Fox News
Fox News
Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
  • 1 pessoas curtiram isso
  • 79 Publicações
  • 2 fotos
  • 0 Vídeos
  • 0 Anterior
  • News
Pesquisar
Atualizações recentes
  • WWW.FOXNEWS.COM
    Dont get caught in the 'Apple ID suspended' phishing scam
    Tech Dont get caught in the 'Apple ID suspended' phishing scam Phishing scams are getting better, but here's how to stay safe Published November 24, 2024 10:00am EST close Apples AirPods Pro 2 make hearing tests as easy as a tap Checking your hearing just got much easier. Scammers keep coming up with new and, honestly, pretty clever ways to trick people. They socially engineer their phishing emails and messages so well that even the most tech-savvy users have to think twice. One example is the "Apple ID Suspended" phishing scam.You might have seen it before since its been going around for the past few years.Heres how it works: You get an email from what looks like Apple, saying your Apple ID has been suspended.The sender's name shows "Apple," but the email is actually from a scammer trying to get you to click on a malicious link. A woman looking at her iPhone (Kurt "CyberGuy" Knutsson)What you need to knowThe Apple ID phishing emails have come a long way in recent years. They used to be plain text, had no Apple branding and didnt even greet or address the user. Now, though, they look almost identical to genuine Apple emails. These fraudulent emails claim your Apple ID has been suspended to trick you into giving up login credentials or other sensitive information. They come complete with an Apple logo, show "Apple ID" as the sender name and have a big blue button that says "Go to Apple ID."WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The email pretends to be from Apple Support, claiming your access has been suspended due to "unusual activity" or missing or invalid information. It says you can't access your account or Apple services until you verify your identity. Theres usually a link that leads to a fake Apple site, asking you to enter your username, password and additional personal details to reactivate your account. To add urgency, it even warns that if you dont verify your Apple ID within 24 hours, it will be permanently blocked. A person checking emails (Kurt "CyberGuy" Knutsson)Watch out for red flagsIf youre not paying attention, its easy to get tricked into clicking the link in a scam like this. But if youre keeping an eye out, there are plenty of red flags. Ive added a sample phishing email below, and youll spot the issues immediately. For one, its not actually from Apple; the email domain is @uaepass.ae, which has nothing to do with Apple. Any legit Apple email will end with "@email.apple.com," so anything else is an instant red flag.Then theres the awful grammar and punctuation. A company worth $3.37 trillion can definitely afford a decent content writer. You know someone at Apple is not going to mix up past and present tense like its their first time writing an email.Take this gem: "Therefore we need to re-verify your account data. if you did not verify your account within 48 hour, your account will be permanently locked, go to Apple ID and verify as soon as possible." It reads like someone smashed a bunch of words together and called it a day. I'm not trying to give a grammar lesson here, but you get the point.GET FOX BUSINESS ON THE GO BY CLICKING HERE "Apple ID Suspended" phishing email (Kurt "CyberGuy" Knutsson)6 ways to protect yourself from Apple ID phishing scams1. Check the email address: Always verify the senders email address. Any legitimate email from Apple will come from a domain ending in "@email.apple.com." If its anything else, like @uaepass.ae, its a scam.2. Look for spelling and grammar mistakes: Phishing emails often have poor grammar and punctuation. If the message sounds odd or looks like it was written by someone who doesnt know how to write well, be suspicious.3. Dont click on suspicious links: If the email asks you to click a link, dont do it right away. Hover over the link to see the actual URL. If it doesnt look like an official Apple website (or any site you trust), dont click it.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication(2FA): This adds an extra layer of protection to your Apple ID. Even if a scammer gets your password, they wont be able to log in without the second authentication step.5. Verify directly with Apple: If youre ever unsure about an email or message, go directly to Apples official website or contact their support team. Dont use any contact info provided in a suspicious email.6. Invest in data removal services: Scammers often use personal information thats readily available online to craft more convincing phishing attempts. By investing in data removal services, you can reduce the amount of personal data thats exposed on the web, making it harder for scammers to target you effectively.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawaysScammers are getting pretty clever, but you dont have to fall for their tricks. By staying alert and keeping an eye out for those red flags, you can easily spot these phishing attempts before they catch you off guard. Always double-check the senders email address, watch for bad grammar and dont click on any suspicious links. If something feels off, dont hesitate to go directly to Apples official website or contact their support team.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Apple are doing enough to protect users from scams? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 0 Visualizações
  • WWW.FOXNEWS.COM
    Stanford prof accused of using AI to fake testimony in Minnesota case against conservative YouTuber
    By Andrea Margolis Fox News Published November 24, 2024 6:39pm EST close Fox News Flash top headlines for November 24 Fox News Flash top headlines are here. Check out what's clicking on Foxnews.com. A Stanford University "misinformation expert" has been accused of using artificial intelligence (AI) to craft testimony later used by Minnesota Attorney General Keith Ellison in a politically-charged case.Jeff Hancock, a professor of communications and founder of the vaunted school's Social Media Lab, provided an expert declaration in a case involving a satirical conservative YouTuber named Christopher Kohls. The court case is about Minnesota's recent ban on politicaldeepfakes, which the plaintiffs argue is an attack on free speech.Hancock's testimony was submitted to the court by Ellison, who is arguing in favor of the law. Hancock is "well-known for his research on how people use deception with technology, from sending texts and emails to detecting fake online reviews," according to Stanford's website.But the plaintiff's lawyers have asked the Minnesota federal judge hearing the case to dismiss the testimony, charging that Hancock cited a fake study. A Stanford professor is accused of using an AI language model to write an expert declaration. (Getty Images)"[The] Declaration of Prof. Jeff Hancock cites a study that does not exist," lawyers argued in a recent 36-page memo. "No article by the title exists."The "study" was called "The Influence of Deepfake Videos on Political Attitudes and Behavior" and was purportedly published in the Journal of Information Technology & Politics. The Nov. 16 filing notes that the journal is authentic, but had never published a study by that name."The publication exists, but the cited pages belong to unrelated articles," the lawyers argued. "Likely, the study was a hallucination generated by an AI large language model like ChatGPT.""Plaintiffs do not know how this hallucination wound up in Hancocks declaration, but it calls the entire document into question, especially when much of the commentary contains no methodology or analytic logic whatsoever."The document also calls out Ellison, arguing that "the conclusions that Ellison most relies on have no methodology behind them and consist entirely of expert say-so.""Hancock could have cited a real study similar to the proposition in paragraph 21," the memo states. "But the existence of a fictional citation Hancock (or his assistants) didnt even bother to click calls into question the quality and veracity of the entire declaration." Microsoft Bing Chat and ChatGPT AI chat applications are seen on a mobile device in this photo illustration in Warsaw, Poland, on July 21, 2023. (Jaap Arriens/NurPhoto via Getty Images)The memorandum also doubles down on the claim that the citation is bogus, noting the multiple searches lawyers went through to try to locate the study."The title of the alleged article, and even a snippet of it, does not appear on anywhere on the internet as indexed by Google and Bing, the most commonly-used search engines," the document states. "Searching Google Scholar, a specialized search engine for academic papers and patent publications, reveals no articles matching the description of the citation authored by Hwang [the purported author] that includes the term deepfake.""Perhaps this was simply a copy-paste error? Its not," the filing later flatly states. "The article doesnt exist."The attorneys concluded that, if the declaration were partially fabricated, it is entirely unreliable and should be dismissed from court consideration."The declaration of Prof. Hancock should be excluded in its entirety because at least some of it is based on fabricated material likely generated by an AI model, which calls into question its conclusory assertions," the document concluded. "The court may inquire into the source of the fabrication and additional action may be warranted." Minnesota Attorney General Keith Ellison arrives to speak on stage during the third day of the Democratic National Convention at the United Center on August 21, 2024, in Chicago, Illinois. (Getty Images)Fox News Digital reached out to Ellison, Hancock and Stanford University for comment. Andrea Margolis is a writer for Fox News Digital and Fox Business. Readers can send story tips to andrea.margolis@fox.com.
    0 Comentários 0 Compartilhamentos 0 Visualizações
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Mr. Miyagi's dramatic return
    Pat Morita and Ralph Macchio in a scene from the film 'The Karate Kid', 1984. (Photo by Columbia Pictures/Getty Images) (Columbia Pictures/Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Cobra Kai used AI to bring back Karate Kid character in controversial nightmare scene- Nvidia stock dips despite optimistic forecast for Age of AI- AI-powered dog robot sniffs out invasive fire ants Actor Pat Morita during filming of short film called Talk To Taka, Aug. 9, 2000, in Los Angeles. (Bob Riha, Jr./Getty Images)WAX ON, WAX OFF: Netflixs "Cobra Kai" used artificial intelligence to bring back the most influential character in the "Karate Kid" universe the late Pat Moritas Mr. Miyagi.'AGE OF AI': Nvidia released its earnings report on Wednesday and projected that fourth-quarter sales were above Wall Street estimates, but investors balked as those figures fell short of the lofty expectations theartificial intelligence giant has garnered during its historic rise. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)K-9 PEST PATROL: High-tech canines are being trained to sniff out invasive fire ants, using artificial intelligence to identify their nests with remarkable precision. This breakthrough could change the way we manage invasive species and protect our environment.MACHINE BIAS: On Tuesday, the Department of Education's Office for Civil Rights released presidentially-mandated guidance that lays out how schools' use of artificial intelligence can be discriminatory toward minority and transgender students, "likely" opening them up to federal investigations. This photo illustration created in Washington, DC, on November 16, 2023 shows an AI girl generator in front of an image of school busses. When Ellis, a 14-year-old from Texas, woke up one October morning with several missed calls and texts, they were all about the same thing: nude images of her circulating on social media. That she had not actually taken the pictures didn't make a difference, as artificial intelligence makes so-called "deepfakes" more and more realistic. The source images of Ellis and a friend, also a victim, were lifted from Instagram, their faces then placed on naked bodies below. Other students -- all girls -- were also targeted, with the photos shared with other classmates on Snapchat. ((Photo by Stefani REYNOLDS / AFP) (Photo by STEFANI REYNOLDS/AFP via Getty Images))FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comentários 0 Compartilhamentos 28 Visualizações
  • WWW.FOXNEWS.COM
    Cheap Black Friday deals cost to your privacy
    Published November 23, 2024 10:00am EST close Best travel gifts for road trips Lifestyle expert Carey Reilly shows various travel gifts for your family this summer. Its the perfect time to pick up holiday gifts for your family and treat yourself to that pricey watch you wouldnt splurge on otherwise.Black Friday is a worldwide cultural and economic phenomenon today. It comes with much anticipation, great discounts and a shopping frenzy. Its success is such that it now lasts the whole month. But dont let the excitement cloud your judgment.The deals are enticing, but there are dangers lurking beneath the surface. A woman shopping online on her laptop. (Kurt "CyberGuy" Knutsson)The devils in the privacy policyParticularly when it comes to online shopping, we give up personal data with every purchase. Information such as your email address, name and address is necessary to create an account or receive a delivery. And thats fine as long as its used for these purposes only.However, the fine print linked under "Privacy Policy" that you agree to at checkout often comes with a long list or, worse still, an unspecified number of third parties with which your data will be shared. Retailers often sell personal information and purchase histories to third parties, such as marketing companies and data brokers, who use it to build detailed consumer profiles. Once its out there, its very hard to remove your information from these third-party databases.Arguably, this happens all the time, Black Friday or not. But with all the marketing strategies pushing us to buy quickly and buy more, were just less likely to pay attention. A woman shopping online on her laptop. (Kurt "CyberGuy" Knutsson)The spam and scam aftershock, a post-Black Friday hiccupThe term "Black Friday" was originally coined in the 1950s by Philadelphia police officers to describe the chaos that ensued the day after Thanksgiving, when hordes of shoppers and tourists flooded the city.After the shopping extravaganza of Black Friday, your inbox and phone may experience their own dark moments. A surge in spam is widely reported during the month of November. This unwanted communication can come from several sources.First, from the online shops where youve left your email and phone number. Second, from all the companies that received your consumer profile, the ones listed (or not) in the fine print of the privacy policy. Third, from all the retailers you bought from in the past, including that one-time purchase of a kettlebell set three years ago (that youd rather forget).But thats not all; Black Friday is a fiesta for hackers, too, and the perfect time for social engineering attacks! The urgency and excitement of Black Friday deals encourage you to let your guard down. Youre likelier to click on links or open attachments without checking the source. And less likely to notice that a phishing email pretending to be sent by a big retailer has sneaked into your inbox. Your data is being collected, shared and sold as you read this article. A woman shopping online on her laptop. (Kurt "CyberGuy" Knutsson)How to buy without being sold at the same timeReading privacy policies every time you buy something isnt realistic. If youre ambitious, use the search function (Ctrl+F or Command+F) to find terms like "opt out," "unsubscribe" or "do not sell" to quickly locate sections where you can limit data sharing. Depending on where you live, these options may simply not be available to you.An easier solution is to use adisposable email address whenever you open an account for the sole purpose of making a purchase. Once you receive your order confirmation, you can disable it so that no further communication is sent your way. You can also use privacy-focused tools or browsers that block tracking cookies and prevent companies from collecting your data. A woman shopping online on her laptop. (Kurt "CyberGuy" Knutsson)8 tips to safeguard your email after Black FridayAs the dust settles from the shopping rush, it's crucial to be proactive; here are eight essential tips to help you protect your email and personal information from the surge of spam and scams that often follow.1. Create alias email addresses.An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address. An email alias address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address.See my review of best secure and private email services here.2. Use apassword manager to consistently use complex passwords that you can change frequently.3. Avoid opening attachments or clicking on links from emails unless you are sure they are from a trusted source. Scammers or hackers can easily change the name of the sender to make it look like it came from a legitimate organization such as Amazon or an individual. But if you click the email header, you will see the sender's actual email address. By pretending to be a reputable organization, the crooks send urgent messages to make you click on links, reply or provide personal information in an attempt to fix a problem or claim a reward. If you click on a malicious link, then a scammer may be able to access your email and other personal data.4. Have strong antivirus software on all your devices:The best way to protect yourself from having your data breached is to have antivirus protection installed on all your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Malicious links are often disguised as legitimate ones, but they can download malware onto your device without your knowledge. Malware is a type of software that can damage your device, steal your personal information, or give hackers access to your data. Hackers can then use your data for various purposes, such asidentity theft, fraud or blackmail. This is why it is important to have antivirus software that can detect and remove malware before it causes any harm.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Go directly to the official site where you have any accounts, such as your financial institution, to check if any changes or charges were made instead of clicking links in the email you received or responding to the email. This way, you can avoid falling for phishing scams and keep your account secure.6. Limit the number of accounts or profiles you create with your personal email account.7.Regularly scrub your personal information on the internet. You dont want spammers to take your email and add it to their lists, do you? That would result in annoying and potentially dangerous messages flooding your inbox. To prevent that, you need to make sure your personal information is not exposed on the internet. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.8. Using aVPN (Virtual Private Network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs dont directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.I've been scammed! What to do next?If a scammer gets hold of your email address, they can use it to access your other accounts, send phishing emails to trick you into revealing your passwords or personal details, or even impersonate you to commit fraud or other crimes. This is why it is important to protect your email address from falling into the wrong hands and to act quickly if you suspect that it has been compromised. Below are some next steps if you find you or your loved one is a victim of identity theft.1. If you can regain control of your accounts,change your passwords and inform the account provider.2. Look through bank statements and checking account transactions to see where outlier activity started.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Useidentity theft protection services to manage your personal information on and offline. Identity Theft protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number, and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using identity theft protections services is that it can include identity theft insurance of up to$1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case managerhelps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.4.Report any breaches to official government agencies like the Federal Communications Commission.5. You may wish to get the professional advice of a lawyerbefore speaking to law enforcement, especially when you are dealing with criminal identity theft, and if being a victim of criminal identity theft leaves you unable to secure employment or housing.6.Alert all three major credit bureaus and possibly place a fraud alert on your credit report.7. Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.Kurt's key takeawaysNavigating the world of online shopping during Black Friday can be a thrilling yet daunting experience. While the discounts are enticing, they often come with hidden costs namely, your personal data. As you prepare your shopping list, consider utilizing tools to safeguard your information. These resources can help you maintain your privacy while enjoying the benefits of online shopping. Also, remember that post-Black Friday, you may find yourself inundated with spam and unwanted communications from retailers and third parties. Taking proactive steps now can save you from future headaches.CLICK HERE TO GET THE FOX NEWS APPHave you ever experienced a data breach or privacy issue while shopping online? How did you handle it? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 30 Visualizações
  • WWW.FOXNEWS.COM
    Hypersonic jet promises NYC to London in under an hour
    Published November 22, 2024 6:00am EST close Hypersonic jet promises NYC to London in under an hour A Texas company is developing a groundbreaking hypersonic jet. Venus Aerospace, a Texas-based company, is developing a groundbreaking hypersonic jet called the Stargazer that could potentially fly from New York City to London in just under an hour, a journey that currently takes around seven hours.This ambitious project aims to revolutionize long-distance travel and redefine the boundaries of commercial aviation. Stargazer (Venus Aerospace)Powering Stargazer to hypersonic heightsAt the heart ofthe Stargazer's capabilities is the Venus Detonation Ramjet 2,000lb Thrust Engine, or VDR2.This innovative propulsion system combines the rotating detonation rocket engine (RDRE) with a ramjet, allowing the engine to operate from takeoff through hypersonic speeds without complex mechanical systems. The VDR2 is expected to reach speeds of up to Mach 6, or 3,600 miles per hour and fly at an altitude of 110,000 feet, allowing passengers to see the curvature of the Earth. The aircraft is designed to travel up to 5,000 miles.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Stargazer (Venus Aerospace)Navigating the path to hypersonic commercial flightWhile the prospect of hypersonic travel is exciting, there are several challenges to overcome. The Stargazer is estimated to cost $33 million and will have a limited passenger capacity of 12. There are also potential issues with sonic booms over populated areas and regulatory hurdles in obtaining approval for commercial hypersonic flight. However, Venus Aerospace is moving swiftly to bring their vision to reality. The Stargazer is projected to be available for commercial use in the 2030s. Stargazer (Venus Aerospace)Kurt's key takeawaysIf successful, the Stargazer could transform long-distance travel, making global cities more connected than ever before. However, it's important to temper excitement with realism, as the road to commercial hypersonic flight will likely be long and complex. The technological advancements being made by Venus Aerospace are promising, but numerous hurdles remain before hypersonic travel becomes a reality for everyday passengers.CLICK HERE TO GET THE FOX NEWS APPWould you fly on a hypersonic jet like the Stargazer, or are you hesitant about the idea of such rapid travel? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Try CyberGuy's new games (crosswords, word searches, trivia and more!)Enter CyberGuy's $500 holiday gift card sweepstakesUnbeatable Best Black Friday dealsBest gifts for:Men |Women |Kids |Teens |Pet loversBest deals:Laptops |Desktops |PrintersFor those who love:Cooking |Coffee |Tools |Travel |WineAccessories:Car| Kitchen |Laptop |Keyboards |Phone |Travel |Keep It CozyCant go wrong with these:Gift Cards |Money-saving apps |Amazon Black Friday insider tipsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 10 Visualizações
  • WWW.FOXNEWS.COM
    AI-powered dog robot sniffs out invasive fire ants
    Published November 21, 2024 6:00am EST close AI-powered dog robot sniffs out invasive fire ants Robot uses artificial intelligence to locate nests with precision. Imagine walking through a park on a sunny day, only to feel the sharp sting of fire ants attacking your ankles.These tiny invaders are not just a nuisance; they pose significant threats to our ecosystems and economies. Fortunately, scientists have developed an innovative solution to combat these pests: robot dogs.These high-tech canines are being trained to sniff out invasive fire ants, using artificial intelligence to identify their nests with remarkable precision. This breakthrough could change the way we manage invasive species and protect our environment. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)A high-tech ant hunterResearchers from China and Brazil have created a robotic dog known as CyberDog, specifically designed to locate fire ant nests. This high-tech robot has been trained to identify red imported fire ants, which are wreaking havoc in various ecosystems around the globe. Impressively, the CyberDog is capable of finding three times more nests than human inspectors, all while showing off greater accuracy. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)Why fire ants are such a big dealRed imported fire ants may be small, but their impact is anything but trivial. Native to central South America, these aggressive ants have spread across the United States, Australia and parts of Asia, causing extensive environmental and economic damage. In the U.S. alone, they are responsible for an estimated $6 billion in losses each year due to reduced crop yields and damage to farm equipment.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)How the CyberDog works its magicPublished in theSCI journal Pest Management Science, the study showcases how the CyberDog robot, equipped with an AI model, can efficiently automate the identification and control of red imported fire ants, a notoriously destructive global pest. The research team trained the CyberDog using a comprehensive dataset of over 1,100 images of fire ant nests, resulting in an impressive detection accuracy rate of over 90%.The robot is programmed to poke suspected nests with its paw; when it does so, active nests release their workers in a defensive frenzy, confirming the presence of fire ants. This unique method allows researchers to distinguish between active mounds and those that may be abandoned or occupied by other species. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)More than just ant controlBeyond its practical applications in pest management, the CyberDog also serves an educational purpose. Zheng Yan, one of the researchers involved in the project, emphasizes that sightings of robots tracking fire ant nests can captivate public interest and raise awareness about the dangers posed by invasive species. By engaging communities in this way, scientists hope to foster greater understanding and proactive measures against these ecological threats.GET FOX BUSINESS ON THE GO BY CLICKING HERE CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)Challenges and future prospectsDespite its impressive capabilities, the CyberDog is not without challenges. Its battery life currently lasts about 30 minutes, which limits its operational time in the field. Additionally, acquiring more advanced models can be costly. However, as technology continues to evolve and production costs decrease, it's likely that robotic solutions like this will become more accessible for widespread use in pest control. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)Kurts key takeawaysThe development of the CyberDog shows us how technology can be harnessed to tackle ecological challenges in innovative ways that benefit both nature and society. As we confront increasing threats from invasive species worldwide, AI-powered robots could become our new allies in protecting ecosystems.Would you welcome robot dogs patrolling your local park for fire ants? Or does the idea of AI-powered pest control make you feel uneasy? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Unbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 49 Visualizações
  • WWW.FOXNEWS.COM
    How to protect your deliveries from getting stolen by porch pirates
    close Holiday shopping fraud expected to increase due to AI The busy holiday shopping season is just around the corner and most of us will be targeted by an AI scam. As the holiday season approaches, the excitement of gift-giving can quickly turn into anxiety over package theft. With porch pirates on the prowl, your carefully delivered gifts can vanish right from your doorstep. In 2023 alone, a staggering119 million packages were reported stolen, meaning one in every 180 deliveries disappeared into thin air.Cities like Seattle, Memphis and San Diego have become hot spots for these unfortunate heists.If youve ever found yourself racing home to rescue a package, asking neighbors to keep an eye out or, worst of all, falling victim to these sneaky thieves, youre not alone. But dont worry! Weve got some tips that could save you from the holiday headache of package theft. Lets dive in. Alleged porch pirate taking packages from property (Kurt "CyberGuy" Knutsson)Tip 1: Get security camerasFirst things first, consider installing security cameras around your home. Having a good camera system can really make a difference when it comes to deterring those sneaky thieves. Depending upon how well your police department responds to porch pirate package theft, position yourvideo doorbell to capture the face of the pirate and your package deliveries. A Video Doorbell can push notifications to get a phone alert whenever anyone or anything approaches your door, even if they don't ring the doorbell.Also, you might want to consider adding a couple of nearly invisiblewireless cameras on tree limbs near the street at your house. We did it in hopes of being able to record a license plate if ever needed for police. I can set them to send a notification when the camera detects a person or car.When youre shopping for cameras, look for high-resolution video so you can see everything clearly, even at night, with night vision capabilities. Motion detection is a must. Itll alert you if someone gets too close to your front door. Plus, two-way audio lets you talk to anyone at your door, whether its a delivery person or someone who shouldnt be there. And dont forget about cloud storage. This way, you can easily access footage whenever you need it. Check out my top picks for thesix best outdoor security cameras.Pro tip: If your camera has the feature, set your video camera to notify you when it identifies packages within view.GET MORE OF MY TOP PICKS TO AMP UP YOUR HOME SECURITY Image of a doorbell camera (Kurt "CyberGuy" Knutsson)Tip 2: Use tracking appsNext up, make sure you're using tracking apps for your deliveries. Most shipping companies offer tracking services that let you follow your package from the moment it leaves the warehouse until it arrives at your home.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?If you sign up forUSPS Informed Delivery, youll get digital previews of whats coming to your mailbox, which is super handy. You can set up email or text alerts for delivery updates so youre always in the loop about when your packages are arriving. Some retailers even send you photos once your package has been delivered, giving you extra reassurance that it made it safely. A woman using a tracking app on her iPhone (Kurt "CyberGuy" Knutsson)Tip 3: Make sure someone is homeNow, lets talk about timing. Its important to have someone around to receive packages as soon as they arrive. This can be tricky since many deliveries happen during work hours. If you can swing it, try working from home on days when important packages are expected. If thats not possible, coordinate with friends, family members or roommates so someone is always there to grabthe delivery right away.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman receiving packages at home (Kurt "CyberGuy" Knutsson)Tip 4: Coordinate with your neighborsDont underestimate the power of community. Teaming up with your neighbors can be a game-changer in preventing package theft. Sign up for neighborhood porch pirate alerts from popular local networks likeNeighbors andNextdoor apps. This is where people often post when they've had a package stolen and sometimes upload videos or images of the suspected porch pirates. Plus, making an agreement with trusted neighbors to watch each others packages can really enhance security; there's strength in numbers. A person picking up packages for their neighbor (Kurt "CyberGuy" Knutsson)Tip 5: Have the package delivered somewhere elseIf home delivery feels too risky, consider alternative delivery options that offer more security. Many people choose to have their packages sent to their workplace if allowed; this way, theyre less likely to be stolen than sitting on a porch all day. Retailers often provide secure pickup points where you can collect your packages at your convenience. Renting a P.O. Box or using services that hold packages for pickup at local shipping facilities are also great options for those valuable items. A woman receiving packages at her workplace (Kurt "CyberGuy" Knutsson)Tip 6: Request a signature confirmationAnother way to prevent package theft is to request a signature confirmation for your deliveries. This means that the delivery person will not leave the package at your door unless someone signs for it. You can request a signature confirmation from most delivery services, such as FedEx, UPS, USPS and DHL. This option may cost extra, but it can give you peace of mind that your package will not be stolen.Tip 7: Send to remote pick-up locationsDid you know that most delivery services now offer remote pick-up locations? These can be secure lockers, post offices or retail counters. Amazon has hundreds of Amazon Lockers and pick-up counters across the country, which are free for Prime members.See howfar away the nearest Amazon Locker is located from your home.When you're checking out, just click onChange next to your shipping address, then selectFind a pickup location near you to see your options. Once your package is delivered, you'll get a notification or email with a code to retrieve it from the locker or pick-up point. Some items can even be returned at these locations. A person picking up a package from a locker (Kurt "CyberGuy" Knutsson)Tip 8: Amazon Key In-Garage DeliveryWe added a strong deadbolt to the door leading into the house from the garage before signing up. Now, when we are not home, an Amazon delivery can be placed securely inside our garage using the free service called Amazon Key In-Garage Delivery. The addition of asmart garage controller is the first step. Once you've signed up for Amazon Key In-Garage Delivery, pick Key Delivery when checking out on Amazon to have your packages securely put in the garage. I really like that you can block access to your garage any time you want. The driver never needs your garage code, and access only works for their one-time delivery. A delivery being made using Amazon Key-In-Garage Delivery (Kurt "CyberGuy" Knutsson)Tip 9: Provide a delivery boxAnother great option is to invest in adelivery box that allows packages to be securely dropped off and stored discreetly. Just remember that you'll need to inform delivery personnel about using the box and how it works. Package being placed in a delivery box (Kurt "CyberGuy" Knutsson)Tip 10: Sign up for delivery notificationsYou can get an alert each time a package arrives at your doorstep.Both FedEx and UPS will send a text when you've just received a delivery.Amazon will also send you a shipment text letting you know a package has just been delivered.To set upAmazon delivery notifications, follow these quick steps.Log on to theAmazon siteGo toYour Account sectionScroll down to theCommunication and Content sectionTapShipment Updates via TextFollow the on-screen instructions, tapSubscribeKurt's key takeawaysRemember, simple actions like installing security cameras, using tracking apps and coordinating with neighbors can go a long way in protecting your packages. So, as you prepare for the holiday season, take these tips to heart and enjoy a worry-free gift-giving experience. Let's keep those porch pirates at bay and ensure that every package arrives safely at your doorstep.CLICK HERE TO GET THE FOX NEWS APPHave you ever had a package stolen? If so, how did you handle the situation, and what lessons did you learn?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Unbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 49 Visualizações
  • WWW.FOXNEWS.COM
    Must-do privacy settings on your iPhone in iOS 18.1
    close Must-turn off privacy settings on your iPhone in iOS 18.1 AI The 'CyberGuy' walks you through which settings to adjust. With Apple rolling out the latest iOS 18.1 update, privacy has become an even hotter topic. The update introduces advanced AI capabilities through Apple Intelligence and Siri, giving your device more autonomy in understanding and learning from your behaviors.While this sounds promising, it also means that your iPhone might be capturing and analyzing sensitive information, especially if you have certain financial or health-related apps on your device.Well walk you through which settings to adjust, why its important and how to ensure that Apples AI isnt overstepping its boundaries with your personal data. Apple Intelligence on iPhone. (Apple)Why privacy matters more than ever in iOS 18.1iOS 18.1 brings a slew of AI-powered features aimed at enhancing your experience with Siri and Apple Intelligence, but its worth questioning: How much does your iPhone really need to know about you? If you're like most people, privacy is a top priority, especially when it comes to sensitive data such as banking information, health details and your location.When Apple Intelligence is enabled, it starts "learning" from your interactions with certain apps, creating a digital profile that can theoretically tailor your experience. This is a double-edged sword; while personalization might sound appealing, its crucial to consider what data Apples AI is learning and why you might want to limit its reach. Apple Intelligence and Siri on iPhone. (Kurt "CyberGuy" Knutsson)Apple Intelligence requirements for iPhoneDevices: iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 15 Pro or iPhone 15 Pro MaxSettings:Device language and Siri language set to a supported language.Storage: 4 GB available storage.Operating systems: iOS 18.1, update to iOS 18.1 viaSettings > General>Software Update.If available, tapUpdate Now and begin downloading and installing iOS 18.1 Steps to update your iPhones software. (Kurt "CyberGuy" Knutsson)Recommended apps to turn off 'Learn from this App'Financial apps: Banking and finance apps often contain highly sensitive information. Disabling learning on these apps prevents Apple Intelligence from accessing details about your transactions, account balances or other financial data.Health and fitness apps: Health-related apps can reveal personal information that you may not want to share with Apple Intelligence, even if its just being used for personalization.Location-based apps: Location data can be incredibly telling. Maps and similar apps often gather your location history, places you frequent and travel patterns. Turning off learning from these apps will help you avoid disclosing this information.The critical settings you need to changeApple Intelligence and Siri settings are at the heart of managing your data privacy. By navigating here, youre taking the first step in controlling what Apples AI can access. Heres how to protect your sensitive information from being used by Apple Intelligence and Siri:Open your iPhone and go toSettings.Tap onApple Intelligence and Siri.Enable Apple Intelligence bytoggling it on. Steps to enable Apple Intelligence. (Kurt "CyberGuy" Knutsson)Once youre in the Apple Intelligence section, scroll to the bottom and tapApps.These are all the apps that Apple Intelligence will learn from.Youll find a list of all the apps from which Apple Intelligence learns.Click oneach app andtoggle off next to "Learn from this App."Remember:Gray means off, andgreen means on. Steps to turn on "Learn from this App" on iPhone. (Kurt "CyberGuy" Knutsson)GET FOX BUSINESS ON THE GO BY CLICKING HEREHow to customize Siri and Apple Intelligence settingsEven if you turn off learning for certain apps, you may want to activate other AI settings selectively based on your preferences. For instance, some users prefer Siris suggestions for navigation but dont want AI involved with their social media or financial accounts. This customization is entirely up to you, but its essential to know where these toggles are and what each does.Why you should revisit these settings regularlyOne thing about privacy settings is that they can change with each software update. As Apple introduces more features, some apps may automatically gain access to Apple Intelligence. Its essential to check these settings periodically to ensure that no new permissions have been granted without your knowledge.Kurt's key takeawaysThe arrival of iOS 18.1 is exciting, especially with the enhanced AI features, but its crucial to stay vigilant about your privacy. Banking, health and location apps contain some of your most sensitive data, and allowing Apple Intelligence to learn from them might open up unintended risks. By turning off "Learn from this App" in settings, youre taking a proactive step to control your personal information. Remember, gray is off, green is on, and when it comes to privacy, sometimes its best to err on the side of caution.Revisit these settings occasionally to ensure they remain as you want them and stay in control of your data. Taking a few minutes to manage these settings today can go a long way in safeguarding your privacy in the future.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about the balance between convenience and privacy with AI features? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:KURT'S HOLIDAY GIFT GUIDESUnbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 50 Visualizações
  • WWW.FOXNEWS.COM
    How your browser is spying on you: Hidden dangers lurking behind every click
    close CyberGuy shows how you can add ChatGPT to your browser Kurt Knutsson explains how ChatGPT's functions can help you in your day-to-day life. A browser is one of the most popular apps we use. It's the gateway between the internet and its users, translating raw code into something we perceive as a web page and allowing us to interact with the web. It's safe to say that anyone who uses the internet uses a web browser.But while this tool is extremely useful, it can also be equally dangerous. For example, clicking malicious links can redirect you to harmful websites that either steal personal information or infect your device with malware.If you use a search engine like Google through Chrome, it can collect data on your searches, browsing history and even your location (if location services are enabled). Most browsers also use cookies, small files that store information about your online behavior. Let's discuss the risks associated with web browsers and how to stay safe. A person conducting a Google search on their laptop (Kurt "CyberGuy" Knutsson)How a browser doubles as spywareBrowsers are much more than simple tools to navigate the web. They are, in many ways, tools for surveillance. While they help you access websites and services, they also track your every move online to feed the ever-hungry advertising industry.First off, most browsers collect data about your searches, browsing habits and even your location. This data isn't just stored to "improve your experience," it's used to create a detailed profile of you, which is then shared with advertisers who target you with personalized ads.Google Chrome, for example, is notorious for tracking your activity. As you browse, it feeds data to Googles advertising engine, allowing it to serve highly targeted ads based on your behavior. This includes everything from your search history to the websites you visit, even down to the smallest detail, like how long you stay on a page."Google may share information about you with advertisers, business partners, sponsors, and other third parties," Google boldlymentions on its privacy policy page.Browsers also use cookies to keep tabs on you. These cookies track your activity across different sites, even after you've left a site. This means that ads you saw on one website might follow you across others, creating a persistent digital footprint. And while cookies can be blocked or deleted, many websites rely on them to function, making it hard to escape this kind of tracking. Google browser (Kurt "CyberGuy" Knutsson)Even Incognito mode isnt safeEven if you're using privacy-focused browsers or tools like Incognito mode, they dont really guarantee privacy. A2020 class-action lawsuit revealed that Google kept scraping searches by gathering data from users browsing in Incognito through ad tools used by websites, picking up "potentially embarrassing" searches from millions of people. Google then used that data to track web traffic and sell ads.Its not just Google. Your internet service provider, the websites you visit and even governments can monitor your browsing activity, even in Incognito mode. All it does is hide your activity from your local browser history.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A person conducting a Google search on their laptop (Kurt "CyberGuy" Knutsson)How to protect your privacyAs you all know, web browsers are essential tools for accessing the internet, but many popular options compromise your privacy by collecting extensive data. While Google Chrome is widely used, it tracks significant amounts of user information to power targeted advertising. However, there areseveral privacy-focused browser alternatives that prioritize user data protection. Also, to enhance your online security and protect your personal information, consider implementing these essential cybersecurity practices.Keep software updated: Regularlyupdate your operating system, browsers and other software to patch security vulnerabilities. Enable automatic updates whenever possible to ensure you're always protected against the latest threats.Use strong, unique passwords: Create complex passwords for each of your accounts and avoid reusing them. Consider using apassword manager to generate and securely store strong passwords.Enable two-factor authentication (2FA): Activate2FA on all accounts that offer it. This adds an extra layer of security by requiring a second form of verification beyond your password.GET FOX BUSINESS ON THE GO BY CLICKING HEREBe cautious with emails and links: Avoid opening suspicious emails or clicking on unknown links. These could be phishing attempts designed to steal your information or infect your device with malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Use secure networks: When usingpublic Wi-Fi, connect through aVPN to encrypt your internet traffic. For sensitive transactions, stick to secure, private networks.Be mindful of social media sharing: Limit the personal information you share on social media platforms and adjust yourprivacy settings to control who can view your posts.VPN: Your first line of defense against browser spying:A VPN (virtual private network) encrypts your internet connection, making it difficult for anyone, including your browser, to track your online activities. By masking your IP address and routing your traffic through secure servers, a VPN not only protects your personal data from prying eyes but also helps you avoid targeted advertising and potential data breaches.Regardless of whether you are new to VPNs or not, youll want to choose trusted VPN providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost both your security and speed.By implementing these security practices and using privacy-focused browsers, you can significantly enhance your online safety and protect your personal data while browsing the web. Remember, cybersecurity is an ongoing process that requires vigilance and regular updates to your practices.Kurts key takeawayThe web browser is an essential tool for accessing the internet, but it also opens the door to a host of privacy and security risks. Whether its being tracked for ads, snooped on by your ISP or accidentally stumbling onto a malware-filled site, the risks are everywhere. Tools like Incognito mode or cookie-blocking can help a bit, but theyre not enough to truly protect you. If youre serious about staying private and secure, you need to up your game. Use a VPN, be cautious about what you click on and stay informed about the ways your browser might be working against you.CLICK HERE TO GET THE FOX NEWS APPDo you think companies have gone too far with tracking? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Unbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 38 Visualizações
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Chatbot's disturbing message
    By Fox News Staff Fox News Published November 20, 2024 12:21pm EST A Google Gemini user reported a shocking answer. (Tobias Schwarz/AFP/Jonathan Raa/NurPhoto/David Paul Morris/Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Google AI chatbot tells user to 'please die'- Ben Affleck is confident AI cannot replace Hollywood movies for this reason- Donald Trump will be very good for AI: Jeff Sica'PLEASE DIE': Google's AI chatbot Gemini is at the center of another controversy after a user reported a shocking answer in a conversation about challenges aging adults face. A graduate student in Michigan was told "please die" by the artificial intelligence chatbot, CBS News first reported. (Marilla Sicilia/Archivio Marilla Sicilia/Mondadori Portfolio via Getty Images)'LAST TO GO' Ben Affleck is getting a lot of attention for his views on artifical intelligence. Last week, the actor spoke at CNBC's Delivering Alpha 2024 investor summit, taking time to share his thoughts on how AI will affect the entertainment industry. "Movies will be one of the last things, if everything gets replaced, to be replaced by AI," he explained. (Omar Marques/SOPA Images/LightRocket/CHARLY TRIBALLEAU/AFP)HERE COMES THE BOOM: Circle Squared Alternative Investments founder Jeff Sica explains how President-elect Donald Trump policies will aid the construction of A.I data centers on 'Varney & Co.' Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)CHINESE STRENGTH: China's Shanghai Kepler Robotics is making waves in the world of humanoid robotics with its innovative Forerunner series. Its latest humanoid robot, the Forerunner K2, has quickly become a hot topic, showcasing Kepler's commitment to pushing the boundaries of what robots can do.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comentários 0 Compartilhamentos 49 Visualizações
  • WWW.FOXNEWS.COM
    This tool is made for the laziest parent ever
    Published November 19, 2024 6:00am EST close 'CyberGuy': Easy way to motorize your manual baby stroller to give it the push and power it needs Tech expert Kurt Knutsson discusses how an innovative Easy-Way kit turns standard strollers electric, simplifying navigation for parents. Ever wished your trusty stroller could magically power itself up those steep hills or through sandy beaches? Well, get ready to have your mind blown. The is a game-changer for parents seeking to ease their daily stroller routines. This innovative device transforms any standard stroller into an electric one, making walks with little ones easier and more enjoyable.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)What is the Easy-Way kit?The Easy-Way kit is designed to retrofit existing strollers, providing electric assistance without the need for a brand-new stroller purchase. This Polish startup's creation is currently featured on Kickstarter, aiming to make life easier for parents everywhere. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Key features of the Easy-Way electric kitThe Easy-Way kit is designed to be compatible with most strollers that have a rear axle width ranging from 21.7 to 29.5 inches. It features two powerful 150-watt motors that automatically adjust their output based on the terrain, ensuring a smooth experience whether you're going uphill or downhill.With a single charge, parents can expect over 19 miles of use, making it ideal for long city strolls or trips out of town. Additionally, the kit includes a user-friendly remote that is mounted on the stroller handle, allowing parents to select from five different levels of electric assistance to suit their needs. Electric stroller kit remote (Easy-Way) (Kurt "CyberGuy" Knutsson)How the Easy-Way kit worksThe Easy-Way kit clamps onto the stroller's frame above the rear axle, featuring rubber rollers that engage with the stroller's wheels. Integrated sensors track wheel speed and incline, adjusting motor output automatically for uphill climbs and downhill descents. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Safety features of the Easy-Way kitThe Easy-Way kit is equipped with essential safety features designed to enhance the security of both the child and the parent. If a parent lets go of the stroller, the system automatically locks the wheels in place, effectively acting as a parking brake to prevent any unintended movement.Additionally, the kit includes an emergency braking function that helps to avoid dangerous situations when navigating slopes, ensuring that the stroller remains under control at all times. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Conquering any terrain with the Easy-Way kitThe Easy-Way kit provides exceptional uphill assistance, making climbing hills effortless for parents. It also features downhill control, which prevents the stroller from rolling away on slopes, ensuring safety during descents. Additionally, the kit is beach-ready, designed to handle loose sand and uneven surfaces, allowing for smooth strolls in challenging environments. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)The soothing rocking feature of the Easy-Way kitOne of the standout features of the Easy-Way is its ability to rock the stroller gently, helping soothe infants during outings. With three rocking modes, parents can choose the intensity that best suits their child's preferences. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Installation and maintenanceThe Easy-Way kit features a quick installation process that requires no tools, taking less than a minute to set up. Its durable design is weather-resistant and built to withstand various conditions, ensuring reliability during daily use. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)How to get oneThe Easy-Way is currently available through aKickstarter campaign. By pledging approximately $496, backers can secure one of these kits before they hit retail shelves. Once production is complete, the planned retail price will be around $648. This preorder opportunity allows early adopters to take advantage of a lower price while supporting this exciting new product. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysFor parents looking to reduce physical strain while enjoying outdoor activities with their children, the Easy-Way electric stroller kit offers an innovative solution. By blending technology with practicality, this tool promises to make parenting just a little bit easier, one stroll at a time.Are devices like the Easy-Way electric stroller making parenting too easy and contributing to a culture of laziness? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 41 Visualizações
  • WWW.FOXNEWS.COM
    Data breach exposes over 56 million clothing store customers
    Tech Data breach exposes over 56 million clothing store customers This data includes email addresses, physical addresses, phone numbers, more Published November 19, 2024 10:00am EST close 'CyberGuy': This years most devastating data breaches Kurt Knutsson: Data breaches in 2024 exposed info of millions, stressing the need for better cybersecurity. A cybersecurity vendor claimed last month that a hacker stole data from the fashion retailer Hot Topic, including the personal information of millions of customers. At that time, there was no confirmation from the retailer itself. However, a breach notification site has now confirmed that the personal data of 56,904,909 users was found online and leaked from customers of Hot Topic, Torrid and Box Lunch.This data includes email addresses, physical addresses, phone numbers, purchase history, gender and dates of birth. Partial credit card data was also included in the breach.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter. Image of a person shopping (Kurt "CyberGuy" Knutsson)What you need to knowThe breach notification serviceHave I Been Pwned (HIBP) announced this week that it alerted 56 million Hot Topic customers about a data breach compromising their personal information. While Hot Topic, which operates more than 640 stores across the U.S., has yet to confirm the breach, HIBP reported that it occurred on Oct. 19. Just two days later, a threat actor using the alias "Satanic" claimed responsibility.Satanic alleges that the database contains details of 350 million users, though that number seems inflated. The leaked data does, however, include names, email addresses, physical addresses and dates of birth; all information collected through Hot Topics loyalty program. The hacker is offering the database for $20,000 and demanding that Hot Topic pay $100,000 to prevent its sale.Hudson Rock, an Israeli cybersecurity firm, initially reported the breach and considers it credible. The firm traced the issue back to a malware infection on an employees computer at Robling, a third-party retail analytics firm. Hudson Rock, which operates the cyber intelligence platform Cavalier to monitor compromised devices, discovered the infection and flagged it for clients.Its likely that the threat actor used credentials stolen by info stealer malware to gain access to an analytics platform used by Hot Topic, potentially allowing them to infiltrate the retailers cloud environments. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)Hot Topics silence after the breach is suspiciousEvidence of a data breach at Hot Topic keeps piling up, but the company hasnt said a word yet. Customers and state attorneys general havent been notified, either. Hot Topics silence could mean a few things, especially with such a big breach. They might still be investigating, working with cybersecurity experts to confirm what happened and figure out the extent of the damage. Sometimes, companies stay quiet, hoping to delay or dodge bad press. But this strategy can backfire, leading to more scrutiny and skepticism.We reached out to Hot Topic to request a comment on our story but did not hear back before our deadline. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)5 ways you can stay safe in the event of a data breach1) Keep a strong password:With the Hot Topic data breach exposing sensitive information, its essential to update your passwords. Use a strong, unique password for each account, especially for services where your personal details are stored. A mix of letters, numbers and symbols will make it harder for hackers to guess. Consider using apassword manager to keep everything secure and easily accessible.2) Beware of suspicious links:After a breach, phishing attempts increase, and hackers may use your leaked email to send fake links or emails. Never click on suspicious links, especially those that ask for personal information. Always double-check the sender's email and look out for strange language or urgent requests. If in doubt, go directly to the website instead of following the links in the message.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Invest in a data removal service:Since your personal information could be floating around on the dark web or public databases, its a good idea to invest in a data removal service.Check out my top picks for data removal services here.4) Watch out for the risk of identity theft:The leaked data includes sensitive details like addresses, birthdays and purchase histories, which could be used for identity theft. Be extra cautious when sharing personal information moving forward, and if you notice anything unusual, report it immediately. If you are a Hot Topic customer, you might also want to consider an identity theft monitoring service.See my tips and best picks on how to protect yourself from identity theft.5) Monitor your accounts regularly:Keep an eye on your bank accounts, credit card statements and even loyalty programs where your information is stored. Set up alerts for transactions and logins so you can act fast if anything seems off. Regular monitoring can help you catch fraudulent activity early, minimizing the damage if your data is misused.Kurts key takeawayThe Hot Topic data breach is alarming, especially since it affects over 56 million people. What makes the situation even more concerning is that Hot Topic has stayed silent about it. The company hasnt notified those affected, leaving many unprepared for potential cybersecurity threats. Hackers could use this gap to target victims with scams, leading to financial losses. This situation is a strong reminder of the importance of maintaining good cybersecurity hygiene, whether youre impacted by a breach or not.Should companies be forced to compensate customers whose data has been exposed instead of just staying silent? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 40 Visualizações
  • WWW.FOXNEWS.COM
    New Tech Platforms Help Legal Immigrants
    By David Nath Fox News Published November 19, 2024 11:52am EST close New tech platforms focus on helping legal immigrants Legal immigrants are increasingly turning to high-tech solutions to help navigate Americas immigration landscape. Its no secret that Americas immigration policy is in desperate need of a high-tech overhaul. Most online immigration tools so far have been rudimentary, and thats often left legal immigrants complaining of long wait times, contradictory instructions, and a web presence that doesn't help with things like green card renewal or family petitions. Now President-Elect Trump is promising a big deportation push when he comes into office for his second term, and its more important than ever for immigrants to have their paperwork in order."Immigration, legal immigration should be efficient and accessible and affordable for everyone," says Yasaman Soroori, the co-founder and CEO of Consulta, a new A.I.-powered platform offering high-tech solutions for those immigration issues. Its thought to be the first online platform dedicated specifically to helping legal immigrants navigate Americas complicated immigration landscape. Their goal is simple; integrating tech with personalized support, hoping to bring order and affordability to a complex and costly process.And Soroori says their intake protocol is much more simple and cost-effective than going to see an immigration attorney. "Once the user finds us on our website and goes to the platform," she explains, "they are able to select the service that pertains to them, answer a simplified questionnaire, upload the necessary documents, well even take care of the passport pictures for them. And that's it."As the immigration debate heats up, Consulta is getting more visibility; it has a number of high-profile backers, including the founder of Venmo. Right now, services include renewing green cards, petitions for family visas, and help with citizenship. Its all part of using A.I. to deliver a more streamlined immigration experience."We always talk about the negativity about immigration, but we don't focus on the legal immigrants that are in this country," says Soroori. "And we wanted to offer them the most stress free, affordable option in order for more people to pursue it."
    0 Comentários 0 Compartilhamentos 40 Visualizações
  • WWW.FOXNEWS.COM
    T-Mobile hacked by Chinese cyber espionage in major attack on US telecoms
    Tech T-Mobile hacked by Chinese cyber espionage in major attack on US telecoms Learn how to stay safe amid rise in telecom data breaches Published November 18, 2024 10:00am EST | Updated November 18, 2024 4:47pm EST close 'CyberGuy': NSA urges Americans to reboot phones once a week. Why? Tech expert Kurt Knutsson says the National Security Agency advises weekly phone reboots to protect against cyberattacks and enhance mobile security. The telecom industry is one of cybercriminals' favorite targets, likely because of the sensitive data it stores. Your carrier knows who you call and what you text. This type of information is valuable not only to hackers but also to governments. Thats probably why U.S. phone giant T-Mobile was hacked as part of a broad cyberattack on domestic and international phone and internet companies in recent months.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! T-Mobile booth (T-Mobile) (Kurt "CyberGuy" Knutsson)What you need to knowThere was unauthorized access to a limited number of T-Mobile routers using methods indicative of a major Chinese cyber-espionage operation, but T-Mobiles layered defenses and security monitoring enabled T-Mobile to quickly identify and shut down the threat.The report revealed that hackers connected to a Chinese intelligence agency breached T-Mobile as part of a monthslong effort to spy on the cellphone communications of high-value intelligence targets. The report did not specify when the attack occurred, but T-Mobile says no customer calls or communication records were stolen.The U.S. government alsoconfirmed this month that Chinese hackers breached multiple U.S. telecommunications service providers to access wiretap systems used by law enforcement for surveillance of Americans. Wiretap systems allow law enforcement agencies to monitor phone calls, text messages and internet communications as part of investigations, typically with a warrant.CISA (Cybersecurity and Infrastructure Security Agency) and the FBI issued a joint statement revealing "a broad and significant" cyber-espionage campaign. The statement disclosed that PRC-affiliated hackers had breached networks at "multiple telecommunications companies" across the United States. While CISA and the FBI did not name the organizations affected, multiple reports suggest that T-Mobile, AT&T, Lumen (formerly CenturyLink) and Verizon are likely on the list.WSJ reported in October that Chinese hackers had access to the networks "for months or longer," enabling them to collect "internet traffic from internet service providers that count businesses large and small and millions of Americans as their customers." Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)T-Mobiles many data breachesT-Mobile has faced several hacks in recent years. In 2021, a malicious actor breached T-Mobiles lab environment by posing as a legitimate connection to an unidentified piece of equipment. The hacker guessed passwords for multiple servers and moved laterally through the network, ultimately stealing personal data, including names, addresses, Social Security numbers and drivers license IDs, from tens of millions of customers.In 2022, T-Mobile experienced another breach when a malicious actor used SIM-swapping, phishing and other tactics to infiltrate the companys internal platform for managing mobile resellers who serve T-Mobile customers.The troubles continued into 2023. Early in the year, hackers used phished credentials from dozens of T-Mobile retail employees to access a sales application originally set up during the COVID-19 pandemic for remote viewing of customer data. Then, in January 2023, a misconfigured application programming interface exposed personal data for 37 million current customers, marking yet another significant security lapse. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)T-Mobiles responseWhen CyberGuy reached out to T-Mobile regarding the latest security incident, a spokesperson provided the following statement: "T-Mobile is closely monitoring this industry-wide attack. Due to our security controls, network structure and diligent monitoring and response we have seen no significant impacts to T-Mobile systems or data. We have no evidence of access or exfiltration of any customer or other sensitive information as other companies may have experienced. We will continue to monitor this closely, working with industry peers and the relevant authorities."5 ways to stay safe amid the rise in telecom data breaches1) Change your passwords regularly: Make it a habit to update your passwords every few months, especially for your telecom accounts and related services. Use strong, unique passwords that include a mix of letters, numbers and symbols.Password managers can help you generate and store these securely.2) Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach.Check out my top picks for data removal services here.3) Use identity theft protection: Identity theft protection services monitor your accounts for unusual activity, alert you to potential threats and can even assist in resolving issues if your data is compromised.See my tips and best picks on how to protect yourself from identity theft.4) Enable two-factor authentication (2FA): Add an extra layer of security to your telecom accounts with2FA. This requires a second form of verification, like a text code or an app-based prompt, making it harder for hackers to access your accounts even if they have your password.5) Guard against phishing scams with strong antivirus software: Be cautious about unsolicited calls, texts or emails that ask for personal information or account access. Legitimate companies won't ask for sensitive details this way. If something seems off, contact your telecom provider directly through official channels. Whatever you do, don't click on links, as they can lead to scams or malware.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayTelecom providers like T-Mobile and AT&T are frequent targets for hackers. Over the last two years, millions of Americans have had their data stolen, things like call records, text messages and even personal details. The issue got so bad that the FCC stepped in, warning T-Mobile to step up its cybersecurity efforts. The company was fined about $30 million, split between a $15 million penalty and a mandatory $15 million investment in better security. Unfortunately, if the companies handling your data keep getting breached, there's only so much you can do.Do fines and penalties for telecom companies feel like enough of a deterrent, or should they face stricter consequences? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 40 Visualizações
  • WWW.FOXNEWS.COM
    Helpful hack: Customize your home screen by adding widgets on your iPhone
    close 'CyberGuy': Customize your home screen by adding widgets on your iPhone Tech expert Kurt Knutsson shows you how to add, customize and manage widgets for quick access to apps and info from your iPhone home screen. Have you ever wished for a way to access your favorite apps and information without the hassle of digging through your iPhone's home screen? Well, youre in luck. Widgets are here to transform your iPhone experience. Think of them as mini apps that bring key information right to your fingertips, allowing you to stay updated at a glance. Whether its checking the weather, tracking your fitness goals or keeping an eye on your calendar, widgets make it all possible without needing to open each app individually. Lets get started on making your home screen not just functional but uniquely yours.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter. Image of widgets on iPhone (Apple) (Kurt "CyberGuy" Knutsson)What are widgets?Widgets are mini applications that display at-a-glance information from your favorite apps directly on your home screen. They provide quick access to key features and updates without the need to open the full app, saving you time and streamlining your iPhone experience. Widgets on iPhone (Kurt "CyberGuy" Knutsson)How to update your iPhone to the latest softwareNot sure if you're running the latest iOS? No worries. Here are some quick steps to update your iPhone:OpenSettingsTapGeneralSelectSoftware UpdateIf available, tapUpdate Now and begin downloading and installing iOS 18.1 Steps to update your iPhones software (Kurt "CyberGuy" Knutsson)Adding widgets to your home screenFollow these simple steps to add widgets to your home screen and make your iPhone even handier:Touch and hold an empty area on your home screen until the apps start to jiggle.Look for the Edit icon in the top-left corner of your screen and tap it.ClickAdd WidgetScroll through theavailable widgets or use thesearch bar to find a specific one.Tap on yourchosen widget, then swipe left or right to view different options.Once you've selected the size, tapAdd Widget to place it on your home screen. Steps to add widgets to your iPhones home screen (Kurt "CyberGuy" Knutsson)Arranging and resizing widgetsAfter adding a widget, you can easily adjust its position and size. Here's how:Touch and hold the widget until it floats, then drag it to your desired location. You can place it anywhere on the current page or even drag it to the edge of the screen to move it to a different page. Then, tap an empty area on the home screen.Next,long-presson a widget to see available size options. Tap on the size you'd like the widget to be.Now, tap on the empty area on the home screen, and if available, you cangrab the corner of the widgetwhere you see a small handle to make it larger.To finalize the changes, tapDone. Steps to arrange and resize widgets on iPhones home screen (Kurt "CyberGuy" Knutsson)Customizing widget appearanceiOS 18 introduced new ways to customize the look of your widgets:Change icon size: Press the empty area on your home screen. TapEdit at the top of the screen, then chooseCustomize to access options for making icons larger.Adjust appearance: SelectLight orDark mode for your icons and widgets or chooseAutomatic to switch based on the time of day.Add color tint: Use theTinted option to add a color overlay to your icons and widgets, adjusting the hue and saturation to your liking. Press theempty area on your home screen to save your changes. Steps to customize widget appearance (Kurt "CyberGuy" Knutsson)Removing widgetsIf you want to remove a widget from your home screen:Touch and hold an empty area on the home screen until the apps jiggle.Look for the "-" icon on the widget you want to remove.TapRemove to confirm your decision. Steps to remove widgets on iPhones home screen (Kurt "CyberGuy" Knutsson)Kurts key takeawaysCustomizing your iPhone's home screen with widgets is a great way to personalize your device and improve your productivity. With the ability to add, resize and arrange widgets, you can create a home screen that perfectly suits your needs and preferences. Remember to experiment with different layouts and widget combinations to find what works best for you.What new widgets do you plan to add to your iPhone home screen to enhance your daily productivity and access to information? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 46 Visualizações
  • WWW.FOXNEWS.COM
    New Chinese humanoid robot shows off its strength by lifting 35 pounds per hand
    Tech New Chinese humanoid robot shows off its strength by lifting 35 pounds per hand The humanoid robot that you could be working next to in the future Published November 17, 2024 6:00am EST close New Chinese humanoid robot shows off its strength by lifting 35 pounds per hand Kepler's Forerunner K2 represents the fifth generation of its humanoid robot technology. China's Shanghai Kepler Robotics is making waves in the world of humanoid robotics with its innovative Forerunner series.Its latest humanoid robot, the Forerunner K2, has quickly become a hot topic, showcasing Kepler's commitment to pushing the boundaries of what robots can do.With each new development, Kepler is not just keeping pace with the competition. It's setting the stage for a future where humanoid robots play an integral role in our everyday lives.I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)Pioneering technologyThe original Forerunner, now known as K1, showcased Kepler's advanced technology, including proprietary planetary roller screw actuators, intelligent dexterous hands and the Nebula AI system. Standing at 5 feet, 10 inches tall and weighing 187 pounds, the K1 was designed to compete directly with other leading humanoid robots in the market. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)The next generation: Forerunner K2Building on the success of the K1, Kepler has introduced theForerunner K2, representing the fifth generation of its humanoid robot technology. This latest model has undergone extensive software and hardware enhancements, tailoring it for commercial applications across various industries. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)Advanced features and capabilitiesThe Forerunner K2 features an impressive 52 degrees of freedom throughout its body, allowing for more natural and fluid movements. Its rotating and tilting head module, combined with improved arm and leg rigidity, enhances its overall functionality and ease of maintenance.One of the most remarkable features of the K2 is its dexterous hands. Each hand supports up to 11 degrees of active and passive freedom and can carry up to 33 pounds. The fingertips are equipped with sensor arrays, each containing 96 contact points, enabling precise object manipulation and tactile sensing.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)AI and software advancementsKepler has significantly enhanced the K2's vision system and navigation software, allowing it to better perceive and react to its environment in real time. The robot's artificial intelligence capabilities have been expanded through a combination of embodied intelligence software, imitation and reinforcement learning and a cloud-based cognitive model.These improvements enable the K2 to perform specific tasks autonomously and cooperate effectively with human operators. The robot's stability and walking speed have also been improved through advancements in gait planning and control algorithms. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)GET FOX BUSINESS ON THE GO BY CLICKING HERECommercial applications and future prospectsKepler has positioned the Forerunner K2 as an ideal solution for various industries, including intelligent manufacturing, warehousing and logistics, high-risk operations and research and education. The company has already begun evaluating the K2's performance in customer facilities, where it's being used for materials handling, sample processing, patrol and inspection and quality control tasks.With an estimated retail price range of $20,000 to $30,000, Kepler aims to make its humanoid robots accessible to a wide range of businesses. The company plans to commence mass production of its humanoid robots in the second half of 2024, positioning itself at the forefront of the industry. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)Kurts key takeawaysKepler's Forerunner K2 is truly a game changer in the world of humanoid robotics, showcasing impressive advancements that hint at a future where these machines become commonplace in our workplaces. With rapid improvements from the K1 to the K2, it's clear that Kepler is not just keeping pace but leading the charge in innovation. As these robots become more capable and affordable, we can expect to see them assisting us in various industries, from manufacturing to health care.CLICK HERE TO GET THE FOX NEWS APPHow comfortable are you with the increasing presence of humanoid robots like Kepler's Forerunner K2 in everyday life and the workplace, and what concerns or benefits do you foresee? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 43 Visualizações
  • WWW.FOXNEWS.COM
    How a wrong Google search can compromise your data and bring law enforcement calling
    Tech How a wrong Google search can compromise your data and bring law enforcement calling Beware of what you search on Google Published November 17, 2024 10:00am EST close Google accused of using unlawful tactics to control digital advertising market Constitutional law professor Jonathan Turley joins 'The Faulkner Focus' to discuss the Justice Department's antitrust case against Google, accusing the search engine of abusing its power to create an online advertising monopoly. Google is probably the one online service that we all use at least once a day, whether it's searching for a query, finding something to buy or anything else.It's generally safe to use, even though the search results arent quite hitting the mark these days. Thats a discussion for another time.What we have at hand today are the hidden risks involved with Google search, which can not only compromise your device and personal data but also bring law enforcement to your doorstep. This is not an exaggeration, and below you'll find out how. Woman typing on laptop (Kurt "CyberGuy" Knutsson)The hidden dangers of niche queriesCybersecurity companySophos issued an urgent warning on its website, asking people not to type six words into its search engines. Those who Google "Are Bengal Cats legal in Australia?" have reportedly had their personal information stolen after clicking on fraudulent links that appear near the top of the page.Its unclear why hackers have launched this unusually specific campaign. The only reason I can think of is that they are targeting the Australian demographic, and the phrase "Are Bengal Cats legal in Australia?" is easy to rank for on the Google search engine results page.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?People who search about whether bengal cats are legal in Australia (they are, if youre curious) are at risk of being targeted by GootLoader malware. This malware is spread through SEO tactics, where hackers make infected links show up high in search results. When people search for terms like legal documents or agreements, they might click on these dangerous links that lead to websites hosting a ZIP file with harmful code.Once this malware gets onto a computer, it opens the door for a second, more dangerous malware called GootKit, which is designed to steal personal information and allow hackers to control the device remotely. Image of Google search engine (Kurt "CyberGuy" Knutsson)Hackers arent the only ones watching your Google searchesWhile hackers are targeting Google searches, theyre not the only ones watching what you search. Law enforcement, your workplaces IT department and your telecom provider can also see your search activity. One couple reportedly learned this the hard way when police showed up at their door after they searched just four words, "pressure cooker bomb," along with the word "backpack."Michele Catalano and her husband from Long Island, New York, were browsing online for some everyday items, but they quickly found themselves in unexpected trouble. Michele, a freelance writer, was looking to buy a pressure cooker, while her husband wanted a new backpack. They each searched for the items separately.But two days later, her husband searched for both items from his work computer, just before leaving his job. His former employers IT staff flagged these searches and reported them to the local Suffolk County Police Department. Soon after, several black SUVs showed up at the couple's house, with police wanting to make sure there were no security threats.GET FOX BUSINESS ON THE GO BY CLICKING HERE A person doing a Google search (Kurt "CyberGuy" Knutsson)5 ways to stay safe when searching something on Google1. Avoid clicking on ads and suspicious links: Be cautious of ads or unfamiliar links at the top of search results. Hackers often use SEO poisoning to place dangerous links in prominent positions. So, try to stick with trusted websites and known sources.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Use a VPN: A virtual private network (VPN) encrypts your internet traffic, making it harder for hackers, ISPs or other third parties to track your online activity and searches. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices3. Enable SafeSearch: Googles SafeSearch filters help to block explicit or potentially harmful content. Its especially useful for filtering out unsafe links and improving search safety.4. Limit personal data on Google: Adjust your Google accounts privacy settings to minimize data collection, including search history, location tracking and ad personalization. You can access these settings in the "My Activity" section of your Google account.5. Use private browsing or clear your history: Using Incognito Mode or clearing your browsing history regularly can help reduce tracking of your searches. While it doesnt hide your activity from ISPs or law enforcement, it limits the data Google can store on your device.Kurts key takeawayBad actors are always trying to exploit any digital medium you use, whether its social media or a Google search. Its concerning how malicious websites that put users at risk are readily available on the first page of Google. Although the search giant has claimed to prioritize helpful content this year, the ease with which hackers manipulate search results suggests Google is doing quite the opposite. Im not holding out much hope for Google to improve its platform, but you can stay safe by avoiding suspicious links and being extra careful.CLICK HERE TO GET THE FOX NEWS APPDo you feel like Googles search results have become more or less trustworthy over the years? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 44 Visualizações
  • WWW.FOXNEWS.COM
    How to make your VPN faster
    Published November 16, 2024 6:00am EST close How VPNs shield your identity and secure your financial transactions from theft A VPN could be your secret weapon to protect your identity and finances. Many people turn to VPNs virtual private networks for added privacy and security online, only to find that their internet speeds suddenly slow to a crawl. But what exactly does a VPN do, and why might it cause this slowdown?A VPN works by creating a secure, encrypted pathway between your device and the internet, keeping your data private from hackers, advertisers and anyone else trying to monitor your activity. This encryption process also allows you to browse as if youre in a different location, which can help access content that may be restricted where you are.Just ask Terry from Reno, who recently reached out with this frustration:"My VPN slows down my phone to the point where I can't open the apps! Help!"Youre not alone, Terry. VPNs are fantastic tools for safeguarding data and unlocking restricted content, but that extra layer of protection and location masking can sometimes slow things down. The good news? There are several ways to keep your VPN running smoothly without sacrificing security. Let's dive in. A woman using a VPN on her laptop. (Kurt "CyberGuy" Knutsson)Make sure it's actually the VPNBefore we blame the VPN, let's make sure it's really the culprit. Here's a quick test:1. Disconnect from your VPN: Close your VPN application completely or turn off the VPN connection in your device settings.2. Run a speed test at Speedtest.net and note the results: Click the "Go" button and wait for the test to complete. Write down your download and upload speeds, as well as the ping.3. Connect to your VPN: Open your VPN application and connect to your preferred server. Wait until the connection is fully established.4. Run the speed test again: Refresh the Speedtest.net page to ensure it detects your new location, then run the test again. Note down the new results.If your VPN-connected speeds are less than about 60% of your normal speeds, then Houston, we have a VPN problem. If the difference is minimal, you may just need to optimize your base internet connection first. A woman using a VPN on her cellphone. (Kurt "CyberGuy" Knutsson)Fixing VPN speed issuesWhen encountering slow speeds while using a VPN, it's crucial to approach the problem systematically. Assuming the VPN is indeed the bottleneck in your connection, there are several steps you can employ to potentially boost your speeds and improve your overall experience.1. Switch VPN serversThe physical distance between you and the VPN server location plays a significant role in connection speeds. Opting for a server closer to your geographical location can often result in a noticeable improvement. If you need to connect to a specific country for content access or other reasons, experiment with different cities within that country. Many VPN providers offer multiple server options in popular locations. Additionally, some VPNs display server load information, which can be incredibly useful. Connecting to a less crowded server typically yields faster speeds, as you're sharing fewer resources with other users.CLICK HERE FOR MORE U.S. NEWS Various server locations available on VPN. (Kurt "CyberGuy" Knutsson)2. Tweak VPN settingsAdjusting your VPN settings can lead to performance enhancements. If your VPN service allows for customization, consider lowering the encryption level from 256-bit to 128-bit AES. While 256-bit encryption is incredibly secure, it can sometimes impact speed. The 128-bit AES encryption is still considered very secure for most purposes and may offer a speed boost. Another setting to look for is the WireGuard protocol. If your VPN provider offers this newer protocol, enabling it could significantly improve your connection speed, as it's designed to be both faster and more efficient than older protocols. For those using the OpenVPN protocol, switching from TCP to UDP can often result in faster speeds. However, approach these changes cautiously, especially if you're not entirely sure about their implications. Avoid disabling critical security features in your quest for speed.3. Change VPN protocolsDifferent protocols offer varying levels of speed and security. Generally, protocols like PPTP, L2TP and IKEv2 are known for their speed but may not provide the highest level of security. OpenVPN is often the default choice as it strikes a good balance between speed and security. If you decide to stick with OpenVPN, which is recommended for most users, try switching from TCP to UDP. This simple change can potentially provide a noticeable speed boost without compromising security.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Update your VPN appKeeping your VPN application up to date is essential for ensuring optimal performance and security. VPN providers frequently release updates that not only enhance the overall functionality of their software but also address any bugs or vulnerabilities that may have been discovered. An outdated VPN app can lead to compatibility issues with your operating system, which can hinder performance and reduce connection speeds. Therefore, it is advisable to regularly check for updates within your VPN app's settings or visit the provider's official website to download the latest version. Additionally, many VPN services offer an automatic update feature, which you should enable to ensure that you are always using the most current version of the software without having to remember to do it manually.5. Close background apps and optimize your deviceTo improve your VPN speed, it is important to minimize the load on your device by closing unnecessary applications running in the background. Many applications consume bandwidth and processing power, which can significantly affect your VPN's performance. For instance, streaming services, file-sharing programs or even software that automatically updates can slow down your connection. Before connecting to your VPN, take a moment to close these apps and consider disabling any auto-sync features temporarily.Also, restarting your device before initiating a VPN connection is also a good practice, as it clears temporary files and frees up memory, allowing for a smoother experience.6. Consider a faster VPN serviceIf you have tried various troubleshooting methods and your current VPN service still fails to deliver satisfactory speeds, it may be time to explore other options. The market is filled with numerous VPN providers that emphasize speed and reliability, so conducting thorough research is essential. Look for services that boast a large network of servers strategically located around the world, as this can significantly enhance connection speeds. Many top-tier VPN providers offer free trials or money-back guarantees, allowing you to test their performance without any financial risk. When evaluating potential new services, consider not only their speed but also their security features, privacy policies and customer support options. By making an informed choice, you can find a VPN that meets both your speed requirements and security needs effectively.Remember, while these strategies can help optimize your VPN speed, it's important to have realistic expectations. Your base internet speed, provided by your internet service provider (ISP), will always be the ultimate limiting factor. No VPN can make your connection faster than the maximum speed your ISP provides. However, by implementing these techniques, you can ensure that you're getting the most out of your VPN connection and minimizing any unnecessary slowdowns. A woman using a VPN on her tablet. (Kurt "CyberGuy" Knutsson)Find the perfect VPNRegardless of whether you are new to VPNs or in need of a faster, more secure option, youll want to choose trusted VPN providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost both your security and speed.For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devicesKurt's key takeawaysVPNs are incredible privacy tools, but they shouldn't cripple your internet experience. With a bit of tweaking, you should be able to find a sweet spot between speed and security. And Terry, I hope these tips help get your phone apps running smoothly again. Remember, a good VPN might slow things down a tad, but it shouldn't make your device unusable. If nothing here helps, definitely reach out to your VPN's support team or consider trying a different service.CLICK HERE TO GET THE FOX NEWS APPWhat challenges have you faced when trying to balance VPN security with connection speed, and how did you overcome them? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 48 Visualizações
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Beatles song will 'push the limit'
    close The Beatles come together Their final song was mixed with John Lennon's voice. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- The Beatles' AI-assisted songs Grammy nomination could push the limit on interest in the technology- Gary Marcus: OpenAI could be the next WeWork- Trump is not going to regulate AI industry with Musk 'sitting next to him,' exec says The Beatles posing together. From left to right: musicians George Harrison, John Lennon, Paul McCartney and Ringo Starr, circa 1965. (Getty Images)'COME TOGETHER': The Beatles' return to the Grammys has come with an assist from artificial intelligence. "Now and Then" is nominated for record of the year and best rock performance at the 2025 Grammy Awards, making it the first nominated song ever to use AI in its production.MODELS MAXED OUT?: New York University professor emeritus Gary Marcus discusses the consequences of artificial intelligence and OpenAI's valuation on 'The Claman Countdown.'HANDS-OFF APPROACH: Dominari Securities CEO Kyle Wool joins 'Mornings with Maria' to assess Q3 earnings, deregulation under President-elect Trump and his expectations for upcoming economic data. Tesla CEO Elon Musk speaks on stage as he joins former U.S. President and Republican presidential candidate Donald Trump during a campaign rally at site of his first assassination attempt in Butler, Pa. on Oct. 5, 2024. (JIM WATSON/AFP via Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comentários 0 Compartilhamentos 53 Visualizações
  • WWW.FOXNEWS.COM
    Apples AirPods Pro 2 makes hearing tests as easy as a few taps
    close Apples AirPods Pro 2 makes hearing tests as easy as a tap Checking your hearing just got much easier. Millions of people are walking around with undetected hearing loss, but checking your hearing just got a whole lot easier thanks to the new hearing test feature in AirPods Pro 2.No more booking appointments or visiting clinics. Now, you can take a scientifically validated hearing test right from your iPhone or iPad in the comfort of your own home. Hearing aid feature using AirPods Pro 2. (Apple)A convenient and accurate hearing testIt's pretty slick how it works. TheAirPods Pro 2 use their Pro-level Active Noise Cancellation and in-ear seal to create a controlled environment, kind of like a mini sound booth in your ears.Using puretone audiometry built on advanced acoustic science, the test plays a series of tones that you respond to by tapping the screen. Helpful animations, tapback effects, and progress indicators guide you through the experience, which takes about five minutes. More than 150,000 realworld audiograms and millions of simulations helped develop thishearing test thats accurate, fast and easy. In about five minutes, you'll have a personalized report on your hearing. Test your hearing using AirPods Pro 2. (Apple)Steps to complete your Hearing test with AirPods Pro 2You'll want to find a quiet spot and follow these steps to take your hearing test. Note that this hearing test is intended for people 18 years and older.Ensure your iPhone is running the latest software. Go toSettings >General >Software Update, then tap"Download and Install" if needed.Next, make sure you are wearing yourAirPods Pro 2.On your iPhone, tap onSettings.Next, click yourAirPods Pro 2.Then, select theHearing Test option.Now tapGet Startedand follow theprompts,which include answering a few questions, confirming you are in a quiet location, and checking the fit of your AirPods Pro 2.Follow the remainingprompts and tapStart Test.It should take about 5 minutes, and you can cancel it at any time.The test will playunique tones at different volumes and frequencies, which, at times, you may not hear. Each tone will pulse three times.Tapthe screen when you hear a tone and wait until you hear another.The test will begin with your left ear and then proceed to the right.After the hearing test is complete, you'll get acheckmark and a message that your results have been saved.TapShow Results, and you can tapShow Details to review your results and any hearing assistance recommendations.Tapdone when you are finished.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Hearing test using AirPods Pro 2. (Apple)Immediate insights into your hearing healthOnce you're done with your hearing test, you'll receive immediate insights into your hearing health. Here's how to access your hearing data, which will be saved in the Health app:In the health app, tap onBrowse in the bottom right-hand corner.Taphearing, and your most recenthealth results will appear near the top.TapHearing Test Results to review your hearing assistance recommendations and all your results, which include a graph that shows the decibel loss for each ear, as well as averages if you've taken multiple tests.You can tapShow More Data for additional information.You can also tapAdd Test in the upper-right corner of your screen if you'd like to upload data from another hearing test or audiogram, like one taken at a doctor's office.If you'd like toprint or save results, scroll down, tapAll Hearing Test Results, and then tapExport PDF.AIRPODS PRO 2 VS. A CUTTING-EDGE HEARING AID: WHICH ONE OFFERS BETTER SOUND? Hearing test results using AirPods Pro 2. (Apple)Transforming AirPods into clinical-grade hearing aidsIf the test indicates mild to moderate hearing loss, you will be prompted to enable the new hearing aid feature. This Hearing Aid mode is pretty groundbreaking. It essentially turns yourAirPods Pro 2 into a clinical-grade hearing aid. Using Apple's H2 chip and advanced computational audio technology, it enhances sound clarity in real time. Let's learn how to set up hearing assistance and turn on the hearing aid feature.While wearing your AirPods Pro 2, tapHearing Assistance in your AirPods settings on your iPhone.You can start a new hearing test from here or selectresults from a test you've already taken.We'll tapUse a Prior Test Result.Answer thequestions on the Provide Some Details screen.Scroll down and tapNext.Now, select acompatible Hearing Test result.Then, tap Next, and the results and recommendations from your selected test will appear.If your test indicates mild to moderate hearing loss, tapSet up Hearing Aid and follow the prompts.When Hearing Aid is ready, tapTurn On Hearing Aid andtap Done.GET FOX BUSINESS ON THE GO BY CLICKING HEREOnce the Hearing Aid feature is on, it's saved to your AirPods Pro 2, so make sure that you don't share your AirPods with anyone. Also, keep in mind that it might take some time to get used to the adjustments based on your personalized hearing profile. You can make additional changes in Control Center at any time. Here's how:TapHearing Assistance in your AirPods settings again andcustomize your Hearing Assistance settings.If you tapAdjustments, you'll find options and sliders to help you further adjust the Hearing Aid feature.Plus,Media Assist is on by default, which automatically improves the clarity of music, phone calls and FaceTime calls.Advanced hearing protectionThe new Hearing Protection feature is designed to safeguard your ears from loud noises in daily life. It actively adjusts to sudden loud sounds, protecting your hearing in noisy environments like concerts or even during your daily commute. What's really cool is how Apple has packaged all of this hearing test, hearing aid, and noise protection into one seamless experience. Advanced hearing protection with AirPods Pro. (Apple)Beyond AirPods: Professional-grade hearing solutionsNow, if the test indicates mild to moderate hearing loss, as we mentioned, you'll be able to use theAirPods Pro 2 as a hearing aid. However, if you have more severe hearing loss, you may need aproduct which is much better for the hearing-impaired.Kurt's key takeawaysThis Apple update to theAirPods Pro 2 is a pretty big deal in the world of hearing health. By making these tools so accessible, Apple's potentially changing the game for millions of people who might have otherwise ignored their hearing health. It's exciting to think about how this could lead to more people taking care of their ears and catching hearing issues early on.CLICK HERE TO GET THE FOX NEWS APPWhat barriers have you encountered in addressing your hearing health, and how do you think innovations like these could help overcome them? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 51 Visualizações
  • WWW.FOXNEWS.COM
    Exoskeleton helps paralyzed people regain independence
    Tech Exoskeleton helps paralyzed people regain independence Wearable robot can actually walk over to person in wheelchair Published November 15, 2024 6:00am EST close The exoskeleton helping paralyzed people regain independence It can actually walk to a person in a wheelchair, solving a major problem. Advancements in technology are continually reshaping the landscape of mobility aids, particularly for individuals with disabilities.Among these innovations, the WalkON Suit F1, developed by KAIST (Korea Advanced Institute of Science and Technology), stands out as a groundbreaking solution for paraplegic patients.Let's delve into the features, development and implications of this remarkable wearable robot. WalkON Suit F1 (KAIST)What's so special about this suit?Imagine an exoskeleton that doesn't just help you walk, it comes to you. That's right, the WalkON Suit F1 can actually walk over to a person in a wheelchair. This incredible piece of tech solves a major problem that other exoskeletons face. You see, most exoskeletons require helpers to lift users out of their wheelchairs and strap them in. But the WalkON Suit F1? It's got a nifty front-docking system that lets the person put it on while still seated in their wheelchair. Talk about independence.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The suit features a system "that actively controls the center of its weight against the pull of gravity" to prevent it from toppling over as the person stands up. And get this: The WalkON Suit F1 has been tweaked to allow people to use both hands while standing upright and even take short walks without needing a cane. WalkON Suit F1 (KAIST)Tech specs of the exoskeletonFor those of you who love the nitty-gritty details, let me break down what makes the WalkON Suit F1 tick. This exoskeleton is packed with cutting-edge technology that sets it apart from its predecessors.First up, it's got an impressive balance control system that actively manages its center of weight, ensuring it doesn't topple over when the user stands up. This is a game-changer for stability and user confidence.The team has also made significant strides in motor technology, with the output density of the motors doubling compared to previous versions. This means more power in a compact package, which is crucial for a wearable device.But the innovations don't stop there. The WalkON Suit F1 incorporates AI integration through an onboard neural network application, making the suit more adaptable to different users and situations.And let's not forget about the vision recognition system, which allows the suit to spot and navigate around obstacles, adding an extra layer of safety and independence for the user.The team has made some serious advancements in the components. They've domestically produced all the core parts, including the motor, reducer, motor driver and main circuit. The motor's output density has improved twofold, and the control performance of the motor driver is about three times better than the best overseas technology. Now, that's what I call progress.GET FOX BUSINESS ON THE GO BY CLICKING HERE WalkON Suit F1 (KAIST)Putting the exoskeleton to the testNow, you might be wondering, "How do we know this thing really works?" Well, let me tell you about the Cybathlon. It's like the Olympics for cyborgs, and it's where assistive technologies go head-to-head.In the 2024 Cybathlon, the WalkON Suit F1 didn't just participate, it dominated. The team's pilot, Seunghwan Kim, completed all the challenges in just six minutes and 41 seconds, securing first place. We're talking tasks like sidesteps between narrow chairs, moving boxes and even food prep in the kitchen, all without crutches. WalkON Suit F1 (KAIST)The brains behind the exoskeletonLet's give a shout-out to Professor Kyoung-Chul Kong from KAIST's Department of Mechanical Engineering. This guy has been working on exoskeletons since around 2015. The first WalkON Suit hit the scene in 2016, and by 2020, they had the WalkON Suit 4.0 walking at a speedy 1.98 mph. That's practically jogging for an exoskeleton. WalkON Suit F1 (KAIST)Kurts key takeawaysThe WalkON Suit F1 is about giving people with paraplegia more independence and mobility. As Professor Kong puts it, this suit is "the culmination of wearable robot technology for the disabled." It's setting new standards for the entire industry, and I, for one, can't wait to see where this technology goes next. Who knows? Maybe in a few years, we'll see these suits zipping around our cities, helping people live life to the fullest.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on how innovations like the WalkON Suit F1 can change the lives of individuals with disabilities, and what future advancements would you like to see in assistive technology?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 52 Visualizações
  • WWW.FOXNEWS.COM
    Solar-powered aircraft achieves groundbreaking 22-hour autonomous flight
    Published November 14, 2024 6:00am EST close Solar-powered aircraft achieves groundbreaking 22-hour autonomous flight Aircraft can stay airborne for weeks without refueling. Imagine an aircraft that can stay airborne for weeks, even months, without refueling. This isn't futuristic fantasy.Skydweller Aero is working toward turning this vision into reality with its innovative solar-powered plane.As the world's largest unmanned solar-powered aircraft, Skydweller is pushing the boundaries of what's possible in aviation. Skydweller Aero solar aircraft (Skydweller Aero)A milestone achievementSkydweller Aero recently achieved a significant milestone by completing a series of uncrewed autonomous flight tests. The longest of these flights lasted an impressive 22 hours, launched from the company's facility at Stennis International Airport in Kiln, Mississippi. This achievement demonstrates the feasibility of remaining airborne for extended periods using solar energy and batteries. Skydweller Aero solar aircraft (Skydweller Aero)The Skydweller advantageWhat sets Skydweller apart from its predecessors? Its foundation is built on the Solar Impulse, the first solar-powered aircraft to circumnavigate the globe. This heritage provides Skydweller with a robust design capable of carrying substantial payloads. With a wingspan of 236 feet (larger than a 747) and weighing just 5,620 pounds (about the same weight as a Ford F150), the Skydweller can carry up to 800 pounds of payload. Skydweller Aero solar aircraft (Skydweller Aero)Military applications and beyondThe Navy has demonstrated significant interest in Skydweller's potential, as evidenced by recent flight tests conducted as part of a Joint Concept Technology Demonstration, which previously played a key role in the development of platforms like the Global Hawk and Predator. This initiative, overseen by the Office of the Undersecretary of Defense for Research and Engineering and supported by a cooperative research and development agreement with the Naval Air Warfare Center Aircraft Division, aims to evaluate autonomous maritime patrol aircraft. Skydweller's ability to remain airborne for extended periods could revolutionize maritime patrol and surveillance operations.Persistent surveillance for maritime and border securitySkydweller Aero's uncrewed, autonomous solar-powered aircraft offers continuous surveillance capabilities, enhancing maritime border security, monitoring illegal fishing activities and preventing unauthorized operations such as trafficking and smuggling. The aircraft's long endurance enables round-the-clock coverage, significantly bolstering national security efforts.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Telecommunications and connectivityBy serving as a non-terrestrial communications platform, Skydweller Aero provides cost-effective, airborne telecom solutions to remote areas and underserved populations. This capability not only connects the unconnected but also promotes economic development in these regions.Disaster response and humanitarian aidIn times of crisis, Skydweller Aero's aircraft can rapidly respond to disasters, offering real-time aerial assessments, communication relays and tracking for relief operations. The solar-powered endurance ensures extended, consistent coverage, complementing other assets or providing solutions where alternatives are unavailable or cost-prohibitive.Environmental monitoring and researchSkydweller Aero's ultra-long endurance and remote access capabilities make it an invaluable asset for environmental and scientific research. From climate and wildfire monitoring to geophysical surveys, the aircraft enables meaningful, long-baseline data collection across vast regions, contributing significantly to environmental protection efforts. Skydweller Aero solar aircraft (Skydweller Aero)The road to commercializationWhile military applications are the initial focus, Skydweller Aero has its sights set on commercial markets, too. CEO Robert Miller envisions a future where solar-powered aircraft could serve as airborne communication platforms, complementing satellite networks. Miller sees solar aircraft as a complementary capability to LEO satellite communications rather than a direct rival, with the potential for providing continuous coverage in specific regions.GET FOX BUSINESS ON THE GO BY CLICKING HERE Skydweller Aero solar aircraft (Skydweller Aero)Overcoming technical challengesDeveloping a solar-powered aircraft isn't without its challenges. Many previous attempts by other companies have ended in failure. Skydweller's success lies in its team's expertise in aeroelasticity, ensuring the aircraft can withstand the stresses of flight. As CEO Robert Miller explains,"Fundamentally, my team has a lot more experience in aeroelasticity than all the other solar programs combined." Skydweller Aero solar aircraft (Skydweller Aero)Kurts key takeawaysAs the world's largest unmanned solar aircraft, Skydweller Aero is revolutionizing aviation and opening up exciting new possibilities. From enhancing maritime patrols to serving as airborne communication platforms, the potential applications are vast. While challenges remain, Skydweller's recent successful test flights demonstrate just how far solar aviation technology has advanced.CLICK HERE TO GET THE FOX NEWS APPWhat challenges do you foresee in the widespread implementation of solar-powered aircraft technology, and how might they be overcome? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 53 Visualizações
  • WWW.FOXNEWS.COM
    Why that Google Meet error might be a sneaky hacker trick
    Published November 14, 2024 10:00am EST close Tech expert explains how AI kidnapping scammers replicate people's real voices Cyble CEO and Chair Beenu Arora explains how scammers use AI to replicate people's real voices in a kidnapping scam. A new scam called ClickFix is targeting users and is on the rise in the U.S. As the name suggests, it prompts you to click on a link, claiming to fix an issue, but in reality it infects your computer with malware.Ireported on this earlier, detailing how threat actors used messages impersonating errors from Google Chrome, Microsoft Word and OneDrive to infect users' computers.Now, a similar type of attack is affecting Google Meet users, regardless of whether theyre using a Windows PC or a Mac. I explain how this cyberattack works and what you can do to protect yourself. A woman working on her laptop (Kurt "CyberGuy" Knutsson)How the Google Meet trap worksAccording to Frenchcybersecurity company Sekoia, it all starts with an email containing a link to a Google Meet. The email can come from any address and may be socially engineered to look like it's related to your organization. It could link to a Google Meet invite for a meeting, webinar, online collaboration or something similar. When you click on the link, youll be directed to a fake Google Meet page, which will soon display a warning claiming theres an issue with your PC. It might say your microphone or camera isn't working or there's a problem with your headset.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?You can expect to see the following URLs in these fake meeting emails:meet[.]google[.]us-join[.]commeet[.]google[.]web-join[.]commeet[.]googie[.]com-join[.]usmeet[.]google[.]cdm-join[.]usThis fake page will also display a pop-up offering to fix the issue, showing phrases like "Press the key combination" or "CTRL+V." When you follow these instructions, malicious code is pasted into the Windows prompt, infecting your computer with malware. Once the code is on your computer, hackers can gain access to your cryptocurrencies, sensitive files and personal information.Sekoia has uncovered several other malware distribution clusters beyond Google Meet. These include platforms like Zoom, PDF readers, fake video games (such as Lunacy, Calipso, Battleforge and Ragon), web3 browsers and projects like NGT Studio and messenger apps such as Nortex. Fake Google Meet page (Sekoia)The bigger pictureBack in July, McAfee noticed that ClickFix campaigns were ramping up, especially in the U.S. and Japan (viaBleeping Computer). Lately, two groups Slavic Nation Empire and Scamquerteo have been behind some of these attacks. Both are said to be offshoots of larger crypto scam gangs Marko Polo and CryptoLove.Earlier this year, Proofpoint found thatmalware was spreading by pretending to be fake error messages for Google Chrome, Word and OneDrive, tricking people into downloading malicious code. They also pointed out a method called "email lure," where hackers send fake emails pretending to be from MS Word to infect computers.GET FOX BUSINESS ON THE GO BY CLICKING HERE Fake page requests (Sekoia)4 ways to protect yourself from harmful softwareThe fake Google Meet page creates a sense of urgency, making users click on the links and unknowingly compromise their devices. There are several steps you can take to protect yourself from such cyberattacks.1. Have strong antivirus software:The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Monitor your accounts: Regularly review your bank statements, credit card statements and other financial accounts for any unauthorized activity. If you notice any suspicious transactions, report them immediately to your bank or credit card company.3. Place a fraud alert:Contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.4. Enable two-factor authentication:Enabletwo-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.Kurts key takeawaysHackers have come up with sneaky ways to trick you into installing malware. They use social engineering to make emails and website prompts look legit, hoping you'll click on a link and follow their instructions. The best way to protect yourself is by avoiding unknown links and always checking the URL of the page you're on before taking any action.CLICK HERE TO GET THE FOX NEWS APPHave you ever received an email or prompt that looked suspicious but seemed legitimate at first glance? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 52 Visualizações
  • WWW.FOXNEWS.COM
    Oops, heres how to edit and unsend a message on iPhone before its too late
    Tech Oops, heres how to edit and unsend a message on iPhone before its too late Edit and unsend iMessages with ease Published November 13, 2024 6:00am EST close Oops, heres how to edit and unsend your messages on iPhone before its too late With the latest iOS updates, you can unsend your iMessages. We've all experienced that moment of panic after sending a text message, whether its a typo, an accidental send to the wrong person or something you wish you could take back.Thankfully, if you're an iPhone user, there's good news.With the latest iOS updates, you can edit or unsend your iMessages. Lets dive into how you can save yourself from potential embarrassment. Messages app on iPhone (Kurt "CyberGuy" Knutsson)How to edit a sent iMessageOpen theMessages app and find theiMessage you want to changeLong-press on the messageA pop-up menu will appear; tap on Edit.Adjust the text as neededTap theblue check mark to confirm your changesCLICK HERE FOR MORE US NEWS Steps to edit a sent iMessage (Kurt "CyberGuy" Knutsson)Important notes about editing a sent iMessageYou have 15 minutes after sending a message to edit it.You can edit the same message up to five times.The recipient will see an "Edited" label on any modified messages, allowing them to view the original text if they choose.How to unsend an iMessageJust like editing, start by opening theMessages app and finding the message.Long-press on the messageIn the pop-up menu, chooseUndo SendThe message willvanish from both your device and the recipient's screen.GET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to unsend an iMessage (Kurt "CyberGuy" Knutsson)Key considerations about unsending an iMessageYou only have two minutes after sending a message to unsend it.The recipient may still see a notification that you unsent a message.This feature only works for iMessages (blue bubbles), not SMS texts (green bubbles).Limitations you should knowWhile these features are incredibly useful, they come with some limitations.Both you and the recipient must be using iOS 16 or later for full functionality.If the recipient is on an older version or using a non-Apple device, your edits or unsends may not work as intended.Kurt's key takeawaysWith these simple steps, you can easily correct mistakes or retract messages that you may regret sending. The ability to edit and unsend messages is a welcome addition for anyone who has ever felt that pang of regret after hitting "send."What other messaging features would you like to see added to iMessage or other messaging apps in the future? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 43 Visualizações
  • WWW.FOXNEWS.COM
    Your email didnt expire; its just another sneaky scam
    Published November 13, 2024 10:00am EST close Beware of new sneaky parking QR code scam The new scam is giving parkers everywhere a major headache. Its hard to ignore the rise of phishing scams these days. They seem to pop up in our inboxes with alarming frequency. As we become more aware of these deceptive tactics, scammers are also upping their game, using increasingly sophisticated methods to lure in unsuspecting victims.One particularly sneaky tactic involves impersonating a help desk or support team. You might receive an email claiming that your Microsoft 365 account is set to expire today.The goal? To create a sense of panic and urgency, prompting you to act quickly without thinking. So, how do you recognize these scams and protect yourself from falling victim to them? Let's go down that road to keep you safe. A woman opening email on laptop (Kurt "CyberGuy" Knutsson)How can you tell if it is a scam email?Its easy to see why people fall prey to these sorts of tactics, because scammers do a relatively good job of making these scam emails appear professional and legitimate. They go as far as to change the contact information of the email sender to something legitimate like an actual helpdesk or IT department or business.Upon further examination of the email senders contact information, you can see that the domain address of the actual email address is different and random. For example, the name in the "From" field of the email may read from helpdesk, but if you click on the contact information to view the email address, it will have a domain from @magicpin.in, @gmail.com or @hotmail.com, etc. If its an email supposedly from Microsoft, you'd expect the domain to be microsoft.com. Microsoft scam email (Kurt "CyberGuy" Knutsson)How are victims exploited by these types of scams?Getting a "fake" email may seem relatively benign, but it can be a slippery slope to identity theft and fraud. Below are ways in which scammers take advantage of their victims with these phishing email scams:1. Email validation: By opening the email or engaging with the email (clicking a link or responding to it), you can validate that the email account they messaged is active. Oftentimes, scammers randomly email people whose email address they've gotten from data breaches, the dark web or data harvesting.2. Information gathering: If you reply to the email or use any other contact information they provide to "reinstate" your account, it will validate that the email address they reached out to is active, and they will likely hard-sell you for financial and personal information. If you call any phone number they provide you, they will also connect your phone number with your email address so they can continue to update their information on you.3. Malware distribution: They will often have buttons, links or attachments included in the email. If you click the attachment, it can download malware or a virus to your device. If you click on a link that's provided in the email, it might take you to a website that will collect your personal and financial information or download malware or viruses to your device.CLICK HERE FOR MORE US NEWS Illustration of scammer at work What should you do if you receive these types of phishing emails?There are a few easy steps you can take if you receive an email you suspect is a phishing scam.1. Do not click on any links or buttons and do not download or open any attachments: This helps prevent malware installation and protects your personal information. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.GET FOX BUSINESS ON THE GO BY CLICKING HERE2. Do not reply or reach out to these scammers by email or phone: Engaging with them can confirm your email address is active, leading to more scams.3. If your email client allows it, you can block the sender and report it as a phishing email: This action helps protect yourself and others by alerting your email provider to malicious activity.4. Verify the email's legitimacy by checking the official website of the organization: Directly accessing your account ensures you receive accurate information without falling for fake notifications.5. If two-factor authentication is offered for your account, enable it:2FA adds an extra layer of security, making it harder for scammers to gain access even if they have your password.6. Invest in personal data removal services: Reducing your digital footprint minimizes the risk of identity theft and scams based on harvested data. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawaysPhishing scams are becoming increasingly sophisticated, but staying informed and vigilant can significantly reduce your risk. By adopting good digital habits and following the tips we've shared, you can navigate the online world with confidence. Remember, awareness is your best defense, so keep sharing this knowledge with friends and family to help protect everyone from these deceptive tactics.What's the most unusual or clever phishing attempt you've encountered, and how did you recognize it as a scam? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 50 Visualizações
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: AI developers discover 'Donald Trump neuron', expert says
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- AI developers discover 'Donald Trump neuron', expert says- Petition calls for Trump admin to appoint Musk as AI advisor- OpenAI touts AI infrastructure blueprint to outcompete China, bolster economy under incoming Trump admin. (Omar Marques/SOPA Images/LightRocket/CHARLY TRIBALLEAU/AFP)'DONALD TRUMP NEURON': Artificial intelligence recognizes images and the name of President-elect Donald Trump so much that the phenomenon is referred to as a "Donald Trump neuron," expert Chris Olah says.MUSK PETITION: Anartificial intelligence (AI) advocacy group is urging President-elect Trump to make billionaire entrepreneur Elon Musk a special adviser to the White House focused on AI. INDIA - 2024/05/17: In this photo illustration, the OpenAI logo is seen displayed on a mobile phone screen with ChatGPT logo in the background. (Photo Illustration by Idrees Abbas/SOPA Images/LightRocket via Getty Images) (Idrees Abbas/SOPA Images/LightRocket via Getty Images)HELP FROM SILICON VALLEY: OpenAI has assembled a "blueprint" for artificial intelligence infrastructure that the company hopes will be considered by the incoming Trump administration and Congress suggesting that the plan will help the United States maintain its lead in the field over competitors like China.WHOS RECORDING YOU: Remember when recording a phone call on your iPhone felt like trying to solve a Rubik's Cube blindfolded? Well, those days are officially over. With the release of iOS 18.1, Apple has introduced a native call recording feature as part of Apple Intelligence. Native call recording feature on iPhone (Apple)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere.
    0 Comentários 0 Compartilhamentos 54 Visualizações
  • WWW.FOXNEWS.COM
    FBI, CISA say Chinese hackers breached multiple US telecom providers in targeted attack
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) said that People's Republic of China (PRC) hackers breached commercial telecommunication service providers in the U.S.The breached entities have been warned, and the agencies are proactively alerting other potential targets of elevated cyber activity."The U.S. government's continued investigation into thePeople's Republic of China (PRC) targeting ofcommercial telecommunications infrastructure has revealed a broad and significant cyber espionage campaign," the agencies said Wednesday in a joint release.CHINESE HACKERS ATTEMPTED TO BREACH TRUMP AND HARRIS CAMPAIGNS' CELLPHONE DATA The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) say Chinese hackers breached commercial telecommunication service providers in the U.S. (Chip Somodevilla/Getty Images)The agencies said that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call record data, as well as private communications of a "limited number of individuals who are primarily involved in government or political activity."The joint statement said that the PRC actors also copied "certain information that was subject to U.S. law enforcement requests pursuant to court orders.""We expect our understanding of these compromises to grow as the investigation continues," the agencies noted. The U.S. government is investigating China for targeting commercial telecommunications infrastructure in America. (CISA)The agencies said that they are working to "strengthen cyber defenses," and encouraged organizations that believe they were impacted to contact their local FBI field office or CISA."The FBI and the CISA continue to render technical assistance, rapidly share information to assist other potential victims, and work to strengthen cyber defenses across the commercial communications sector," the agencies said. "We encourage any organization that believes it might be a victim to engage its local FBI Field Office or CISA." The reports of continued Chinese interference in the U.S. come after hackers targeted the Trump and Harris presidential campaigns. (Paul Yeung/Bloomberg via Getty Images)The reports of continued Chinese interference in the U.S. come after hackers targeted President-elect Trump and Vice President Kamala Harris' campaigns during the thick of the race for the White House."After the FBI identified specific malicious activity targeting the sector, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) immediately notified affected companies, rendered technical assistance, and rapidly shared information to assist other potential victims," the FBI and CISA previously told Fox News Digital in a joint statement.Fox News Digital has reached out to the FBI for comment.
    0 Comentários 0 Compartilhamentos 60 Visualizações
  • WWW.FOXNEWS.COM
    Prada's out-of-this-world spacesuit for NASA
    Published November 12, 2024 6:00am EST close 'CyberGuy': Prada's out-of-this-world spacesuit for NASA Kurt Knutsson discusses how Axiom Space and luxury designer Prada are collaborating on NASA's Artemis III spacesuit design. In an unexpected yet fascinating collaboration, Axiom Space has joined forces with the prestigious luxury Italian fashion house Prada to design the next-generation spacesuit for NASA's Artemis program. This partnership marks a significant shift in how spacesuits are conceived, merging high fashion with advanced engineering.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletterhere! AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)The need for new spacesuitsNASA has been using the same extravehicular activity suits since 1982, and there have been no new designs for lunar missions since the Apollo program ended in 1972. To address this gap, NASA awarded Axiom Space a contract worth $228 million in 2022 to develop a modern version of the Apollo suit, leading to the creation of theAxiom Extravehicular Mobility Unit (AxEMU) suit. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Blending fashion with functionAt first glance, involving a fashion designer in an engineering project may seem unusual. However, Axiom and Prada's collaboration highlights an innovative approach to spacesuit design. The AxEMU suit incorporates aesthetic considerations alongside functionality, reflecting a trend seen inprevious designs, such as those for SpaceX's Dragon astronauts. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Key features of the AxEMU SuitAdaptive fit: Unlike previous suits tailored for individual astronauts, the AxEMU is designed to fit 99% of both males and females, enhancing comfort and usability.Advanced materials: The suit features high-performance materials developed through Prada's expertise, ensuring durability against lunar conditions.Enhanced mobility: Innovative joint designs allow for a greater range of motion, enabling astronauts to perform tasks more effectively.Safety innovations: The AxEMU includes redundant systems and self-diagnostic capabilities to ensure astronaut safety during missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Unveiling at the International Astronautical CongressThe AxEMU was formally unveiled at the International Astronautical Congress in Milan. During this event, both Axiom Space and Prada emphasized their commitment to pushing boundaries in space exploration through collaborative efforts.Russell Ralston, executive vice president of extravehicular activity at Axiom Space, said,"We are pioneering a new era in space exploration where partnerships are imperative to the commercialization of space."Lorenzo Bertelli, Prada Group chief marketing officer, added,"Going beyond our limits is one of the companys values that perfectly reflects the spirit of the Prada brand." AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Testing and future prospectsThe AxEMU is currently undergoing extensive testing, including simulations designed to mimic lunar conditions. It is expected to enter its critical design review phase in 2025. This rigorous testing process aims to ensure that astronauts are equipped with reliable and advanced capabilities for future lunar missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysWho would have thought that high fashion and space exploration could find common ground? Yet here we are, witnessing a luxury brand contribute its expertise to one of humanity's most ambitious endeavors. By combining Prada's knowledge of materials and craftsmanship with Axiom's engineering prowess, we're seeing a suit that promises to be more comfortable, more adaptable and more efficient than anything that's come before.Could we see more fashion houses getting involved in space tech? One thing's for sure: The AxEMU suit is a perfect example of what can happen when we think outside the box and bring diverse expertise together. As we continue to reach for the stars, it seems that the sky is no longer the limit, not even for fashion.How do you feel about the role of aesthetics in spacesuit design? Do you think looking good in space is just as important as functionality?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 48 Visualizações
  • WWW.FOXNEWS.COM
    Alarming rise of fake legal requests: What it means for your privacy
    Published November 12, 2024 10:00am EST close Tips to protect yourself against bank scams Scammers often ask for answers to secret questions for crucial information needed to access accounts. Phishing emails are one of the most common tricks scammers use, but theyre usually easy to catch if you pay attention. Awkward grammar, random details and, most importantly, an unofficial email address are dead giveaways. For example, you might get an email saying your Apple IDs been disabled, but the senders email wont actually be from Apple. Now, though, scammers are finding ways to get around this.According to the FBI, theres been a recent rise in cybercriminal services using hacked police and government email accounts to send fake subpoenas and data requests to U.S.-based tech companies.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)What you need to knowTheFBI has seen a spike in criminal forum posts about emergency data requests and stolen email credentials from police departments and government agencies. Cybercriminals are getting into compromised U.S. and foreign government email accounts and using them to send fake emergency data requests to U.S.-based companies, which exposes customer data for further misuse in other crimes.In August 2024, a popular cybercriminal on an online forum advertised "high-quality .gov emails" for sale, meant for espionage, social engineering, data extortion, emergency data requests and more. The listing even included U.S. credentials, and the seller claimed they could guide buyers on making emergency data requests and even sell real stolen subpoena documents to help them pose as law enforcement.Another cybercriminal boasted about owning government emails from over 25 countries. They claimed anyone can use these emails to send a subpoena to a tech company and get access to usernames, emails, phone numbers and other personal client info. Some con artists are even hosting a "masterclass" on how to create and submit their own emergency data requests to pull data on any social media account, charging $100 for the full rundown. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)How this phishing scam worksWhen law enforcement, whether federal, state or local, wants information about someones account at a tech company, like their email address or other account details, they typically need a warrant, subpoena or court order. When a tech company receives one of these requests from an official email address, theyre required to comply. So, if a scammer gets access to a government email, they can fake a subpoena and get information on just about anyone.To bypass verification, scammers often send emergency data requests, claiming that someones life is at risk and that the data is needed urgently. Because companies dont want to delay in case of an actual emergency, they may hand over the information, even if the request turns out to be fake. By portraying it as a life-or-death situation, scammers make it harder for companies to take time to verify the request.For example, the FBI reported that earlier this year, a known cybercriminal posted pictures on an online forum of a fake emergency data request theyd sent to PayPal. The scammer tried to make it look legitimate by using a fraudulent mutual legal assistance treaty, claiming it was part of a local investigation into child trafficking, complete with a case number and legal code for verification. However, PayPal recognized that it wasnt a real law enforcement request and denied it. Illustration of a person receiving a phishing email (Kurt "CyberGuy" Knutsson)What can companies do to avoid falling for these phishing scams?1) Verify all data requests: Before sharing sensitive information, companies should verify every data request, even those that look legitimate. Establish a protocol for confirming requests directly with the agency or organization that supposedly sent them.2) Strengthen email security:Use email authentication protocols like DMARC, SPF and DKIM to block emails from unauthorized sources. Implement anti-phishing filters to detect suspicious content in messages.3) Train employees on phishing awareness: Regular training sessions on phishing scams can help employees recognize red flags, such as urgent language, unusual requests or emails from unknown addresses. Employees should be encouraged to report suspicious emails.4) Limit access to sensitive data: Restrict who can view or share sensitive customer data. Fewer people with access means fewer chances for accidental or intentional data leaks.5) Implement emergency verification procedures: Have a clear verification process in place for "emergency" data requests, including steps for double-checking with higher management or legal teams before responding to any urgent request for customer information. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Is there something you need to do?This particular phishing scam mostly targets big tech companies, so theres not much you can do directly. However, its a reminder that you shouldnt automatically trust an email, even if it comes from a .gov address. Here are some steps you can take to stay safe.1) Double-check email addresses and links: Even if an email looks official, take a moment to check the senders email address and hover over any links to see where they actually lead. Be cautious if anything looks off. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Enable two-factor authentication (2FA):Use2FA for all sensitive accounts. This extra layer of security helps protect you even if your login credentials are compromised.3) Stay updated on phishing scams:Keep an eye on the latest phishing tactics, so you know what to look out for. Regular updates help you spot new types of scams before they affect you.4) Verify suspicious requests:If you get an unexpected email asking for sensitive info, contact the sender directly through an official channel to confirm the request. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Kurts key takeawayScammers are taking phishing emails to a whole new level. I often recommend checking the email carefully when you receive anything suspicious to see if its legit. But now, since scammers can even access government emails, you need to be extra cautious. This phishing scam seems to target mostly big tech companies, so its on them to strengthen their security and verify every request thoroughly before sharing any user information. It's also up to governments worldwide to protect their digital assets from being compromised.Whats your stance on how governments are handling cybersecurity? Are they doing enough to protect sensitive data? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 54 Visualizações
  • WWW.FOXNEWS.COM
    Top scams targeting our military heroes and how to avoid them
    Published November 11, 2024 10:00am EST close Veterans, first responders are top of mind for this celebrity chef Chef Robert Irvine of the Robert Irvine Foundation speaks with Fox News Digital about the importance of supporting veterans and first responders this Veterans Day and some unique ways to do so. Cyberscammers are some of the most heartless people out there. They dont even spare our military heroes.Last year, these criminals stole $477 million from veterans, military personnel and their spouses, according to the Federal Trade Commission (FTC). Thats a $63 million jump from 2022, showing that the military community is a big target for scammers. The number of military members who lost money to these attacks went up by 7% to 30,948, per the FTCs latest data.These scammers use all kinds of tricks to get veterans to hand over personal info or hard-earned cash, including veterans' benefit scams and IRS scams. I break down five of the most common scams targeting our military heroes and how to stay safe from them.Enter bysigning up for my free newsletter! Image of military personnel (Kurt "CyberGuy" Knutsson)Romance scamsRomance scams have become an increasingly painful reality for veterans, as scammers target them through fake online relationships to exploit their emotions and financial stability. Often, these scammers pose as attractive, understanding individuals on dating apps, social media platforms or even support forums specifically tailored for veterans. Theyll build a relationship over weeks or months, using flattery and fabricated stories to create a strong emotional connection with their target.Once the scammer believes theyve gained enough trust, theyll ask for money, typically by inventing a sudden, urgent situation. It might be a "medical emergency," a supposed travel expense to come to visit or even a claim that they need help with a legal matter. The requests start small but can quickly escalate as the scammer continues to manipulate the victim's emotions.This continues to be the most common fraud targeting veterans, costing them and their families over $40 million in 2020, according to Aura. Among all romance scam victims, those ages 50-69 were hit the hardest, losing $179.65 million in just the first three quarters of 2022. That figure has almost certainly surged in 2024. Image of military personnel supporting one another (Kurt "CyberGuy" Knutsson)Veterans benefit scamsSome scammers pretend to offer help with veterans' benefits. They promise to help increase benefits or expedite claims, but theyre really after personal information or a fee. A scammer might claim youre eligible for new or additional benefits, contacting you by phone, email or text. When dealing with unsolicited advice, remember that if it seems too good to be true, it probably is.Phishing scams from fake government agenciesPhishing scams are a social engineering trick where scammers send emails that look like theyre from official places, like the government or your bank. These legit-looking emails act as bait, but the real goal is to grab your banking or credit card info.Sometimes, these scam emails will ask you to click a link or download an attachment, which can install malware on your device. Scammers are also known to send phishing links through LinkedIn, Facebook or other social media.One classic example is the IRS scam. Though it targets everyone, military members are prime targets. Scammers pretend to be IRS agents, threatening jail time, fines or other penalties if they dont get immediate payment. They even spoof IRS caller IDs to make their calls look real.Rental property scamsRental property scams are a common way scammers try to exploit people looking for a place to rent. In these scams, fraudsters often post fake listings for apartments or houses on popular rental websites or social media platforms. The listing might look too good to be true, like a beautiful place at an unbelievably low price.The scammer will usually claim to be out of town or unavailable to meet in person, asking potential renters to send a deposit or rent payment upfront to "secure" the property. In some cases, they may even send fake lease agreements or claim that the property is already rented, but they can still "help" find a similar place.Car sales and financing scamsCar sales and financing scams targeting veterans are unfortunately common. Scammers know that veterans may have limited experience with certain financial deals, so they exploit that by offering unrealistic car sales or financing options. These scams can take various forms, and the result is often financial loss and stress. Image of military personnel honoring our troops (Kurt "CyberGuy" Knutsson)6 ways veterans can protect themselves from scams1) Be cautious with unsolicited offers: Whether its a phone call, email or text, if someone claims to offer help with veterans' benefits or promises something too good to be true, dont take the bait. Verify the legitimacy of any offer directly through official channels like the Department of Veterans Affairs (VA) or trusted veteran organizations.2) Watch out for emotional manipulation in online relationships: Romance scammers often prey on veterans' emotions. Avoid sharing personal or financial details with people you meet online, especially if the relationship feels rushed or too perfect. If someone asks for money after just a few weeks or months, its likely a scam.3) Verify government communications: Scammers often impersonate government agencies like the IRS or VA. If you get a message that threatens penalties or asks for personal information, dont respond. Instead, contact the agency directly using official contact details to confirm whether the message is legitimate.4) Be skeptical of rental or car sale deals that seem too good to be true: If a rental listing or car sale seems too cheap or perfect to be true, it probably is. Always visit the property or dealership in person, and never send money upfront without seeing the product or having a signed agreement.5) Protect your personal information: Avoid clicking on links or downloading attachments from unknown sources. Scammers use phishing emails and fake websites to steal personal and financial information. Ensure your devices have updated security software and be extra cautious when handling sensitive data online.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.6)Invest in data removal services: Consider using data removal services to protect your personal information from being harvested by scammers. These services can help remove your data from public databases and people-search websites, reducing the risk of identity theft and unwanted solicitations.Check out my top picks for data removal services here.Kurts key takeawayScammers rely on misinformation to trick you. However, by staying informed and being extra careful when navigating the internet, you can stay safe. These bad actors are constantly finding new ways to target veterans, from romance scams to fake government offers. Being cautious, verifying offers and keeping your data secure are the best ways to avoid falling victim to these heartless fraudsters.Do you think more needs to be done to protect military personnel from these types of scams? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 49 Visualizações
  • WWW.FOXNEWS.COM
    Avoiding Siri slipups and apologies for butt dials
    Published November 11, 2024 6:00am EST close 'CyberGuy': Avoiding Siri-ous confusion on your work, personal iPhones Voice assistants may cause confusion across devices. Tech expert Kurt Knutsson offers some solutions to fix it. When it comes to using voice assistants across multiple devices, things can get a bit tricky. "Mike" from St. George, Utah, found himself in a comical yet frustrating situation with his personal and work iPhones. Let's dive into his predicament and explore some solutions.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Man making a call using Siri on iPhone (Kurt "CyberGuy" Knutsson)The dilemmaMike has two iPhones, one for personal use and another for work. In his email to us, he explained his issue: "When using Siri to call my wife (Terrie) on my personal phone, my WORK phone dials a guy I work with also named Terry. So Im constantly having to explain my butt dial to him."This leads to awkward explanations and unnecessary "butt dials." The situation highlights a common challenge faced by many users with multiple devices, where voice assistants can become more of a hindrance than a help. Siri being used on iPhone (Kurt "CyberGuy" Knutsson)HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWAREAttempted solutionsMike's first attempt was to rename his wife's contact to "Wifey" on his personal phone. However, this didn't fully solve the problem, as Siri still struggled to differentiate between similar-sounding names across devices. Unfortunately, Apple doesn't allow users to change Siri's activation phrase to something custom like "Hey Wife." This limitation means we need to look for alternative solutions. iPhone and a laptop on a coffee table (Kurt "CyberGuy" Knutsson)HOW TO ASSOCIATE A RINGTONE WITH ONE OF YOUR CONTACTS ON YOUR PHONEEffective workarounds1) Use Siri Shortcuts:You can create a Siri Shortcut for calling your wife and assign a unique phrase to it. This way, you can say something like "Call Wifey" and it will only trigger on the phone where the shortcut is set up.Create a shortcutOpen the Shortcuts app on your iPhone.Tap the "+" icon to create a new shortcut.Add the action Call and select your wifes contact.Click Done Steps to create a Siri Shortcut on iPhone (Kurt "CyberGuy" Knutsson)Use Voice Control: You can enable Voice Control and create custom commands that wont interfere with Siri.Go to SettingsTap AccessibilityClick Voice ControlTurn on Voice Controlby toggling it onClick the Commands row Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Click CustomClick Create new commandIn the phrase field, type "Call Wifey"Click the Action rowClick Run shortcutClick the first row you just set above called "Call"Click backClick Save in upper right-hand corner Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Now go back to your home screen and say to your phone "Call Wifey" and it should call her.2) Disable Siri on one device: If you primarily use Siri on one phone, you can disable it on the other to prevent accidental triggers.Go to SettingsTap Siri (or could appear as Siri & Search depending on which iOS you have installed).Tap Talk to SiriTurn off Listen for "Hey Siri" and enable Press Side Button for Siri Steps to disable Siri on iPhone (Kurt "CyberGuy" Knutsson)3) Rename contacts differently: Since youve already tried renaming your wifes contact, you might want to use a more unique name that wont conflict with your work contacts. For example, you could use a nickname or a combination of her name and a unique identifier.IOS 18: MAXIMIZE YOUR PRIVACY BY TURNING OFF THESE 3 IPHONES SETTINGS NOWKurt's key takeawaysWhile Siri's confusion can be frustrating, there are several ways to work around the issue. The most effective solution seems to be using Siri Shortcuts or Voice Control, as these methods create unique commands that are less likely to be misinterpreted across devices. It's worth noting that voice assistant technology is continually improving. In the future, we may see more sophisticated context recognition that can better distinguish between similar names on different devices. Until then, these workarounds should help Mike avoid any more awkward explanations to his colleague Terry!In what ways do you think voice assistants could be improved for a better user experience? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 55 Visualizações
  • WWW.FOXNEWS.COM
    Heroes among us: Celebrating American bravery on Veterans Day
    Tech Heroes among us: Celebrating American bravery on Veterans Day 11 inspiring podcasts, audiobooks, documentaries honoring courage of US service members Published November 11, 2024 8:00am EST close Veterans Day: Quaid, Adkins among Hollywood stars honoring military Stars such as Dennis Quaid, Trace Adkins and Erik Estrada share with Fox News Digital what Veterans Day means to them. In a time when stories of courage and sacrifice deserve to be heard, a collection of podcasts,documentaries and audiobooks shines light on the incredible journeys of American heroes.From the inspiring tales shared on the "Proud American" podcast hosted by Johnny Joey Jones to the eye-opening documentaries like "Wildcat" and "To Be of Service," these platforms honor the bravery of veterans, first responders and everyday individuals who embody the spirit of service. Join us as we explore these powerful narratives that not only celebrate their sacrifices but also highlight the ongoing challenges they face, offering a deeper understanding of what it truly means to be an American hero.Enter bysigning up for my free newsletter! Americans honoring our veterans (Kurt "CyberGuy" Knutsson) "#STILLSERVING" podcast (VFW) (Kurt "CyberGuy" Knutsson)This podcast is a must-listen for anyone looking to understand the current challenges facing veterans today. This engaging podcast, produced by the Veterans of Foreign Wars (VFW), dives deep into critical issues that affect service members and their families. With conversations featuring congressional leaders, Department of Defense officials and everyday veterans, each episode tackles important topics like legislation, mental health and community support. As we honor our veterans this Veterans Day, tuning into #StillServing is a great way to stay informed and connected to the ongoing dialogue about the needs and experiences of those who have served our nation. "Proud American" podcast (Fox News) (Kurt "CyberGuy" Knutsson)"Proud American" is another podcast available on every major podcast platform. It is hosted by Johnny Joey Jones, a Fox News correspondent and an Army veteran. In the podcast, Jones honors those who have protected and served our country over the years and echoes stories not only from veterans but also from first responders and everyday American heroes. "Modern Warriors" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)Written by Army veteran and "FOX & Friends Weekend" co-host Pete Hegseth,"Modern Warriors"highlights 15 inspiring stories from great American heroes, including Navy SEALs, Army Rangers, Marines and more. These people discuss what made them want to serve, what sacrificing for their country really means and so many other meaningful topics. You can find this audiobook on Audible now. "The Team House" podcast (YouTube) (Kurt "CyberGuy" Knutsson)"The Team House" is a podcast hosted by Jack Murphy and Dave Parke, both of whom are former Rangers. Murphy eventually became a Green Beret while Parke was a paramilitary contractor.They focus on interviewing other veterans and experts in their field of work. Some of their clips are only a few minutes long, while others go as long as 3.5 hours. The Team House podcast is available on multiple platforms, including Apple Podcasts, Spotify and YouTube.Listen to "The Team House" "Signature Wounds" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)If you want to listen to a good audiobook about veterans, you can listen to"Signature Wounds: The Untold Story of the Military's Mental Health Crisis" by David Kieran. The audiobook explores how much of an effect the Iraq and Afghanistan wars that the U.S. fought throughout the 2000s had on our troops mentally after the fact and how doctors labeled traumatic brain injuries as the "signature wound" among those who fought. You can find this audiobook on Audible right now. "Wildcat" documentary (Amazon) (Kurt "CyberGuy" Knutsson)Available on Prime Video now,"Wildcat" is a documentary that was released back in 2022. It follows a young former soldier suffering from post-traumatic stress disorder and how he copes with his suffering by developing a bond with a baby ocelot in the jungles of Peru. He meets this ocelot through a young woman who runs a wildlife rescue and rehabilitation center in the area. Watch the documentary with a Prime Video membership now. "Danger Close" podcast (officialjackcarr.com) (Kurt "CyberGuy" Knutsson)"Danger Close" with Jack Carr is another great podcast that you can listen to on major platforms, including Apple Podcasts and Spotify. Jack Carr is the host, and he spent 20 years as a Navy SEAL. He has served in various positions, including team leader, platoon commander, troop commander, task unit commander and sniper. Carr has written a series of books about his experiences as a SEAL, and on this podcast, he takes listeners beyond his experiences and has conversations with other veterans, writers and more. "By All Means Available" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)"By All Means Available"by Michael G. Vickers is also currently available on Audible. Vickers is a former Green Beret, and in 1984 he took on the immensely difficult job of taking charge of the CIAs secret war against the Soviets in Afghanistan. In this audiobook, he talks about all his experiences and how they have shaped him today, as well as the challenges that our nation is still facing 40 years later. "To Be of Service" documentary (Amazon) (Kurt "CyberGuy" Knutsson)If you're a dog lover, then you should watch"To Be of Service," available for rent on bothPrime Video andApple TV+. This documentary focuses on service dogs who help veterans work through their struggles with PTSD and how these dogs help restore a sense of independence and inner peace within these men and women who served. "The Protectors" podcast (Buzzsprout) (Kurt "CyberGuy" Knutsson)Available on every major podcast platform, including Apple Podcasts, Spotify and Amazon Music, "The Protectors" is hosted by Dr. Jason Piccolo, who is a seasoned veteran and a retired special agent. Piccolo interviews everyone from fellow veterans to authors and entertainers. It takes a look at both the sacrifices that our men and women in uniform have made and how those experiences have been turned into some noteworthy literature, films and other art forms that we read and watch today. "Here. Is. Better." documentary (Amazon) (Kurt "CyberGuy" Knutsson)"Here. Is. Better." is another inspiring documentary that is available to rent or buy on Prime Video right now. It follows four men and women suffering from PTSD after their time serving our country and how new breakthrough treatments are helping them to overcome their struggles. It's an information-packed film about how human beings experience and process trauma and how we can overcome it.Kurt's key takeawaysAs we reflect on the incredible stories shared through these podcasts and documentaries, it's clear that the journeys of our veterans deserve to be celebrated and understood. Each narrative not only highlights their bravery but also sheds light on the challenges they continue to face. By engaging with these powerful stories, we can foster a deeper appreciation for their sacrifices and contribute to ongoing conversations about support and healing. Lets honor their experiences and ensure that their voices are heard.What stories of courage and service have inspired you the most, and how do you think we can better support our veterans in our communities?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 52 Visualizações
  • WWW.FOXNEWS.COM
    Avoiding Siri slipups and apologies for butt dials
    Published November 11, 2024 6:00am EST close 'CyberGuy': Avoiding Siri-ous confusion on your work, personal iPhones Voice assistants may cause confusion across devices. Tech expert Kurt Knutsson offers some solutions to fix it. When it comes to using voice assistants across multiple devices, things can get a bit tricky. "Mike" from St. George, Utah, found himself in a comical yet frustrating situation with his personal and work iPhones. Let's dive into his predicament and explore some solutions.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Man making a call using Siri on iPhone (Kurt "CyberGuy" Knutsson)The dilemmaMike has two iPhones, one for personal use and another for work. In his email to us, he explained his issue: "When using Siri to call my wife (Terrie) on my personal phone, my WORK phone dials a guy I work with also named Terry. So Im constantly having to explain my butt dial to him."This leads to awkward explanations and unnecessary "butt dials." The situation highlights a common challenge faced by many users with multiple devices, where voice assistants can become more of a hindrance than a help. Siri being used on iPhone (Kurt "CyberGuy" Knutsson)HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWAREAttempted solutionsMike's first attempt was to rename his wife's contact to "Wifey" on his personal phone. However, this didn't fully solve the problem, as Siri still struggled to differentiate between similar-sounding names across devices. Unfortunately, Apple doesn't allow users to change Siri's activation phrase to something custom like "Hey Wife." This limitation means we need to look for alternative solutions. iPhone and a laptop on a coffee table (Kurt "CyberGuy" Knutsson)HOW TO ASSOCIATE A RINGTONE WITH ONE OF YOUR CONTACTS ON YOUR PHONEEffective workarounds1) Use Siri Shortcuts:You can create a Siri Shortcut for calling your wife and assign a unique phrase to it. This way, you can say something like "Call Wifey" and it will only trigger on the phone where the shortcut is set up.Create a shortcutOpen the Shortcuts app on your iPhone.Tap the "+" icon to create a new shortcut.Add the action Call and select your wifes contact.Click Done Steps to create a Siri Shortcut on iPhone (Kurt "CyberGuy" Knutsson)Use Voice Control: You can enable Voice Control and create custom commands that wont interfere with Siri.Go to SettingsTap AccessibilityClick Voice ControlTurn on Voice Controlby toggling it onClick the Commands row Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Click CustomClick Create new commandIn the phrase field, type "Call Wifey"Click the Action rowClick Run shortcutClick the first row you just set above called "Call"Click backClick Save in upper right-hand corner Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Now go back to your home screen and say to your phone "Call Wifey" and it should call her.2) Disable Siri on one device: If you primarily use Siri on one phone, you can disable it on the other to prevent accidental triggers.Go to SettingsTap Siri (or could appear as Siri & Search depending on which iOS you have installed).Tap Talk to SiriTurn off Listen for "Hey Siri" and enable Press Side Button for Siri Steps to disable Siri on iPhone (Kurt "CyberGuy" Knutsson)3) Rename contacts differently: Since youve already tried renaming your wifes contact, you might want to use a more unique name that wont conflict with your work contacts. For example, you could use a nickname or a combination of her name and a unique identifier.IOS 18: MAXIMIZE YOUR PRIVACY BY TURNING OFF THESE 3 IPHONES SETTINGS NOWKurt's key takeawaysWhile Siri's confusion can be frustrating, there are several ways to work around the issue. The most effective solution seems to be using Siri Shortcuts or Voice Control, as these methods create unique commands that are less likely to be misinterpreted across devices. It's worth noting that voice assistant technology is continually improving. In the future, we may see more sophisticated context recognition that can better distinguish between similar names on different devices. Until then, these workarounds should help Mike avoid any more awkward explanations to his colleague Terry!In what ways do you think voice assistants could be improved for a better user experience? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 43 Visualizações
  • WWW.FOXNEWS.COM
    Heroes among us: Celebrating American bravery on Veterans Day
    Tech Heroes among us: Celebrating American bravery on Veterans Day 11 inspiring podcasts, audiobooks, documentaries honoring courage of US service members Published November 11, 2024 8:00am EST close Veterans Day: Quaid, Adkins among Hollywood stars honoring military Stars such as Dennis Quaid, Trace Adkins and Erik Estrada share with Fox News Digital what Veterans Day means to them. In a time when stories of courage and sacrifice deserve to be heard, a collection of podcasts,documentaries and audiobooks shines light on the incredible journeys of American heroes.From the inspiring tales shared on the "Proud American" podcast hosted by Johnny Joey Jones to the eye-opening documentaries like "Wildcat" and "To Be of Service," these platforms honor the bravery of veterans, first responders and everyday individuals who embody the spirit of service. Join us as we explore these powerful narratives that not only celebrate their sacrifices but also highlight the ongoing challenges they face, offering a deeper understanding of what it truly means to be an American hero.Enter bysigning up for my free newsletter! Americans honoring our veterans (Kurt "CyberGuy" Knutsson) "#STILLSERVING" podcast (VFW) (Kurt "CyberGuy" Knutsson)This podcast is a must-listen for anyone looking to understand the current challenges facing veterans today. This engaging podcast, produced by the Veterans of Foreign Wars (VFW), dives deep into critical issues that affect service members and their families. With conversations featuring congressional leaders, Department of Defense officials and everyday veterans, each episode tackles important topics like legislation, mental health and community support. As we honor our veterans this Veterans Day, tuning into #StillServing is a great way to stay informed and connected to the ongoing dialogue about the needs and experiences of those who have served our nation. "Proud American" podcast (Fox News) (Kurt "CyberGuy" Knutsson)"Proud American" is another podcast available on every major podcast platform. It is hosted by Johnny Joey Jones, a Fox News correspondent and an Army veteran. In the podcast, Jones honors those who have protected and served our country over the years and echoes stories not only from veterans but also from first responders and everyday American heroes. "Modern Warriors" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)Written by Army veteran and "FOX & Friends Weekend" co-host Pete Hegseth,"Modern Warriors"highlights 15 inspiring stories from great American heroes, including Navy SEALs, Army Rangers, Marines and more. These people discuss what made them want to serve, what sacrificing for their country really means and so many other meaningful topics. You can find this audiobook on Audible now. "The Team House" podcast (YouTube) (Kurt "CyberGuy" Knutsson)"The Team House" is a podcast hosted by Jack Murphy and Dave Parke, both of whom are former Rangers. Murphy eventually became a Green Beret while Parke was a paramilitary contractor.They focus on interviewing other veterans and experts in their field of work. Some of their clips are only a few minutes long, while others go as long as 3.5 hours. The Team House podcast is available on multiple platforms, including Apple Podcasts, Spotify and YouTube.Listen to "The Team House" "Signature Wounds" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)If you want to listen to a good audiobook about veterans, you can listen to"Signature Wounds: The Untold Story of the Military's Mental Health Crisis" by David Kieran. The audiobook explores how much of an effect the Iraq and Afghanistan wars that the U.S. fought throughout the 2000s had on our troops mentally after the fact and how doctors labeled traumatic brain injuries as the "signature wound" among those who fought. You can find this audiobook on Audible right now. "Wildcat" documentary (Amazon) (Kurt "CyberGuy" Knutsson)Available on Prime Video now,"Wildcat" is a documentary that was released back in 2022. It follows a young former soldier suffering from post-traumatic stress disorder and how he copes with his suffering by developing a bond with a baby ocelot in the jungles of Peru. He meets this ocelot through a young woman who runs a wildlife rescue and rehabilitation center in the area. Watch the documentary with a Prime Video membership now. "Danger Close" podcast (officialjackcarr.com) (Kurt "CyberGuy" Knutsson)"Danger Close" with Jack Carr is another great podcast that you can listen to on major platforms, including Apple Podcasts and Spotify. Jack Carr is the host, and he spent 20 years as a Navy SEAL. He has served in various positions, including team leader, platoon commander, troop commander, task unit commander and sniper. Carr has written a series of books about his experiences as a SEAL, and on this podcast, he takes listeners beyond his experiences and has conversations with other veterans, writers and more. "By All Means Available" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)"By All Means Available"by Michael G. Vickers is also currently available on Audible. Vickers is a former Green Beret, and in 1984 he took on the immensely difficult job of taking charge of the CIAs secret war against the Soviets in Afghanistan. In this audiobook, he talks about all his experiences and how they have shaped him today, as well as the challenges that our nation is still facing 40 years later. "To Be of Service" documentary (Amazon) (Kurt "CyberGuy" Knutsson)If you're a dog lover, then you should watch"To Be of Service," available for rent on bothPrime Video andApple TV+. This documentary focuses on service dogs who help veterans work through their struggles with PTSD and how these dogs help restore a sense of independence and inner peace within these men and women who served. "The Protectors" podcast (Buzzsprout) (Kurt "CyberGuy" Knutsson)Available on every major podcast platform, including Apple Podcasts, Spotify and Amazon Music, "The Protectors" is hosted by Dr. Jason Piccolo, who is a seasoned veteran and a retired special agent. Piccolo interviews everyone from fellow veterans to authors and entertainers. It takes a look at both the sacrifices that our men and women in uniform have made and how those experiences have been turned into some noteworthy literature, films and other art forms that we read and watch today. "Here. Is. Better." documentary (Amazon) (Kurt "CyberGuy" Knutsson)"Here. Is. Better." is another inspiring documentary that is available to rent or buy on Prime Video right now. It follows four men and women suffering from PTSD after their time serving our country and how new breakthrough treatments are helping them to overcome their struggles. It's an information-packed film about how human beings experience and process trauma and how we can overcome it.Kurt's key takeawaysAs we reflect on the incredible stories shared through these podcasts and documentaries, it's clear that the journeys of our veterans deserve to be celebrated and understood. Each narrative not only highlights their bravery but also sheds light on the challenges they continue to face. By engaging with these powerful stories, we can foster a deeper appreciation for their sacrifices and contribute to ongoing conversations about support and healing. Lets honor their experiences and ensure that their voices are heard.What stories of courage and service have inspired you the most, and how do you think we can better support our veterans in our communities?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 51 Visualizações
  • WWW.FOXNEWS.COM
    How VPNs shield your identity and secure your financial transactions from theft
    close How VPNs shield your identity and secure your financial transactions from theft A VPN could be your secret weapon to protect your identity and finances. Ever feel like navigating the internet is like walking through a digital minefield?With cybercriminals lurking around every corner, protecting your identity and finances can feel daunting. But what if I told you that a VPN could be your secret weapon?By masking your IP address and encrypting your data, a VPN makes you nearly invisible to online threats.Lets dive into how this powerful tool can safeguard your online activities and keep your financial transactions secure. A woman using a VPN on a tablet (Kurt "CyberGuy" Knutsson)What is a VPN?A VPN, or virtual private network, is a service that encrypts your internet connection, ensuring that your online activities remain private and secure. By routing your internet traffic through a secure server, VPNs mask your IP address, making it difficult for hackers and malicious entities to track your online behavior. A VPN being used on a laptop (Kurt "CyberGuy" Knutsson)How VPNs workVPNs operate through two primary mechanisms IP address masking and data encryption. When you connect to a VPN, it hides your real IP address by assigning you a new one from its server network, effectively preventing websites and cybercriminals from tracking your location or identifying you based on your IP address.Simultaneously, VPNs encrypt all data transmitted between your device and the internet, rendering it unreadable to anyone who might attempt to intercept it. This encryption process ensures that sensitive information, such as credit card details, remains confidential throughout your online activities. By combining these two powerful features, VPNs create a secure tunnel for your internet traffic, significantly enhancing your online privacy and security. A woman using a VPN on her cell phone (Kurt "CyberGuy" Knutsson)Protecting against identity theft by using a VPNIdentity theft occurs when someone illegally obtains your personal information to commit fraud. This can lead to unauthorized transactions and damage to your credit status. So, how can a VPN prevent identity theft? By encrypting your internet connection, VPNs protect against data breaches and unauthorized access to personal information, especially on unsecured networks like public Wi-Fi. VPNs also prevent third parties from tracking your online activities, reducing the risk of personal data being harvested for malicious purposes.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman using a VPN on her laptop (Kurt "CyberGuy" Knutsson)Using a VPN to reduce risks in online transactionsOnline transactions are vulnerable to interception by cybercriminals looking to steal financial information such as credit card numbers and banking credentials. A VPN can be used as a shield for financial data. VPNs ensure that all data exchanged during online transactions is encrypted, making it nearly impossible for hackers to access sensitive financial information. When using public Wi-Fi networks, which are often targeted by cybercriminals, a VPN provides an additional layer of security by encrypting all data transmissions. A woman using a VPN on her cell phone (Kurt "CyberGuy" Knutsson)Practical tips for using VPNs effectively1. Choose a reliable VPN provider:Opt for reputable VPN services known for strong encryption standards and no-log policies to ensure maximum privacy and security.For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices2. Use strong passwords:Combine the use of a VPN with strong, unique passwords for each of your accounts to enhance security. Consider using apassword manager to generate and store complex passwords.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Enable two-factor authentication(2FA):Wherever possible, enable 2FA to add an extra layer of protection against unauthorized access.4. Regularly update software: Keep yourdevices and software updated to protect against vulnerabilities that could be exploited by cybercriminals.5. Monitor financial accounts: Regularly check bank statements and credit reports for any suspicious activity to catch potential fraud early. A woman working on a laptop using a VPN (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysVPNs play a vital role in protecting your identity and securing financial transactions online. By masking your IP address and encrypting data transmissions, they offer a robust defense against identity theft and credit card fraud. Implementing the tips provided can further enhance your online security, ensuring peace of mind in the digital world.Have you ever experienced identity theft or fraud? How might the information in this article help you prevent it in the future? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 54 Visualizações
  • WWW.FOXNEWS.COM
    Score big on Amazon Black Friday 2024 with my insider tips
    close Amazon facing backlash after reportedly canceling pro-Israel talk, inviting Macklemore instead Bestselling author Samantha Ettus tells 'Fox & Friends First' about reportedly being banned from holding a pro-Israel talk with Jewish workers. Amazons Black Friday sales event will start onFriday, Nov. 22, and end onFriday, Nov. 29. This is Amazon's longest Black Friday sale yet.The first phase of deals is fromNov.,expect exclusive deals.During the main Black Friday event, you can browse through deals from a wide number of categories, including major TV brands, smart home devices, fashion, beauty and wellness, furniture, pet supplies, tools, fitness equipment and more. A woman using the Amazon app to shop (Kurt "CyberGuy" Knutsson)How to work the deals be fast!Black Friday deals can expire in minutes, and some deals conclude when inventory is gone. Inside the Black Friday event are promotions called Spotlight Deals, Gold Box Deals of the Day and Lightning Deals. I rank these in order of urgency.The Lightning Deals almost always offer the best prices and last for a small window of time or when sold out, sometimes even just minutes.Even though it may look like a deal is gone, there's a tip below that could provide an easy workaround to getting the deal anyway.CLICK HERE FOR MORE U.S. NEWS A woman using the Amazon app to shop (Kurt "CyberGuy" Knutsson)CyberGuy Black Friday battle plan tips"Join Waitlist" on sold-out products you want and missed. Think it's sold out? Maybe not. Items sitting in another shopper's cart expire if not purchased within 15 minutes. If you are on a waitlist, you could get notified that the deal is yours.Download the Amazon smartphone or tablet app to see deals first. The app shows deals coming first and allows you to create a "Watch this deal" list to get notified when a deal is going live.Say, "Alexa, what are your deals?" for exclusive offers. You can power through this audio form of deals by saying "Alexa, next" as they are being described to advance to the next deal. Voice shopping is a complete hassle, and Amazon knows it. That's why it is tempting us to try it with even better deals than what you can find on the site.Compare prices at other retailers like BestBuy, Walmart, Kohls and Target since so many other sources are taking advantage of the Black Friday excitement.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman shopping on the Amazon website (Kurt "CyberGuy" Knutsson)Watch out for these losing Black Friday mishapsAvoidUnknown Brands that can often disappointAvoidFake Reviewsby using fakespot.com. Instead of adding its browser extension, just link to the search field to copy and paste an Amazon product listing. Fakespot will analyze the results to show a letter grade and explanation. The goal is to weed out fake reviews and identify troubled listings.Avoidoverpaying by checking the lowest price history at CamelCamelCamel.A price history of almost every Amazon item is recorded here to show if you are really getting the lowest price.Avoidthe Amazon Assistant browser plug-in for privacy concerns. While Amazon's browser plug-in can make comparing items and tracking deals convenient, it also comes at a cost to your personal privacy in the way it can track your web browser activity.Kurt's key takeawaysAs you prepare for Amazon's longest Black Friday sales event yet, from Nov. 22-29, get ready to uncover some fantastic deals. With a wide range of categories, including electronics, home goods and fashion, theres something special waiting just for you. Remember, timing is everything. Many of the best offers will only last for a short window. So, having a solid plan will help you grab those must-have items. Be sure to take advantage of the Amazon app and ask Alexa for notifications on the latest deals. Happy shopping, and may you score some incredible savings this holiday season.CLICK HERE TO GET THE FOX NEWS APPWhat types of products are you most excited to shop for during Amazon's Black Friday event and why? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 49 Visualizações
  • WWW.FOXNEWS.COM
    Say goodbye to needle nightmares: gadget gives doctors X-ray vision of your veins
    Tech Say goodbye to needle nightmares: gadget gives doctors X-ray vision of your veins Device ends the struggle to find a vein in someone's body Published November 9, 2024 6:00am EST close Say goodbye to needle nightmares. This gadget gives doctors x-ray vision of your veins This device gives medical professionals Superman-like X-ray vision. We've all been there, sitting in the doctor's office, sleeve rolled up, watching nervously as the nurse searches for that elusive vein.For some, it's a quick and painless process.For others, it can feel like an eternity of poking and prodding. But what if there was a way to make this experience easier for everyone involved? Vein Locator. (Adison)Turning your skin transparent (sort of)Imagine a device that could give medical professionals Superman-like X-ray vision, allowing them to see right through your skin to the veins beneath. That's exactly what theAdison Vein Locator does. This nifty gadget uses cutting-edge optical technology to create a 3D map of your veins, making needle insertion a breeze.CLICK HERE FOR MORE U.S. NEWS Vein Locator. (Adison)How it worksThe Adison Vein Locator uses near-infrared light to penetrate your skin and create a real-time, three-dimensional image of your veins. It's like having a personal GPS for your circulatory system. The best part? It works on all skin tones and even through scar tissue. Vein Locator. (Adison)Not just for adultsFinding veins in infants can be particularly challenging due to their chubby little arms. The Adison Vein Locator has proven effective on patients as young as 6 months old, making those necessary blood draws and IV insertions much less stressful for both babies and medical staff.GET FOX BUSINESS ON THE GO BY CLICKING HERE Vein Locator. (Adison)Boosting success rates and patient comfortTests have shown that this device can improve the success rate of first-time IV insertions by a whopping 30%. That means fewer attempts, less discomfort, and happier patients all around. Vein Locator. (Adison)Award-winning designThe Adison Vein Locator isn't just functional it's also a looker. This sleek device won a RedDot design award, one of the most prestigious accolades in the product design world. It's not often that medical equipment gets recognized for its aesthetics. With its tilting screen and portable design, the Adison Vein Locator is ready for action in any setting. Whether you're in a hospital room or kneeling beside a patient on the ground, this device adapts to your needs. Vein Locator. (Adison)Kurt's key takeawaysBy making vein access easier and more accurate, the Adison Vein Locator has the potential to reduce patient anxiety, improve treatment efficiency, and even save lives in emergency situations. As we continue to see advancements in medical technology, devices like this remind us that sometimes, the most impactful innovations are those that solve everyday challenges in healthcare. The days of dreading needle sticks may soon be behind us, thanks to this remarkable "x-ray vision" gadget.CLICK HERE TO GET THE FOX NEWS APPWould you feel more at ease during blood draws or IV insertions if your healthcare provider used advanced vein visualization technology like the Adison Vein Locator compared to traditional methods? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 53 Visualizações
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: 'It might kill us all'
    Hugh Grant attends the Los Angeles Premiere of Warner Bros. "Wonka" at Regency Village Theatre on Dec. 10, 2023, in Los Angeles. (Axelle/Bauer-Griffin/FilmMagic) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Hugh Grant movie slams AI; director warns 'it might kill us all'- US finalizes rule to block investments in China-based tech firms to protect AI, military development- AI-powered attack drones take flight Hugh Grant in a scene from "Heretic." (Kimberly French/A24)'MIGHT KILL US ALL': Hugh Grants new film, "Heretic," has an unexpected announcement about artificial intelligence in the final credits. Variety reported there is a message that says, "No generative AI was used in the making of this film." The film's directors, Scott Beck and Bryan Woods, made their feelings about the technology clear in comments with the outlet.BLOCKING BEIJING: The Biden administration this week finalized steps to block Americans from investing in a range of advanced technology, including artificial intelligence, being developed in China. The Bolt-M (Anduril)ON THE ATTACK: Anduril Industries recently announced the launch of two advanced drones, the Bolt and Bolt-M, which are designed to enhance military operations through cutting-edge technology.APPLES BIG UNVEILING: Apple's week of Mac announcements kicked off Oct. 28, and all the reveals are now official. The lineup includes a refreshed iMac with the new M4 chip and updated color options, plus redesigned accessories keyboard, mouse and trackpad now featuring USB-C ports. iMac M4 (Apple)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comentários 0 Compartilhamentos 51 Visualizações
  • WWW.FOXNEWS.COM
    How a researcher hacked ChatGPT's memory to expose a major security flaw
    Published November 9, 2024 10:00am EST close Company behind ChatGPT disbands AI safety board Kurt 'CyberGuy' Knutsson discusses OpenAI ending its safety task force, actress Scarlett Johansson claiming the company copied her voice and the growing popularity of the voice notes phone feature. ChatGPT is an amazing tool, and its developer, OpenAI, keeps adding new features from time to time.Recently, the company introduced a new memory feature in ChatGPT, which essentially enables it to remember things about you. For example, it can recall your age, gender, philosophical beliefs and pretty much anything else.These memories are meant to remain private, but a researcher recently demonstrated how ChatGPT's artificial intelligence memory features can be manipulated, raising questions about privacy and security. ChatGPT introduction screen. (Kurt "CyberGuy" Knutsson)What is ChatGPT's Memory feature?ChatGPTs memory feature is designed to make the chatbot more personal to you. It remembers information that might be useful for future conversations and tailors responses based on that information, even if you open a different chat. For example, if you mention that youre vegetarian, the next time you ask for recipes, it will provide only vegetarian options.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?You can also train it to remember specific details about you, such as saying, "Remember that I like to watch classic movies." In future interactions, it will tailor recommendations accordingly. You have control over ChatGPTs memory. You can reset it, clear specific memories or all memories, or turn this feature off entirely in your settings. A prompt on ChatGPT. (Kurt "CyberGuy" Knutsson)The security vulnerability in ChatGPTAs reported byArstechnica, security researcher Johann Rehberger found that its possible to trick the AI into remembering false information through a method called indirect prompt injection. This means the AI can be manipulated into accepting instructions from unreliable sources like emails or blog posts.For instance, Rehberger demonstrated that he could trick ChatGPT into believing a certain user was 102 years old, lived in a fictional place called the Matrix and thought the Earth was flat. After the AI accepts this made-up information, it will carry it over to all future chats with that user. These false memories could be implanted by using tools like Google Drive or Microsoft OneDrive to store files, upload images or even browse a site like Bing all of which could be manipulated by a hacker.Rehberger submitted a follow-up report that included a proof of concept, demonstrating how he could exploit the flaw in the ChatGPT app for macOS. He showed that by tricking the AI into opening a web link containing a malicious image, he could make it send everything a user typed and all the AI's responses to a server he controlled. This meant that if an attacker could manipulate the AI in this way, they could monitor all conversations between the user and ChatGPT.Rehberger's proof-of-concept exploit demonstrated that the vulnerability could be used to exfiltrate all user input in perpetuity. The attack isn't possible through the ChatGPT web interface, thanks to an API OpenAI rolled out last year. However, it was still possible through the ChatGPT app for macOS.When Rehberger privately reported the finding to OpenAI in May, the company took it seriously and mitigated this issue by ensuring that the model doesnt follow any links generated within its own responses, like those involving memory and similar features. JohannRehbergers ChatGPT conversation. (Johann Rehberger)OpenAIs responseAfter Rehberger shared his proof of concept, OpenAI engineers took action and released a patch to address this vulnerability. They released a new version of the ChatGPT macOS application (version 1.2024.247) that encrypts conversations and fixes the security flaw.So, while OpenAI has taken steps to address the immediate security flaw, there are still potential vulnerabilities related to memory manipulation and the need for ongoing vigilance in using AI tools with memory features. The incident underscores the evolving nature of security challenges in AI systems.The company says, instruction hierarchy or application-layer defenses like the ones mentioned."How do I disable ChatGPT memory?If you're not cool with ChatGPT keeping stuff about you or the chance that it could let a bad actor access your data, you can just turn off this feature in the settings.Open theChatGPT app or websiteon your computer or smartphone.Click on theprofile icon in the top right corner of the screen.Go to Settings and then select Personalization.Switch the Memory option off, and youre all set.This disables ChatGPTs ability to retain information between conversations, giving you full control over what it remembers or forgets.GET FOX BUSINESS ON THE GO BY CLICKING HERE A man using ChatGPT on his laptop (Kurt "CyberGuy" Knutsson)Cybersecurity best practices: Protecting your data in the age of AIAs AI technologies like ChatGPT become more prevalent, it's crucial to adhere to cybersecurity best practices to protect your personal information. Here are some tips for enhancing your cybersecurity:1. Regularly review privacy settings:Stay informed about what data is being collected. Periodically check and adjust privacy settings on AI platforms like ChatGPT and others to ensure youre only sharing information youre comfortable with.2. Be cautious about sharing sensitive information:Less is more when it comes to personal data. Avoid disclosing sensitive details such as your full name, address, or financial information in conversations with AI.3. Use strong, unique passwords:Create passwords that are at least 12 characters long, combining letters, numbers, and symbols, and avoid reusing them across different accounts. Consider using apassword manager to generate and store complex passwords.4. Enable two-factor authentication(2FA): Add an extra layer of security to your ChatGPT and other AI accounts.By requiring a second form of verification, such as a text message code, you significantly reduce the risk of unauthorized access.5. Keep software and applications up to date:Stay ahead of vulnerabilities.Regular updates often include security patches that protect against newly discovered threats, so enable automatic updates whenever possible.6. Have strong antivirus software: In an age where AI is everywhere, protecting your data from cyber threats is more important than ever. Adding strong antivirus software to your devices adds a critical layer of protection. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.7. Regularly monitor your accounts:Catch issues early. Frequently check bank statements and online accounts for any unusual activity, which can help you identify potentialbreaches quickly.Kurts key takeawaysAs AI tools like ChatGPT get smarter and more personal, it's pretty interesting to think about how they can tailor conversations to us. But, as Johann Rehbergers findings remind us, there are some real risks involved, especially when it comes to privacy and security. While OpenAI is able to mitigate these issues as they arise, it also shows that we need to keep a close eye on how these features work. It's all about finding that sweet spot between innovation and keeping our data safe.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on AI remembering personal detailsdo you find it helpful, or does it raise privacy concerns for you? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 51 Visualizações
  • WWW.FOXNEWS.COM
    AI-powered attack drones take flight
    Published November 8, 2024 6:00am EST close AI-powered attack drones take flight Drones are designed to enhance military operations through cutting-edge technology. Anduril Industries recently announced the launch of two advanced drones, the Bolt and Bolt-M, which are designed to enhance military operations through cutting-edge technology.These drones are not just typical consumer models. They are tailored for tactical applications, with the Bolt-M variant specifically equipped for munitions delivery. The Bolt-M (Anduril)Cutting-edge technology in defenseThe Bolt family operates on Anduril's Lattice artificial intelligence platform, which integrates artificial intelligence to streamline complex military operations. The Lattice system is designed to manage machine-to-machine tasks at unprecedented speeds, allowing for efficient coordination in combat scenarios. This technology enables operators to focus on strategic decisions rather than navigating the drones manually.I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS Operator controlling Bolt-M drone (Anduril)Specifications of the Bolt and Bolt-MBoltWeight: Approximately 12 poundsFlight time: Up to 45 minutesRange: 12.4 milesPrimary use: Intelligence, surveillance and reconnaissance; search and rescue Image of Bolt drone (Anduril)Bolt-MWeight: 13-15 pounds (dependent on payload)Flight time: Up to 40 minutesRange: 12.4 milesPayload capacity: Up to 3 pounds of munitionsBoth drones can be deployed rapidly, with the Bolt being ready for flight in under five minutes.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The Bolt-M (Anduril)User-friendly operationThe design of both drones emphasizes ease of use. Operators interact with a touchscreen controller that simplifies decision-making into four key actions: where to look, what to follow, how to engage and when to strike. This intuitive interface allows for quick adaptations to changing battlefield conditions. Touchscreen controller (Anduril)Autonomous features and flexibilityThe Bolt-M drone boasts advanced features such as:Autonomous waypoint navigation: Operators can set specific paths for the drone to follow.Target-agnostic tracking: The drone can track any visual target identified by the operator.Modular payloads: Operators can easily switch between different types of warheads based on mission requirements.These capabilities ensure that the Bolt-M drone can adapt to various operational needs while maintaining high levels of performance. The Bolt-M (Anduril)Kurt's key takeawaysBy combining lightweight design with sophisticated AI capabilities, these drones offer modern armed forces a versatile tool for both reconnaissance and precision strikes. As warfare continues to evolve, innovations like these will likely play a crucial role in shaping future combat strategies. The integration of such technology not only enhances operational efficiency but also aims to reduce the cognitive burden on operators, making military engagements more effective and safer.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on the implications of AI-powered drones like the Bolt and Bolt-M for the future of military operations? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comentários 0 Compartilhamentos 53 Visualizações
Mais stories