• Meet Martha Swope, the Legendary Broadway Photographer Who Captured Iconic Moments From Hundreds of Productions and Rehearsals

    Meet Martha Swope, the Legendary Broadway Photographer Who Captured Iconic Moments From Hundreds of Productions and Rehearsals
    She spent nearly 40 years taking theater and dance pictures, providing glimpses behind the scenes and creating images that the public couldn’t otherwise access

    Stephanie Rudig

    - Freelance Writer

    June 11, 2025

    Photographer Martha Swope sitting on a floor covered with prints of her photos in 1987
    Andrea Legge / © NYPL

    Martha Swope wanted to be a dancer. She moved from her home state of Texas to New York to attend the School of American Ballet, hoping to start a career in dance. Swope also happened to be an amateur photographer. So, in 1957, a fellow classmate invited her to bring her camera and document rehearsals for a little theater show he was working on. The classmate was director and choreographer Jerome Robbins, and the show was West Side Story.
    One of those rehearsal shots ended up in Life magazine, and Swope quickly started getting professional bookings. It’s notoriously tough to make it on Broadway, but through photography, Swope carved out a career capturing theater and dance. Over the course of nearly four decades, she photographed hundreds more rehearsals, productions and promotional studio shots.

    Unidentified male chorus members dancing during rehearsals for musical West Side Story in 1957

    Martha Swope / © NYPL

    At a time when live performances were not often or easily captured, Swope’s photographs caught the animated moments and distilled the essence of a show into a single image: André De Shields clad in a jumpsuit as the title character in The Wiz, Patti LuPone with her arms raised overhead in Evita, the cast of Cats leaping in feline formations, a close-up of a forlorn Sheryl Lee Ralph in Dreamgirls and the row of dancers obscuring their faces with their headshots in A Chorus Line were all captured by Swope’s camera. She was also the house photographer for the New York City Ballet and the Martha Graham Dance Company and photographed other major dance companies such as the Ailey School.
    Her vision of the stage became fairly ubiquitous, with Playbill reporting that in the late 1970s, two-thirds of Broadway productions were photographed by Swope, meaning her work dominated theater and dance coverage. Carol Rosegg was early in her photography career when she heard that Swope was looking for an assistant. “I didn't frankly even know who she was,” Rosegg says. “Then the press agent who told me said, ‘Pick up any New York Times and you’ll find out.’”
    Swope’s background as a dancer likely equipped her to press the shutter at the exact right moment to capture movement, and to know when everyone on stage was precisely posed. She taught herself photography and early on used a Brownie camera, a simple box model made by Kodak. “She was what she described as ‘a dancer with a Brownie,’” says Barbara Stratyner, a historian of the performing arts who curated exhibitions of Swope’s work at the New York Public Library.

    An ensemble of dancers in rehearsal for the stage production Cats in 1982

    Martha Swope / © NYPL

    “Dance was her first love,” Rosegg says. “She knew everything about dance. She would never use a photo of a dancer whose foot was wrong; the feet had to be perfect.”
    According to Rosegg, once the photo subjects knew she was shooting, “the anxiety level came down a little bit.” They knew that they’d look good in the resulting photos, and they likely trusted her intuition as a fellow dancer. Swope moved with the bearing of a dancer and often stood with her feet in ballet’s fourth position while she shot. She continued to take dance classes throughout her life, including at the prestigious Martha Graham School. Stratyner says, “As Graham got older,was, I think, the only person who was allowed to photograph rehearsals, because Graham didn’t want rehearsals shown.”
    Photographic technology and the theater and dance landscapes evolved greatly over the course of Swope’s career. Rosegg points out that at the start of her own career, cameras didn’t even automatically advance the film after each shot. She explains the delicate nature of working with film, saying, “When you were shooting film, you actually had to compose, because you had 35 shots and then you had to change your film.” Swope also worked during a period of changing over from all black-and-white photos to a mixture of black-and-white and color photography. Rosegg notes that simultaneously, Swope would shoot black-and-white, and she herself would shoot color. Looking at Swope’s portfolio is also an examination of increasingly crisp photo production. Advances in photography made shooting in the dark or capturing subjects under blinding stage lights easier, and they allowed for better zooming in from afar.

    Martha Graham rehearses dancer Takako Asakawa and others in Heretic, a dance work choreographed by Graham, in 1986

    Martha Swope / © NYPL

    It’s much more common nowadays to get a look behind the curtain of theater productions via social media. “The theater photographers of today need to supply so much content,” Rosegg says. “We didn’t have any of that, and getting to go backstage was kind of a big deal.”
    Photographers coming to document a rehearsal once might have been seen as an intrusion, but now, as Rosegg puts it, “everybody is desperate for you to come, and if you’re not there, they’re shooting it on their iPhone.”
    Even with exclusive behind-the-scenes access to the hottest tickets in town and the biggest stars of the day, Swope remained unpretentious. She lived and worked in a brownstone with her apartment above her studio, where the film was developed in a closet and the bathroom served as a darkroom. Rosegg recalls that a phone sat in the darkroom so they could be reached while printing, and she would be amazed at the big-name producers and theater glitterati who rang in while she was making prints in an unventilated space.

    From left to right: Paul Winfield, Ruby Dee, Marsha Jackson and Denzel Washington in the stage production Checkmates in 1988

    Martha Swope / © NYPL

    Swope’s approachability extended to how she chose to preserve her work. She originally sold her body of work to Time Life, and, according to Stratyner, she was unhappy with the way the photos became relatively inaccessible. She took back the rights to her collection and donated it to the New York Public Library, where many photos can be accessed by researchers in person, and the entire array of photos is available online to the public in the Digital Collections. Searching “Martha Swope” yields over 50,000 items from more than 800 productions, featuring a huge variety of figures, from a white-suited John Travolta busting a disco move in Saturday Night Fever to Andrew Lloyd Webber with Nancy Reagan at a performance of Phantom of the Opera.
    Swope’s extensive career was recognized in 2004 with a special Tony Award, a Tony Honors for Excellence in Theater, which are given intermittently to notable figures in theater who operate outside of traditional awards categories. She also received a lifetime achievement award from the League of Professional Theater Women in 2007. Though she retired in 1994 and died in 2017, her work still reverberates through dance and Broadway history today. For decades, she captured the fleeting moments of theater that would otherwise never be seen by the public. And her passion was clear and straightforward. As she once told an interviewer: “I’m not interested in what’s going on on my side of the camera. I’m interested in what’s happening on the other side.”

    Get the latest Travel & Culture stories in your inbox.
    #meet #martha #swope #legendary #broadway
    Meet Martha Swope, the Legendary Broadway Photographer Who Captured Iconic Moments From Hundreds of Productions and Rehearsals
    Meet Martha Swope, the Legendary Broadway Photographer Who Captured Iconic Moments From Hundreds of Productions and Rehearsals She spent nearly 40 years taking theater and dance pictures, providing glimpses behind the scenes and creating images that the public couldn’t otherwise access Stephanie Rudig - Freelance Writer June 11, 2025 Photographer Martha Swope sitting on a floor covered with prints of her photos in 1987 Andrea Legge / © NYPL Martha Swope wanted to be a dancer. She moved from her home state of Texas to New York to attend the School of American Ballet, hoping to start a career in dance. Swope also happened to be an amateur photographer. So, in 1957, a fellow classmate invited her to bring her camera and document rehearsals for a little theater show he was working on. The classmate was director and choreographer Jerome Robbins, and the show was West Side Story. One of those rehearsal shots ended up in Life magazine, and Swope quickly started getting professional bookings. It’s notoriously tough to make it on Broadway, but through photography, Swope carved out a career capturing theater and dance. Over the course of nearly four decades, she photographed hundreds more rehearsals, productions and promotional studio shots. Unidentified male chorus members dancing during rehearsals for musical West Side Story in 1957 Martha Swope / © NYPL At a time when live performances were not often or easily captured, Swope’s photographs caught the animated moments and distilled the essence of a show into a single image: André De Shields clad in a jumpsuit as the title character in The Wiz, Patti LuPone with her arms raised overhead in Evita, the cast of Cats leaping in feline formations, a close-up of a forlorn Sheryl Lee Ralph in Dreamgirls and the row of dancers obscuring their faces with their headshots in A Chorus Line were all captured by Swope’s camera. She was also the house photographer for the New York City Ballet and the Martha Graham Dance Company and photographed other major dance companies such as the Ailey School. Her vision of the stage became fairly ubiquitous, with Playbill reporting that in the late 1970s, two-thirds of Broadway productions were photographed by Swope, meaning her work dominated theater and dance coverage. Carol Rosegg was early in her photography career when she heard that Swope was looking for an assistant. “I didn't frankly even know who she was,” Rosegg says. “Then the press agent who told me said, ‘Pick up any New York Times and you’ll find out.’” Swope’s background as a dancer likely equipped her to press the shutter at the exact right moment to capture movement, and to know when everyone on stage was precisely posed. She taught herself photography and early on used a Brownie camera, a simple box model made by Kodak. “She was what she described as ‘a dancer with a Brownie,’” says Barbara Stratyner, a historian of the performing arts who curated exhibitions of Swope’s work at the New York Public Library. An ensemble of dancers in rehearsal for the stage production Cats in 1982 Martha Swope / © NYPL “Dance was her first love,” Rosegg says. “She knew everything about dance. She would never use a photo of a dancer whose foot was wrong; the feet had to be perfect.” According to Rosegg, once the photo subjects knew she was shooting, “the anxiety level came down a little bit.” They knew that they’d look good in the resulting photos, and they likely trusted her intuition as a fellow dancer. Swope moved with the bearing of a dancer and often stood with her feet in ballet’s fourth position while she shot. She continued to take dance classes throughout her life, including at the prestigious Martha Graham School. Stratyner says, “As Graham got older,was, I think, the only person who was allowed to photograph rehearsals, because Graham didn’t want rehearsals shown.” Photographic technology and the theater and dance landscapes evolved greatly over the course of Swope’s career. Rosegg points out that at the start of her own career, cameras didn’t even automatically advance the film after each shot. She explains the delicate nature of working with film, saying, “When you were shooting film, you actually had to compose, because you had 35 shots and then you had to change your film.” Swope also worked during a period of changing over from all black-and-white photos to a mixture of black-and-white and color photography. Rosegg notes that simultaneously, Swope would shoot black-and-white, and she herself would shoot color. Looking at Swope’s portfolio is also an examination of increasingly crisp photo production. Advances in photography made shooting in the dark or capturing subjects under blinding stage lights easier, and they allowed for better zooming in from afar. Martha Graham rehearses dancer Takako Asakawa and others in Heretic, a dance work choreographed by Graham, in 1986 Martha Swope / © NYPL It’s much more common nowadays to get a look behind the curtain of theater productions via social media. “The theater photographers of today need to supply so much content,” Rosegg says. “We didn’t have any of that, and getting to go backstage was kind of a big deal.” Photographers coming to document a rehearsal once might have been seen as an intrusion, but now, as Rosegg puts it, “everybody is desperate for you to come, and if you’re not there, they’re shooting it on their iPhone.” Even with exclusive behind-the-scenes access to the hottest tickets in town and the biggest stars of the day, Swope remained unpretentious. She lived and worked in a brownstone with her apartment above her studio, where the film was developed in a closet and the bathroom served as a darkroom. Rosegg recalls that a phone sat in the darkroom so they could be reached while printing, and she would be amazed at the big-name producers and theater glitterati who rang in while she was making prints in an unventilated space. From left to right: Paul Winfield, Ruby Dee, Marsha Jackson and Denzel Washington in the stage production Checkmates in 1988 Martha Swope / © NYPL Swope’s approachability extended to how she chose to preserve her work. She originally sold her body of work to Time Life, and, according to Stratyner, she was unhappy with the way the photos became relatively inaccessible. She took back the rights to her collection and donated it to the New York Public Library, where many photos can be accessed by researchers in person, and the entire array of photos is available online to the public in the Digital Collections. Searching “Martha Swope” yields over 50,000 items from more than 800 productions, featuring a huge variety of figures, from a white-suited John Travolta busting a disco move in Saturday Night Fever to Andrew Lloyd Webber with Nancy Reagan at a performance of Phantom of the Opera. Swope’s extensive career was recognized in 2004 with a special Tony Award, a Tony Honors for Excellence in Theater, which are given intermittently to notable figures in theater who operate outside of traditional awards categories. She also received a lifetime achievement award from the League of Professional Theater Women in 2007. Though she retired in 1994 and died in 2017, her work still reverberates through dance and Broadway history today. For decades, she captured the fleeting moments of theater that would otherwise never be seen by the public. And her passion was clear and straightforward. As she once told an interviewer: “I’m not interested in what’s going on on my side of the camera. I’m interested in what’s happening on the other side.” Get the latest Travel & Culture stories in your inbox. #meet #martha #swope #legendary #broadway
    WWW.SMITHSONIANMAG.COM
    Meet Martha Swope, the Legendary Broadway Photographer Who Captured Iconic Moments From Hundreds of Productions and Rehearsals
    Meet Martha Swope, the Legendary Broadway Photographer Who Captured Iconic Moments From Hundreds of Productions and Rehearsals She spent nearly 40 years taking theater and dance pictures, providing glimpses behind the scenes and creating images that the public couldn’t otherwise access Stephanie Rudig - Freelance Writer June 11, 2025 Photographer Martha Swope sitting on a floor covered with prints of her photos in 1987 Andrea Legge / © NYPL Martha Swope wanted to be a dancer. She moved from her home state of Texas to New York to attend the School of American Ballet, hoping to start a career in dance. Swope also happened to be an amateur photographer. So, in 1957, a fellow classmate invited her to bring her camera and document rehearsals for a little theater show he was working on. The classmate was director and choreographer Jerome Robbins, and the show was West Side Story. One of those rehearsal shots ended up in Life magazine, and Swope quickly started getting professional bookings. It’s notoriously tough to make it on Broadway, but through photography, Swope carved out a career capturing theater and dance. Over the course of nearly four decades, she photographed hundreds more rehearsals, productions and promotional studio shots. Unidentified male chorus members dancing during rehearsals for musical West Side Story in 1957 Martha Swope / © NYPL At a time when live performances were not often or easily captured, Swope’s photographs caught the animated moments and distilled the essence of a show into a single image: André De Shields clad in a jumpsuit as the title character in The Wiz, Patti LuPone with her arms raised overhead in Evita, the cast of Cats leaping in feline formations, a close-up of a forlorn Sheryl Lee Ralph in Dreamgirls and the row of dancers obscuring their faces with their headshots in A Chorus Line were all captured by Swope’s camera. She was also the house photographer for the New York City Ballet and the Martha Graham Dance Company and photographed other major dance companies such as the Ailey School. Her vision of the stage became fairly ubiquitous, with Playbill reporting that in the late 1970s, two-thirds of Broadway productions were photographed by Swope, meaning her work dominated theater and dance coverage. Carol Rosegg was early in her photography career when she heard that Swope was looking for an assistant. “I didn't frankly even know who she was,” Rosegg says. “Then the press agent who told me said, ‘Pick up any New York Times and you’ll find out.’” Swope’s background as a dancer likely equipped her to press the shutter at the exact right moment to capture movement, and to know when everyone on stage was precisely posed. She taught herself photography and early on used a Brownie camera, a simple box model made by Kodak. “She was what she described as ‘a dancer with a Brownie,’” says Barbara Stratyner, a historian of the performing arts who curated exhibitions of Swope’s work at the New York Public Library. An ensemble of dancers in rehearsal for the stage production Cats in 1982 Martha Swope / © NYPL “Dance was her first love,” Rosegg says. “She knew everything about dance. She would never use a photo of a dancer whose foot was wrong; the feet had to be perfect.” According to Rosegg, once the photo subjects knew she was shooting, “the anxiety level came down a little bit.” They knew that they’d look good in the resulting photos, and they likely trusted her intuition as a fellow dancer. Swope moved with the bearing of a dancer and often stood with her feet in ballet’s fourth position while she shot. She continued to take dance classes throughout her life, including at the prestigious Martha Graham School. Stratyner says, “As Graham got older, [Swope] was, I think, the only person who was allowed to photograph rehearsals, because Graham didn’t want rehearsals shown.” Photographic technology and the theater and dance landscapes evolved greatly over the course of Swope’s career. Rosegg points out that at the start of her own career, cameras didn’t even automatically advance the film after each shot. She explains the delicate nature of working with film, saying, “When you were shooting film, you actually had to compose, because you had 35 shots and then you had to change your film.” Swope also worked during a period of changing over from all black-and-white photos to a mixture of black-and-white and color photography. Rosegg notes that simultaneously, Swope would shoot black-and-white, and she herself would shoot color. Looking at Swope’s portfolio is also an examination of increasingly crisp photo production. Advances in photography made shooting in the dark or capturing subjects under blinding stage lights easier, and they allowed for better zooming in from afar. Martha Graham rehearses dancer Takako Asakawa and others in Heretic, a dance work choreographed by Graham, in 1986 Martha Swope / © NYPL It’s much more common nowadays to get a look behind the curtain of theater productions via social media. “The theater photographers of today need to supply so much content,” Rosegg says. “We didn’t have any of that, and getting to go backstage was kind of a big deal.” Photographers coming to document a rehearsal once might have been seen as an intrusion, but now, as Rosegg puts it, “everybody is desperate for you to come, and if you’re not there, they’re shooting it on their iPhone.” Even with exclusive behind-the-scenes access to the hottest tickets in town and the biggest stars of the day, Swope remained unpretentious. She lived and worked in a brownstone with her apartment above her studio, where the film was developed in a closet and the bathroom served as a darkroom. Rosegg recalls that a phone sat in the darkroom so they could be reached while printing, and she would be amazed at the big-name producers and theater glitterati who rang in while she was making prints in an unventilated space. From left to right: Paul Winfield, Ruby Dee, Marsha Jackson and Denzel Washington in the stage production Checkmates in 1988 Martha Swope / © NYPL Swope’s approachability extended to how she chose to preserve her work. She originally sold her body of work to Time Life, and, according to Stratyner, she was unhappy with the way the photos became relatively inaccessible. She took back the rights to her collection and donated it to the New York Public Library, where many photos can be accessed by researchers in person, and the entire array of photos is available online to the public in the Digital Collections. Searching “Martha Swope” yields over 50,000 items from more than 800 productions, featuring a huge variety of figures, from a white-suited John Travolta busting a disco move in Saturday Night Fever to Andrew Lloyd Webber with Nancy Reagan at a performance of Phantom of the Opera. Swope’s extensive career was recognized in 2004 with a special Tony Award, a Tony Honors for Excellence in Theater, which are given intermittently to notable figures in theater who operate outside of traditional awards categories. She also received a lifetime achievement award from the League of Professional Theater Women in 2007. Though she retired in 1994 and died in 2017, her work still reverberates through dance and Broadway history today. For decades, she captured the fleeting moments of theater that would otherwise never be seen by the public. And her passion was clear and straightforward. As she once told an interviewer: “I’m not interested in what’s going on on my side of the camera. I’m interested in what’s happening on the other side.” Get the latest Travel & Culture stories in your inbox.
    0 Yorumlar 0 hisse senetleri
  • The Trump-Musk Fight Could Have Huge Consequences for U.S. Space Programs

    June 5, 20254 min readThe Trump-Musk Fight Could Have Huge Consequences for U.S. Space ProgramsA vitriolic war of words between President Donald Trump and SpaceX CEO Elon Musk could have profound repercussions for the nation’s civil and military space programsBy Lee Billings edited by Dean VisserElon Muskand President Donald Trumpseemed to be on good terms during a press briefing in the Oval Office at the White House on May 30, 2025, but the event proved to be the calm before a social media storm. Kevin Dietsch/Getty ImagesFor several hours yesterday, an explosively escalating social media confrontation between arguably the world’s richest man, Elon Musk, and the world’s most powerful, President Donald Trump, shook U.S. spaceflight to its core.The pair had been bosom-buddy allies ever since Musk’s fateful endorsement of Trump last July—an event that helped propel Trump to an electoral victory and his second presidential term. But on May 28 Musk announced his departure from his official role overseeing the U.S. DOGE Service. And on May 31 the White House announced that it was withdrawing Trump’s nomination of Musk’s close associate Jared Isaacman to lead NASA. Musk abruptly went on the attack against the Trump administration, criticizing the budget-busting One Big Beautiful Bill Act, now navigating through Congress, as “a disgusting abomination.”Things got worse from there as the blowup descended deeper into threats and insults. On June 5 Trump suggested on his own social-media platform, Truth Social, that he could terminate U.S. government contracts with Musk’s companies, such as SpaceX and Tesla. Less than an hour later, the conflict suddenly grew more personal, with Musk taking to X, the social media platform he owns, to accuse Trump—without evidence—of being incriminated by as-yet-unreleased government documents related to the illegal activities of convicted sex offender Jeffrey Epstein.On supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.Musk upped the ante further in follow-up posts in which he endorsed a suggestion for impeaching Trump and, separately, declared in a now deleted post that because of the president’s threat, SpaceX “will begin decommissioning its Dragon spacecraft immediately.”Dragon is a crucial workhorse of U.S. human spaceflight. It’s the main way NASA’s astronauts get to and from the International Space Stationand also a key component of a contract between NASA and SpaceX to safely deorbit the ISS in 2031. If Dragon were to be no longer be available, NASA would, in the near term, have to rely on either Russian Soyuz vehicles or on Boeing’s glitch-plagued Starliner spacecraft for its crew transport—and the space agency’s plans for deorbiting the ISS would essentially go back to the drawing board. More broadly, NASA uses SpaceX rockets to launch many of its science missions, and the company is contracted to ferry astronauts to and from the surface of the moon as part of the space agency’s Artemis III mission.Trump’s and Musk’s retaliatory tit for tat also raises the disconcerting possibility of disrupting other SpaceX-centric parts of U.S. space plans, many of which are seen as critical for national security. Thanks to its wildly successful reusable Falcon 9 and Falcon Heavy rockets, the company presently provides the vast majority of space launches for the Department of Defense. And SpaceX’s constellation of more than 7,000 Starlink communications satellites has become vitally important to war fighters in the ongoing conflict between Russia and U.S.-allied Ukraine. SpaceX is also contracted to build a massive constellation of spy satellites for the DOD and is considered a leading candidate for launching space-based interceptors envisioned as part of Trump’s “Golden Dome” missile-defense plan.Among the avalanche of reactions to the incendiary spectacle unfolding in real time, one of the most extreme was from Trump’s influential former adviser Steve Bannon, who called on the president to seize and nationalize SpaceX. And in an interview with the New York Times, Bannon, without evidence, accused Musk, a naturalized U.S. citizen, of being an “illegal alien” who “should be deported from the country immediately.”NASA, for its part, attempted to stay above the fray via a carefully worded late-afternoon statement from the space agency’s press secretary Bethany Stevens: “NASA will continue to execute upon the President’s vision for the future of space,” Stevens wrote. “We will continue to work with our industry partners to ensure the President’s objectives in space are met.”The response from the stock market was, in its own way, much less muted. SpaceX is not a publicly traded company. But Musk’s electric car company Tesla is. And it experienced a massive sell-off at the end of June 5’s trading day: Tesla’s share price fell down by 14 percent, losing the company a whopping billion of its market value.Today a rumored détente phone conversation between the two men has apparently been called off, and Trump has reportedly said he now intends to sell the Tesla he purchased in March in what was then a gesture of support for Musk. But there are some signs the rift may yet heal: Musk has yet to be deported; SpaceX has not been shut down; Tesla’s stock price is surging back from its momentary heavy losses; and it seems NASA astronauts won’t be stranded on Earth or on the ISS for the time being.Even so, the entire sordid episode—and the possibility of further messy clashes between Trump and Musk unfolding in public—highlights a fundamental vulnerability at the heart of the nation’s deep reliance on SpaceX for access to space. Outsourcing huge swaths of civil and military space programs to a disruptively innovative private company effectively controlled by a single individual certainly has its rewards—but no shortage of risks, too.
    #trumpmusk #fight #could #have #huge
    The Trump-Musk Fight Could Have Huge Consequences for U.S. Space Programs
    June 5, 20254 min readThe Trump-Musk Fight Could Have Huge Consequences for U.S. Space ProgramsA vitriolic war of words between President Donald Trump and SpaceX CEO Elon Musk could have profound repercussions for the nation’s civil and military space programsBy Lee Billings edited by Dean VisserElon Muskand President Donald Trumpseemed to be on good terms during a press briefing in the Oval Office at the White House on May 30, 2025, but the event proved to be the calm before a social media storm. Kevin Dietsch/Getty ImagesFor several hours yesterday, an explosively escalating social media confrontation between arguably the world’s richest man, Elon Musk, and the world’s most powerful, President Donald Trump, shook U.S. spaceflight to its core.The pair had been bosom-buddy allies ever since Musk’s fateful endorsement of Trump last July—an event that helped propel Trump to an electoral victory and his second presidential term. But on May 28 Musk announced his departure from his official role overseeing the U.S. DOGE Service. And on May 31 the White House announced that it was withdrawing Trump’s nomination of Musk’s close associate Jared Isaacman to lead NASA. Musk abruptly went on the attack against the Trump administration, criticizing the budget-busting One Big Beautiful Bill Act, now navigating through Congress, as “a disgusting abomination.”Things got worse from there as the blowup descended deeper into threats and insults. On June 5 Trump suggested on his own social-media platform, Truth Social, that he could terminate U.S. government contracts with Musk’s companies, such as SpaceX and Tesla. Less than an hour later, the conflict suddenly grew more personal, with Musk taking to X, the social media platform he owns, to accuse Trump—without evidence—of being incriminated by as-yet-unreleased government documents related to the illegal activities of convicted sex offender Jeffrey Epstein.On supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.Musk upped the ante further in follow-up posts in which he endorsed a suggestion for impeaching Trump and, separately, declared in a now deleted post that because of the president’s threat, SpaceX “will begin decommissioning its Dragon spacecraft immediately.”Dragon is a crucial workhorse of U.S. human spaceflight. It’s the main way NASA’s astronauts get to and from the International Space Stationand also a key component of a contract between NASA and SpaceX to safely deorbit the ISS in 2031. If Dragon were to be no longer be available, NASA would, in the near term, have to rely on either Russian Soyuz vehicles or on Boeing’s glitch-plagued Starliner spacecraft for its crew transport—and the space agency’s plans for deorbiting the ISS would essentially go back to the drawing board. More broadly, NASA uses SpaceX rockets to launch many of its science missions, and the company is contracted to ferry astronauts to and from the surface of the moon as part of the space agency’s Artemis III mission.Trump’s and Musk’s retaliatory tit for tat also raises the disconcerting possibility of disrupting other SpaceX-centric parts of U.S. space plans, many of which are seen as critical for national security. Thanks to its wildly successful reusable Falcon 9 and Falcon Heavy rockets, the company presently provides the vast majority of space launches for the Department of Defense. And SpaceX’s constellation of more than 7,000 Starlink communications satellites has become vitally important to war fighters in the ongoing conflict between Russia and U.S.-allied Ukraine. SpaceX is also contracted to build a massive constellation of spy satellites for the DOD and is considered a leading candidate for launching space-based interceptors envisioned as part of Trump’s “Golden Dome” missile-defense plan.Among the avalanche of reactions to the incendiary spectacle unfolding in real time, one of the most extreme was from Trump’s influential former adviser Steve Bannon, who called on the president to seize and nationalize SpaceX. And in an interview with the New York Times, Bannon, without evidence, accused Musk, a naturalized U.S. citizen, of being an “illegal alien” who “should be deported from the country immediately.”NASA, for its part, attempted to stay above the fray via a carefully worded late-afternoon statement from the space agency’s press secretary Bethany Stevens: “NASA will continue to execute upon the President’s vision for the future of space,” Stevens wrote. “We will continue to work with our industry partners to ensure the President’s objectives in space are met.”The response from the stock market was, in its own way, much less muted. SpaceX is not a publicly traded company. But Musk’s electric car company Tesla is. And it experienced a massive sell-off at the end of June 5’s trading day: Tesla’s share price fell down by 14 percent, losing the company a whopping billion of its market value.Today a rumored détente phone conversation between the two men has apparently been called off, and Trump has reportedly said he now intends to sell the Tesla he purchased in March in what was then a gesture of support for Musk. But there are some signs the rift may yet heal: Musk has yet to be deported; SpaceX has not been shut down; Tesla’s stock price is surging back from its momentary heavy losses; and it seems NASA astronauts won’t be stranded on Earth or on the ISS for the time being.Even so, the entire sordid episode—and the possibility of further messy clashes between Trump and Musk unfolding in public—highlights a fundamental vulnerability at the heart of the nation’s deep reliance on SpaceX for access to space. Outsourcing huge swaths of civil and military space programs to a disruptively innovative private company effectively controlled by a single individual certainly has its rewards—but no shortage of risks, too. #trumpmusk #fight #could #have #huge
    WWW.SCIENTIFICAMERICAN.COM
    The Trump-Musk Fight Could Have Huge Consequences for U.S. Space Programs
    June 5, 20254 min readThe Trump-Musk Fight Could Have Huge Consequences for U.S. Space ProgramsA vitriolic war of words between President Donald Trump and SpaceX CEO Elon Musk could have profound repercussions for the nation’s civil and military space programsBy Lee Billings edited by Dean VisserElon Musk (left) and President Donald Trump (right) seemed to be on good terms during a press briefing in the Oval Office at the White House on May 30, 2025, but the event proved to be the calm before a social media storm. Kevin Dietsch/Getty ImagesFor several hours yesterday, an explosively escalating social media confrontation between arguably the world’s richest man, Elon Musk, and the world’s most powerful, President Donald Trump, shook U.S. spaceflight to its core.The pair had been bosom-buddy allies ever since Musk’s fateful endorsement of Trump last July—an event that helped propel Trump to an electoral victory and his second presidential term. But on May 28 Musk announced his departure from his official role overseeing the U.S. DOGE Service. And on May 31 the White House announced that it was withdrawing Trump’s nomination of Musk’s close associate Jared Isaacman to lead NASA. Musk abruptly went on the attack against the Trump administration, criticizing the budget-busting One Big Beautiful Bill Act, now navigating through Congress, as “a disgusting abomination.”Things got worse from there as the blowup descended deeper into threats and insults. On June 5 Trump suggested on his own social-media platform, Truth Social, that he could terminate U.S. government contracts with Musk’s companies, such as SpaceX and Tesla. Less than an hour later, the conflict suddenly grew more personal, with Musk taking to X, the social media platform he owns, to accuse Trump—without evidence—of being incriminated by as-yet-unreleased government documents related to the illegal activities of convicted sex offender Jeffrey Epstein.On supporting science journalismIf you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.Musk upped the ante further in follow-up posts in which he endorsed a suggestion for impeaching Trump and, separately, declared in a now deleted post that because of the president’s threat, SpaceX “will begin decommissioning its Dragon spacecraft immediately.” (Some five hours after his decommissioning comment, tempers had apparently cooled enough for Musk to walk back the remark in another X post: “Ok, we won’t decommission Dragon.”)Dragon is a crucial workhorse of U.S. human spaceflight. It’s the main way NASA’s astronauts get to and from the International Space Station (ISS) and also a key component of a contract between NASA and SpaceX to safely deorbit the ISS in 2031. If Dragon were to be no longer be available, NASA would, in the near term, have to rely on either Russian Soyuz vehicles or on Boeing’s glitch-plagued Starliner spacecraft for its crew transport—and the space agency’s plans for deorbiting the ISS would essentially go back to the drawing board. More broadly, NASA uses SpaceX rockets to launch many of its science missions, and the company is contracted to ferry astronauts to and from the surface of the moon as part of the space agency’s Artemis III mission.Trump’s and Musk’s retaliatory tit for tat also raises the disconcerting possibility of disrupting other SpaceX-centric parts of U.S. space plans, many of which are seen as critical for national security. Thanks to its wildly successful reusable Falcon 9 and Falcon Heavy rockets, the company presently provides the vast majority of space launches for the Department of Defense. And SpaceX’s constellation of more than 7,000 Starlink communications satellites has become vitally important to war fighters in the ongoing conflict between Russia and U.S.-allied Ukraine. SpaceX is also contracted to build a massive constellation of spy satellites for the DOD and is considered a leading candidate for launching space-based interceptors envisioned as part of Trump’s “Golden Dome” missile-defense plan.Among the avalanche of reactions to the incendiary spectacle unfolding in real time, one of the most extreme was from Trump’s influential former adviser Steve Bannon, who called on the president to seize and nationalize SpaceX. And in an interview with the New York Times, Bannon, without evidence, accused Musk, a naturalized U.S. citizen, of being an “illegal alien” who “should be deported from the country immediately.”NASA, for its part, attempted to stay above the fray via a carefully worded late-afternoon statement from the space agency’s press secretary Bethany Stevens: “NASA will continue to execute upon the President’s vision for the future of space,” Stevens wrote. “We will continue to work with our industry partners to ensure the President’s objectives in space are met.”The response from the stock market was, in its own way, much less muted. SpaceX is not a publicly traded company. But Musk’s electric car company Tesla is. And it experienced a massive sell-off at the end of June 5’s trading day: Tesla’s share price fell down by 14 percent, losing the company a whopping $152 billion of its market value.Today a rumored détente phone conversation between the two men has apparently been called off, and Trump has reportedly said he now intends to sell the Tesla he purchased in March in what was then a gesture of support for Musk. But there are some signs the rift may yet heal: Musk has yet to be deported; SpaceX has not been shut down; Tesla’s stock price is surging back from its momentary heavy losses; and it seems NASA astronauts won’t be stranded on Earth or on the ISS for the time being.Even so, the entire sordid episode—and the possibility of further messy clashes between Trump and Musk unfolding in public—highlights a fundamental vulnerability at the heart of the nation’s deep reliance on SpaceX for access to space. Outsourcing huge swaths of civil and military space programs to a disruptively innovative private company effectively controlled by a single individual certainly has its rewards—but no shortage of risks, too.
    Like
    Love
    Wow
    Sad
    Angry
    634
    0 Yorumlar 0 hisse senetleri
  • Day 4 of TechCrunch Sessions: AI Trivia Countdown — Flex your brain, score big on tickets

    TechCrunch Sessions: AI hits UC Berkeley’s Zellerbach Hall on June 5 — and today’s your shot at AI trivia glory and two tickets for the price of one.
    Answer a few brain-busting questions on artificial intelligence, and if you ace it, you might just find a special promo code waiting in your inbox.
    Every day brings new questions — so don’t get discouraged if you don’t know today’s answers. But don’t wait too long. The last day of Countdown AI Trivia is June 4. Don’t miss your chance to win big and be part of the AI action this Thursday.
    Whether you know which AI model kicked off the large language model revolution or what year OpenAI launched ChatGPT, this is your time to shine.
    How it works
    Step 1: Answer the AI trivia questions on this form
    Step 2: Watch your inbox for the special code if you win
    Step 3: Use the code to claim your 2-for-1 ticket deal

    Techcrunch event

    now through June 4 for TechCrunch Sessions: AI
    on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5.

    Exhibit at TechCrunch Sessions: AI
    Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last.

    Berkeley, CA
    |
    June 5

    REGISTER NOW

    Show off your AI knowledge in this quick trivia round.
    #day #techcrunch #sessions #trivia #countdown
    Day 4 of TechCrunch Sessions: AI Trivia Countdown — Flex your brain, score big on tickets
    TechCrunch Sessions: AI hits UC Berkeley’s Zellerbach Hall on June 5 — and today’s your shot at AI trivia glory and two tickets for the price of one. Answer a few brain-busting questions on artificial intelligence, and if you ace it, you might just find a special promo code waiting in your inbox. Every day brings new questions — so don’t get discouraged if you don’t know today’s answers. But don’t wait too long. The last day of Countdown AI Trivia is June 4. Don’t miss your chance to win big and be part of the AI action this Thursday. Whether you know which AI model kicked off the large language model revolution or what year OpenAI launched ChatGPT, this is your time to shine. How it works Step 1: Answer the AI trivia questions on this form Step 2: Watch your inbox for the special code if you win Step 3: Use the code to claim your 2-for-1 ticket deal Techcrunch event now through June 4 for TechCrunch Sessions: AI on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW Show off your AI knowledge in this quick trivia round. #day #techcrunch #sessions #trivia #countdown
    TECHCRUNCH.COM
    Day 4 of TechCrunch Sessions: AI Trivia Countdown — Flex your brain, score big on tickets
    TechCrunch Sessions: AI hits UC Berkeley’s Zellerbach Hall on June 5 — and today’s your shot at AI trivia glory and two tickets for the price of one. Answer a few brain-busting questions on artificial intelligence, and if you ace it, you might just find a special promo code waiting in your inbox. Every day brings new questions — so don’t get discouraged if you don’t know today’s answers. But don’t wait too long. The last day of Countdown AI Trivia is June 4. Don’t miss your chance to win big and be part of the AI action this Thursday. Whether you know which AI model kicked off the large language model revolution or what year OpenAI launched ChatGPT, this is your time to shine. How it works Step 1: Answer the AI trivia questions on this form Step 2: Watch your inbox for the special code if you win Step 3: Use the code to claim your 2-for-1 ticket deal Techcrunch event Save now through June 4 for TechCrunch Sessions: AI Save $300 on your ticket to TC Sessions: AI—and get 50% off a second. Hear from leaders at OpenAI, Anthropic, Khosla Ventures, and more during a full day of expert insights, hands-on workshops, and high-impact networking. These low-rate deals disappear when the doors open on June 5. Exhibit at TechCrunch Sessions: AI Secure your spot at TC Sessions: AI and show 1,200+ decision-makers what you’ve built — without the big spend. Available through May 9 or while tables last. Berkeley, CA | June 5 REGISTER NOW Show off your AI knowledge in this quick trivia round.
    0 Yorumlar 0 hisse senetleri
  • Microsoft And Video Game Workers Union Reach Tentative Agreement On Labor Contract

    The Communications Workers of America, the union representing QA testers at ZeniMax, announced today that it has reached a tentative agreement on a labor contract with Microsoft. If implemented, this contract will be one of the first to go into effect at one of the big AAA game publishers.Last month, the union voted to authorize a strike in response to challenges to the contract negotiation process; this agreement would avoid a strike from being carried out. In a press release, CWA shared that the agreed contract would grant ZeniMax employees significantly increased protections and would raise pay across the board. It would also implement guidelines on the use of AI, restrict "arbitrary dismissal," and create processes to ensure that QA testers adequately receive credit in video games that they contribute to.QA testing has been a hotspot of unionization efforts in the games industry, some of which have been targeted with union-busting efforts. At ZeniMax, the QA testers' union represents around 300 employees and has been fighting for several years for this contract. In response to the agreement, Jessee Leese, a QA tester and union representative at ZeniMax, stated, "Video games have been the revenue titan of the entire entertainment industry for years, and the workers who develop these games are too often exploited for their passion and creativity. Organizing unions, bargaining for a contract, and speaking with one collective voice has allowed workers to take back the autonomy we all deserve."Continue Reading at GameSpot
    #microsoft #video #game #workers #union
    Microsoft And Video Game Workers Union Reach Tentative Agreement On Labor Contract
    The Communications Workers of America, the union representing QA testers at ZeniMax, announced today that it has reached a tentative agreement on a labor contract with Microsoft. If implemented, this contract will be one of the first to go into effect at one of the big AAA game publishers.Last month, the union voted to authorize a strike in response to challenges to the contract negotiation process; this agreement would avoid a strike from being carried out. In a press release, CWA shared that the agreed contract would grant ZeniMax employees significantly increased protections and would raise pay across the board. It would also implement guidelines on the use of AI, restrict "arbitrary dismissal," and create processes to ensure that QA testers adequately receive credit in video games that they contribute to.QA testing has been a hotspot of unionization efforts in the games industry, some of which have been targeted with union-busting efforts. At ZeniMax, the QA testers' union represents around 300 employees and has been fighting for several years for this contract. In response to the agreement, Jessee Leese, a QA tester and union representative at ZeniMax, stated, "Video games have been the revenue titan of the entire entertainment industry for years, and the workers who develop these games are too often exploited for their passion and creativity. Organizing unions, bargaining for a contract, and speaking with one collective voice has allowed workers to take back the autonomy we all deserve."Continue Reading at GameSpot #microsoft #video #game #workers #union
    WWW.GAMESPOT.COM
    Microsoft And Video Game Workers Union Reach Tentative Agreement On Labor Contract
    The Communications Workers of America, the union representing QA testers at ZeniMax, announced today that it has reached a tentative agreement on a labor contract with Microsoft. If implemented, this contract will be one of the first to go into effect at one of the big AAA game publishers.Last month, the union voted to authorize a strike in response to challenges to the contract negotiation process; this agreement would avoid a strike from being carried out. In a press release, CWA shared that the agreed contract would grant ZeniMax employees significantly increased protections and would raise pay across the board. It would also implement guidelines on the use of AI, restrict "arbitrary dismissal," and create processes to ensure that QA testers adequately receive credit in video games that they contribute to.QA testing has been a hotspot of unionization efforts in the games industry, some of which have been targeted with union-busting efforts. At ZeniMax, the QA testers' union represents around 300 employees and has been fighting for several years for this contract. In response to the agreement, Jessee Leese, a QA tester and union representative at ZeniMax, stated, "Video games have been the revenue titan of the entire entertainment industry for years, and the workers who develop these games are too often exploited for their passion and creativity. Organizing unions, bargaining for a contract, and speaking with one collective voice has allowed workers to take back the autonomy we all deserve."Continue Reading at GameSpot
    0 Yorumlar 0 hisse senetleri
  • PowerWash Simulator goes underground, overground in final free content update

    PowerWash Simulator goes underground, overground in final free content update
    It's been a blast.

    News

    by Matt Wales
    News Reporter

    Published on May 29, 2025

    The end is nigh for developer FuturLab's endlessly hypnotic original PowerWash Simulator, but before the studio packs away its nozzles in anticipation of an upcoming sequel, there's one last free update featuring a couple more spaces in which to unleash your hose.

    "The time has come to reach our final destination for PowerWash Simulator," FuturLab wrote in an update on its website, "and what a journey it has been!... Whether you've been with us busting the grime from early access, or hopped aboard the PowerWash hype train somewhere down the line, we'd love to say a huge thank you for enjoying this adventure with us."

    And as a final farewell to the original game, FuturLab has released Muckingham Files 6, which features two more locations in desperate need of a clean. The first will be immediately familiar to old hands, taking players down into the Muckingham subway station for one last spray. However, rather than demanding a repeat of the harrowing tunnel clean-up job featured in the base game, this time you'll be aiming your nozzle at an extremely grubby train that's pulled into the station, washing away the grime from its outers and innards.

    Watch on YouTube

    After that, there's one last stop in the form of Sculpture Park, where players will be working at the behest of Darcy d'Arcy to restore the area's collection of "fine" art - including a large Monolith and The Man of A Thousand Faces - to its former glory. And, of course, there's a giant gnome, because what sort of send off would it be without one?

    "We hope you enjoy this final PowerWash Simulator update as much as we have enjoyed creating it," FuturLab concluded in its update. "The team have poured their hearts and souls into creating a world for you all to escape to and clean, somewhere for you to relax and solo clean, or a place to gather with friends and catch up over a satisfying wash."

    PowerWash Simulator's free Muckingham Files 6 update - which follows April's inclusion of Muckingham's Dessert Parlour for a cleaning - is available now on all platforms, and FutureLab has taken the opportunity to squeeze in a couple more bug fixes, as detailed in its patch notes.

    Next up, of course, is PowerWash Simulator 2, which is currently expected to launch for PC, PlayStation 5, Xbox Series X/S, and possibly Switch 2 later this year. It promises new jobs, new dirt to blast, and a new hub-like HQ. And if you're a fan of PowerWash Simulator's ridiculous narrative, don't fret - FuturLab has also confirmed plenty more Muckingham lore.
    #powerwash #simulator #goes #underground #overground
    PowerWash Simulator goes underground, overground in final free content update
    PowerWash Simulator goes underground, overground in final free content update It's been a blast. News by Matt Wales News Reporter Published on May 29, 2025 The end is nigh for developer FuturLab's endlessly hypnotic original PowerWash Simulator, but before the studio packs away its nozzles in anticipation of an upcoming sequel, there's one last free update featuring a couple more spaces in which to unleash your hose. "The time has come to reach our final destination for PowerWash Simulator," FuturLab wrote in an update on its website, "and what a journey it has been!... Whether you've been with us busting the grime from early access, or hopped aboard the PowerWash hype train somewhere down the line, we'd love to say a huge thank you for enjoying this adventure with us." And as a final farewell to the original game, FuturLab has released Muckingham Files 6, which features two more locations in desperate need of a clean. The first will be immediately familiar to old hands, taking players down into the Muckingham subway station for one last spray. However, rather than demanding a repeat of the harrowing tunnel clean-up job featured in the base game, this time you'll be aiming your nozzle at an extremely grubby train that's pulled into the station, washing away the grime from its outers and innards. Watch on YouTube After that, there's one last stop in the form of Sculpture Park, where players will be working at the behest of Darcy d'Arcy to restore the area's collection of "fine" art - including a large Monolith and The Man of A Thousand Faces - to its former glory. And, of course, there's a giant gnome, because what sort of send off would it be without one? "We hope you enjoy this final PowerWash Simulator update as much as we have enjoyed creating it," FuturLab concluded in its update. "The team have poured their hearts and souls into creating a world for you all to escape to and clean, somewhere for you to relax and solo clean, or a place to gather with friends and catch up over a satisfying wash." PowerWash Simulator's free Muckingham Files 6 update - which follows April's inclusion of Muckingham's Dessert Parlour for a cleaning - is available now on all platforms, and FutureLab has taken the opportunity to squeeze in a couple more bug fixes, as detailed in its patch notes. Next up, of course, is PowerWash Simulator 2, which is currently expected to launch for PC, PlayStation 5, Xbox Series X/S, and possibly Switch 2 later this year. It promises new jobs, new dirt to blast, and a new hub-like HQ. And if you're a fan of PowerWash Simulator's ridiculous narrative, don't fret - FuturLab has also confirmed plenty more Muckingham lore. #powerwash #simulator #goes #underground #overground
    WWW.EUROGAMER.NET
    PowerWash Simulator goes underground, overground in final free content update
    PowerWash Simulator goes underground, overground in final free content update It's been a blast. News by Matt Wales News Reporter Published on May 29, 2025 The end is nigh for developer FuturLab's endlessly hypnotic original PowerWash Simulator, but before the studio packs away its nozzles in anticipation of an upcoming sequel, there's one last free update featuring a couple more spaces in which to unleash your hose. "The time has come to reach our final destination for PowerWash Simulator," FuturLab wrote in an update on its website, "and what a journey it has been!... Whether you've been with us busting the grime from early access, or hopped aboard the PowerWash hype train somewhere down the line, we'd love to say a huge thank you for enjoying this adventure with us." And as a final farewell to the original game, FuturLab has released Muckingham Files 6, which features two more locations in desperate need of a clean. The first will be immediately familiar to old hands, taking players down into the Muckingham subway station for one last spray. However, rather than demanding a repeat of the harrowing tunnel clean-up job featured in the base game, this time you'll be aiming your nozzle at an extremely grubby train that's pulled into the station, washing away the grime from its outers and innards. Watch on YouTube After that, there's one last stop in the form of Sculpture Park, where players will be working at the behest of Darcy d'Arcy to restore the area's collection of "fine" art - including a large Monolith and The Man of A Thousand Faces - to its former glory. And, of course, there's a giant gnome, because what sort of send off would it be without one? "We hope you enjoy this final PowerWash Simulator update as much as we have enjoyed creating it," FuturLab concluded in its update. "The team have poured their hearts and souls into creating a world for you all to escape to and clean, somewhere for you to relax and solo clean, or a place to gather with friends and catch up over a satisfying wash." PowerWash Simulator's free Muckingham Files 6 update - which follows April's inclusion of Muckingham's Dessert Parlour for a cleaning - is available now on all platforms, and FutureLab has taken the opportunity to squeeze in a couple more bug fixes, as detailed in its patch notes. Next up, of course, is PowerWash Simulator 2, which is currently expected to launch for PC, PlayStation 5, Xbox Series X/S, and possibly Switch 2 later this year. It promises new jobs, new dirt to blast, and a new hub-like HQ. And if you're a fan of PowerWash Simulator's ridiculous narrative, don't fret - FuturLab has also confirmed plenty more Muckingham lore.
    9 Yorumlar 0 hisse senetleri
  • What the “Trump effect” teaches us about crypto hype

    The last six months have been a strange, exhilarating time for crypto. First, there was the so-called “Trump effect”—a surge in crypto prices and on-chain activity triggered by the then president-elect’s vocal support of crypto. Then came the viral “Hawk Tuah” meme, which somehow alchemized into a crypto memecoin that rocketed in value, pulled headlines, and emptied wallets in equal measure. 

    For many first-time crypto users, these moments were their gateway into the blockchain. Wallets were downloaded. Tokens were swapped. Twitterfeeds were flooded with strange new lingo: HODL, degen, DYOR. It was a wild ride. For most newcomers, the experience probably felt like trying to join a conversation in a foreign language while riding a rollercoaster. 

    As the leader of a nonprofit dedicated to educating everyday Americans about crypto, I welcome this influx of interest. Crypto, at its best, can democratize financial access, create transparency, and offer new tools for digital empowerment. But hype cycles also bring risk: not just of financial loss, but of alienation and misunderstanding. It’s time we decouple the signal from the noise. 

    Crypto isn’t just for bros—and it never was 

    Let’s start by busting one of crypto’s most persistent stereotypes: that it’s just for young, wealthy finance bros chasing dreams of Lamborghini sports carsand going “to the moon.” Sure, that subculture exists—just like it does in day trading and sports betting. But crypto’s roots are far more diverse.  

    Earlier this year, we conducted one of the largest-ever studies of crypto holders in America. We found that almost one thirdare women, and more are over the age of 55than under 25. Nearly as many crypto users work in constructionas do in technology—far more than those working in finance—and many do not belong to higher income brackets, with roughly a quarterof crypto-owning households earning less than /year. 

    The stereotype is outdated and, frankly, dangerous. It discourages thoughtful newcomers from participating and lets bad actors hide behind a smokescreen of memes and cartoonish masculinity. The future of crypto will be shaped by everyday Americans, not caricatures. 

    Decode the lingo, stay for the mission 

    Don’t let the lingo intimidate you. You don’t need to speak “crypto” fluently to participate—just like you don’t need to know what “https” means to send an email. But to new users feeling overwhelmed by the language of crypto, here’s a quick translation guide to get started: 

    HODL: Originally a typo for “hold,” it means holding on to your crypto for dear life and resisting the urge to sell in volatile markets. It’s become a philosophy for long-term belief in a project’s value. 

    Degen: Short for “degenerate,” it describes high-risk traders chasing fast gains in often unvetted projects. It’s part joke, part warning. 

    Memecoin: A token built around a joke or cultural moment like Dogecoin or the recent Hawk Tuah coin. Some are created in jest, others are tapping into legitimate community-driven goals. Think of these as digital collectibles, like Pokemon cards. 

    Tips for crypto newbies  

    Start small, stay curious: The best way to learn is by doing. Treat your first crypto transaction like your first gym session—you’re here to learn the ropes, not break a record.  

    Use reputable platforms: Avoid buying coins just because they’re trending on TikTok. Stick to exchanges and wallets with strong reputations, transparent policies, and educational resources. 

    Do your own research: Known as “DYOR” in the crypto world, do your own research and lean on trusted sources. Unfortunately like any industry, there is risk of scams or fraud with crypto. Rule of thumb: If something seems too good to be true, it probably is.  

    Beyond the buzz 

    Crypto’s potential isn’t defined by celebrity endorsements or trending memes. It lies in what happens beyond the hype: freedom to exchange value directly, without back-office delays or middlemen taking control. Transparent governance and extra layers of privacy. True ownership and accessibility of your digital identity and assets.  

    Regardless of what piqued your interest in crypto or when, welcome. You’re right on time. The memes may fade, but crypto’s promise is here to stay. 

    Stu Alderoty is president of the National Cryptocurrency Association. 
    #what #trump #effect #teaches #about
    What the “Trump effect” teaches us about crypto hype
    The last six months have been a strange, exhilarating time for crypto. First, there was the so-called “Trump effect”—a surge in crypto prices and on-chain activity triggered by the then president-elect’s vocal support of crypto. Then came the viral “Hawk Tuah” meme, which somehow alchemized into a crypto memecoin that rocketed in value, pulled headlines, and emptied wallets in equal measure.  For many first-time crypto users, these moments were their gateway into the blockchain. Wallets were downloaded. Tokens were swapped. Twitterfeeds were flooded with strange new lingo: HODL, degen, DYOR. It was a wild ride. For most newcomers, the experience probably felt like trying to join a conversation in a foreign language while riding a rollercoaster.  As the leader of a nonprofit dedicated to educating everyday Americans about crypto, I welcome this influx of interest. Crypto, at its best, can democratize financial access, create transparency, and offer new tools for digital empowerment. But hype cycles also bring risk: not just of financial loss, but of alienation and misunderstanding. It’s time we decouple the signal from the noise.  Crypto isn’t just for bros—and it never was  Let’s start by busting one of crypto’s most persistent stereotypes: that it’s just for young, wealthy finance bros chasing dreams of Lamborghini sports carsand going “to the moon.” Sure, that subculture exists—just like it does in day trading and sports betting. But crypto’s roots are far more diverse.   Earlier this year, we conducted one of the largest-ever studies of crypto holders in America. We found that almost one thirdare women, and more are over the age of 55than under 25. Nearly as many crypto users work in constructionas do in technology—far more than those working in finance—and many do not belong to higher income brackets, with roughly a quarterof crypto-owning households earning less than /year.  The stereotype is outdated and, frankly, dangerous. It discourages thoughtful newcomers from participating and lets bad actors hide behind a smokescreen of memes and cartoonish masculinity. The future of crypto will be shaped by everyday Americans, not caricatures.  Decode the lingo, stay for the mission  Don’t let the lingo intimidate you. You don’t need to speak “crypto” fluently to participate—just like you don’t need to know what “https” means to send an email. But to new users feeling overwhelmed by the language of crypto, here’s a quick translation guide to get started:  HODL: Originally a typo for “hold,” it means holding on to your crypto for dear life and resisting the urge to sell in volatile markets. It’s become a philosophy for long-term belief in a project’s value.  Degen: Short for “degenerate,” it describes high-risk traders chasing fast gains in often unvetted projects. It’s part joke, part warning.  Memecoin: A token built around a joke or cultural moment like Dogecoin or the recent Hawk Tuah coin. Some are created in jest, others are tapping into legitimate community-driven goals. Think of these as digital collectibles, like Pokemon cards.  Tips for crypto newbies   Start small, stay curious: The best way to learn is by doing. Treat your first crypto transaction like your first gym session—you’re here to learn the ropes, not break a record.   Use reputable platforms: Avoid buying coins just because they’re trending on TikTok. Stick to exchanges and wallets with strong reputations, transparent policies, and educational resources.  Do your own research: Known as “DYOR” in the crypto world, do your own research and lean on trusted sources. Unfortunately like any industry, there is risk of scams or fraud with crypto. Rule of thumb: If something seems too good to be true, it probably is.   Beyond the buzz  Crypto’s potential isn’t defined by celebrity endorsements or trending memes. It lies in what happens beyond the hype: freedom to exchange value directly, without back-office delays or middlemen taking control. Transparent governance and extra layers of privacy. True ownership and accessibility of your digital identity and assets.   Regardless of what piqued your interest in crypto or when, welcome. You’re right on time. The memes may fade, but crypto’s promise is here to stay.  Stu Alderoty is president of the National Cryptocurrency Association.  #what #trump #effect #teaches #about
    WWW.FASTCOMPANY.COM
    What the “Trump effect” teaches us about crypto hype
    The last six months have been a strange, exhilarating time for crypto. First, there was the so-called “Trump effect”—a surge in crypto prices and on-chain activity triggered by the then president-elect’s vocal support of crypto. Then came the viral “Hawk Tuah” meme, which somehow alchemized into a crypto memecoin that rocketed in value, pulled headlines, and emptied wallets in equal measure.  For many first-time crypto users, these moments were their gateway into the blockchain. Wallets were downloaded. Tokens were swapped. Twitter (now X) feeds were flooded with strange new lingo: HODL, degen, DYOR. It was a wild ride. For most newcomers, the experience probably felt like trying to join a conversation in a foreign language while riding a rollercoaster.  As the leader of a nonprofit dedicated to educating everyday Americans about crypto, I welcome this influx of interest. Crypto, at its best, can democratize financial access, create transparency, and offer new tools for digital empowerment. But hype cycles also bring risk: not just of financial loss, but of alienation and misunderstanding. It’s time we decouple the signal from the noise.  Crypto isn’t just for bros—and it never was  Let’s start by busting one of crypto’s most persistent stereotypes: that it’s just for young, wealthy finance bros chasing dreams of Lamborghini sports cars (aka “Lambos”) and going “to the moon.” Sure, that subculture exists—just like it does in day trading and sports betting. But crypto’s roots are far more diverse.   Earlier this year, we conducted one of the largest-ever studies of crypto holders in America. We found that almost one third (31%) are women, and more are over the age of 55 (15%) than under 25 (11%). Nearly as many crypto users work in construction (12%) as do in technology (14%)—far more than those working in finance (7%)—and many do not belong to higher income brackets, with roughly a quarter (26%) of crypto-owning households earning less than $75,000/year.  The stereotype is outdated and, frankly, dangerous. It discourages thoughtful newcomers from participating and lets bad actors hide behind a smokescreen of memes and cartoonish masculinity. The future of crypto will be shaped by everyday Americans, not caricatures.  Decode the lingo, stay for the mission  Don’t let the lingo intimidate you. You don’t need to speak “crypto” fluently to participate—just like you don’t need to know what “https” means to send an email. But to new users feeling overwhelmed by the language of crypto, here’s a quick translation guide to get started:  HODL: Originally a typo for “hold,” it means holding on to your crypto for dear life and resisting the urge to sell in volatile markets. It’s become a philosophy for long-term belief in a project’s value.  Degen: Short for “degenerate,” it describes high-risk traders chasing fast gains in often unvetted projects. It’s part joke, part warning.  Memecoin: A token built around a joke or cultural moment like Dogecoin or the recent Hawk Tuah coin. Some are created in jest, others are tapping into legitimate community-driven goals. Think of these as digital collectibles, like Pokemon cards.  Tips for crypto newbies   Start small, stay curious: The best way to learn is by doing. Treat your first crypto transaction like your first gym session—you’re here to learn the ropes, not break a record.   Use reputable platforms: Avoid buying coins just because they’re trending on TikTok. Stick to exchanges and wallets with strong reputations, transparent policies, and educational resources.  Do your own research: Known as “DYOR” in the crypto world, do your own research and lean on trusted sources. Unfortunately like any industry, there is risk of scams or fraud with crypto. Rule of thumb: If something seems too good to be true, it probably is.   Beyond the buzz  Crypto’s potential isn’t defined by celebrity endorsements or trending memes. It lies in what happens beyond the hype: freedom to exchange value directly, without back-office delays or middlemen taking control. Transparent governance and extra layers of privacy. True ownership and accessibility of your digital identity and assets.   Regardless of what piqued your interest in crypto or when, welcome. You’re right on time. The memes may fade, but crypto’s promise is here to stay.  Stu Alderoty is president of the National Cryptocurrency Association. 
    0 Yorumlar 0 hisse senetleri
  • Android scam lets hackers use your credit card remotely

    Published
    May 20, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. An Android phoneWhat makes SuperCard X different?SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN.The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card.Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. SuperCardX fully undetectableHow the scam worksThe fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust.Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card.Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker.Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. A woman scrolling on her phone8 ways you can stay safe from SuperCard X malware1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts.3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you’ll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers.4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it’s possible your banking details are already compromised. That’s why it’s important to regularly check your transaction history for anything odd, like a small payment you don’t remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It’s also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues.5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they’ll try again, especially if your personal detailsare easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6) Contact your bank and freeze your cards: If you think you’ve tapped or handled a suspicious card, or if your phone acted strangely afterward, don’t brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name.7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI’s Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure.Kurt’s key takeawayThe SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies.Do you think Google is doing enough to protect you from malware? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #android #scam #lets #hackers #use
    Android scam lets hackers use your credit card remotely
    Published May 20, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. An Android phoneWhat makes SuperCard X different?SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN.The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card.Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. SuperCardX fully undetectableHow the scam worksThe fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust.Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card.Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker.Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. A woman scrolling on her phone8 ways you can stay safe from SuperCard X malware1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts.3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you’ll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers.4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it’s possible your banking details are already compromised. That’s why it’s important to regularly check your transaction history for anything odd, like a small payment you don’t remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It’s also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues.5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they’ll try again, especially if your personal detailsare easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6) Contact your bank and freeze your cards: If you think you’ve tapped or handled a suspicious card, or if your phone acted strangely afterward, don’t brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name.7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI’s Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure.Kurt’s key takeawayThe SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies.Do you think Google is doing enough to protect you from malware? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #android #scam #lets #hackers #use
    WWW.FOXNEWS.COM
    Android scam lets hackers use your credit card remotely
    Published May 20, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. An Android phone (Kurt "CyberGuy" Knutsson)What makes SuperCard X different?SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN.The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card.Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. SuperCardX fully undetectable (FUD | Cleafy) (Kurt "CyberGuy" Knutsson)How the scam worksThe fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust.Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card.Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker.Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. A woman scrolling on her phone (Kurt "CyberGuy" Knutsson)8 ways you can stay safe from SuperCard X malware1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts.3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you’ll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers.4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it’s possible your banking details are already compromised. That’s why it’s important to regularly check your transaction history for anything odd, like a small payment you don’t remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It’s also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues.5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they’ll try again, especially if your personal details (like your phone number, address or email) are easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6) Contact your bank and freeze your cards: If you think you’ve tapped or handled a suspicious card, or if your phone acted strangely afterward, don’t brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name.7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI’s Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure.Kurt’s key takeawayThe SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies.Do you think Google is doing enough to protect you from malware? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri
  • How to Stream Disney+ in 4K If You Aren't Already

    With over a hundred years of history and a stacked portfolio of films and TV shows, it’s no surprise that Disney has its own horse in the competitive streaming service race. Since the inception of Disney+ in 2019, the streaming giant has grown its portfolio beyond its classic fairy tale roots and now boasts a catalogue of box office-busting films and bingeable series alike. From Star Wars to Marvel, you might be wondering: How can I stream Disney+ in 4K? Look no further, as our guide will run you through everything you’ll need, from subscription types to hardware. How to Stream Disney+ in 4KUnlike most streaming services on the market, Disney+ doesn’t require you to have a premium account to access 4K content. That means no matter what kind of subscription you’ve chosen, whether it be a bundle or basic plan, you’ll have access to 4K streaming on Disney+. So if you’re considering which bundle or account type to pick, the decisions will come down to what extras you’d like, such as offline downloads or ads. Disney+ Basic– per month Disney+ Premium– per month Disney+ Hulu Bundle Basic– per monthDisney+ Hulu Bundle Premium– per monthDisney+, Hulu, ESPN+ Basic– per month Disney+, Hulu, ESPN+ Bundle Premium- per month Disney+, Hulu, Max Bundle- per monthDisney+, Hulu, Max Bundle- per monthPlayMake Sure Your Setup Is 4K-CompatibleTo stream Disney+ in 4K, you’ll need to ensure all aspects of your setup can support streaming in 4K. That means it’s not just your Smart TV that needs to be compatible, but also every other piece of hardware, too. If you use an Apple TV or Firestick, you’ll need to shop around for the 4K compatible versions. Same goes for buying a HDMI cable to connect your hardware. Budget 4K Streaming DeviceAmazon Fire TV Stick 4K MaxSee it at AmazonHDMI for 4KBelkin HDMI 2.1 Ultra High SpeedSee it at AmazonBest 4K TVLG 65" Class OLED evo C4See it at AmazonBest 4K MonitorAsus ROG Swift PG32UCDPSee it at Best BuyOne important caveat to consider is that, as of right now, streaming Disney+ in 4K is not possible on computer browsers. That means if you're using a laptop, your content will be limited. Check Your ConnectionWhen streaming 4K content on Disney+, there aren’t any internet settings to adjust, as the app automatically detects internet quality and adjusts your content’s video format accordingly. With that in mind, if you’re still running into problems, you can reset your device’s cache. To do this, we recommend following the official guide Disney+ has on its website. Are There Other Ways to Watch Disney+ Movies and Shows in 4K ?From keyrings to theme parks, Disney loves to flaunt its vast collection of iconic IPs. As such, the media conglomerate has released a slew of its best content as physical Blu-rays. From Marvel’s catalogue of high-octane superhero flicks to Pixar’s collection of heart-rending animated films, much of the Disney+ catalogue can be purchased separately from the platform. Better still, many seasons of Disney’s beloved TV shows have also found a home on 4K Blu-ray, including The Mandalorian, Loki, and Hawkeye, to name a few.
    #how #stream #disney #you #aren039t
    How to Stream Disney+ in 4K If You Aren't Already
    With over a hundred years of history and a stacked portfolio of films and TV shows, it’s no surprise that Disney has its own horse in the competitive streaming service race. Since the inception of Disney+ in 2019, the streaming giant has grown its portfolio beyond its classic fairy tale roots and now boasts a catalogue of box office-busting films and bingeable series alike. From Star Wars to Marvel, you might be wondering: How can I stream Disney+ in 4K? Look no further, as our guide will run you through everything you’ll need, from subscription types to hardware. How to Stream Disney+ in 4KUnlike most streaming services on the market, Disney+ doesn’t require you to have a premium account to access 4K content. That means no matter what kind of subscription you’ve chosen, whether it be a bundle or basic plan, you’ll have access to 4K streaming on Disney+. So if you’re considering which bundle or account type to pick, the decisions will come down to what extras you’d like, such as offline downloads or ads. Disney+ Basic– per month Disney+ Premium– per month Disney+ Hulu Bundle Basic– per monthDisney+ Hulu Bundle Premium– per monthDisney+, Hulu, ESPN+ Basic– per month Disney+, Hulu, ESPN+ Bundle Premium- per month Disney+, Hulu, Max Bundle- per monthDisney+, Hulu, Max Bundle- per monthPlayMake Sure Your Setup Is 4K-CompatibleTo stream Disney+ in 4K, you’ll need to ensure all aspects of your setup can support streaming in 4K. That means it’s not just your Smart TV that needs to be compatible, but also every other piece of hardware, too. If you use an Apple TV or Firestick, you’ll need to shop around for the 4K compatible versions. Same goes for buying a HDMI cable to connect your hardware. Budget 4K Streaming DeviceAmazon Fire TV Stick 4K MaxSee it at AmazonHDMI for 4KBelkin HDMI 2.1 Ultra High SpeedSee it at AmazonBest 4K TVLG 65" Class OLED evo C4See it at AmazonBest 4K MonitorAsus ROG Swift PG32UCDPSee it at Best BuyOne important caveat to consider is that, as of right now, streaming Disney+ in 4K is not possible on computer browsers. That means if you're using a laptop, your content will be limited. Check Your ConnectionWhen streaming 4K content on Disney+, there aren’t any internet settings to adjust, as the app automatically detects internet quality and adjusts your content’s video format accordingly. With that in mind, if you’re still running into problems, you can reset your device’s cache. To do this, we recommend following the official guide Disney+ has on its website. Are There Other Ways to Watch Disney+ Movies and Shows in 4K ?From keyrings to theme parks, Disney loves to flaunt its vast collection of iconic IPs. As such, the media conglomerate has released a slew of its best content as physical Blu-rays. From Marvel’s catalogue of high-octane superhero flicks to Pixar’s collection of heart-rending animated films, much of the Disney+ catalogue can be purchased separately from the platform. Better still, many seasons of Disney’s beloved TV shows have also found a home on 4K Blu-ray, including The Mandalorian, Loki, and Hawkeye, to name a few. #how #stream #disney #you #aren039t
    WWW.IGN.COM
    How to Stream Disney+ in 4K If You Aren't Already
    With over a hundred years of history and a stacked portfolio of films and TV shows, it’s no surprise that Disney has its own horse in the competitive streaming service race. Since the inception of Disney+ in 2019, the streaming giant has grown its portfolio beyond its classic fairy tale roots and now boasts a catalogue of box office-busting films and bingeable series alike. From Star Wars to Marvel, you might be wondering: How can I stream Disney+ in 4K? Look no further, as our guide will run you through everything you’ll need, from subscription types to hardware. How to Stream Disney+ in 4KUnlike most streaming services on the market, Disney+ doesn’t require you to have a premium account to access 4K content. That means no matter what kind of subscription you’ve chosen, whether it be a bundle or basic plan, you’ll have access to 4K streaming on Disney+. So if you’re considering which bundle or account type to pick, the decisions will come down to what extras you’d like, such as offline downloads or ads. Disney+ Basic (with Ads) – $9.99 per month Disney+ Premium (without Ads) – $15.99 per month Disney+ Hulu Bundle Basic (with Ads) – $10.99 per monthDisney+ Hulu Bundle Premium (without Ads) – $19.99 per monthDisney+, Hulu, ESPN+ Basic (with Ads) – $16.99 per month Disney+, Hulu, ESPN+ Bundle Premium (without Ads) - $26.99 per month Disney+, Hulu, Max Bundle (with Ads) - $16.99 per monthDisney+, Hulu, Max Bundle (without Ads) - $29.99 per monthPlayMake Sure Your Setup Is 4K-CompatibleTo stream Disney+ in 4K, you’ll need to ensure all aspects of your setup can support streaming in 4K. That means it’s not just your Smart TV that needs to be compatible, but also every other piece of hardware, too. If you use an Apple TV or Firestick, you’ll need to shop around for the 4K compatible versions. Same goes for buying a HDMI cable to connect your hardware. Budget 4K Streaming DeviceAmazon Fire TV Stick 4K MaxSee it at AmazonHDMI for 4KBelkin HDMI 2.1 Ultra High SpeedSee it at AmazonBest 4K TVLG 65" Class OLED evo C4See it at AmazonBest 4K Monitor (for gaming too)Asus ROG Swift PG32UCDPSee it at Best BuyOne important caveat to consider is that, as of right now, streaming Disney+ in 4K is not possible on computer browsers. That means if you're using a laptop, your content will be limited. Check Your ConnectionWhen streaming 4K content on Disney+, there aren’t any internet settings to adjust, as the app automatically detects internet quality and adjusts your content’s video format accordingly. With that in mind, if you’re still running into problems, you can reset your device’s cache. To do this, we recommend following the official guide Disney+ has on its website. Are There Other Ways to Watch Disney+ Movies and Shows in 4K ?From keyrings to theme parks, Disney loves to flaunt its vast collection of iconic IPs. As such, the media conglomerate has released a slew of its best content as physical Blu-rays. From Marvel’s catalogue of high-octane superhero flicks to Pixar’s collection of heart-rending animated films, much of the Disney+ catalogue can be purchased separately from the platform. Better still, many seasons of Disney’s beloved TV shows have also found a home on 4K Blu-ray, including The Mandalorian, Loki, and Hawkeye, to name a few.
    0 Yorumlar 0 hisse senetleri
  • Check washing crisis fueled by AI and mail theft

    Published
    May 18, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Once considered an old-fashioned crime, check washing has roared back to life with alarming sophistication. Criminals are not just targeting personal checks anymore. They  are exploiting every vulnerability in the mailing and banking system to cash in on stolen funds. As check fraud incidents continue to rise sharply across the country, it is more important than ever to understand how check washing works and what you can do to protect yourself. Here is what you need to know to stay ahead of the scammers.JOIN THE FREE CYBERGUY REPORT: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS, AND EXCLUSIVE DEALS — PLUS INSTANT ACCESS TO MY FREE ULTIMATE SCAM SURVIVAL GUIDE WHEN YOU SIGN UP! A pen placed on top of a blank check What is check washing fraud?Check washing fraud happens when a scammer steals a check you have written, erases the ink using chemicals like acetone or nail polish remover, and rewrites it to a new recipient. Often, they will change the amount to something much higher. The altered check is then deposited or cashed, and the funds are drained from your account before you even realize something is wrong.Why it's dangerous:Check washing does not require much technical skill.It can happen with checks you leave in your outgoing mail.Even mailed bill payments are vulnerable if not handled securely.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEUnlike digital fraud, check washing often goes unnoticed until long after the damage is done. Because checks can take days or even weeks to clear through the banking system, criminals have plenty of time to deposit altered checks and move funds before victims realize anything is wrong. By the time the missing money is discovered, tracing it back to the scammer can be extremely difficult. This delay makes it critical to monitor your accounts closely and act quickly if you spot any suspicious activity. Illustration of check fraud in progress How check washing has gotten worseSince 2023, check fraud has exploded in the United States.Financial institutions filed 665,000 suspicious activity reportsrelated to check fraud in 2023, which is a 134% increase compared to 2020.A 2024 Federal Reserve survey showed that check fraud now accounts for 30% of all fraud losses, second only to debit card fraud.Between February 2023 and August 2023 alone, Americans lost over million to mail theft-related check fraud.The surge in fraud reports reflects more than just isolated criminal acts. Organized crime rings are increasingly turning to check washing as a hybrid crime, blending old-school mail theft with new digital tools like AI. Fraudsters now use advanced technologies to forge identities, alter check images and exploit gaps in banking security, making check washing more sophisticated than ever. As financial institutions strengthen cybersecurity defenses, scammers are targeting physical mail systems as a weaker link to bypass digital barriers.Real examples:Six people were charged with attempting to steal million through fraudulent checks tied to COVID-19 relief funds.In Florida, a former mail carrier pleaded guilty to attempting to sell USPS arrow keys and stolen checks totaling nearly to an undercover agent, leading to his arrest and confession.sNew tricks criminals are usingFraudsters have adapted their methods to stay ahead of law enforcement and banks.Mobile deposit fraud: Criminals alter check images or deposit the same check into multiple accounts.Synthetic identity fraud: Scammers create fake identities using AI-generated documents to open accounts and cash stolen checks.Business Email Compromise: Attackers impersonate executives or vendors to convince companies to send checks to fraudulent accounts.Criminals are combining old techniques like mail theft with new digital strategies, making check washing harder to recognize and prevent without proactive security measures. Recent advancements in AI technology have made it easier for scammers to forge realistic-looking documents, generate convincing fake identities and create sophisticated phishing emails. AI-generated fake IDs and altered check images can pass basic verification checks that would have caught manual forgeries in the past. This shift means check fraud is no longer just a matter of stealing a physical check, but exploiting digital vulnerabilities at every stage of the banking process. A person going over a bank statementHow to protect yourself from check washing fraudHere are 14 essential protective measures to shield yourself from check washing scams.1. Use a black gel pen: When writing checks, always use a black gel pen. The ink is much harder to remove compared to regular ballpoint pen ink.2. Bring checks directly to the post office when mailing them: If using a mailbox, make sure to drop off your mail before the final scheduled pickup so it is not left sitting overnight.3. Sign up for USPS Informed Delivery: Stay ahead by signing up for USPS Informed Delivery. You will receive digital previews of incoming mail so you can monitor for any missing items early. Learn more about why it's important here.4. Monitor your bank accounts: Set up real-time alerts for check clearing and review your statements weekly to catch any suspicious activity. Also, ask your bank about any other fraud-prevention tools they offer to protect your accounts.5. Switch to digital payments when possible: Use your bank’s mobile app to deposit checks without mailing or physically delivering them, reducing the risk of theft or tampering.6. Use checks with built-in security features: Choose checks printed on paper with watermarks, chemical-sensitive coatings or other security features that make check washing much harder.7. Limit the information on checks: Avoid unnecessary personal details. Do not print your Social Security number, driver’s license number or phone number on your checks. The less information available, the less a fraudster can use.HOW CYBERSCAMS ARE DRAINING AMERICANS WALLETS BY THE BILLIONS8. Store checks securely: Keep blank checks in a safe place. Store your checkbook in a locked drawer or safe, not in your purse, car or an easily accessible location at home.9. Check your mailbox security: Install a locking mailbox. If possible, use a mailbox with a lock to prevent thieves from stealing outgoing or incoming mail.10. Be cautious with endorsements: When endorsing checks, write "For Deposit Only" along with your account number to prevent others from cashing the check.11. Enroll in identity theft protection with check fraud specialization: Choose services that specifically monitor for compromised check details on dark web marketplaces and alert you to suspicious check-cashing patterns. Identity theft protection services monitor your personal data across the dark web and public databases, alert you to suspicious activity and assist you in locking down your accounts if needed. See my tips and best picks on how to protect yourself from identity theft.12. Invest in personal data removal services: Minimize exposure of sensitive detailsthat fraudsters could exploit for check-washing scams. Removing your personal information from these sites can help reduce your risk of becoming a victim. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 13. Shred sensitive documents: Shred old checks and bank statements. Don’t just throw them away. Shred any documents with sensitive banking information.14. Report suspicious activity immediately: If you suspect check fraud or missing mail, report it to your bank and the U.S. Postal Inspection Service right away.15. Use Positive Pay if you are a business: Positive Pay is a fraud prevention service offered by most banks to business customers. It works by matching the checks you issue with the ones presented for payment. If something doesn’t add up, like a changed amount or payee, the bank flags it for your review before it’s processed. You usually need to sign up through your bank, and there might be a fee, but it’s a smart way to protect your business from check fraud, especially if you write a lot of checks.What to do if you are a victimIf you think you have been targeted by check fraud:Report it to your bank immediately and freeze your account if necessary.Contact the USPS Postal Inspection Service to report stolen mail.File a complaint with the Better Business Bureauor at IdentityTheft.gov.Time matters. The faster you act, the better your chances of recovering lost funds.Kurt’s key takeawaysCheck washing fraud is growing rapidly, and criminals are becoming more organized and sophisticated. Simple habits like using gel pens, securing your mail and monitoring your financial accounts closely can make a big difference. Services like USPS Informed Delivery, Positive Pay for businesses and personal data removal tools provide added layers of protection. Identity theft protection services can also offer critical support if you ever become a victim of check fraud.CLICK HERE TO GET THE FOX NEWS APPHave you or someone you know experienced check fraud? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #check #washing #crisis #fueled #mail
    Check washing crisis fueled by AI and mail theft
    Published May 18, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Once considered an old-fashioned crime, check washing has roared back to life with alarming sophistication. Criminals are not just targeting personal checks anymore. They  are exploiting every vulnerability in the mailing and banking system to cash in on stolen funds. As check fraud incidents continue to rise sharply across the country, it is more important than ever to understand how check washing works and what you can do to protect yourself. Here is what you need to know to stay ahead of the scammers.JOIN THE FREE CYBERGUY REPORT: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS, AND EXCLUSIVE DEALS — PLUS INSTANT ACCESS TO MY FREE ULTIMATE SCAM SURVIVAL GUIDE WHEN YOU SIGN UP! A pen placed on top of a blank check What is check washing fraud?Check washing fraud happens when a scammer steals a check you have written, erases the ink using chemicals like acetone or nail polish remover, and rewrites it to a new recipient. Often, they will change the amount to something much higher. The altered check is then deposited or cashed, and the funds are drained from your account before you even realize something is wrong.Why it's dangerous:Check washing does not require much technical skill.It can happen with checks you leave in your outgoing mail.Even mailed bill payments are vulnerable if not handled securely.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEUnlike digital fraud, check washing often goes unnoticed until long after the damage is done. Because checks can take days or even weeks to clear through the banking system, criminals have plenty of time to deposit altered checks and move funds before victims realize anything is wrong. By the time the missing money is discovered, tracing it back to the scammer can be extremely difficult. This delay makes it critical to monitor your accounts closely and act quickly if you spot any suspicious activity. Illustration of check fraud in progress How check washing has gotten worseSince 2023, check fraud has exploded in the United States.Financial institutions filed 665,000 suspicious activity reportsrelated to check fraud in 2023, which is a 134% increase compared to 2020.A 2024 Federal Reserve survey showed that check fraud now accounts for 30% of all fraud losses, second only to debit card fraud.Between February 2023 and August 2023 alone, Americans lost over million to mail theft-related check fraud.The surge in fraud reports reflects more than just isolated criminal acts. Organized crime rings are increasingly turning to check washing as a hybrid crime, blending old-school mail theft with new digital tools like AI. Fraudsters now use advanced technologies to forge identities, alter check images and exploit gaps in banking security, making check washing more sophisticated than ever. As financial institutions strengthen cybersecurity defenses, scammers are targeting physical mail systems as a weaker link to bypass digital barriers.Real examples:Six people were charged with attempting to steal million through fraudulent checks tied to COVID-19 relief funds.In Florida, a former mail carrier pleaded guilty to attempting to sell USPS arrow keys and stolen checks totaling nearly to an undercover agent, leading to his arrest and confession.sNew tricks criminals are usingFraudsters have adapted their methods to stay ahead of law enforcement and banks.Mobile deposit fraud: Criminals alter check images or deposit the same check into multiple accounts.Synthetic identity fraud: Scammers create fake identities using AI-generated documents to open accounts and cash stolen checks.Business Email Compromise: Attackers impersonate executives or vendors to convince companies to send checks to fraudulent accounts.Criminals are combining old techniques like mail theft with new digital strategies, making check washing harder to recognize and prevent without proactive security measures. Recent advancements in AI technology have made it easier for scammers to forge realistic-looking documents, generate convincing fake identities and create sophisticated phishing emails. AI-generated fake IDs and altered check images can pass basic verification checks that would have caught manual forgeries in the past. This shift means check fraud is no longer just a matter of stealing a physical check, but exploiting digital vulnerabilities at every stage of the banking process. A person going over a bank statementHow to protect yourself from check washing fraudHere are 14 essential protective measures to shield yourself from check washing scams.1. Use a black gel pen: When writing checks, always use a black gel pen. The ink is much harder to remove compared to regular ballpoint pen ink.2. Bring checks directly to the post office when mailing them: If using a mailbox, make sure to drop off your mail before the final scheduled pickup so it is not left sitting overnight.3. Sign up for USPS Informed Delivery: Stay ahead by signing up for USPS Informed Delivery. You will receive digital previews of incoming mail so you can monitor for any missing items early. Learn more about why it's important here.4. Monitor your bank accounts: Set up real-time alerts for check clearing and review your statements weekly to catch any suspicious activity. Also, ask your bank about any other fraud-prevention tools they offer to protect your accounts.5. Switch to digital payments when possible: Use your bank’s mobile app to deposit checks without mailing or physically delivering them, reducing the risk of theft or tampering.6. Use checks with built-in security features: Choose checks printed on paper with watermarks, chemical-sensitive coatings or other security features that make check washing much harder.7. Limit the information on checks: Avoid unnecessary personal details. Do not print your Social Security number, driver’s license number or phone number on your checks. The less information available, the less a fraudster can use.HOW CYBERSCAMS ARE DRAINING AMERICANS WALLETS BY THE BILLIONS8. Store checks securely: Keep blank checks in a safe place. Store your checkbook in a locked drawer or safe, not in your purse, car or an easily accessible location at home.9. Check your mailbox security: Install a locking mailbox. If possible, use a mailbox with a lock to prevent thieves from stealing outgoing or incoming mail.10. Be cautious with endorsements: When endorsing checks, write "For Deposit Only" along with your account number to prevent others from cashing the check.11. Enroll in identity theft protection with check fraud specialization: Choose services that specifically monitor for compromised check details on dark web marketplaces and alert you to suspicious check-cashing patterns. Identity theft protection services monitor your personal data across the dark web and public databases, alert you to suspicious activity and assist you in locking down your accounts if needed. See my tips and best picks on how to protect yourself from identity theft.12. Invest in personal data removal services: Minimize exposure of sensitive detailsthat fraudsters could exploit for check-washing scams. Removing your personal information from these sites can help reduce your risk of becoming a victim. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 13. Shred sensitive documents: Shred old checks and bank statements. Don’t just throw them away. Shred any documents with sensitive banking information.14. Report suspicious activity immediately: If you suspect check fraud or missing mail, report it to your bank and the U.S. Postal Inspection Service right away.15. Use Positive Pay if you are a business: Positive Pay is a fraud prevention service offered by most banks to business customers. It works by matching the checks you issue with the ones presented for payment. If something doesn’t add up, like a changed amount or payee, the bank flags it for your review before it’s processed. You usually need to sign up through your bank, and there might be a fee, but it’s a smart way to protect your business from check fraud, especially if you write a lot of checks.What to do if you are a victimIf you think you have been targeted by check fraud:Report it to your bank immediately and freeze your account if necessary.Contact the USPS Postal Inspection Service to report stolen mail.File a complaint with the Better Business Bureauor at IdentityTheft.gov.Time matters. The faster you act, the better your chances of recovering lost funds.Kurt’s key takeawaysCheck washing fraud is growing rapidly, and criminals are becoming more organized and sophisticated. Simple habits like using gel pens, securing your mail and monitoring your financial accounts closely can make a big difference. Services like USPS Informed Delivery, Positive Pay for businesses and personal data removal tools provide added layers of protection. Identity theft protection services can also offer critical support if you ever become a victim of check fraud.CLICK HERE TO GET THE FOX NEWS APPHave you or someone you know experienced check fraud? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #check #washing #crisis #fueled #mail
    WWW.FOXNEWS.COM
    Check washing crisis fueled by AI and mail theft
    Published May 18, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Once considered an old-fashioned crime, check washing has roared back to life with alarming sophistication. Criminals are not just targeting personal checks anymore. They  are exploiting every vulnerability in the mailing and banking system to cash in on stolen funds. As check fraud incidents continue to rise sharply across the country, it is more important than ever to understand how check washing works and what you can do to protect yourself. Here is what you need to know to stay ahead of the scammers.JOIN THE FREE CYBERGUY REPORT: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS, AND EXCLUSIVE DEALS — PLUS INSTANT ACCESS TO MY FREE ULTIMATE SCAM SURVIVAL GUIDE WHEN YOU SIGN UP! A pen placed on top of a blank check  (Kurt "CyberGuy" Knutsson)What is check washing fraud?Check washing fraud happens when a scammer steals a check you have written, erases the ink using chemicals like acetone or nail polish remover, and rewrites it to a new recipient. Often, they will change the amount to something much higher. The altered check is then deposited or cashed, and the funds are drained from your account before you even realize something is wrong.Why it's dangerous:Check washing does not require much technical skill.It can happen with checks you leave in your outgoing mail.Even mailed bill payments are vulnerable if not handled securely.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEUnlike digital fraud, check washing often goes unnoticed until long after the damage is done. Because checks can take days or even weeks to clear through the banking system, criminals have plenty of time to deposit altered checks and move funds before victims realize anything is wrong. By the time the missing money is discovered, tracing it back to the scammer can be extremely difficult. This delay makes it critical to monitor your accounts closely and act quickly if you spot any suspicious activity. Illustration of check fraud in progress  (Kurt "CyberGuy" Knutsson)How check washing has gotten worseSince 2023, check fraud has exploded in the United States.Financial institutions filed 665,000 suspicious activity reports (SARs) related to check fraud in 2023, which is a 134% increase compared to 2020.A 2024 Federal Reserve survey showed that check fraud now accounts for 30% of all fraud losses, second only to debit card fraud.Between February 2023 and August 2023 alone, Americans lost over $688 million to mail theft-related check fraud.The surge in fraud reports reflects more than just isolated criminal acts. Organized crime rings are increasingly turning to check washing as a hybrid crime, blending old-school mail theft with new digital tools like AI. Fraudsters now use advanced technologies to forge identities, alter check images and exploit gaps in banking security, making check washing more sophisticated than ever. As financial institutions strengthen cybersecurity defenses, scammers are targeting physical mail systems as a weaker link to bypass digital barriers.Real examples:Six people were charged with attempting to steal $80 million through fraudulent checks tied to COVID-19 relief funds.In Florida, a former mail carrier pleaded guilty to attempting to sell USPS arrow keys and stolen checks totaling nearly $550,000 to an undercover agent, leading to his arrest and confession.sNew tricks criminals are usingFraudsters have adapted their methods to stay ahead of law enforcement and banks.Mobile deposit fraud: Criminals alter check images or deposit the same check into multiple accounts.Synthetic identity fraud: Scammers create fake identities using AI-generated documents to open accounts and cash stolen checks.Business Email Compromise (BEC): Attackers impersonate executives or vendors to convince companies to send checks to fraudulent accounts.Criminals are combining old techniques like mail theft with new digital strategies, making check washing harder to recognize and prevent without proactive security measures. Recent advancements in AI technology have made it easier for scammers to forge realistic-looking documents, generate convincing fake identities and create sophisticated phishing emails. AI-generated fake IDs and altered check images can pass basic verification checks that would have caught manual forgeries in the past. This shift means check fraud is no longer just a matter of stealing a physical check, but exploiting digital vulnerabilities at every stage of the banking process. A person going over a bank statement (Kurt "CyberGuy" Knutsson)How to protect yourself from check washing fraudHere are 14 essential protective measures to shield yourself from check washing scams.1. Use a black gel pen: When writing checks, always use a black gel pen. The ink is much harder to remove compared to regular ballpoint pen ink.2. Bring checks directly to the post office when mailing them: If using a mailbox, make sure to drop off your mail before the final scheduled pickup so it is not left sitting overnight.3. Sign up for USPS Informed Delivery: Stay ahead by signing up for USPS Informed Delivery. You will receive digital previews of incoming mail so you can monitor for any missing items early. Learn more about why it's important here.4. Monitor your bank accounts: Set up real-time alerts for check clearing and review your statements weekly to catch any suspicious activity. Also, ask your bank about any other fraud-prevention tools they offer to protect your accounts.5. Switch to digital payments when possible: Use your bank’s mobile app to deposit checks without mailing or physically delivering them, reducing the risk of theft or tampering.6. Use checks with built-in security features: Choose checks printed on paper with watermarks, chemical-sensitive coatings or other security features that make check washing much harder.7. Limit the information on checks: Avoid unnecessary personal details. Do not print your Social Security number, driver’s license number or phone number on your checks. The less information available, the less a fraudster can use.HOW CYBERSCAMS ARE DRAINING AMERICANS WALLETS BY THE BILLIONS8. Store checks securely: Keep blank checks in a safe place. Store your checkbook in a locked drawer or safe, not in your purse, car or an easily accessible location at home.9. Check your mailbox security: Install a locking mailbox. If possible, use a mailbox with a lock to prevent thieves from stealing outgoing or incoming mail.10. Be cautious with endorsements: When endorsing checks, write "For Deposit Only" along with your account number to prevent others from cashing the check.11. Enroll in identity theft protection with check fraud specialization: Choose services that specifically monitor for compromised check details on dark web marketplaces and alert you to suspicious check-cashing patterns. Identity theft protection services monitor your personal data across the dark web and public databases, alert you to suspicious activity and assist you in locking down your accounts if needed. See my tips and best picks on how to protect yourself from identity theft.12. Invest in personal data removal services: Minimize exposure of sensitive details (like addresses or banking affiliations) that fraudsters could exploit for check-washing scams. Removing your personal information from these sites can help reduce your risk of becoming a victim. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 13. Shred sensitive documents: Shred old checks and bank statements. Don’t just throw them away. Shred any documents with sensitive banking information.14. Report suspicious activity immediately: If you suspect check fraud or missing mail, report it to your bank and the U.S. Postal Inspection Service right away.15. Use Positive Pay if you are a business: Positive Pay is a fraud prevention service offered by most banks to business customers. It works by matching the checks you issue with the ones presented for payment. If something doesn’t add up, like a changed amount or payee, the bank flags it for your review before it’s processed. You usually need to sign up through your bank, and there might be a fee, but it’s a smart way to protect your business from check fraud, especially if you write a lot of checks.What to do if you are a victimIf you think you have been targeted by check fraud:Report it to your bank immediately and freeze your account if necessary.Contact the USPS Postal Inspection Service to report stolen mail.File a complaint with the Better Business Bureau (BBB) or at IdentityTheft.gov.Time matters. The faster you act, the better your chances of recovering lost funds.Kurt’s key takeawaysCheck washing fraud is growing rapidly, and criminals are becoming more organized and sophisticated. Simple habits like using gel pens, securing your mail and monitoring your financial accounts closely can make a big difference. Services like USPS Informed Delivery, Positive Pay for businesses and personal data removal tools provide added layers of protection. Identity theft protection services can also offer critical support if you ever become a victim of check fraud.CLICK HERE TO GET THE FOX NEWS APPHave you or someone you know experienced check fraud? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri