Fox News
Fox News
Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
  • 1 people like this
  • 419 Posts
  • 2 Photos
  • 0 Videos
  • 0 Reviews
  • News
Search
Recent Updates
  • WWW.FOXNEWS.COM
    AI humanoid robot learns to mimic human emotions and behavior
    Published April 13, 2025 6:00am EDT close New AI humanoid robot learns to mimic human emotions and behavior in real time It's like a real-life WALL-E, but with even more personality. Ready for a robot that not only looks human but also acts and reacts like one, expressing emotions like shyness, excitement or friendliness? Disney Research, the innovation powerhouse behind The Walt Disney Company, has turned this into reality. Its latest creation is an autonomous humanoid robot that can mimic human emotions and behaviors in real time. Think of it as a real-life WALL-E, but with even more personality.This groundbreaking robot uses advanced artificial intelligence to replicate natural gestures and deliberate actions with striking accuracy. What makes it truly special is how it learns by observing and mimicking human operators who guide its emotional responses during interactions. Over time, the robot becomes capable of engaging with people on its own, making every interaction feel personal and lifelike.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW Autonomous humanoid robot can mimic human emotions and behaviors  (Disney Research)How does it work? Training robots to feelThe secret sauce behind this emotional robot lies in its training process. Initially, a human operator remotely controlled the robot, using instincts and social intuition to guide its behavior. For example, if someone approached the robot shyly, the operator would respond in kind, teaching the robot how to mirror that emotion. These interactions were recorded and fed into an AI system that analyzed every movement and response.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Disney Research explains it best: "Our model learns to predict continuous operator commands through a diffusion process and discrete commands through a classifier."In simpler terms, the AI learns two things, smooth movements (like waving) and specific actions (like saying hello). After extensive training in simulations, the robot was tested with real people, and it nailed it. Users could even recognize different "moods" generated by the robot’s AI. This autonomous humanoid robot can mimic human emotions and behaviors.  (Disney Research)The role of Newton: A physics engine for next-gen roboticsBehind this innovation is Newton, an open-source physics engine developed by Disney Research in collaboration with NVIDIA and Google DeepMind. Newton is designed to close the "sim-to-real" gap in robotics by creating ultra-realistic virtual environments where robots can be trained efficiently. This means robots can practice complex tasks, like interacting with soft objects or navigating tricky terrains, before stepping into the real world.Newton’s capabilities are impressive:Differentiable physics: It allows robots to optimize their movements by simulating how actions will play out in real-world scenarios.Extensibility: Robots can interact with diverse objects like food or fabric, making them perfect for entertainment purposes.GPU acceleration: With NVIDIA’s Warp technology, simulations run up to 100 times faster than traditional methods.Disney plans to use Newton to enhance its robotic character platform, which includes expressive droids like the Star Wars-inspired BDX models showcased at NVIDIA’s GTC keynote this year.GET FOX BUSINESS ON THE GO BY CLICKING HERE An autonomous humanoid robot that can mimic human emotions and behaviors  (Disney Research)Disney’s vision: Robots that tell storiesFor Disney, these humanoid robots are more than just technological advances. They’re storytellers. Kyle Laughlin, senior vice president of Walt Disney Imagineering Research & Development, shared his excitement about what’s next."This collaboration will allow us to create a new generation of robotic characters that are more expressive and engaging than ever before — and connect with our guests in ways that only Disney can," he said.The BDX droids are just the beginning. Disney envisions a future in which robots aren’t just tools but companions that make you laugh, cry and feel connected, just like your favorite Disney characters. An autonomous humanoid robot can mimic human emotions and behaviors  (Disney Research)Kurt's key takeawaysDisney’s humanoid robot is a peek into a future where machines don’t just assist us, they engage with us emotionally. With billions of humanoid robots expected by 2050, innovations like these are setting the stage for a world where technology feels more human than ever before. Who knows? The next time you visit a Disney park, you might just find yourself chatting with a robot that feels as alive as you do.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about robots that can mimic human emotions? Do you think they could enhance our lives, or does the idea of machines expressing feelings make you uneasy? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 22 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: White House record-keeping revamp
    Recommended By Fox News Staff Fox News Published April 12, 2025 8:30am EDT This photo posted by DOGE on Feb. 11, 2025, shows shelving and cardboard boxes which DODGE says workers at the underground mine facility use to store federal worker retirement papers. (DOGE / X) Welcome to Fox News' Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- White House rolls out implementation of AI for federal employee records- 'Wizard of Oz' AI makeover is 'total transformation,' sparking mixed reactions: experts- OpenAI countersues Elon Musk, claiming he 'has tried every tool available to harm' the company The White House announces that it will implement AI technology to improve efficiency in federal records keeping. (Right photo by AP Photo/Alex Brandon, left photo by Oliver Berg/picture alliance via Getty Images) (Alex Brandon, Oliver Berg)HISTORIC EFFICIENCY: Fox News Digital has learned that the U.S. Office of Personnel Management (OPM) will post an updated Privacy Impact Assessment (PIA) at the close of business Wednesday that paves the way for artificial intelligence to improve government efficiency and enhance the federal record-keeping process. Bert Lahr as the Cowardly Lion, Jack Haley as the Tin Man, Judy Garland as Dorothy Gale and Ray Bolger as the Scarecrow in a scene from the film "The Wizard Of Oz," 1939. (Metro-Goldwyn-Mayer/Getty Images)NOT IN KANSAS ANYMORE: The use of artifical intelligence to reimagine the classic film "The Wizard of Oz" will likely see mixed reactions from fans, experts told Fox News Digital.BAD-FAITH TACTICS: OpenAI escalated its legal battle with Elon Musk by countersuing the Tesla and xAI CEO, claiming in a lawsuit he "has tried every tool available to harm" the company.  Jerome Dewald used an AI-generated avatar as his attorney while appearing in front of the New York State Supreme Court Appellate Division's First Judicial Department on March 26, 2025.  (New York State Supreme Court Appellate Division's First Judicial Department/YouTube)OBJECTION: An artificial intelligence-generated avatar was the source of contempt inside a New York courtroom after judges quickly realized the attorney arguing a case in front of them was not real.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
    0 Comments 0 Shares 28 Views
  • WWW.FOXNEWS.COM
    Hackers find a way around built-in Windows protections
    Tech Hackers find a way around built-in Windows protections How Windows Defender Application Control is exploited and what you can do to stay safe Published April 12, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt ‘CyberGuy’ Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All Windows PCs come with a built-in security feature called Windows Defender Application Control (WDAC), which helps prevent unauthorized software from running by allowing only trusted applications. However, despite its purpose, hackers have discovered several ways to bypass WDAC, exposing systems to malware, ransomware and other cyber threats. As a result, what was once considered a strong layer of defense may now serve as a potential vulnerability if not properly managed.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW Image of a Windows laptop. (Kurt "CyberGuy" Knutsson)What is Windows Defender Application Control (WDAC) bypass?Windows Defender Application Control (WDAC) is a security feature in Windows that enforces strict rules about which applications can run. It helps block unauthorized software, but researchers have found ways to bypass these protections.Bobby Cooke, a red team operator at IBM X-Force Red, confirmed that Microsoft Teams could be used as a WDAC bypass. He explained that during Red Team Operations, they were able to get around WDAC and execute their Stage 2 Command and Control payload.GET FOX BUSINESS ON THE GO BY CLICKING HERETo find and fix these security gaps, Microsoft runs a bug bounty program that rewards researchers for reporting vulnerabilities in WDAC and other security components. However, some bypass techniques go unpatched for long periods. Teams Electron API Surface revealed. (IBM)How hackers bypass Windows Defender Application ControlOne of the key ways attackers get around WDAC is by using Living-off-the-Land Binaries, or LOLBins. These are legitimate system tools that come pre-installed with Windows, but hackers can repurpose them to execute unauthorized code while avoiding security detection. Since these tools are trusted by the system, they provide an easy way to slip past defenses.Some bypass techniques involve DLL sideloading, where attackers trick legitimate applications into loading malicious DLLs instead of the intended ones. Additionally, if WDAC policies are not enforced properly, attackers can modify execution rules to allow unauthorized software to run.Hackers also use unsigned or loosely signed binaries. WDAC relies on code signing to verify an application’s authenticity. However, attackers sometimes exploit misconfigurations where loosely signed or unsigned binaries are mistakenly allowed, letting them execute malicious payloads.Once an attacker bypasses WDAC, they can execute payloads without being flagged by traditional security solutions. This means they can deploy ransomware, install backdoors, or move laterally within a network without triggering immediate suspicion. Since many of these attacks use built-in Windows tools, detecting malicious activity becomes even more difficult. Image of a Windows laptop. (Kurt "CyberGuy" Knutsson)3 ways you can protect your PC from WDAC hackersSince this attack exploits a vulnerability within WDAC, there is little you can do to fully protect yourself. It is up to Microsoft to fix the issue. However, here are three best practices you can follow to reduce your risk.1. Keep Windows updated: Microsoft regularly releases security updates that patch vulnerabilities, including those related to WDAC. Keeping Windows and Microsoft Defender up to date ensures you have the latest protection against known threats. If you’re not sure how to do that, see my guide on how to keep all your devices and apps updated.2. Be cautious with software downloads: Only install applications from trusted sources like the Microsoft Store or official vendor websites. Avoid pirated software, as it can come bundled with malicious code that bypasses security protections like WDAC.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?3. Use strong antivirus software: Based on the report, it does not appear that hackers require user interaction to bypass WDAC. The methods described suggest that an attacker could exploit these vulnerabilities without direct user input, especially if they already have some level of access to the system.However, in real-world scenarios, attackers often combine such exploits with social engineering or phishing to gain initial access. For example, if an attacker gains access through a phishing attack, they might then use WDAC bypass methods to execute further malicious payloads. So, while direct user input may not be necessary for some bypass techniques, attackers often use user actions as an entry point before exploiting WDAC vulnerabilities. The best way to avoid becoming a victim is to have a strong antivirus software installed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurt’s key takeawaysWhile Windows Defender Application Control (WDAC) offers a valuable layer of security, it isn’t foolproof. Hackers are actively developing and using WDAC bypass techniques to exploit gaps in system defenses. Understanding how WDAC bypass works is essential to protecting your devices. By keeping your software up to date, using trusted applications, and relying on reputable security tools, you can significantly lower your risk.CLICK HERE TO GET THE FOX NEWS APPDo you think Microsoft is doing enough to patch these vulnerabilities, or should it take stronger action?  Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 30 Views
  • WWW.FOXNEWS.COM
    Is this robot after our hospitality, retail and healthcare jobs?
    Tech Is this robot after our hospitality, retail and healthcare jobs? How this semi-humanoid robot is beginning to enter into the workforce Published April 12, 2025 6:00am EDT close Is this robot after your hospitality, retail and healthcare jobs FlashBot Arm is designed to interact more like a human. As you navigate through your daily routine, whether it's grabbing a meal at a restaurant, visiting a healthcare center or checking into a hotel, you might soon encounter a new kind of robot at these places. It’s called the FlashBot Arm, and Pudu Robotics is behind it. This semi-humanoid robot combines advanced manipulation capabilities with intelligent delivery features, making it a significant innovation in the service robotics sector. Unlike traditional robots, the FlashBot Arm is designed to interact with its environment in a more human-like way.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW FlashBot Arm in a hotel. (Pudu Robotics)What is the FlashBot arm?The FlashBot Arm is an upgraded version of Pudu's FlashBot Max, a wheeled cube used for autonomous item delivery within buildings. This new model adds two robotic arms with seven degrees of freedom each and dexterous hands featuring 11 degrees of freedom, allowing it to perform tasks such as pressing elevator buttons, swiping card keys and carrying objects. These enhancements enable the robot to adapt effortlessly to various tasks without requiring costly modifications to existing infrastructures. FlashBot Arm in a hotel. (Pudu Robotics)SpecificationsDimensions: 21.22 x 20.28 x 56.7 inchesWeight: 33 lbsBattery life: Up to 8 hours on a single 4-hour chargeAutomatic recharging: Automatically returns to the charging station when the battery is low, ensuring safety and convenienceMaximum reach: 6.6 feet operational range for both armsDisplay: 10.1-inch touchscreen capable of displaying facial expressionsNavigation: VSLAM + LiDAR SLAM for real-time mapping and obstacle avoidancePayload capacity: Can carry up to 33 lbs FlashBot Arm in a restaurant. (Pudu Robotics)Advanced features and capabilitiesOne of the FlashBot Arm's standout features is its ability to navigate complex environments entirely on its own. Using advanced VSLAM and laser SLAM technologies, it creates detailed 3D maps, allowing it to move through spaces and avoid obstacles in real time. This is especially valuable in places like hotels, where traditional robots often struggle with elevator navigation due to infrastructure limitations. The FlashBot Arm overcomes these challenges seamlessly, handling tasks from picking up items to operating elevators and delivering them with precision, which significantly boosts service efficiency.The robot also incorporates cutting-edge large language models that enable it to hold natural conversations with people. Through these interactions, it can understand verbal delivery instructions and coordinate with other robots in the vicinity to analyze tasks and break them down for efficient execution. This conversational capability makes the FlashBot Arm a more interactive and responsive tool, elevating the overall experience by providing personalized service tailored to specific needs. FlashBot Arm in a restaurant. (Pudu Robotics)Applications across industriesThe FlashBot Arm is designed for diverse commercial settings:It can deliver items to guests autonomously in hotels while navigating elevators.In restaurants and retail spaces, it assists staff by transporting goods or interacting with customers.In healthcare facilities, it supports medical staff with logistical tasks like moving supplies.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? FlashBot Arm in a service environment. (Pudu Robotics)Safety and user interactionThe FlashBot Arm is designed with safety and seamless interaction in mind. It’s packed with high-precision sensors like RGBD cameras, LiDAR, panoramic cameras and pressure-sensitive skin, which help it understand its surroundings in real time. These features allow the robot to navigate safely and stop immediately if it encounters an obstacle, ensuring smooth human-robot interactions. You can communicate with the FlashBot Arm using voice commands, gestures, or even through its expressive touchscreen face, making the experience feel natural and intuitive. Its sleek design also makes it approachable and engaging, breaking down barriers for anyone interacting with this cutting-edge technology.GET FOX BUSINESS ON THE GO BY CLICKING HERE FlashBot Arm in a hotel. (Pudu Robotics)Cost and availabilityThe FlashBot Arm is priced at approximately $28,000, making it a premium solution for businesses looking to integrate advanced robotic assistance into their operations. As for availability, Pudu Robotics has established a presence here in the U.S. with headquarters in Santa Clara, California, and a fulfillment center in Hamilton, New Jersey. This setup ensures that the FlashBot Arm is accessible to businesses across the U.S. through authorized distributors. However, specific pricing and availability details may vary, so it's best to contact Pudu Robotics directly for more information. FlashBot Arm in a hotel. (Pudu Robotics)Kurt's key takeawaysAs impressive as this technology is, it’s impossible to ignore the concerns it raises. For some, the FlashBot Arm represents progress — streamlining tasks and enhancing services in ways that were once unimaginable. For others, it’s a sign of growing automation that could displace human workers, particularly in roles traditionally filled by manual labor. While robots like the FlashBot Arm can create new opportunities in areas like maintenance and programming, they also bring the risk of job displacement for those without access to retraining or alternative career paths. The reality is that automation isn’t going away — it’s expanding. But its adoption isn’t instantaneous, giving us time to adapt and find ways to balance innovation with workforce stability.CLICK HERE TO GET THE FOX NEWS APPHow do you view these robots, as helpful tools or potential threats to employment? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 35 Views
  • WWW.FOXNEWS.COM
    Can't find your Android phone? Here's what to do to track it down
    Published April 11, 2025 10:00am EDT close How to free up space on your Android Three simple tricks to free up valuable space on your device. You're about to run out of the house, and suddenly your phone is nowhere to be found. Or you get in your car after being at the store, and your phone's not in your bag.Does this scenario sound familiar? Whether you're someone who loses or misplaces your phone frequently or just once in a blue moon, we've all been there.Unfortunately, finding your phone is not so easy. Perhaps you try calling it, but your ringer is on silent. Or it fell into the cracks somewhere, and you can't see the screen light up. Luckily, there's another way to find your Android phone if you're unsure where you last left it. iPhone users, be sure to check out four ways to find your lost iPhone, with and without other devices.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW A man looking at his smartwatch (Kurt "CyberGuy" Knutsson)1. Ping your phone using your smartwatchOne way to find your Android phone if you're not quite sure where you last left is to rely on your smartwatch, which you can use to ping your phone. This feature sends a signal to your phone, making it ring loudly even if it's on silent, helping you locate it quickly.Open the watch app: On your Android watch (such as a Samsung Galaxy watch), swipe down to access the quick settings menu.Find the Find My Phone icon: Look for an icon that resembles a phone with sound waves around it.Ping your phone: Tap the icon, and your phone will start ringing, making it easier to find.2. Use your Google Account to ‘Find My Device’If you have access to a device connected to your Google account, such as a laptop, tablet or another smartphone, you can use it to find your Android phone. This feature is part of Google's ecosystem and allows you to locate your phone through the Google Play Store or any web browser.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?To use Google's Find My Device feature, a few things must have been set up on your Android phone before it was lost:Your phone must be signed into your Google accountLocation Services must be turned onThe Find My Device feature must be enabled:Go to Settings → Security → Find My Device and ensure it's onYour phone must be powered on and connected to mobile data or Wi-Fi for real-time tracking(Optional but helpful) Your device should be visible on Google Play. You can check this at play.google.com/settings and ensure visibility is turned onIf these conditions are met, you can use any device (such as a laptop, tablet or another phone) connected to the internet to find your lost Android phone:zOn any device, open a web browser or the Google Play Store appLog insame Google account linked to your lost phoneIn the web browser, go to Find My Device. If using the Google Play Store, open the menu and select Find My DeviceGoogle will display your phone's last known location on a mapYou can also use options to make it ring, lock it or erase its data to protect your personal information Find My Device map (Google)3. Utilize the old-school methodIt may go without saying, but with all this convenient technology, sometimes the tried-and-true methods are easily forgotten. If you happen to lose your Android, consider retracing your steps: call the places you visited within the last few hours, ask employees if anyone found their phone, and check all the nooks and crannies in your car, bag, etc. You can also try calling your phone to see if anyone answers, and if they're honest, you can find a safe, public place to meet up. Also, if you happen to lose your phone in a ride-share, those apps have methods to communicate with the driver in order to get your phone back.What to consider if you lose or misplace your AndroidAnyone can lose their phone at some point. Therefore, be careful what apps and security you have on your phone. For instance, if you have banking apps, notes with your passwords listed or private messages and emails, you'll want to have an extra layer of security on your phone, like a keypad lock or biometric security. This way, if your phone is placed in the wrong hands, they can't access your sensitive data.Even if you have those security features on your Android, if you call your phone and someone happens to answer, be wary of what information you give them. Though one would hope the finder would be honest, you never know. They could set you up for a scam, so trust your gut.Other tips to protect your Android phone: Essential accessoriesTo minimize the risk of damage happening to your Android phone, whether that damage is from when you lost or misplaced it, it may be worth investing in some protective gear and tools. Here are some must-haves for any smartphone owner.1. Install strong antivirus software to keep your Android safeThe best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Invest in a durable phone caseA sturdy phone case can prevent damage from drops, bumps and scratches. Consider cases from reputable brands offering shock absorption, reinforced corners and raised edges to protect the screen and camera. Look for materials such as silicone, TPU or hybrid constructions that combine multiple layers for enhanced durability. Additionally, some cases come with added functionalities like kickstands or cardholders, making them both protective and practical.3. Opt for a high-quality chargerUsing a high-quality charger ensures your phone charges efficiently and safely. Look for chargers that offer fast charging capabilities and are certified by your phone's manufacturer. Plus, investing in a reliable charger can save you from the frustration of slow charging times and potential damage to your device. It’s always worth having a dependable charger on hand, especially for those busy days when you need a quick power boost.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman with a dead Android (Kurt "CyberGuy" Knutsson)4. Consider a privacy screenPrivacy screens can prevent prying eyes from viewing your phone’s display, adding an extra layer of security. They are especially useful in public places. Imagine being on a crowded train or in a busy cafe, these screens can give you peace of mind knowing your personal information stays private. Plus, they can also reduce glare, making it easier to see your screen in bright environments.Kurt's key takeawaysLosing your phone can be a frustrating experience, but with the right strategies and tools at your disposal, you can recover it quickly and efficiently. Whether you rely on your smartwatch to ping your device, utilize Google’s "Find My Device" feature or revert to the classic method of retracing your steps, there are multiple ways to help you locate your Android phone. So, the next time you find yourself frantically searching for your phone, you’ll be equipped with the knowledge and tools to handle the situation with confidence.CLICK HERE TO GET THE FOX NEWS APPWhat strategies or tools have you found most effective for locating your lost phone, and do you have any personal stories to share about your experiences with misplaced devices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 26 Views
  • WWW.FOXNEWS.COM
    Teen goes from 10 nightly seizures to zero with brain implant
    close Teen goes from 10 nightly seizures to zero with brain implant Minimally invasive procedure at the Mayo Clinic uses NeuroOne's cutting-edge brain implant technology. Imagine waking up seizure-free after years of suffering. For 17-year-old Clara Fuller, this dream became reality thanks to groundbreaking brain implant technology. Her journey from relentless seizures to a normal teenage life highlights the incredible potential of medical innovation.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Brain implant patient Clara Fuller (NeuroOne)A life turned upside downAt just 13, Clara began experiencing uncontrollable seizures that baffled doctors. Initially misdiagnosed with anxiety and gallbladder issues, she even underwent unnecessary surgery before doctors finally identified the real culprit: epilepsy. But this wasn’t just any epilepsy; Clara had multifocal epilepsy, a rare and severe form that resists all medication."Every night I would have seizures, up to 10, and it was just miserable," Clara said, recalling the years lost to her condition.Her adolescence was marked by sleepless nights and constant medical challenges, robbing her of the simple joys of being a teenager. For years, there seemed to be no solution in sight. Brain implant patient Clara Fuller (NeuroOne)A revolutionary solutionEverything changed this past summer when Clara became the first pediatric patient to undergo a minimally invasive procedure at the Mayo Clinic using NeuroOne's cutting-edge brain implant technology. The device, known as the NeuroOne OneRF Ablation System, is the first of its kind FDA-cleared technology designed for both diagnosing and treating neurological disorders in one procedure."It took them maybe 30 minutes, and the longest part was setting up," Clara said about the procedure that transformed her life.Dr. Brin Freund, a neurologist at the Mayo Clinic in Jacksonville, Florida, explained Clara’s case in more detail: "Clara has had a history of seizures that, unfortunately, were uncontrolled with medications. In these cases, surgery may be the only option to reduce and potentially cure the seizure disorder. After a thorough diagnostic evaluation, our group at Mayo Clinic Florida recommended implantation of electrodes (stereoelectroencephalography, or stereo EEG) in the brain to determine where her seizures were originating, in order to develop a surgical plan to treat them. "Clara and her family were very much in agreement with this plan, given how debilitating her seizures had been and the failure to control her seizures with medications. Clara underwent implantation of NeuroOne electrodes in order to record seizure activity to determine where her seizures were arising from and then to potentially treat them by performing radiofrequency ablation in these areas." Brain implant patient Clara Fuller (NeuroOne)How NeuroOne’s dual-function system worksThe NeuroOne system uses ultra-thin electrodes to pinpoint the exact source of seizures in the brain. Once identified, it employs radiofrequency energy to disrupt abnormal electrical signals in problematic brain tissue without permanently damaging surrounding areas. This dual functionality, diagnostic and therapeutic, is what sets it apart from traditional methods that require two separate surgeries.NeuroOne CEO Dave Rosa explained: "What separates our technology from others is that our device can be used for both the diagnostic part – finding the area of the brain – and then ablating or destroying that tissue, all in the same hospitalization." He added that this approach minimizes patient risk by reducing the number of procedures and hospitalizations required.Freund emphasized this advantage:"Stereo EEG electrodes provide the ability to localize seizure onset with excellent precision as long as the electrode implantation is planned thoroughly and accurately. With regards to the NeuroOne electrodes, they allow for radiofrequency ablation to be performed while the electrodes are still implanted without having to remove them. We can therefore not only localize the seizure onset but provide a surgical treatment and potentially avoid a second and potentially more extensive or invasive procedure such as a craniotomy and resection of brain tissue. "The NeuroOne electrodes allow us to control the conditions of the ablative procedure. They also provide us more confidence that the electrodes will withstand the duration of the implantation, which would include recording seizure data, performing the ablation and then recording more data after the ablation to ensure that the treatment achieved the intended goal." Brain implant patient Clara Fuller (NeuroOne)The resultsThe results have been nothing short of life-changing for Clara. Since undergoing the procedure, she has been completely seizure-free. She’s now back to enjoying school, sports and uninterrupted sleep – things most people take for granted but were once unimaginable for her.According to Freund:"Regarding the implantation itself, she did very well and there were no adverse effects. The first ablation did not cause any acute complications. We then performed a second ablation a few days later after data was recorded from the electrodes demonstrating ongoing seizure activity to ensure that her seizures would not recur. This was also well-tolerated without complications. We have now followed up months after the electrodes were removed and there have been no signs of ill effects due to the implantation or the ablations. She has been seizure-free since the ablation and has done amazingly well."Clara’s story offers hope for others living with drug-resistant epilepsy, which affects about one-third of the 3 million Americans with epilepsy. According to Rosa, "The desire to expand ablation therapy to patients suffering from seizures that do not respond to drug therapy was our driving force." NeuroOne One RF Ablation System (NeuroOne)A broader impact on medicineNeuroOne’s innovative technology isn’t just limited to epilepsy treatment. The company plans to expand its applications to other areas, such as pain management for facial pain and lower back pain, using the same RF ablation technology. Rosa also sees potential for treating neurological conditions beyond epilepsy: "Pain management appears to be the largest opportunity outside of brain ablation."Dr. Freund believes this technology could dramatically improve long-term care for pediatric epilepsy patients like Clara: "This technology could allow for limiting the number of procedures that are required to treat drug-resistant focal epilepsy and also provide immediate feedback as to whether or not a surgical treatment was effective. This could potentially reduce the risk of adverse events by limiting the number of times that a brain surgery would be needed. This technology also allows us to access deeper parts of the brain to provide surgical treatment."He added that the impact may soon be widespread:"In our practice, we are now using these electrodes in every case that requires Stereo EEG for treatment of drug-resistant epilepsy. I think as these types of electrodes are used at more centers and they get more experience, there would be no reason not to use them." NeuroOne One RF Ablation System (NeuroOne)Kurt's key takeawaysClara's remarkable journey from a life plagued by seizures to one of freedom and normalcy underscores how advancements in medical technology are transforming lives in profound ways. Her story offers hope for those struggling with drug-resistant epilepsy and other neurological conditions.As technology continues to push boundaries, we can expect even more groundbreaking treatments to emerge, offering new possibilities for those who once felt limited by their conditions. In the words of NeuroOne's CEO, this revolutionary technology promises a future where fewer surgeries and safer outcomes become the norm.If you or someone close to you had epilepsy, would you consider trying innovative treatments like this? Why or why not? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 34 Views
  • WWW.FOXNEWS.COM
    How thieves use new credit card numbers before you receive them
    Tech How thieves use new credit card numbers before you receive them Why charges can appear on a new card before it arrives and how to respond Published April 10, 2025 10:00am EDT close Consumers are putting money on credit cards, can't pay it off H Squared Research's Hitha Herzog says consumers have been financing their lives on "Your World." Imagine receiving a notification about suspicious charges on a credit card you haven’t even received yet. How could that happen? While it sounds surprising and unsettling, it's increasingly common due to the rise of digital credit card fraud. Criminals no longer need physical cards to make unauthorized transactions, thanks to methods such as data breaches, phishing schemes and card-not-present fraud. Here's how these schemes work and what steps you should take immediately to protect yourself.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Illustration of a crook stealing credit card info (Kurt "CyberGuy" Knutsson)How it happensEven if a new credit card hasn’t arrived yet, it may already be vulnerable. In many cases, the issue isn’t about the card being physically stolen but about someone gaining access to your information digitally. Criminals can exploit online account features, mobile wallets or leaked personal data to start using your card before you’ve even opened the envelope. Below are some of the most common ways this type of fraud happens.1. Account takeover or accessIf a scammer already has access to your account, either through stolen login credentials, a hacked email or malware, they can view the newly issued card number in the online dashboard or mobile app. Many credit card companies now allow instant access to digital card numbers for use in Apple Pay, Google Wallet or online purchases. This means that as soon as a new card is issued, it may be visible digitally before the physical card is even shipped. If a fraudster has access to your account, they can add the number to a digital wallet and begin spending before the envelope ever hits your mailbox.2. Digital wallet hijackSome card issuers allow you to add your credit card to mobile wallets instantly, even before the physical card arrives. While this feature is convenient, it can also expose you to specific security risks tied to mobile wallet activation. Criminals may exploit this process by using stolen personal information to bypass security checks and add your card to their own Apple Pay or Google Wallet accounts. They might pose as you to request a new card, intercept or reroute the digital activation process, or even start making fraudulent purchases immediately. This type of fraud can be hard to detect, especially if you're not expecting a new card or if unauthorized charges blend in with legitimate transactions. Illustration of someone using their digital wallet (Kurt "CyberGuy" Knutsson)3. Phishing or data breachesAnother common scenario involves your personal information being compromised in a phishing attack or large-scale data breach. Thieves use this stolen data, such as your name, Social Security number, address and security question answers, to impersonate you and gain access to your account dashboard or reset login credentials. Once inside, they can retrieve new card details directly from the source or request a replacement card. Phishing scams often trick victims into revealing sensitive information through fake emails or websites, while data breaches expose vast amounts of personal data that criminals can exploit for fraudulent activities.4. Mail theftAlthough charges made before a new credit card is received are rarely due to mail theft, this type of traditional fraud still poses a risk. Criminals may intercept your mail to steal sensitive documents, including credit cards, which can then be used for unauthorized purchases. To reduce this risk, avoid leaving important mail unattended in your mailbox. Consider using Informed Delivery by USPS to track incoming mail or request that your credit card be delivered to a secure location, such as a P.O. box or directly to your bank branch.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A person using their new credit card (Kurt "CyberGuy" Knutsson)What to do immediatelyIf you find yourself in this situation where fraudulent charges appear on a card you haven’t received yet, take these steps right away.1. Change login credentials: Update all login information with your bank or credit card company, including:New passwordSecurity questionsPIN (if applicable)If your account is linked to an email address that may also be compromised, update the password for that email account as well. Many fraudsters gain access by first hacking your email, which can give them entry to password-reset links and sensitive notifications. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.2. Use strong antivirus software: If spyware or a keylogger has been installed on your device, it can continue to steal sensitive data, such as passwords and personal information, even after you change your credentials. To protect yourself, install strong antivirus software on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable multifactor authentication (MFA): Add MFA to all accounts tied to your financial information. This adds an extra layer of security by requiring a second verification step (e.g., a code sent to your phone) before accessing sensitive accounts.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.5. Invest in personal data removal services: Consider using a personal data removal service to reduce your online exposure. These services continuously monitor and remove your sensitive information from data brokers and websites that could be exploited by criminals. This lowers the chances of your data being used in phishing scams or other fraudulent activities. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.6. Ask your credit card company to investigate: Contact your credit card provider directly and request a full investigation. Ask if there was any suspicious account activity, such as a login from a new device, before the fraudulent charges occurred. They may be able to trace when and how your account was accessed. Most card issuers will reverse fraudulent charges and can reissue a new card with a different number.7. Notify law enforcement: File a report with the Federal Trade Commission. If necessary, a police report should also be filed to document the fraud. This can be helpful for disputing charges and clearing your record. Kurt's key takeawaysSo, we've uncovered how those sneaky credit card charges can surface even before you've held the card in your hands. It's a reflection of the increasingly digital world we live in, where our personal information can be vulnerable in surprising ways. Remember, use strong antivirus software and consider a personal data removal service to minimize your online footprint. If you find yourself in this situation, act fast by changing your passwords, enabling multifactor authentication and reporting the issue to your card company.CLICK HERE TO GET THE FOX NEWS APPWhat's the most unexpected way your personal info has been compromised, and what steps did you take to recover? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 35 Views
  • WWW.FOXNEWS.COM
    Cutting-edge drone tech maps land and water with laser accuracy
    Tech Cutting-edge drone tech maps land and water with laser accuracy How lidar is being used to help with environmental research Published April 10, 2025 6:00am EDT close Cutting-edge drone tech maps land and water with laser accuracy YellowScan’s Navigator system is designed to map underwater topography in rivers, ponds and coastal areas. Picture yourself standing by a river, watching as a drone hums overhead. Below, its lidar system scans the landscape, mapping both the land and the shallow waters with pinpoint accuracy. This is precisely what YellowScan’s new Navigator system is designed to do. Built specifically for mapping underwater topography in rivers, ponds and coastal areas, the Navigator is changing the game for environmental monitoring.With precision where traditional methods struggle, it’s giving researchers and conservationists a whole new way to understand our planet’s changing waterways.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Navigator system (YellowScan)Key features and specificationsThe Navigator weighs approximately 8.16 pounds and is compatible with professional drones. In optimal conditions, it can map shallow waters up to 65.6 feet deep, producing digital models with an accuracy of approximately 1.18 inches. Key features include:Miniaturized high-precision sensor technologySuitability for mapping shallow waters where traditional techniques are unsafeAdaptive signal processing for challenging water conditionsIntegrated camera for true-color data visualizationUp to 45 minutes of autonomy on a single battery charge Navigator system (YellowScan)Environmental applicationsYellowScan emphasizes that the Navigator is a critical tool for addressing climate change impacts and advancing environmental research. Its applications include the following.Tracking coastal erosion and sediment movement: The Navigator provides centimeter-level precision in mapping shorelines, enabling researchers to model erosion patterns and sediment transport more effectively. This data is vital for developing strategies to protect vulnerable coastal communities from flooding and habitat loss.Monitoring underwater biodiversity habitats: By capturing detailed 3D images of underwater ecosystems, the Navigator allows scientists to assess habitat volume and spatial distribution. This capability is particularly useful for studying critical environments like eelgrass beds, which support marine biodiversity.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Assessing coral reef degradation: The system’s ability to map reefs in high resolution helps researchers monitor changes in coral health over time. This information is essential for identifying stress factors like bleaching events and guiding conservation efforts.Evaluating sea-level rise impact zones: The Navigator enables precise mapping of low-lying coastal areas at risk from rising sea levels. By providing accurate elevation data, it supports planners in designing mitigation strategies and preparing for climate-induced migration.Documenting changes in marine ecosystems: With its advanced lidar technology, the Navigator captures temporal changes in marine environments, offering insights into how human activity and climate change are reshaping aquatic ecosystems. Navigator system (YellowScan)How the Navigator could transform key sectorsYellowScan highlights the Navigator’s potential to make a significant impact across various sectors. In environmental research, it enhances data collection, leading to more accurate environmental assessments. For marine conservation, the Navigator offers tools to better monitor and protect delicate marine ecosystems. When it comes to coastal protection strategies, it plays a crucial role in developing effective measures to combat erosion and flooding. The system also helps in climate migration planning by identifying vulnerable areas, enabling more informed decision-making. In infrastructure development, the Navigator aids in efficient planning by providing detailed spatial data. Finally, for scientific exploration, it offers researchers new ways to study and understand complex natural environments.GET FOX BUSINESS ON THE GO BY CLICKING HERE Navigator system (YellowScan)Cost of the NavigatorYellowScan hasn’t shared exact pricing for the Navigator yet, but given its advanced tech and precision, you can expect it to be a significant investment. That said, the long-term benefits, like better efficiency, lower operational risks and unmatched data accuracy, make it a smart choice for anyone in environmental research, infrastructure planning or marine conservation. For those interested, it’s best to reach out to YellowScan directly for custom pricing info. Navigator system (YellowScan)Insights from YellowScan's CEOYellowScan CEO Tristan Allouis says, "Years of development and distillation of knowledge were necessary to create YellowScan Navigator. This technology is transforming abstract climate change discussions into concrete, measurable data."Kurt's key takeawaysAt the end of the day, the YellowScan Navigator isn’t just another fancy gadget; it’s a game changer for environmental research. Mapping shallow waters with this level of precision used to be nearly impossible, but now, scientists, conservationists and planners have a powerful new tool at their fingertips. Whether it’s tracking coastal erosion, monitoring marine habitats or preparing for rising sea levels, the Navigator is making complex problems a little easier to solve. And honestly, that’s the kind of tech we need more of.CLICK HERE TO GET THE FOX NEWS APPIf technology can now map the unseen depths of our waterways with precision, what’s stopping us from taking stronger action to protect them? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 40 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: The dangers of oversharing with AI tools
    Recommended By Fox News Staff Fox News Published April 9, 2025 12:26pm EDT close Government officials weigh benefits and risks of artificial intelligence Fox News chief political anchor Bret Baier has the latest on regulatory uncertainty amid AI development on 'Special Report.' Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Dangers of oversharing with AI tools- Instagram Teen Accounts unveils new built-in protections to block nudity, livestreams- ‘Sound of Freedom’ producer says AI tools helped nab child trafficker that eluded FBI for 10 years A man using ChatGPT on his laptop (Kurt "CyberGuy" Knutsson)DON’T OVERSHARE DEETS: Have you ever stopped to think about how much your chatbot knows about you? Over the years, tools like ChatGPThave become incredibly adept at learning your preferences, habits and even some of your deepest secrets. But while this can make them seem more helpful and personalized, it also raises some serious privacy concerns. As much as you learn from these AI tools, they learn just as much about you.GREATER CONTROL: Instagram on Tuesday announced new built-in protections for Instagram Teen Accounts and has expanded its suite of features to the Facebook and Messenger applications. "Sound of Freedom" executive producer Paul Hutchinson details new tools organizations are using to bring child traffickers to justice.  ( Budrul Chukrut/SOPA Images/LightRocket/ANDREI PUNGOVSCHI/AFP via Getty)MAJOR VICTORY: Child predators are on high alert as organizations around the globe have begun rolling out artificial intelligence tools to bring sex traffickers to justice and rescue young victims, according to "Sound of Freedom" executive producer Paul Hutchinson.INDUSTRIAL SUPER-HUMANOID ROBOT: In a groundbreaking development, California-based robotics and artificial intelligence company Dexterity has unveiled Mech, the world's first industrial super-humanoid robot. Mech, the world's first industrial super-humanoid robot  (Dexterity)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
    0 Comments 0 Shares 42 Views
  • WWW.FOXNEWS.COM
    200 million social media records leaked in major X data breach
    close Musk reveals X under massive cyberattack Elon Musk announces his platform X is experiencing a major coordinated cyberattack. X, formerly known as Twitter, has been making headlines recently, with Elon Musk claiming that hackers have been trying to disrupt the platform. However, the most recent news involving the social media site is particularly alarming and puts its users at serious risk. Earlier this month, reports emerged of a major data breach involving X, after a self-proclaimed data enthusiast known as "ThinkingOne" claimed to have released a database containing over 200 million user records on a popular hacker forum. The leaked data includes names, email addresses and nearly everything else associated with a user’s X profile. X app on an iPhone (Kurt "CyberGuy" Knutsson)What you need to knowThe X data leak is believed to stem from a combination of breaches, including a massive one that allegedly occurred in January 2025 and another in 2023. The leaked dataset, reportedly a 34 GB CSV file, contains 201,186,753 entries with information such as X screen names, user IDs, full names, locations, email addresses (from the 2023 breach), follower counts, profile data, time zones and profile images.ThinkingOne claimed that the data was cross-referenced from a larger breach involving 2.8 billion unique Twitter IDs and screen names. This breach may have been linked to an insider job during layoffs at X, although the company has not verified this claim. Cybersecurity researchers, including those from Safety Detectives, partially confirmed the authenticity of the data by matching a sample with public X profiles and verifying some email addresses. However, they were not able to fully confirm ownership.The breach appears to trace back to a vulnerability identified in January 2022 through Twitter’s bug bounty program. This flaw allowed attackers to access user data using only an email address or phone number. Although the vulnerability was patched, the compromised data seems to have resurfaced in later leaks. Partial confirmation of the data (Safety Detectives) (Kurt "CyberGuy" Knutsson)The data breach puts X users at riskThe 2025 incident alone does not include passwords or financial information, but when combined with the email addresses from the 2023 leak, it significantly increases the risk of phishing and social engineering attacks. X has not officially acknowledged this specific breach at the time of writing, although it previously downplayed the 2023 incident by claiming it involved mostly public data.The total of 2.8 billion records far exceeds X’s estimated 335 to 600 million active users, suggesting that the dataset may include inactive accounts, bots or historical data. While the full scope and impact of the breach remain unclear, the incident highlights ongoing security challenges for the platform, especially following its acquisition by xAI in late March 2025. X logo on a smartphone (Kurt "CyberGuy" Knutsson)7 ways you can stay safe from the X data breachIf you have an account on X or think your data may have been part of the breach, here are seven important steps you can take to protect yourself.1) Use strong antivirus software This breach included email addresses linked to X accounts, prime fuel for phishing attacks. Hackers may now send emails that look like they’re from X, Musk or support, asking you to "verify your account" or "reset your password." These often contain links or attachments that can install malware or steal personal data.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Remove your personal data from the internetSince this X leak exposed full names, email addresses and other public-facing profile details, hackers can easily cross-reference it with other data broker sites to build a full profile on you. This could lead to impersonation or spear-phishing.To reduce your exposure, use a trusted data removal service that scans data broker websites and requests the deletion of your personal information. While no service promises to remove all your data from the internet, having a removal service is great if you want to monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.3) Change your X account passwordEven though this particular breach may not have included passwords, there’s still a significant risk, especially if you use the same password across multiple platforms. Once attackers have your email, they often try using it with common or previously leaked passwords to break into accounts.To change your X account password, go to Settings and privacy from your profile menu, then select Your account and tap on Change your password. Enter your current password, set a new strong password and confirm the change. You can do this via the mobile app or by logging in through the web. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.4) Make your X profile more private to reduce future risk Adjust your X account's privacy settings to limit the visibility of personal information, such as making your profile private. Ensure that only necessary information is publicly visible. Information that seems harmless, like your location, job title or birthday, can be used by cybercriminals to impersonate you or guess your login credentials. If your X profile includes any personal details that aren’t necessary, now is the time to remove them.Keeping your profile minimal not only protects your privacy but also makes it harder for scammers to craft convincing phishing messages or social engineering attacks. Think twice before posting personal updates or details publicly, especially if they can be used to guess passwords or verify your identity.Go to Settings > Privacy and safety and lock down your account visibility.5) Enable two-factor authentication (2FA) for your X and email accounts If hackers got your email from the X breach, they may try to reset your password. 2FA helps stop this by requiring a second code to log in:Use an authenticator app like Google Authenticator or Authy, not SMS, which can be interceptedSecure your email accounts, too, since they can be used to reset your X credentials6) Use a VPN on public Wi-Fi Protect your data when accessing X or other platforms on public networks by using a VPN to encrypt your connection. This will help safeguard your information from being intercepted by malicious actors. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.7) Sign up for identity theft protection to catch if your X-linked info is abusedWith 200-plus million names and email addresses exposed, scammers may try opening accounts in your name or use your email in fraud attempts. Good identity protection can alert you if your info is being sold on the dark web. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.Kurt’s key takeawayThe X breach is yet another reminder that patching a vulnerability is only one piece of a much larger puzzle. The persistence of leaked data – years after the original flaw was disclosed and fixed – highlights the long tail of exposure that comes with large-scale breaches. Even when credentials aren’t involved, the combination of identifiers like email addresses, names and social connections can be weaponized through correlation attacks, data enrichment and AI-assisted social engineering.Do you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 61 Views
  • WWW.FOXNEWS.COM
    Humanoid robot breakdances its way into history
    Published April 9, 2025 6:00am EDT close 'CyberGuy': Humanoid robot breakdances into history Atlas robot by Boston Dynamics amazes tech expert Kurt Knutsson with its breakdancing moves. Boston Dynamics is at it again, wowing us with some seriously cool robotic moves. Their latest video of Atlas, their bipedal robot, has blown up online with its mind-blowing human-like movements, including breakdancing. These impressive moves are the result of a collaboration between Boston Dynamics and the Robotics and AI Institute. Atlas humanoid robot breakdancing (Boston Dynamics) (Kurt "CyberGuy" Knutsson)Atlas shows off breakdancing movesBreakdancing, including the famous "coffee grinder" move, is just one of the many impressive feats Atlas can perform. The robot now demonstrates an impressive range of movements that would make even the most seasoned breakdancers envious, such as crawling on all fours with surprising agility, executing forward rolls and cartwheels and performing handstands. It's clear that Atlas is no longer just a walking, talking machine. It's becoming a breakdancer. Atlas humanoid robot breakdancing (Boston Dynamics) (Kurt "CyberGuy" Knutsson)The secret behind the moves: AI and motion captureThe secret behind Atlas' slick moves lies in the combination of reinforcement learning and motion capture technology. Human dancers perform movements while wearing motion capture suits, and this data is fed into Atlas' learning model. Through reinforcement learning, Atlas practices and refines these movements, allowing it to mimic human actions with uncanny accuracy. The result is a robot that can bust a move like a pro. Atlas humanoid robot breakdancing (Boston Dynamics) (Kurt "CyberGuy" Knutsson)Atlas specificationsThe latest fully electric version of Atlas features impressive specifications. Standing at 4 feet 11 inches tall and weighing 196 pounds, this agile robot can reach a top speed of 5.6 mph (approximately 8.2 feet per second). Atlas boasts 28 degrees of freedom, allowing for complex movements and maneuvers.It's equipped with advanced lidar and stereo vision sensors for precise environmental awareness. Unlike its hydraulic predecessors, this version is powered by a fully electric system with all-electric actuators. At its core, Atlas runs on a custom control and computing system, enabling its remarkable performance and adaptability. This new generation of Atlas is stronger and more dexterous than its predecessors, with a broader range of motion that sometimes exceeds human capabilities. Atlas humanoid robot breakdancing (Boston Dynamics) (Kurt "CyberGuy" Knutsson)The cost of cutting-edge roboticsWhile Boston Dynamics doesn't publicly disclose the exact cost of Atlas, industry experts estimate that each unit costs between $500,000 to $1 million to produce as of 2025. This high price tag reflects the cutting-edge technology, advanced materials and countless hours of research and development that go into creating such a sophisticated robot. However, as with most technologies, the cost is expected to decrease over time as production scales up and technologies mature.It's worth noting that Atlas is primarily a research platform and is not currently available for commercial purchase. Instead, Boston Dynamics leases these robots to select partners for research and development purposes, with annual leasing costs estimated to be in the six-figure range. Atlas humanoid robot breakdancing (Boston Dynamics) (Kurt "CyberGuy" Knutsson)Beyond the dance floorWhile watching a robot breakdance is undeniably cool, the implications of this technology go far beyond entertainment. The agility and adaptability demonstrated by Atlas could have significant real-world applications, such as emergency response and search and rescue operations or assisting in environments designed for humans. In fact, Atlas has been trialed in Hyundai Motor Group's vehicle factory since late 2024, potentially revolutionizing manufacturing processes. Atlas humanoid robot breakdancing (Boston Dynamics) (Kurt "CyberGuy" Knutsson)Kurt’s key takeawaysAs we watch Atlas effortlessly spin and cartwheel, it's hard not to be amazed at how far robotics has come. From clunky, barely mobile machines to smooth operators that can outperform humans in certain tasks, the progress is nothing short of miraculous. While we may not see breakdancing robots on every street corner just yet, Atlas' latest performance gives us a glimpse into a future where the line between human and machine movement becomes increasingly blurred.Impressive or unsettling? How comfortable are you with robots moving this well? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 39 Views
  • WWW.FOXNEWS.COM
    Android feature prevents sensitive content in Google Messages
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Have you ever stumbled upon a mysterious app in your Android system settings called "SafetyCore"? If so, you're not alone. Introduced in late 2024, this system service aims to enhance on-device privacy by detecting sensitive content like nudity and enabling features such as Sensitive Content Warnings in Google Messages. While Google assures users that SafetyCore operates locally without sharing data externally, it has still sparked confusion over automatic updates. Let's dive into what SafetyCore does, how it works and the steps you can take to disable it if you choose to do so. A man scrolling on his Android phone (Kurt "CyberGuy" Knutsson)What you need to knowBy definition, SafetyCore is a system service that provides on-device machine-learning infrastructure to help detect sensitive content. It was introduced as part of Google’s Nov. 7, 2024, system update for Android 9 and later.Google initially described SafetyCore as a tool that supports privacy-preserving user protections for apps. One of its first visible uses was in Google Messages, where it enables Sensitive Content Warnings, a feature that blurs images potentially containing nudity and prompts users with additional options before they can view or send them.By default, Google System services automatically update your device with security, bug fixes and new features. Some updates are delivered via system services in separate Android packages. This maintains privacy, security and data isolation following the principle of least privilege because permissions are not shared with other functionality.SafetyCore does more than detect nude images. Its built-in machine-learning functionality can also target, detect and filter images for sensitive content. There is no app icon, and it doesn’t appear in the usual list of running applications. Users must navigate through Settings > Apps > Show system processes to find it. A woman holding an Android phone (Kurt "CyberGuy" Knutsson)What does Google say?Google maintains that SafetyCore is purely an on-device classification service and does not report or share scanned content with Google or other entities. The company argues that the service enhances security without compromising privacy, allowing apps to detect and filter unwanted content locally.We reached out to Google, and a spokesperson told Cyberguy, "Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data."SafetyCore is a new Google system service for Android 9+ devices that provides the on-device infrastructure for securely and privately performing classification to help users detect unwanted content. Users are in control over SafetyCore, and SafetyCore only classifies specific content when an app requests it through an optionally enabled feature."Google also says that as part of its continuous investment in the transparency of its products, the company is going above and beyond, adding binary transparency to SafetyCore. This allows users and developers to verify that SafetyCore is truly privacy-preserving, just like Google says it is.  A Samsung phone (Kurt "CyberGuy" Knutsson)How to remove Android SafetyCoreSettings may vary depending on your Android phone’s manufacturer. (Note: We tested these steps on a Samsung Galaxy S24 Ultra.)If you wish to uninstall or disable SafetyCore on your Samsung Galaxy, follow the steps below:(Note: If you decide to disable or get rid of System SafetyCore, you may not be able to benefit from the new security and privacy features or enhancements that Google offers now or in the future.)Open the Settings app on your deviceTap AppsScroll through the list or use the search bar to find Android System SafetyCoreTap on Android System SafetyCore and check if the Uninstall option is available. If Uninstall is available, tap it to remove the service. If Uninstall is grayed out, you may only be able to Disable it Uninstall or disable SafetyCore on Samsung Galaxy (Kurt "CyberGuy" Knutsson)If you wish to uninstall or disable SafetyCore on your Pixel device, follow the steps below:Settings may vary depending on your Android phone’s manufacturer. (Note: We tested these steps on a Pixel 9 Pro.) Open the Settings app on your deviceTap AppsSelect See all appsScroll through the list or use the search bar to find Android System SafetyCore. Tap on Android System SafetyCoreCheck if the Uninstall option is available. If Uninstall is available, tap it to remove the service. If Uninstall is grayed out, you may only be able to disable it Uninstall or disable SafetyCore on Pixel (Kurt "CyberGuy" Knutsson)4 ways to keep your personal information safeIf you're concerned about Google's data collection and want to keep your personal information safe, here are four steps you can take.1) Limit app permissions: Regularly review and restrict app permissions, especially for access to your camera, microphone, storage or location. If an app doesn’t need access, revoke it in your device settings.2) Disable background data and tracking: Prevent unnecessary tracking by turning off background data for apps that don’t require constant internet access. You can also disable location tracking and opt out of Google’s personalized ads in your account settings.3) Use a VPN for secure browsing: A VPN (virtual private network) encrypts your internet traffic, preventing your ISP, Google or other entities from tracking your online activity. Privacy-focused VPNs are great options that do not log user data. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.4) Regularly clear personal data: Delete unnecessary stored data such as search history, location history and cached files. You can do this in your Google Account settings and within individual apps to minimize your digital footprint.Kurt's key takeawaySafetyCore is an interesting addition to Android, offering on-device content filtering with machine learning. While it aims to enhance privacy and security, some users might have questions about its presence and functionality. Whether you decide to keep it or explore disabling it, staying informed about your device's features is always a good idea. This way, you can make choices that best fit your needs and preferences for managing your Android device.Do you trust Google’s claim that SafetyCore operates entirely on-device and does not share your data? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.
    0 Comments 0 Shares 66 Views
  • WWW.FOXNEWS.COM
    Hydrogen fuel cell trucks hit the roads in Georgia
    Published April 8, 2025 6:00am EDT close 'CyberGuy': Hydrogen fuel cell trucks hit the roads in Georgia Hydrogen trucks debut in Georgia, sparking debates on costs and green freight gains. Kurt Knutsson comments on this promising chapter in green logistics evolution. Imagine a future where trucks zip along highways without leaving a trail of pollution behind them. That future is becoming a reality, thanks to Benore Logistic Systems Inc., which has just added 14 Hyundai Xcient hydrogen-powered trucks to its fleet in Savannah, Georgia. This move showcases Benore's commitment to sustainability and also positions the company as a trailblazer in the adoption of green technologies for freight transportation. Hyundai Xcient hydrogen-powered trucks (Benore Logistic Systems) (Kurt "CyberGuy" Knutsson)A bold step toward sustainabilityBenore Logistic Systems' journey into hydrogen-powered logistics began with a small but significant step in 2022, when it rolled out its first four fuel cell trucks. Building on that success, the company has now expanded its fleet with these additional 14 trucks. They're operating on dedicated routes in Savannah, serving the Hyundai Motor Group Metaplant America, a facility that's all about clean logistics operations. These trucks offer an impressive all-electric range of nearly 250 miles, marking a significant leap forward in sustainable transportation.Dennis Kunz, vice president of revenue strategy and operation development at Benore, highlighted the importance of this initiative: "These hydrogen fuel cell trucks represent a significant step forward for Benore and our ability to deliver innovative, sustainable logistics solutions."It's clear that Benore is serious about making a positive impact on the environment.Strategic partnerships driving innovationThe deployment of these trucks is part of a broader collaboration between Benore, Hyundai Motor Group and HTWO Logistics, a joint venture between Hyundai and Glovis America. Hyundai manufactures the trucks, HTWO oversees deployment, and Benore manages daily logistics to ensure seamless operations for the Glovis EV contract. This partnership shows just how committed Benore is to delivering innovative, sustainable solutions that align with its Just-In-Time and Just-In-Sequence operations. Hyundai Xcient hydrogen-powered trucks (Benore Logistic Systems) (Kurt "CyberGuy" Knutsson)Infrastructure supporting hydrogen logisticsTo support this initiative, HydroFleet has invested $33 million in a hydrogen production and refueling hub near Savannah’s busy container port. This facility will initially refuel up to 14 trucks daily and scale up to 50 trucks per day in the future. Such infrastructure investments are crucial for expanding hydrogen-powered freight solutions across the region.Industry trends and challengesBenore's adoption of hydrogen-powered trucks aligns with a growing industry trend, joining other major players like Werner and DHL Supply Chain in embracing this clean technology. Hyundai has emerged as North America's leading supplier of hydrogen fuel cell trucks, maintaining momentum despite setbacks faced by competitors such as Hyzon and Nikola. The increasing interest in hydrogen technology stems from its substantial potential to reduce emissions, with each Class 8 truck capable of eliminating over 400 metric tons of CO2 annually.However, the transition to hydrogen fuel cell trucks is not without its hurdles. High initial costs pose a significant barrier, particularly for smaller companies, due to expensive fuel cell technology and specialized hydrogen storage systems. The slow development of hydrogen fueling infrastructure remains a critical challenge, impeding widespread adoption. Additionally, the current hydrogen production landscape, dominated by methane-based processes, falls short of the desired environmental benefits.Technological refinement is ongoing, with continued testing needed to verify range estimates, assess performance across various conditions, and address maintenance issues affecting fueling station uptime. Achieving cost parity with diesel fuel is crucial for mass adoption, with estimates suggesting hydrogen needs to reach $4-$5 per kilogram to compete with diesel at $3-$4 per gallon.Despite these obstacles, the potential for significant emissions reduction continues to drive interest and investment in hydrogen fuel cell technology for the trucking industry. As companies like Benore lead the way, the sector watches closely to see how these early adopters navigate the challenges and pave the way for a cleaner future in heavy-duty transportation. Hyundai Xcient hydrogen-powered truck (Benore Logistic Systems) (Kurt "CyberGuy" Knutsson)Hydrogen-powered vehicles: Addressing questions and challengesHydrogen-powered vehicles have ignited interest in their potential to revolutionize transportation. However, their adoption raises critical questions about cost, environmental impact, safety and infrastructure. Below is a summary of key insights and challenges based on expert analysis.Cost and feasibilityHigh production costs: Hydrogen currently costs about $16.51 per gallon equivalent compared to diesel at $4.62, with significant energy (8,410 kWh) required for production.Energy efficiency concerns: Scaling hydrogen production to reduce costs remains a major challenge.Environmental impactGreen vs. gray hydrogen: While green hydrogen (produced via renewable energy) offers near-zero emissions, most hydrogen today is derived from fossil fuels (gray or blue hydrogen), which emit CO2 during production.Water vapor emissions: Though water vapor is a byproduct, its localized warming effects are minimal compared to CO2.Safety considerationsFlammability risks: Modern hydrogen storage tanks are designed to withstand extreme impacts, but public concerns about safety persist due to historical incidents like the Hindenburg disaster.Emergency protocols: Innovations in tank durability and emergency response systems are crucial for public trust.Performance in extreme conditionsHydrogen vehicles perform well across various temperatures but face challenges such as freezing water vapor emissions in cold climates. Integrated heating systems may mitigate these issues.Infrastructure and LogisticsDistribution challenges: Hydrogen requires specialized storage and refueling infrastructure. Converting existing gas stations could lower costs, but widespread adoption demands significant investment.Remote refueling solutions: Portable hydrogen generators are being developed to address refueling in isolated areas.Comparison with electric vehicles (EVs)Hydrogen vehicles offer faster refueling times and lighter energy storage compared to EVs. However, hydrogen production is more energy-intensive, while EV batteries face sustainability concerns due to rare earth mining and recycling issues.Broader barriersEconomic and political hurdles, including high initial infrastructure costs and lobbying by traditional energy sectors, remain significant barriers to mass adoption.Next steps for researchKey areas for future exploration include:Lifecycle emissions analysis to identify sustainable production methodsInnovations in safety protocols for hydrogen storageExpanding hydrogen refueling infrastructureScaling production to make hydrogen cost-competitive with fossil fuels and EVsHydrogen-powered vehicles represent a promising step toward sustainable transportation. However, their success hinges on overcoming economic, environmental and logistical challenges through innovation and collaboration.Kurt's key takeawaysBenore Logistic Systems’ expansion into hydrogen-powered trucking is more than just a business move; it’s a statement about the future of logistics. By embracing cutting-edge technology and sustainable practices, Benore is setting an example for others in the industry. As Kunz aptly put it, these initiatives pave the way toward cleaner transportation solutions that benefit both the planet and future generations. With Savannah as a hub for innovation, this partnership marks a promising chapter in green logistics evolution. It’ll be interesting to see where this will take us.Do you think the potential benefits of hydrogen fuel cell trucks, such as zero emissions and faster refueling, could outweigh their current challenges, or are they destined to remain a niche technology? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 57 Views
  • WWW.FOXNEWS.COM
    Dangers of oversharing with AI tools
    Published April 7, 2025 10:00am EDT close Government officials weigh benefits, risks of AI Fox News chief political anchor Bret Baier has the latest on regulatory uncertainty amid artificial intelligence development on "Special Report." Have you ever stopped to think about how much your chatbot knows about you? Over the years, tools like ChatGPT have become incredibly adept at learning your preferences, habits and even some of your deepest secrets. But while this can make them seem more helpful and personalized, it also raises some serious privacy concerns. As much as you learn from these AI tools, they learn just as much about you. A man using ChatGPT on his laptop (Kurt "CyberGuy" Knutsson)What ChatGPT knowsChatGPT learns a lot about you through your conversations, storing details like your preferences, habits and even sensitive information you might inadvertently share. This data, which includes both what you type and account-level information like your email or location, is often used to improve AI models but can also raise privacy concerns if mishandled.Many AI companies collect data without explicit consent and rely on vast datasets scraped from the web, which can include sensitive or copyrighted material. These practices are now under scrutiny by regulators worldwide, with laws like Europes GDPR emphasizing users "right to be forgotten." While ChatGPT can feel like a helpful companion, its essential to remain cautious about what you share to protect your privacy. ChatGPT on a phone (Kurt "CyberGuy" Knutsson)Why sharing sensitive information is riskySharing sensitive information with generative AI tools like ChatGPT can expose you to significant risks. Data breaches are a major concern, as demonstrated in March 2023 when a bug allowed users to see others chat histories, highlighting vulnerabilities in AI systems. Your chat history could also be accessed through legal requests, such as subpoenas, putting your private data at risk. User inputs are also often used to train future AI models unless you actively opt out, and this process isnt always transparent or easy to manage.These risks underscore the importance of exercising caution and avoiding the disclosure of sensitive personal, financial or proprietary information when using AI tools. A woman using ChatGPT on her laptop (Kurt "CyberGuy" Knutsson)What not to share with ChatGPTTo protect your privacy and security, its crucial to be mindful of what you share. Here are some things you should definitely keep to yourself.Identity details: Social Security numbers, drivers license numbers and other personal identifiers should never be disclosedMedical records:While it might be tempting to seek interpretations for lab results or symptoms, these should be redacted before uploadingFinancial information: Bank account numbers and investment details are highly vulnerable if sharedCorporate secrets:Proprietary data or confidential work-related information can expose trade secrets or client dataLogin credentials:Passwords, PINs and security answers should remain within secure password managers ChatGPT on a Wikipedia page on a phone (Kurt "CyberGuy" Knutsson)How to protect your privacy while using ChatbotsIf you rely on AI tools but want to safeguard your privacy, consider these strategies.1) Delete conversations regularly: Most platforms allow users todelete chat histories. Doing so ensures that sensitive prompts dont linger on servers.2) Use temporary chats: Features like ChatGPTs Temporary Chat mode prevent conversations from being stored or used for training purposes.3) Opt out of training data usage: Many AI platforms offer settings to exclude your prompts from being used for model improvement. Explore these options in account settings.4) Anonymize inputs: Tools like Duck.ai anonymize prompts before sending them to AI models, reducing the risk of identifiable data being stored.5) Secure your account:Enable two-factor authenticationand use strong passwords for added protection against unauthorized access. Consider using apassword manager to generate and store complex passwords. Remember, your account-level details like email addresses and location can be stored and used to train AI models, so securing your account helps limit how much personal information is accessible. Get more details about mybest expert-reviewed password managers of 2025 here.6) Use a VPN:Employ a reputable virtual private network (VPN) to encrypt internet traffic and conceal your IP address, enhancing online privacy during chatbot use. A VPN adds a crucial layer of anonymity, especially since data shared with AI tools can include sensitive or identifying information, even unintentionally. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.Kurt's key takeawaysChatbots like ChatGPT are undeniably powerful tools that enhance productivity and creativity. However, their ability to store and process user data demands caution. By understanding what not to share and taking steps to protect your privacy, you can enjoy the benefits of AI while minimizing risks. Ultimately, its up to you to strike a balance between leveraging AIs capabilities and safeguarding your personal information. Remember: Just because a chatbot feels human doesnt mean it should be treated like one. Be mindful of what you share and always prioritize your privacy.Do you think AI companies need to do more to protect users' sensitive information and ensure transparency in data collection and usage? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 91 Views
  • WWW.FOXNEWS.COM
    Zero-emissions hydrogen-electric jet disrupts conventional flights
    Tech Zero-emissions hydrogen-electric jet disrupts conventional flights This future jet could be a game changer in aviation Published April 7, 2025 6:00am EDT close 'CyberGuy': Zero-emissions hydrogen-electric jet poised to disrupt conventional flights Beyond Aero's BYA-1: Hydrogen-electric jet with zero emissions, reduced costs, 2030 launch. Kurt Knutsson discusses a potential game changer in the evolution of air travel. You know how everyone's talking about going green these days? Well, French startup company Beyond Aero is taking that idea to new heights, literally.They've been working on this cool hydrogen-powered jet that could change the way we think about flying. It's called the BYA-1, and it's not just another concept that'll never see the light of day. These folks mean business. In fact, they aim to put it into service by 2030. This innovative aircraft promises to be a game changer, offering significant cost savings and environmental benefits compared to conventional jets. BYA-1 (Beyond Aero) (Kurt "CyberGuy" Knutsson)The BYA-1 by the numbersTheBYA-1 is a 10-seat business jet designed from the ground up around a battery-free hydrogen-electric propulsion system. This clean-sheet architecture optimizes the use of gaseous hydrogen, addressing the challenges of incorporating this fuel into existing aircraft designs.The jet features six hydrogen cylinders, with four located along the sides of the fuselage and two at the wingtips, which feed six 400-kW fuel cells. These fuel cells convert hydrogen into electricity and water vapor, powering electric jet turbines that achieve a peak power of 2.4 MW.The BYA-1 is capable of flying six passengers a distance of 921 miles at a cruise speed of 357 mph, with a healthy reserve included. By reducing the cruise speed to 276 mph, the range can be extended by 50% to 1,381 miles. BYA-1 (Beyond Aero) (Kurt "CyberGuy" Knutsson)Efficiency and cost savingsBeyond Aero claims that the BYA-1 will offer substantial operational and cost benefits. The aircraft's design reduces operational costs by as much as 55% due to fewer parts and lower maintenance complexity, thanks to a modular and swappable engine unit for ground-based maintenance. Additionally, Beyond projects that the BYA-1 will provide an immediate 17% saving in fuel costs compared to conventional Jet-A1 by 2030. This is expected to increase further as green hydrogen becomes more cost effective. BYA-1 (Beyond Aero) (Kurt "CyberGuy" Knutsson)Environmental and comfort advantagesThe hydrogen-electric propulsion system brings significant environmental and passenger comfort improvements. The BYA-1 emits zero carbon emissions during flight, aligning with the aviation industry's goal of reducing its carbon footprint. Furthermore, the electric jets produce less noise, with Beyond claiming that the cabin will be 15 dB(A) quieter than conventional jets when equipped with acoustic insulation. This translates to a perceived noise reduction of about 50%. BYA-1 (Beyond Aero) (Kurt "CyberGuy" Knutsson)Progress towards certificationBeyond Aero is actively working toward certifying the BYA-1 for commercial use. The company has filed for design organization approval with the European Union Aviation Safety Agency and is collaborating with regulators to define the special conditions needed for certification. Beyond Aero has already demonstrated tangible progress by conducting France's first manned hydrogen-electric flight using a prototype fuel system in an ultralight aircraft seen below. Hydrogen-electric flight using a prototype fuel system in an ultralight aircraft (Beyond Aero) (Kurt "CyberGuy" Knutsson)Industry impact and potentialWith $44 million in capital and letters of intent for 108 sales totaling $914 million, Beyond Aero is positioning itself as a serious contender in the aviation industry. The company's innovative approach could potentially disrupt conventional air travel and accelerate the transition to cleaner aviation technologies. As the aviation industry grapples with environmental concerns, innovations like the BYA-1 may prove crucial in achieving zero-carbon goals by 2050. BYA-1 (Beyond Aero) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysAs we wrap up this look at Beyond Aero's BYA-1, it's clear that the prospect of quieter, cleaner and more efficient flights holds significant promise. The potential benefits of hydrogen-electric jets are substantial, both for passengers and the environment. Of course, there are plenty of challenges to overcome before this technology becomes mainstream, but with innovations like the BYA-1 on the horizon, it's a pivotal moment in the evolution of air travel.Do you think hydrogen-electric jets will become a mainstream option for commercial flights within the next decade, and why or why not?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 90 Views
  • WWW.FOXNEWS.COM
    The best ways to give your old Android a second life
    Tech The best ways to give your old Android a second life Before tossing your old Android, consider these 7 creative ideas Published April 6, 2025 10:00am EDT close How to free up space on your Android Three simple tricks to free up valuable space on your device. With mobile technology evolving rapidly, its common for older devices to become outdated.But heres the thing. Those neglected Android devices are actually full of untapped potential.With the right approach, you can repurpose them and unlock their hidden value. Here are seven creative ways to put your old Android to good use.If you have an iPhone, here aresome great ways to repurpose it for good use.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW An Android phone (Kurt "CyberGuy" Knutsson)1. Separate work and personal phoneWith more and more companies letting us use our own phones for work, its getting harder to keep our work and personal lives separate. This is where having a dedicated device for each role can help. Think about setting up your old phone as your work device or personal phone and using your current phone for the opposite. That way, youll have two devices for two separate parts of your life without the headache of constantly switching between profiles or worrying about mixing business with pleasure. Image of an older Android phone (Kurt "CyberGuy" Knutsson)2. Digital photo frameWho doesnt love a good photo flashback? Grab acheap stand, plug in your old Android phone and youve got yourself a digital photo frame. If you use Google Photos, open the app, pick a photo (or album), hit the three-dot menu in the top-right and choose "Slideshow."Your phone will automatically cycle through your pictures and bring back some good memories while you work or relax.Got a Pixel phone? Pop it on aGoogle Pixel Stand, and youll have a constantly updated photo slideshow of your best moments, all linked to your Google Photos albums.3. Desk calendarYour old phone can be repurposed as your personal calendar. Stick it on your desk and use Google Calendar for all your scheduling needs or grab the freeDigiCal app for a more customizable experience. With this setup, youve got a dedicated calendar that is always within arms reach, helping you stay on top of things and organized all day long.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Desk calendar using an Android phone (Kurt "CyberGuy" Knutsson)4. Security cameraYou dont need to buy a fancy security camera when your old Android phone can do the job. Just download an app like theAlfredCamera security app, and youve got yourself a DIY security cam. AlfredCamera is recognized as the world's most popular and top-rated security camera app for Android phones with over 70 million families using it to convert their old phones into home security cameras. The app offers features like live cam streaming, instant intruder alerts and two-way audio communication. So, its a great way to keep an eye on your space without spending any extra cash.But if you're looking for something a bit more advanced or want a fully integrated system with professional monitoring, it's worth exploring dedicated home security solutions.Here are some of the best home security systems that offer greater peace of mind and robust protection for your home.5. Videoconferencing hubTurn your old phone into a permanent videoconferencing station. Set it up with your go-to video chat app, likeZoom orGoogle Meet, and place it on your desk or conference table. In no time, youve got a dedicated spot for video calls. If you have more old phones around, you could even set up multiple video conference hubs around your home or office. This can be a game changer for easy virtual meetings.6. Dedicated music playerHaving a device just for music or podcasts might seem old school, but its super handy. Use your old Android phone to handle all your audio needs, so you dont have to worry about draining the battery on your current phone. You can also save your main phone from constant notifications while listening to music or podcasts. Its a win-win. An Android being used as a dedicated music player (Kurt "CyberGuy" Knutsson)7. Wireless trackpadYour old Android phone can also double as a wireless trackpad for your computer. All you need is an app likeUnified Remote, and, in a few minutes, youll be controlling your computer from your phone via Wi-Fi or Bluetooth. The free version lets you control the mouse and keyboard, plus basic media playback. Upgrade to the paid version for more features like remote controls for presentations. Its a cool little hack to make your old phone even more useful.Kurts key takeawaysDont let your old Android sit forgotten in a drawer. There are tons of creative ways to give it a new life. From turning it into a dedicated work phone to repurposing it as a security camera, the possibilities are endless.What other devices would you like to repurpose? Let us know by writing us atCyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 80 Views
  • WWW.FOXNEWS.COM
    Worlds first AI-powered industrial super-humanoid robot
    Recommended Published April 6, 2025 6:00am EDT close Worlds first AI-powered industrial super-humanoid robot is faster and stronger than ever This robot figures to revolutionize enterprise operations, particularly in the logistics and manufacturing sectors. In a groundbreaking development, California-based robotics and artificial intelligence (AI) company Dexterity has unveiled Mech, the world's first industrial super-humanoid robot.This innovative creation figures to revolutionize enterprise operations, particularly in the logistics and manufacturing sectors.Let's dive into the details of this new technology and explore its potential impact on the industry.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Mech, the world's first industrial super-humanoid robot (Dexterity)The super-humanoid powerhouseThis industrial super-humanoid robot features two arms mounted on a rover, allowing it to navigate warehouses and industrial sites with ease. With its impressive 17.72-foot arm span and the ability to lift up to 132 pounds,Mech is designed to tackle stressful and repetitive tasks that often lead to workplace injuries. Mech, the world's first industrial super-humanoid robot (Dexterity)AI-powered precisionWhat sets Mech apart is its advanced AI system, which Dexterity calls "Physical AI." This sophisticated technology enables Mech to perform complex tasks with human-like adaptability and superhuman strength. The robot's onboard supercomputer runs hundreds of AI models, allowing it to excel in scenarios that require precise coordination.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Mech, the world's first industrial super-humanoid robot (Dexterity)Key features and capabilitiesStrength and reach: Mech can lift up to 130 pounds and place boxes as high as 8 feet in the air.Environmental adaptability: It operates in temperatures ranging from 32 to 122 degrees Fahrenheit, making it suitable for various industrial settings.Advanced sensing: Equipped with up to 16 cameras, Mech can sense its environment and recognize objects for optimal task execution.Versatility: Mech can perform a wide range of tasks, including truck loading, palletizing, depalletizing and order picking.GET FOX BUSINESS ON THE GO BY CLICKING HERE Mech, the world's first industrial super-humanoid robot (Dexterity)Boosting productivity and safetyOne of the most impressive aspects of Mech is its potential to dramatically increase workplace productivity. A single worker can manage and monitor up to 10 Mechs simultaneously, significantly reducing the risk of injuries associated with repetitive stress and heavy lifting. Mech, the world's first industrial super-humanoid robot (Dexterity)Scalable and future-proofDexterity has designed Mech with scalability in mind. The robot's software can be easily upgraded with new apps, allowing it to learn and perform additional complex tasks. This flexibility ensures that Mech can adapt to changing industry needs and continue to provide value over time. Mech, the world's first industrial super-humanoid robot (Dexterity)Kurt's key takeawaysMech's combination of strength, dexterity and AI-powered intelligence opens up new possibilities for enhancing workplace efficiency and safety. While the impact of such advanced robotics on the job market remains to be seen, one thing is clear. As this technology continues to evolve, it will be fascinating to watch how it reshapes the landscape of manufacturing and logistics in the years to come.CLICK HERE TO GET THE FOX NEWS APPAs robots like Mech become more prevalent in industries, do you think they will enhance human capabilities or eventually replace them? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 95 Views
  • WWW.FOXNEWS.COM
    DoubleClickjacking hack turns double-clicks into account takeovers
    Tech DoubleClickjacking hack turns double-clicks into account takeovers How a simple double-click can quietly give hackers access to your accounts Published April 5, 2025 10:00am EDT close Your Smart TV can be vulnerable to hacking Kurt "The CyberGuy" Knutsson explains step-by-step how to protect your Smart TV from hackers. Nowadays, double-clicking on something on a website without thinking can set you up for hackers to reach your information.A new hacking trick called "doubleclickjacking" turns your ordinary action into a sneaky way for attackers to take control of your account or change your device settings.Lets break it down.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Illustration of an individual being scammed. (Kurt "CyberGuy" Knutsson)What is doubleclickjacking?Doubleclickjacking is a new spin on an old hacking trick known as clickjacking. Normally, clickjacking works by hiding malicious buttons underneath real ones, so when you think youre clicking something harmless, youre actually giving permission for something dangerous. With doubleclickjacking, it takes things a step further. Its triggered when you double-click, allowing hackers to sneak in an extra, invisible command. Your first click might do something normal. The second click? Thats where the damage happens.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? An illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)GET FOX BUSINESS ON THE GO BY CLICKING HEREWhy is it a threat?The scary part is how invisible this trick is. Double-clicking is something we all do automatically, often without giving it a second thought. But that simple action could be giving hackers permission to:Access your webcam or microphoneChange your browser settingsClick "Allow" on a hidden pop-upShare your locationApprove a login, payment or even a crypto transactionWhat makes doubleclickjacking especially dangerous is that most websites werent designed to defend against it. Traditional security features usually protect against a single click, but they often fail when a second click is involved. That small detail opens the door for attackers to bypass layers of protection.This trick doesnt just affect websites, either. It can also interfere with browser extensions like crypto wallets and VPNs, sometimes tricking users into approving actions or turning off protection without realizing it. On mobile devices, a simple double-tap can trigger the same effect. To make matters worse, this vulnerability is more widespread than you might expect. Many well-known websites havent fixed it yet. All it takes is one quick double-click in the wrong place, and you could unknowingly give away access to sensitive parts of your device.How does doubleclickjacking work?Heres a simplified version of how the trick plays out. A malicious website quietly loads invisible elements behind or over visible ones, like an embedded frame, hidden button, or disguised pop-up. On your first click, the attacker uses that action to reposition those hidden elements so that your next click lands exactly where they want it. On your second click, you unknowingly interact with the hidden content. You might be clicking "Allow" on a browser permission, authorizing a login, or disabling a setting, without ever realizing it. Because modern browsers are lightning fast, this all happens in a split second. The entire setup and switch are virtually invisible to the user. From your perspective, it just feels like a normal double-click. Image of security feature on a computer. (Kurt "CyberGuy" Knutsson)How to protect yourselfDoubleclickjacking might be sneaky, but there are simple ways to keep yourself safer online. Here are some practical steps you can take right now:1. Be cautious about double-clicking on unfamiliar websites: It might sound obvious, but most of us click (and double-click) automatically. If a site prompts you to double-click anything, especially for a login, permission or download, ask yourself if its really necessary. Hackers rely on you acting quickly without thinking.2. Keep your browser updated: Browsers like Chrome, Edge and Safari regularly release patches for these vulnerabilities. That means delaying updates could leave you exposed to tricks like doubleclickjacking. Turn on automatic updates if possible, or make sure to manually keep up with updates so youre always protected.3. Use strong antivirus software: Browser-based tools and extensions can help block hidden or malicious scripts before they run, but theyre not foolproof. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Use strong, unique passwords for every account:Dont reuse passwords. If one account gets compromised, hackers can use it to access your other accounts. A password manager helps you create and store strong passwords effortlessly. Get more details about mybest expert-reviewed Password Managers of 2025 here.5. Limit unnecessary permissions: Take control of your privacy by reviewing which websites have access to your camera, microphone, and location. Many sites request these permissions by default, even when they dont need them. Head into your browsers privacy settings and revoke access from any site you dont fully trust. For example, here's a guide onhow to navigate Google's privacy settings.6. Avoid sketchy sites and pop-ups: If a website looks outdated, spammy or aggressively pushes you to click something, get out of there. Avoid downloading random files, and dont trust pop-ups that claim youve won something, need to "fix" your device or "verify" your login info.Kurts key takeawaysDoubleclickjacking is a clever new spin on a classic hacking trick that allows cybercriminals to take control over your device or account, just from a simple double-click. Because this kind of attack is nearly invisible and works on popular browsers, its important to stay alert. Always be cautious when interacting with unfamiliar websites, especially if you're being asked to double-click. Keeping your browser updated and limiting unnecessary permissions can go a long way in reducing your risk. Most importantly, having the right digital protection tools in place can help stop these types of threats before they ever reach you.Have youve noticed odd behavior after double-clicking on a site or had a close call with a scam? Let us know by writing us atCyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 91 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: 'Battlestar Galactica' is 'even more relevant now,' star says
    Recommended By Fox News Staff Fox News Published April 5, 2025 8:30am EDT close Battlestar Galactica star says shows AI warnings more relevant than ever Tricia Helfer, who played a humanoid robot Cylon on "Battlestar Galactica," says the shows look at the conflict between humans and AI still resonates today. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:- Battlestar Galactica star says shows AI warnings more timely as sci-fi fantasies come to life- Fundamental mission of Compute Exchange is to democratize intelligence: CEO Simeon Bochev- Humanoid robot stuns with perfect side-flip acrobatics BATTLESTAR GALACTICA -- Season 4 -- Pictured: Tricia Helfer as Number Six. (Justin Stephens/Syfy/NBCU Photo Bank/NBCUniversal via Getty Images)THE FUTURE IS NOW: "Battlestar Galactica" star Tricia Helfer feels the show was a prescient warning about artificial intelligence when it debuted more than 20 years ago.DEMOCRATIZING INTELLIGENCE: Compute Exchange CEO Simeon Bochev weighed in on the impact of computing power in artificial intelligence during an appearance on "Mornings with Maria."SIDE-FLIPPING ROBOT: Robots aren't just efficient machines anymore, they are now agile performers that can flip and jog. G1 humanoid robot does a side flip (Unitree)MAJOR INVESTMENT: ChatGPT creator OpenAI on Monday revealed it is getting up to $40 billion in new funding. Sam Altman, chief executive officer of OpenAI, during a fireside chat at University College London (UCL) in London, on May 24, 2023. (Chris J. Ratcliffe/Bloomberg via Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 98 Views
  • WWW.FOXNEWS.COM
    How to free up space on your Android
    Published April 5, 2025 6:00am EDT close How to free up space on your Android Three simple tricks to free up valuable space on your device. Is your Android running out of storage space again?Lets fix it with three simple tricks that can free up valuable space on your device.IPhone users, here's how to free up space on your device. A man holding an Android. (Kurt "CyberGuy" Knutsson)Trick 1: Delete hidden clutterHidden files and folders often consume significant storage space. Heres how to clean them up:STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOWSettings may vary depending on your Android phones manufacturer.Open your File Manager (it might be called "My Files").Tap thethree dots in the top-right.SelectSettings.Enable"Show Hidden System Files".Now, lets go to the".thumbnails" folder by tapping on the folder that says"My Files". Steps to delete hidden clutter. (Kurt "CyberGuy" Knutsson)Next, select"Internal Storage".Tap thePictures folder.Then, click .thumbnails.Select "All"images.Then tapDelete. Steps to delete hidden clutter. (Kurt "CyberGuy" Knutsson)Confirm by clickingMove to Trash.By deleting the thumbnail folder, you'll free up valuable storage space on your Android by removing the small preview images of photos and videos stored on your device. Note, the file or folder will come back automatically as you browse photos again, so if you're constantly low on storage, clearing the .thumbnails folder every so often can help but it's just a temporary fix. The system will rebuild it as needed.Now,go back twice by clicking the back arrow.Open"Movies" or"Downloads", and repeat the above steps to clear more space.Finally, find the Trash and click on it. Steps to delete hidden clutter. (Kurt "CyberGuy" Knutsson)Select "All".TapDelete all.Confirm your decision by clickingDelete. Steps to delete hidden clutter. (Kurt "CyberGuy" Knutsson)Trick 2: Google Photos magicGoogle Photos offers a seamless way to manage photo storage without losing your memories. Here's how to free up space using Google Photos:Settings may vary depending on your Android phones manufacturer.Open theGoogle Photos app.Tap yourprofile picture in the top-right corner.ChooseFree up space on this device.Review the files and tap theblue bar at the bottom of the screen.ClickAllow to clear local copies of photos already backed up. Steps to free up space using Google Photos. (Kurt "CyberGuy" Knutsson)Your photos stay safe, but won't take up your phone's storage. Now, before deleting files in your downloads, movies, or .thumbnails folders, take a moment to review them. These may contain files youve saved intentionally, including important documents or personal media.While cleaning up unused files can free up space, be sure not to remove anything you still need. Steps to free up space using Google Photos. (Kurt "CyberGuy" Knutsson)Trick 3: Clear unused appsUninstalling unused apps can significantly free up storage space on your Android device. Heres how to uninstall unused apps:Settings may vary depending on your Android phones manufacturer.Open Settings on your Android.Click onApps or Apps and Notifications.Click the Filter and sort icon.TapUninstalled by you,then tap OK.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Steps to clear unused apps. (Kurt "CyberGuy" Knutsson)Review yourinstalled apps and identify those you no longer use.Uninstallthese apps to free up space byclicking on the app.Click App details in store.Then, tapUninstall.It'll ask you to confirm your decision by clickingUninstall. Steps to clear unused apps. (Kurt "CyberGuy" Knutsson)Trick 4: Get rid of old filesYou can also delete unused files and images on Android. These are files or images you haven't edited in the past 30 days.Settings may vary depending on your Android phones manufacturer.Navigate to Settings on your Android.TapDevice Care.Click Storage.ClickReview old files.GET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to get rid of old files. (Kurt "CyberGuy" Knutsson)TapAll in the upper left-hand corner of the screen to free up space.ClickDelete at the bottom of the screen.Confirm your decision by clickingDelete. Steps to get rid of old files. (Kurt "CyberGuy" Knutsson)By incorporating these steps, you can efficiently manage your Android device's storage and maintain optimal performance.Kurt's key takeawaysRunning out of storage on your Android can be frustrating, but these tricks provide quick solutions to reclaim space without compromising essential data. By implementing simple strategies like deleting hidden clutter, leveraging Google Photos to free up space, and uninstalling unused apps, you can significantly improve your device's performance. Additionally, regularly reviewing and deleting old files can help maintain a clutter-free phone.Whats the most surprising thing youve found taking up space on your device? Let us know by writing us atCyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 103 Views
  • WWW.FOXNEWS.COM
    How to remotely reset your router: Steps for easy troubleshooting
    Tech How to remotely reset your router: Steps for easy troubleshooting Here's how to remotely reset your router from anywhere Published April 4, 2025 10:00am EDT close 'Smart routers' offer more parental control over social media As the debate over regulating social media heats up, one company is urging parents to take matters into their own hands. Does your home have a ton of smart home devices running it? If you do, there's a good chance that you've been out of the house when your internet has gone down and needed a way to quickly reset your router remotely to keep everything at home running smoothly.Tom from Carol Stream, Illinois, reached out to us with this same problem: "When Im out of town and my internet goes down, all of my internet of things goes down too. Yes, Im supposed to turn off my router and turn it on again, but if Im not at home, is there anything I can do when Im out of town? Any help? Its very frustrating!"Tom, we understand your frustration. It can be inconvenient when your internet goes down, especially when youre not at home to reset your router. However, there are ways to reset your router remotely. Here are the general steps to resetting your router remotely using a web browser.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Home router (Kurt "CyberGuy" Knutsson)How to reset your router with a web browserBefore we start, though, it's important to note that you will needadministrator accessto your router. Luckily, this is simple if it's your own home router. Unless you've changed the settings, your router uses the default username and password for its model, which you can find by a simple web search. Once you have your router's login information, follow these steps.GET FOX BUSINESS ON THE GO BY CLICKING HEREOpen your browser: Open any web browser with a good Internet connection.Have login details prepared: Have your routers login information handy, including the public IP address, the network name and the password.Login to router: Open any web browser and input: http://192.168.1.1. This will lead to your router login page, where you will sign in before adjusting settings.Reset router: Look for a setting devoted to resetting or restoring a router to its factory settings. You can enable this process by pressing enter. The settings page should let you know when the reset has been completed. Depending on your ISP, you might have to use their dedicated app. For example, as you can see in the screenshot below, I have Spectrum at home and can only edit the router's settings via the Spectrum mobile app. Typing in the router address will launch the same page, but Spectrum has a note redirecting you to their app to change your settings or reset your router.The exact steps may vary depending on your router's make and model. Also, ensure that your router has no power issues and a stable connection, as interruptions can affect the reset process.Most of the major ISPs in North America now allow you to reset your networking equipment remotely via a smartphone app, making it even easier to reset your router. This assumes you are using their router and not one you purchased for yourself. If you use a third-party router, you'll need to follow the steps above to reset it. Spectrum router info (Kurt "CyberGuy" Knutsson)What if my router doesn't allow remote restarting?If your router doesnt support remote rebooting, you might consider investing in asmart plug that can be controlled remotely. This would allow you to power cycle your router from anywhere by turning the smart plug off and on. Remember, its always important to secure your router and any remote access with strong, unique passwords to prevent unauthorized access.Smart plugs come with smartphone apps that will allow you to set schedules and remotely turn and off plugs around your house, including the plug you plug your router into. All you need to reset your router with a smart plug is a high-quality smart plug. A smart plug (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysWith this handy guide, you can easily reset your router. All you need is a web browser and a solid connection to the internet, along with your ISP and router login information. We also highlighted buying a smart plug as a simpler way to reset your router, and I recommend picking up a few smart plugs to automate parts of your home to keep electric costs down.CLICK HERE TO GET THE FOX NEWS APPHave you ever experienced internet outages while away from home? How did you handle your smart home devices during that time? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 74 Views
  • WWW.FOXNEWS.COM
    High-tech canopy provides off-grid power and water
    Published April 4, 2025 6:00am EDT close High-tech canopy lets you live off-grid with endless power and water The EO Canopy is a fully self-sustaining, solar-powered camping platform. Have you ever dreamed of escaping the hustle of daily life to live off-grid in the wilderness surrounded by nature but without sacrificing modern comforts?The EO Canopy, a groundbreaking product by Electric Outdoors, is here to make that dream a reality.Combining cutting-edge technology with sustainable energy solutions, this off-grid camping platform is revolutionizing outdoor living for adventurers, EV drivers and landowners alike.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW EO Canopy (Electric Outdoors)A new era of sustainable campingThe EO Canopy is not a trailer. Its a fully self-sustaining, solar-powered camping platform designed to provide all the comforts of home while completely off the grid. From generating its own energy and water to offering satellite internet and EV charging capabilities, the EO Canopy is built for those who want to explore remote destinations without compromising on convenience or sustainability.Key FeaturesMassive solar power generation: Equipped with a 6,600-watt solar-tracking roof, the EO Canopy can generate 45-64 kWh of power per day, which is enough to charge two homes or add 150 miles to an EV.154-kWh sodium-ion battery: This powerful battery bank ensures an uninterrupted energy supply and can be expanded for even greater capacity.Atmospheric water generator: It produces up to 18 gallons of purified drinking water daily from thin air, stored in a 100-gallon tank.Incineration toilet: It efficiently handles waste by converting it into ash with minimal energy usage.Connectivity anywhere: With built-in Starlink satellite internet and an AWS IoT cloud backbone, you can stay connected no matter how remote your location is.Comfortable living space: It features a kitchenette with an induction cooktop, wet bath with recirculating shower, LED mood lighting and flexible sleeping arrangements for up to four people. EO Canopy (Electric Outdoors)For landowners: Unlock new opportunitiesThe EO Canopy isnt just for campers; its also a game-changer for landowners. By deploying these units on remote properties, landowners can bypass costly infrastructure investments and tap into a growing market of eco-conscious travelers. The platforms portability eliminates the need for permits or permanent construction, making it an ideal solution for creating unique glamping experiences or generating additional income streams.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? EO Canopy (Electric Outdoors)For campers: Luxury meets adventureWhether youre an EV driver worried about range anxiety or an overlander looking for sustainable adventure, the EO Canopy has you covered. Its robust energy system powers everything from air conditioning to Level 2 EV charging stations. Plus, its indoor-outdoor design with sliding barn doors and a shaded patio offers the perfect blend of comfort and immersion in nature. EO Canopy (Electric Outdoors)Tested in Michigan's Upper PeninsulaElectric Outdoors launched its first pilot program in Michigans Upper Peninsula in collaboration with Innovate Marquette SmartZone. This region was chosen for its rugged beauty and commitment to sustainable outdoor recreation. The pilot program allows users to experience the EO Canopy firsthand while providing valuable insights for future developments.Josef Hjelmaker, founder and CEO of Electric Outdoors, expressed his excitement: "The EO Canopy is designed to bring a top-notch glamping experience to EV drivers, overlanders and other campers who want to get away from the hustle of daily life without sacrificing creature comforts."GET FOX BUSINESS ON THE GO BY CLICKING HERE EO Canopy (Electric Outdoors)What does the EO Canopy cost?OK, let's talk price. The EO Canopy will set you back about $150,000 to start. But when you consider everything you're getting a fully self-sufficient, solar-powered, water-making, internet-connected base camp that price tag starts to make a lot more sense. EO Canopy (Electric Outdoors)Kurt's key takeawaysThe EO Canopy's got everything you need to live your best wilderness life without giving up Netflix or hot showers. I mean, who wouldn't want to charge their EV while making s'mores in the middle of nowhere? Sure, the $150,000 price tag might make your wallet wince, but for the chance to be a high-tech hermit with all the comforts of home? The EO Canopy might just be your ticket to the great outdoors 2.0. Just don't be surprised if you never want to come back to civilization again.CLICK HERE TO GET THE FOX NEWS APPIf you could design your dream EO Canopy experience, what features or customizations would you include? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 99 Views
  • WWW.FOXNEWS.COM
    Relentless hackers abandon Windows to target your Apple ID
    Published April 3, 2025 10:00am EDT close Chinese hackers tried to breach Trump, Vance phones: report Fox News correspondent David Spunt has more on the "sophisticated penetration" of several carriers on "Special Report." If theres one thing that has become clear over the past year, its that Apple devices are not as secure as the company wants you to believe.Were four months into 2025 and there have already been over 10 instances in which attackers specifically targeted Apple users, and these are just the incidents we know of.Ill admit no device is foolproof, but there seems to be a growing trend where bad actors prefer targeting Apple users over other platforms. In fact, security researchers have recently identified a new phishing campaign in which hackers, who previously focused on Windows, are now setting their sights on Apple IDs.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A person working on an Apple laptop (Kurt "CyberGuy" Knutsson)What you need to knowSecurity researchers atLayerX Labs have uncovered a new phishing campaign that specifically targets Mac users, marking a shift from its previous focus on Windows. The attackers initially lured Windows users with fake Microsoft security alerts designed to steal login credentials. However, after Microsoft, Chrome and Firefox implemented new security features to block these attacks, the hackers started redirecting their efforts toward Mac users instead.The new attack closely mirrors its predecessor but with key modifications. The phishing pages have been redesigned to resemble Apples security warnings, making them appear legitimate to macOS users. The attack code has also been adjusted to specifically detect macOS and Safari users, ensuring that only Apple users see the fraudulent pages.Plus, despite shifting their focus, the attackers continue to host these phishing pages on Microsofts Windows[.]net domain. Since this is a trusted Microsoft platform, it allows the phishing pages to evade detection by security tools that assess risk based on domain reputation. Compromised websites displaying fake security warning (LayerX)How victims are lured inThe phishing campaign exploits common yet highly effective methods called typosquatting and malicious redirects. Victims often end up on these phishing pages after making a simple mistake, such as mistyping a URL while trying to visit a legitimate website.Instead of reaching the intended site, they land on a compromised domain parking page. From there, they are redirected through multiple websites before ultimately arriving at the phishing page, which presents a fake Apple security warning. Believing their Apple ID is at risk, victims are tricked into entering their credentials, unknowingly handing them over to the attackers.One notable case involved a person using Safari who was working at a business secured by a Secure Web Gateway. Despite the organizations security measures, the phishing attempt managed to bypass the gateways protections.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Compromised websites displaying fake security warning (LayerX)7 ways to stay safe from attackers targeting Apple usersPhishing campaigns are increasingly targeting macOS users, but youre not defenseless. Here are four essential steps to protect yourself.1. Use strong antivirus software:A reliable antivirus program is your first line of defense against phishing attempts and malicious websites. While Apples built-in security features provide some protection, they arent foolproof, especially against sophisticated phishing attacks that mimic legitimate Apple warnings. A robust antivirus solution can detect and block malicious sites before you even reach them, preventing you from accidentally entering your credentials on a fraudulent page. Additionally, advanced security software can identify suspicious redirects and alert you before you fall victim to typosquatting traps.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Keep your software up to date:Regularupdates to macOS and your applications arent just about new features. Theyre critical patches that fix security vulnerabilities. Attackers are quick to exploit any weakness, so ensuring your operating system and all installed software are current minimizes the risk of a breach. Enable automatic updates where possible so youre always protected by the latest security enhancements.3. Regularly monitor your Apple ID activity: Even with strong security measures in place, its important to keep an eye on your Apple ID account for any signs of unauthorized access. Apple allows users to review their account activity, including devices logged into the account and recent changes. Regularly check your Apple ID settings to ensure that only trusted devices are connected and that no suspicious activity has occurred. If you notice anything unusual, such as login attempts from unfamiliar locations, immediately change your password and remove unauthorized devices. This proactive approach can help you catch potential breaches early and minimize damage.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Enable two-factor authentication (2FA):Strong, unique passwords for every account are essential, but theyre even more effective when combined withtwo-factor authentication. Even if attackers manage to steal your credentials through a phishing attack,2FA adds an extra barrier that makes unauthorized access significantly harder. Consider using apassword manager to generate and store complex passwords. Get more details about mybest expert-reviewed password managers of 2025 here.5. Use a recovery key for enhanced security: Apple offers an optional feature called a recovery key, which is a 28-character code that provides an extra layer of security for your Apple ID. When you enable a recovery key, Apple disables its standard account recovery process, meaning youll need this key, along with access to a trusted device or phone number, to reset your password or regain access to your account. This makes it significantly harder for attackers to take control of your account.To set up a recovery key, go toSettings > [Your Name] > Sign-in & Security > Recovery Key on your iPhone, iPad or Mac. Follow the prompts to generate and confirm your recovery key. Be sure to write it down and store it in a secure location, such as a safe or with a trusted family member. Keep in mind that losing both your recovery key and access to trusted devices can permanently lock you out of your account. However, if used responsibly, this feature gives you greater control over your accounts security.6. Enable biometric authentication: Apple devices offer advancedbiometric authentication options like Face ID and Touch ID, which provide an extra layer of security. These features make it significantly harder for attackers to gain access to your device or sensitive accounts, even if they manage to steal your credentials. Enable biometric authentication wherever possible, especially for apps and services that store personal or financial information. Since biometric data is unique to you, it adds a level of protection that passwords alone cannot provide.7. Practice safe browsing:Many attacks rely on simple user mistakes, such as mistyping a URL or clicking on suspicious links. Always verify that youre visiting legitimate websites before entering any personal information. Be skeptical of unexpected security alerts, even if they mimic Apples design. Learning to identify the subtle signs of phishing, like unusual URL structures or generic greetings, can help you avoid falling for these scams.Kurts key takeawaysApple has long sold the idea that its ecosystem is inherently safer than the alternatives, but that claim is starting to wear thin. The reality is that attackers are no longer ignoring Mac users, theyre actively targeting them, and Apples response has been anything but proactive. While Microsoft, Google and others roll out new security measures to counter evolving threats, Apple remains slow to adapt, relying on outdated assumptions about its platforms safety.CLICK HERE TO GET THE FOX NEWS APPDo you believe Apple should be more transparent about security vulnerabilities affecting its users? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 102 Views
  • WWW.FOXNEWS.COM
    Humanoid robot stuns with perfect side-flip acrobatics
    Recommended Published April 3, 2025 6:00am EDT close Humanoid robot stuns with perfect side-flip acrobatics A robotics company has advanced from a backflipping robot to a side-flipping robot. Robots aren't just efficient machines anymore, they are now agile performers that can flip and jog.Take, for instance, Unitree, a Chinese robotics company that has been making headlines with its incredible G1 humanoid robot. You might have seen itdancing alongside humans or remembered its predecessor, the H1, which stunned us with abackflip using electric motors.But now, the G1 has taken things to a whole new level. It has mastered the side flip.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW G1 humanoid robot does a side flip (Unitree)A backflipping legacyRemember when Unitree's H1 robot shocked us all by performing a backflip using electric motors? Well, they've taken it up a notch with the G1. This little dynamo, which is approximately 4 feet, 3 inches tall, isn't just following in its predecessor's footsteps. It's leaping right over them sideways. H1 robot doing a backflip (Unitree)The side-flip sensationYou heard that right. The G1 has just pulled off a standing side flip, a feat that's even more challenging than a backflip. It's not just about the flip itself; it's the perfect balance and control that's truly mind-blowing no errors, no malfunctions, just pure robotic grace. This remarkable agility is made possible by the G1's advanced specifications, which include 23 degrees of freedom, a maximum torque of about 88 pound-feet and a compact design weighing approximately 77 pounds, allowing it to execute complex movements with precision and stability. G1 humanoid robot does a side flip (Unitree)Walking with swaggerBut wait, there's more. The G1 isn't just about acrobatics. This robot walks with a confidence that puts some humans to shame. Gone are the days of robots waddling around like they've had an accident. The G1 struts its stuff with real swagger.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? G1 humanoid robot walks with a swagger (Unitree)Jogging into the futureAnd if you thought walking was impressive, get this. Thanks to a recent "agile upgrade," the G1 can now jog. We're talking about a robot that can keep up with your morning run. How's that for a jogging buddy?GET FOX BUSINESS ON THE GO BY CLICKING HERE G1 humanoid robots jogging (Unitree)Affordable innovationNow, here's the interesting part. All this cutting-edge tech comes with a surprisingly affordable price tag. Starting at just $16,000, the G1 is making waves not just in capability but in accessibility, too.Kurt's key takeawaysSo, what do you think? Are we looking at the future of robotics right here? With its acrobatic skills, swagger-filled walk and jogging abilities, the G1 is pushing the boundaries of what we thought possible in humanoid robots. Yes, it's kind of exciting but also kinda scary to think about where this technology might lead us.Are you ready to have robots like the G1 as part of your daily life, or do you think it's too much too soon? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 115 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Google's new AI may know when your house is on fire
    Recommended By Fox News Staff Fox News Published April 2, 2025 12:16pm EDT close Googles new AI tech may know when your house will burn down The project aims to detect a fire the size of a classroom within 20 minutes Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Googles new AI tech may know when your house will burn down- AI's development is critically important for America and it all hinges on these freedoms- GenAI, the future of fraud and why you may be an easy target FireSat satellite AI SPOTS WILDFIRES: FireSat is a new satellite project designed to detect and track wildfires early. How early? The project aims to detect a fire that's merely 270 square feet about the size of a classroom within 20 minutes. It's also able to detect fires two to three acres in size, roughly the size of two football fields.TECHNOLOGICAL MIRACLE: The Trump administration recently asked American developers, including OpenAI, for input on what the U.S. needs to do to stay ahead in the global AI competition. We believe that preserving AIs ability to learn should be at the top of the list.GEN-AI FRAUD ALERT: Generative AI refers to so-called artificial intelligence systems that create new content text, images, audio or video based on data they've been trained on. Unlike traditional AI that analyzes existing information, generative AI produces entirely new, convincing content. The most concerning part? These powerful tools are increasingly accessible to fraudsters who use them to create sophisticated scams that are harder than ever to detect. A man typing on his laptop (Kurt "CyberGuy" Knutsson)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 112 Views
  • WWW.FOXNEWS.COM
    FBI warns about new extortion scam targeting sensitive data
    close 'CyberGuy' explains ransomware attacks The U.S. is the target of ransomware attacks. Kurt Knutsson explains how to keep your information safe. Ransomware is a major threat to every industry. In recent years, hackers have increasingly targeted companies with ransomware, locking their data unless a ransom is paid. In some cases, they also threaten to leak the stolen data online if the company refuses to comply, as seen in the UnitedHealth breach, where hackers reportedly demanded $22 million.However, ransomware attacks are not limited to companies.According to the latest FBI warning, they also target employees, particularly corporate executives.The agency cautions that cybercriminals are sending extortion letters, threatening to release victims' sensitive information unless a ransom is paid.STAY PROTECTED AND INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Hacker at work (Kurt "CyberGuy" Knutsson)What you need to knowTheFBI is warning businesses, particularly those in the healthcare sector, about a scam involving physical ransom letters sent via the U.S. Postal Service. These letters, falsely claiming to be from the ransomware group BianLian, demand Bitcoin payments ranging from $150,000 to $500,000 in exchange for not leaking supposedly stolen data.Marked with "TIME SENSITIVE READ IMMEDIATELY," the letters allege that the attackers gained access through social engineering and exfiltrated sensitive files. However, no proof is provided, and investigations have found no signs of actual ransomware intrusions in affected organizations. The letters appear to be templated, with only minor variations, and include a QR code linked to a Bitcoin wallet. Some also feature a compromised password, likely to make the threat seem more credible.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Sent from Boston with U.S. flag stamps, these letters differ significantly in tone and wording from known BianLian communications. Authorities believe this is a fear-based scam designed to trick organizations into paying a ransom for a breach that never happened. Man scrolling on his cellphone (Kurt "CyberGuy" Knutsson)Healthcare industry needs to work on cybersecurityRansomware is hitting healthcare harder than ever. It is now the third-most targeted industry after finance and manufacturing, with attacks rising more than 32% from 2023 to 2024. These attacks do not just put data at risk. They also disrupt hospitals, slow down care and create chaos for doctors and patients.TheAscension cyberattack in May 2024 is a clear example. Hackers locked medical staff out of critical systems, shut down phone lines and blocked tools needed for tests, procedures and medications. At first, the breach was reported with an estimated 500 affected individuals, but by December, that number had jumped to nearly 5.6 million.UnitedHealthsChange Healthcare unit experienced a massive data breach in February 2024 that further highlighted the vulnerability of the sector. Initially reported to have affected around 100 million people, the number later grew to 190 million, making it the largest medical data breach in U.S. history.This breach affected nearly half of the countrys population. UnitedHealth attributed the attack to ALPHV/BlackCat, a Russian-speaking ransomware group that later claimed responsibility for the attack before being dismantled by law enforcement.GET FOX BUSINESS ON THE GO BY CLICKING HERE Woman using multiple devices (Kurt "CyberGuy" Knutsson)7 ways to avoid ransomware attacks (and fake ransomware scams)1. Install strong antivirus software and regularly update software:The first line of defense against ransomware is ensuring that your systems are equipped with the latest security tools. Keep all software and devicesup to date to avoid vulnerabilities that hackers can exploit. Install firewalls,strong antivirus software and intrusion detection systems to block malicious activities before they can cause harm. Regularly patch operating systems and applications to stay ahead of cybercriminals. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Implement strong password policies and use a password manager: Ensure all passwords are unique, at least 15 characters long and include a mix of uppercase and lowercase letters, numbers and symbols. Also, consider using a password manager to generate and store complex passwords securely. This reduces the risk of password reuse and weak passwords, which are common entry points for ransomware attacks. Get more details about mybest expert-reviewed password managers of 2025 here.3. Educate and train employees on cybersecurity awareness:Many ransomware attacks start with phishing emails or social engineering tactics. As seen in the scam targeting executives, attackers often use fear-based tactics to manipulate victims into acting quickly. Train your employees, particularly high-level executives, to recognize suspicious emails, fraudulent requests and phishing attempts.4. Backup data and maintain a secure recovery plan:Data backups are a critical safeguard against ransomware. Regularly back up critical data to secure, offline locations that ransomware cannot access. Testing your recovery plans frequently ensures that if an attack does occur, you can recover quickly with minimal impact on operations. In addition, consider using a cloud service with encryption to ensure that even if an attack happens, the backup remains safe.5.Utilize two-factor authentication (2FA):Two-factor authentication is an essential security measure that adds an extra layer of protection to sensitive systems and data. With 2FA, even if attackers manage to obtain login credentials, they wont be able to access critical systems without the second factor of authentication, whether its a code sent to a phone or biometric verification.6. Verify threats before taking action:If you receive a ransom demand (digital or physical), investigate its legitimacy. Scams often lack proof of data breaches or network compromise. Consult cybersecurity experts or law enforcement before responding.7. Report suspicious activity: Notify law enforcement or organizations like the FBIs Internet Crime Complaint Center if you encounter scams or ransomware threats. Reporting helps authorities track and mitigate these activities.Kurt's key takeawayHealthcare is seriously lagging when it comes to cybersecurity. It's crazy that so many health institutions dont have a CISO or a dedicated security team. Instead, the IT department, which isnt always trained in cybersecurity, gets stuck trying to handle it all. With so much sensitive data at risk, its shocking that so many healthcare organizations still treat cybersecurity as an afterthought.Cyberattacks are only going to get worse, and unless the industry steps up its game, its just a matter of time before more hospitals, clinics and health systems get hit. Its time to take security seriously.CLICK HERE TO GET THE FOX NEWS APPDo you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 117 Views
  • WWW.FOXNEWS.COM
    Googles new AI tech may know when your house will burn down
    Recommended Published April 2, 2025 6:00am EDT close Googles new AI tech may know when your house will burn down The project aims to detect a fire the size of a classroom within 20 minutes. Wildfires are becoming an increasingly common threat worldwide. Record-breaking burns from Australia to the Amazon to the United States are devastating the environment.The deadly wildfires that raged across Los Angeles in January were estimated to have caused more than $250 billion in damages.Current satellite imagery is often low resolution, infrequently updated and unable to detect small fires. But what if there was a way to spot wildfires earlier and more accurately before they become raging infernos?Enter FireSat, a new satellite project designed to detect and track wildfires early. How early? The project aims to detect a fire that's merely 270 square feet about the size of a classroom within 20 minutes. It's also able to detect fires two to three acres in size, roughly the size of two football fields.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW FireSat satellite (FireSat)Finding fires earlier and more accuratelyTheFireSat constellation will consist of more than 50 satellites when it goes live. The satellites are fitted with custom six-band, multispectral infrared cameras designed to capture imagery suitable for machine learning algorithms to accurately identify wildfires, differentiating them from misleading objects like smokestacks.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Illustration of FireSat constellation (FireSat)Building (and testing) a new AI modelUsing artificial intelligence, FireSat rapidly compares a spot, wherever it is in the world, with previous imagery of that location, considering factors like nearby infrastructure and local weather to determine if theres a fire."Differentiating between real fires and random 'noise' in the environment was a challenge," says Chris Van Arsdale, who works on climate and energy projects at Google.The team even loaded a plane with sensors to experiment with their progress."The first time we used the plane, one of our team members lit a barbecue and a fire pit in his backyard so we could fly the plane over and test it," says Erica Brand, one of the project managers for FireSat."And the sensors were able to pick it up."GET FOX BUSINESS ON THE GO BY CLICKING HERE Illustration of FireSat constellation images (FireSat)FireSat's long-term vision takes shapeThe first FireSat satellite has already been launched. The entire constellation should be in orbit by 2030. The satellite data will contribute to a global historical record of fire spread so that scientists can better model and understand wildfire behavior. FireSat stats (FireSat)The team behind FireSatGoogle Research and satellite manufacturer Muon Space are founding partners in theEarth Fire Alliance, the nonprofit home for FireSat. Funding for the constellations first satellite comes in part from AI Collaboratives: Wildfires, an initiative created by Google.org that convenes leading nonprofits, academic institutions, government agencies and companies around the joint goal of using AI to prevent the devastating impact of wildfires.As part of AI Collaboratives, Google.org provided $13 million to support the launch of the first satellite in the FireSat constellation. FireSat satellite (Earth Fire Alliance)Kurt's key takeawaysSo, what does this all mean? It means a future where wildfires are detected faster, contained quicker and cause less devastation. FireSat represents a major advance in wildfire management. This ambitious project has the potential to protect lives, homes and the environment we all cherish.CLICK HERE TO GET THE FOX NEWS APPIf FireSat had been around during the last major wildfire in your area, how might the outcome have been different? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 129 Views
  • WWW.FOXNEWS.COM
    Emergency Chrome security update amid cyber espionage threats
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Google Chrome is the most popular browser in the world, and it is used by billions of people. However, its widespread usage also makes it a prime target for bad actors who exploit various methods, such as malicious extensions, phishing links and fake websites. The latest attack involves hackers exploiting a browser vulnerability to conduct espionage. Google has acknowledged the security flaw and has released an update to fix it. A man using Google Chrome on his laptop (Kurt "CyberGuy" Knutsson)About the attackCybersecurity researchers at Kaspersky recently discovered a sophisticated cyber espionage campaign exploiting a previously unknown vulnerability in Google Chrome. The attack was triggered when victims unknowingly clicked on a phishing link in an email, launching a malicious site in their browser. Shockingly, no further action was required. Simply opening the link was enough to infect the system.According toKasperskys report, the malware was based on a zero-day vulnerability, later identified as CVE-2025-2783. Researchers say they analyzed the exploit, reverse-engineered its logic and uncovered that it allowed attackers to bypass Chromes built-in security features as if they didnt exist.The vulnerability exploited Chrome's inter-process communication framework, known as Mojo, which is crucial for the browser's functionality. This allowed the attackers to execute malicious code across different processes within Chrome, effectively bypassing its security measures."We have discovered and reported dozens of zero-day exploits actively used in attacks, but this particular exploit is certainly one of the most interesting weve encountered," Kaspersky noted.The cybersecurity team also highlighted the stealthy nature of the attack, which primarily targeted media professionals, educational institutions and government agencies. Dubbed "Operation ForumTroll," the campaign appeared to have espionage as its primary goal. Google Chrome on a phone (Kurt "CyberGuy" Knutsson)Googles response to the attackOnce Kaspersky reported the vulnerability,Google released an emergency fix. The company has updated Chromes Stable channel for Windows, with the update gradually rolling out to users over the next few days and weeks. Meanwhile, the Extended Stable channel has also been updated.As with most security updates, Google is keeping the details under wraps until the majority of users have installed the fix. This is a standard precaution to prevent other hackers from exploiting the flaw, while some users are still unprotected. If the bug also affects third-party software, Google will continue restricting details until those platforms release their own patches.How to update Google ChromeWhile the malware is affecting the Windows version of Google Chrome, it's a good idea for everyone who uses Google Chrome to update their browsers. Below, we've listed steps to update the browser on Windows and other devices. To learn more about how to update other browsers like Safari,see my guide here.WindowsOpenChrome browserAt the top right, clickMoreClickHelp, thenAbout Google ChromeSelectUpdate Google ChromeNote: If you do not see the "Update Google Chrome" button, then your browser is already updatedClick Relaunch to complete Google Chrome update on Windows (Kurt "CyberGuy" Knutsson)macOSOpenGoogle Chrome on your MacClick thethree dots in the upper-right corner of the browser windowNavigate to Help >About Google Chrome from the dropdown menuThe browser will automatically check for updates. If an update is available, it will begin downloading immediatelyOnce the update is downloaded, clickRelaunch to apply itIf the above steps fail, or you do not see the update option, visitgoogle.com/chrome to download the latest version manually, then open the installer file and follow the on-screen instructions to install ChromeiPhone/iPadOpen theApp Store on your iPhone or iPadTap yourprofile picture in the top-right corner of the screenScroll down toAvailable Updates and look for Google Chrome in the list of apps with pending updatesIf you seeChrome listed, tap theUpdate button next to itIf you dont see Chrome under Available Updates, use the search bar at the top of the App Store and type Google Chrome, then tap onGoogle Chrome in the search results and check if an Update button is available. If so,tap itOnce updated, asmall blue dot will appear next to Chromes app name on your home screen, indicating that it has been recently updatedYou can also confirm that Chrome is up to date byreopening the App Store, scrolling down to Updated Recently and checking if Google Chrome appears there with todays dateAndroidSettings may vary depending on your Android phones manufacturer.Open theGoogle Play Store app on your deviceTap yourprofile icon in the top-right corner of the screenSelectManage apps & device from the menuUnder Updates available, tapSee details to view a list of apps with pending updatesLocateGoogle Chrome in the list and tap the Update button next to itIf you dont see Chrome listed under updates, search for Google Chrome in the Play Store search bar, then tap onChrome in the results and check if anUpdate button is available. If so, tap itOnce updated, tapOpen to launch the latest version of Chrome3 additional ways to protect your privacyWhile updating Chrome should fix the vulnerability, below are some security tips you can follow to further bolster your privacy and security.1) Have strong antivirus software:Hackers often gain access to devices by sending infected emails or documents or by tricking you into clicking a link that downloads malware. You can avoid all of this by installing strong antivirus software that will detect any potential threat before it can take over your device.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Enable two-factor authentication (2FA):Many online accounts, including Google, offer two-factor authentication as an extra security measure.Enabling 2FA ensures that even if a hacker obtains your password, they still need a second form of verification, such as a code sent to your phone, to access your account. This simple step significantly reduces the chances of unauthorized access.3) Use a secure password manager:A strong password is crucial, but remembering multiple complex passwords can be difficult. A password manager generates, stores and autofills strong passwords for your accounts, reducing the risk of password-related breaches. Avoid using the same password across different sites and always opt for long, unique passwords. Get more details about mybest expert-reviewed password managers of 2025 here.Kurt's key takeawayThis incident serves as yet another reminder that even the most secure systems are never truly invulnerable, especially when state-backed or highly skilled actors are in play. While Googles quick response is commendable, it also highlights the never-ending cat-and-mouse game between security teams and cybercriminals. If you are using Chrome, update it now.Do you think Google is doing enough to protect users from security threats?Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved.
    0 Comments 0 Shares 106 Views
  • WWW.FOXNEWS.COM
    Save loved ones' voicemails with Android
    Recommended Published April 1, 2025 6:00am EDT close 'CyberGuy': Save loved ones' voicemails with Android Preserving voicemails securely on Android: Tech expert Kurt Knutsson reveals easy methods to keep memories alive forever. I still remember when my dad passed away; one of the most precious things I had left of him were the voicemails he had left on my phone. Preserving those messages became incredibly important to me, as they were a tangible connection to his voice and love. If you're in a similar situation, or if you just want to keep a sweet message from your kid or a sentimental voice from a loved one, I'm here to guide you through the process on your Android. Here's theprocess to go through on your iPhone. A woman listening to voicemails on her Android (Kurt "CyberGuy" Knutsson)How to archive voicemails on AndroidSettings may vary depending on your Android phones manufacturer.Open your voicemail appSelect themessage you want to savePress Archive at the bottomConfirm your decision by clickingArchive again Steps to archive voicemails on Android (Kurt "CyberGuy" Knutsson)That's it. Your message is now safely saved on your device. To find it later:From the home screen, selectVoicemailTapArchive at the bottom right Steps to find an archived voicemail (Kurt "CyberGuy" Knutsson)Want to share the voicemail? Here's howSettings may vary depending on your Android phones manufacturer.Click thevoicemailTap theshare iconChoose yourdesired destination (cloud service, email or messaging app) Steps to share an archived voicemail (Kurt "CyberGuy" Knutsson)How to record a voicemail from another device and share itSettings may vary depending on your Android phones manufacturer.Open theVoice Recorder app on your AndroidPressrecord and play the voicemail out loud from another device (computer, laptop or tablet)Once done,name itHit saveTap the three dots (top right) Steps to record a voicemail from another device (Kurt "CyberGuy" Knutsson)SelectSharePick your voicemail fileThenshare it via email, cloud storage or Google Drive Steps to share a voicemail from another device (Kurt "CyberGuy" Knutsson)Store and backupOnce youve saved or recorded the voicemails:Transfer them to your computer or cloud storage (e.g., Google Drive, Dropbox) or yourhard driveConsider creating multiple backups onexternal drives or USB sticksLabel files clearly with dates or descriptions for easy access laterKurt's key takeawaysSaving those special voicemails is like preserving a piece of your heart. It's a way to hold onto moments and voices that matter most. So go ahead, take a few minutes to safeguard those precious messages. Trust me; down the road, you will be so grateful you did.What's the most memorable voicemail you've ever received, and why is it so special to you? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 101 Views
  • WWW.FOXNEWS.COM
    New phishing attack uses real-time interception to bypass 2FA
    Published March 31, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and his tips on how to avoid them. Phishing attacks are everywhere, and most of us can spot the obvious ones. Even if someone falls for one and hands over their password, two-factor authentication (2FA) usually adds a crucial layer of protection. But a new phishing kit making the rounds can bypass 2FA entirely by using session hijacking and real-time credential interception.Known as Astaroth, this tool intercepts and manipulates traffic between your device and legitimate authentication services like Gmail, Yahoo and Microsoft. Since it grabs everything in real time, it completely bypasses 2FA and gives attackers full access to your account. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)How Astaroth worksAstaroth is a next-level phishing kit that takes scamming to a whole new level. Instead of using basic fake login pages like traditional phishing kits, it works as a middleman between your device and the real authentication service while silently grabbing everything needed to break in.The attack begins when you click on a phishing link and land on a malicious site that looks identical to the real one. Since the site has valid SSL certificates, there are no red flags, no security warnings and no sketchy pop-ups. When you enter your login details, including username, password, device info and IP address, Astaroth snatches them up before passing the request to the actual website.Two-factor authentication is not a problem for Astaroth. It intercepts one-time passwords the second they are entered, whether they come from an authenticator app, SMS or a push notification. The stolen codes are instantly sent to the attacker through a web panel or Telegram alert, so they can use them before they expire.The real kicker is that Astaroth also grabs session cookies, which are the small bits of data that keep users logged in after authentication. Attackers can inject these cookies into their own browsers, skipping the need for passwords or two-factor authentication altogether. Once they have the session, they are in with no extra steps required. An example of what the victim and attacker would see (SlashNext) (Kurt "CyberGuy" Knutsson)Astaroth is shockingly advancedAs reported by cybersecurity companySlashNext, Astaroth stands out from other phishing kits because of its ability to intercept credentials in real time, automate attacks and resist takedown efforts. Traditional phishing depends on tricking victims into entering their credentials on fake login pages, but Astaroth removes that step entirely.Beyond its advanced capabilities, Astaroth comes with features that make it appealing to cybercriminals. It uses bulletproof hosting to stay online despite law enforcement efforts, receives frequent updates to bypass security patches and follows a structured payment model. For $2,000, buyers get six months of continuous upgrades. To build trust, the creators even let hackers test the phishing kit before purchasing.Astaroth is widely available through Telegram and underground cybercrime forums. The anonymity of these platforms makes it difficult for authorities to track distribution. The seller sharing information on testing the phishing kit out (SlashNext) (Kurt "CyberGuy" Knutsson)Signs you may be infected with Astaroth1) Unexpected account logins or security alertsYou receive alerts from Gmail, Microsoft or other services about a login from an unknown device or locationYou get a 2FA request when you werent trying to log in2) Youre mysteriously logged out of accountsIf your session cookies were stolen, an attacker might log in as you and force a log-out elsewhere3) Password changes or settings updates you didnt makeIf an attacker has control, they may change recovery emails, phone numbers or passwords4) Slow system performance or odd behaviorAstaroth uses legitimate Windows processes (likeWMIC,BITSAdmin orRegsvr32) to hide itselfIf your system is sluggish or the Task Manager shows strange processes using high CPU/network with no explanation, that could be a clue5) Browser acting strangelyLogin fields autopopulate incorrectly or redirect loops occurPages that used to work suddenly trigger warnings or errors6) Unfamiliar programs or scripts running in the backgroundCheck for odd Scheduled Tasks, Registry changes or background network connections (especially if they're outbound to suspicious domains or IPs).What to do if you suspect infectionDisconnect from the internet immediatelyRun a full malware scan usingtrusted antivirus softwareCheck for unauthorized logins on your major accounts andchange all passwords on another trusted deviceEnable passkeys or hardware security keys where possibleReset your device if malware persists; a full factory reset may be requiredMonitor bank accounts and email inboxes for suspicious activity4 ways to stay safe from Astaroth phishing attacks1) Avoid unknown links and use strong antivirus software: Remember that no matter how advanced the malware is, it still needs input from you. In most cases, an attacker will require you to click a link before they can steal your data. For example, for Astaroth to work, you have to click a link, visit a malicious website and enter your credentials. If you dont click the link, you stay clear of the malware.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS device.2) Double-check sites:Always verify website addresses and use bookmarks for trusted sites. Instead of clicking on links in emails or messages, manually type the URL or use a trusted bookmark. This minimizes the risk of landing on a fraudulent page designed to mimic a legitimate website.3) Update your devices:You might wonder how keeping your devices updated helps against malware like Astaroth. While it doesnt directly prevent an attack, it ensures the situation doesnt get worse.Keeping your operating system and applications up to date with the latest security patches closes vulnerabilities that malware might exploit, making it harder for attackers to gain a foothold on your device.4) Avoid typing passwords:Avoid entering passwords whenever possible to reduce the risk of credential theft. Instead, use authentication methods like passkeys, Google Sign-In or Apple Sign-In.A passkey is a feature that uses cryptographic key pairs to verify your identity, eliminating the need for traditional passwords. It allows you to sign in to apps and websites using the same process you use to unlock your device, such as biometrics, PIN or pattern.Google Sign-In is a feature that allows you to log in to third-party apps or websites using their Google Account credentials. It simplifies the sign-in process by eliminating the need to create and remember separate usernames and passwords for each service. You can sign in via a "Sign in with Google" button, a Google sign-in prompt or automatic sign-in if previously authorized.Apple Sign-In is a feature that enables you to privately sign in to participating third-party apps and websites using your Apple ID. It offers a fast, easy and more private way to authenticate without the need to create new accounts or remember additional passwords. To set up an account to "Sign in with Apple," when a participating website or app asks you to set up or upgrade an account, do the following: Tap Sign in with Apple. Follow the onscreen instructions. Some apps (and websites) dont request your name and email address. In this case, you simply authenticate with Face ID or Touch ID (depending on your model), then start using the app.Others may ask for your name and email address to set up a personalized account. When an app asks for this information, Sign in with Apple displays your name and the personal email address from your Apple Account for you to review.These methods rely on cryptographic keys or secure tokens, making it much harder for attackers to intercept your login information, even if they manage to trick you into visiting a malicious site.Kurts key takeawayAstaroth shows just how far phishing kits have come, taking things beyond the usual tricks and bypassing 2FA with ease. Its a reminder that no matter how secure we think our systems are, theres always a smarter attack waiting to exploit the gaps. Cybercriminals are adapting fast, and while traditional defenses may not cut it anymore, there are still steps you can take to fight back: use passwordless logins, stay updated and keep learning about these evolving threats.What do you think governments and companies should be doing to protect you from sophisticated cyber threats like the Astaroth phishing kit, which can bypass traditional security measures? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 92 Views
More Stories