• Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • How addresses are collected and put on people finder sites

    Published
    June 14, 2025 10:00am EDT close Top lawmaker on cybersecurity panel talks threats to US agriculture Senate Armed Services Committee member Mike Rounds, R-S.D., speaks to Fox News Digital NEWYou can now listen to Fox News articles!
    Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online.How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online.How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online.What are the risks of having your address on people finder sites?The Federal Trade Commissionadvises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #how #addresses #are #collected #put
    How addresses are collected and put on people finder sites
    Published June 14, 2025 10:00am EDT close Top lawmaker on cybersecurity panel talks threats to US agriculture Senate Armed Services Committee member Mike Rounds, R-S.D., speaks to Fox News Digital NEWYou can now listen to Fox News articles! Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online.How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online.How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online.What are the risks of having your address on people finder sites?The Federal Trade Commissionadvises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #how #addresses #are #collected #put
    WWW.FOXNEWS.COM
    How addresses are collected and put on people finder sites
    Published June 14, 2025 10:00am EDT close Top lawmaker on cybersecurity panel talks threats to US agriculture Senate Armed Services Committee member Mike Rounds, R-S.D., speaks to Fox News Digital NEWYou can now listen to Fox News articles! Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online. (Kurt "CyberGuy" Knutsson)How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online. (Kurt "CyberGuy" Knutsson)How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online. (Kurt "CyberGuy" Knutsson)What are the risks of having your address on people finder sites?The Federal Trade Commission (FTC) advises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Star Trek: Strange New Worlds’ third season falls short of its second

    This is a spoiler-free preview of the first five episodes of season three.
    Star Trek: Strange New Worlds ended its second season with arguably the single strongest run of any streaming-era Trek. The show was made with such confidence in all departments that if there were flaws, you weren’t interested in looking for them. Since then, it’s gone from being the best modern Trek, to being the only modern Trek. Unfortunately, at the moment it needs to be the standard bearer for the show, it’s become noticeably weaker and less consistent. 
    As usual, I’ve seen the first five episodes, but can’t reveal specifics about what I’ve seen. I can say plenty of the things that made Strange New Worlds the best modern-day live-action Trek remain in place. It’s a show that’s happy for you to spend time with its characters as they hang out, and almost all of them are deeply charming. This is, after all, a show that uses as motif the image of the crew in Pike’s quarters as the captain cooks for his crew.
    Its format, with standalone adventures blended with serialized character drama, means it can offer something new every week. Think back to the first season, when “Memento Mori,” a tense action thriller with the Gorn, was immediately followed by “Spock Amock,” a goofy, starbase-set body-swap romantic comedy of manners centered around Spock. Strange New Worlds is the first Trek in a long while to realize audiences don’t just want a ceaseless slog of stern-faced, angry grimdark. And if they want that, they can go watch Picard and Section 31.
    Marni Grossman/Paramount+
    But, as much as those things are SNW’s greatest strength, it’s a delicate balance to ensure the series doesn’t lurch too far either way. And, it pains me to say this, the show spends the first five episodes of its third season going too far in both directions. No specifics, but one episode I’m sure was on the same writers room whiteboard wishlist as last season’s musical episode. What was clearly intended as a chance for everyone to get out of their usual roles and have fun falls flat. Because the episode can never get past the sense it’s too delighted in its own silliness to properly function.
    Marni Grossman/Paramount+
    At the other end of the scale, we get sprints toward the eye-gouging grimdark that blighted those other series. Sure, the series has gone to dark places before, but previously with more of a sense of deftness, rather than just going for the viscerally-upsetting gore. A cynic might suggest that, as Paramount’s other Trek projects ended, franchise-overseer Alex Kurtzman — who has pushed the franchise into “grittier” territory whenever he can — had more time to spend in the SNW writers’ room.
    Much as I’ve enjoyed the series’ soapier elements, the continuing plotlines take up an ever bigger part of each episode’s runtime so far. Consequently, the story of the week gets less service, making them feel weaker and less coherent. One episode pivots two thirds of the way in to act as a low-key sequel to an episode from season two. But since we’ve only got ten minutes left, it feels thrown in as an afterthought, or to resolve a thread the creative team felt they were obliged to deal with.
    In fact, this and the recently-finished run of Doctor Who suffered from the same problem that blights so many streaming-era shows, which is the limited episode order. Rather than producing TV on the scale broadcast networks were able to — yearly runs of 22-, 24- or 26 episodes, a lot ofgenre shows get less than half that. The result is that each episode has to be More Important Than The Last One in a way that’s exhausting for a viewer.
    But Strange New Worlds can’t solve all the economic issues with the streaming model on its own. My hope is that, much like in its first season, the weaker episodes are all in its front half to soften us up for the moments of quality that followed toward its conclusion.
    ASIDE: Shortly before publication, Paramount announced Strange New Worlds would end in its fifth season, which would be cut from ten episodes to six. It's not surprising — given the equally-brilliant Lower Decks was also axed after passing the same milestone — but it is disappointing. My only hope is that the series doesn't spend that final run awkwardly killing off the series' young ensemble one by one in order to replace them with the entire original series' roster as to make it "line up." Please, let them be their own things. This article originally appeared on Engadget at
    #star #trek #strange #new #worlds
    Star Trek: Strange New Worlds’ third season falls short of its second
    This is a spoiler-free preview of the first five episodes of season three. Star Trek: Strange New Worlds ended its second season with arguably the single strongest run of any streaming-era Trek. The show was made with such confidence in all departments that if there were flaws, you weren’t interested in looking for them. Since then, it’s gone from being the best modern Trek, to being the only modern Trek. Unfortunately, at the moment it needs to be the standard bearer for the show, it’s become noticeably weaker and less consistent.  As usual, I’ve seen the first five episodes, but can’t reveal specifics about what I’ve seen. I can say plenty of the things that made Strange New Worlds the best modern-day live-action Trek remain in place. It’s a show that’s happy for you to spend time with its characters as they hang out, and almost all of them are deeply charming. This is, after all, a show that uses as motif the image of the crew in Pike’s quarters as the captain cooks for his crew. Its format, with standalone adventures blended with serialized character drama, means it can offer something new every week. Think back to the first season, when “Memento Mori,” a tense action thriller with the Gorn, was immediately followed by “Spock Amock,” a goofy, starbase-set body-swap romantic comedy of manners centered around Spock. Strange New Worlds is the first Trek in a long while to realize audiences don’t just want a ceaseless slog of stern-faced, angry grimdark. And if they want that, they can go watch Picard and Section 31. Marni Grossman/Paramount+ But, as much as those things are SNW’s greatest strength, it’s a delicate balance to ensure the series doesn’t lurch too far either way. And, it pains me to say this, the show spends the first five episodes of its third season going too far in both directions. No specifics, but one episode I’m sure was on the same writers room whiteboard wishlist as last season’s musical episode. What was clearly intended as a chance for everyone to get out of their usual roles and have fun falls flat. Because the episode can never get past the sense it’s too delighted in its own silliness to properly function. Marni Grossman/Paramount+ At the other end of the scale, we get sprints toward the eye-gouging grimdark that blighted those other series. Sure, the series has gone to dark places before, but previously with more of a sense of deftness, rather than just going for the viscerally-upsetting gore. A cynic might suggest that, as Paramount’s other Trek projects ended, franchise-overseer Alex Kurtzman — who has pushed the franchise into “grittier” territory whenever he can — had more time to spend in the SNW writers’ room. Much as I’ve enjoyed the series’ soapier elements, the continuing plotlines take up an ever bigger part of each episode’s runtime so far. Consequently, the story of the week gets less service, making them feel weaker and less coherent. One episode pivots two thirds of the way in to act as a low-key sequel to an episode from season two. But since we’ve only got ten minutes left, it feels thrown in as an afterthought, or to resolve a thread the creative team felt they were obliged to deal with. In fact, this and the recently-finished run of Doctor Who suffered from the same problem that blights so many streaming-era shows, which is the limited episode order. Rather than producing TV on the scale broadcast networks were able to — yearly runs of 22-, 24- or 26 episodes, a lot ofgenre shows get less than half that. The result is that each episode has to be More Important Than The Last One in a way that’s exhausting for a viewer. But Strange New Worlds can’t solve all the economic issues with the streaming model on its own. My hope is that, much like in its first season, the weaker episodes are all in its front half to soften us up for the moments of quality that followed toward its conclusion. ASIDE: Shortly before publication, Paramount announced Strange New Worlds would end in its fifth season, which would be cut from ten episodes to six. It's not surprising — given the equally-brilliant Lower Decks was also axed after passing the same milestone — but it is disappointing. My only hope is that the series doesn't spend that final run awkwardly killing off the series' young ensemble one by one in order to replace them with the entire original series' roster as to make it "line up." Please, let them be their own things. This article originally appeared on Engadget at #star #trek #strange #new #worlds
    WWW.ENGADGET.COM
    Star Trek: Strange New Worlds’ third season falls short of its second
    This is a spoiler-free preview of the first five episodes of season three. Star Trek: Strange New Worlds ended its second season with arguably the single strongest run of any streaming-era Trek. The show was made with such confidence in all departments that if there were flaws, you weren’t interested in looking for them. Since then, it’s gone from being the best modern Trek, to being the only modern Trek. Unfortunately, at the moment it needs to be the standard bearer for the show, it’s become noticeably weaker and less consistent.  As usual, I’ve seen the first five episodes, but can’t reveal specifics about what I’ve seen. I can say plenty of the things that made Strange New Worlds the best modern-day live-action Trek remain in place. It’s a show that’s happy for you to spend time with its characters as they hang out, and almost all of them are deeply charming. This is, after all, a show that uses as motif the image of the crew in Pike’s quarters as the captain cooks for his crew. Its format, with standalone adventures blended with serialized character drama, means it can offer something new every week. Think back to the first season, when “Memento Mori,” a tense action thriller with the Gorn, was immediately followed by “Spock Amock,” a goofy, starbase-set body-swap romantic comedy of manners centered around Spock. Strange New Worlds is the first Trek in a long while to realize audiences don’t just want a ceaseless slog of stern-faced, angry grimdark. And if they want that, they can go watch Picard and Section 31. Marni Grossman/Paramount+ But, as much as those things are SNW’s greatest strength, it’s a delicate balance to ensure the series doesn’t lurch too far either way. And, it pains me to say this, the show spends the first five episodes of its third season going too far in both directions (although, mercifully, not at the same time). No specifics, but one episode I’m sure was on the same writers room whiteboard wishlist as last season’s musical episode. What was clearly intended as a chance for everyone to get out of their usual roles and have fun falls flat. Because the episode can never get past the sense it’s too delighted in its own silliness to properly function. Marni Grossman/Paramount+ At the other end of the scale, we get sprints toward the eye-gouging grimdark that blighted those other series. Sure, the series has gone to dark places before, but previously with more of a sense of deftness, rather than just going for the viscerally-upsetting gore. A cynic might suggest that, as Paramount’s other Trek projects ended, franchise-overseer Alex Kurtzman — who has pushed the franchise into “grittier” territory whenever he can — had more time to spend in the SNW writers’ room. Much as I’ve enjoyed the series’ soapier elements, the continuing plotlines take up an ever bigger part of each episode’s runtime so far. Consequently, the story of the week gets less service, making them feel weaker and less coherent. One episode pivots two thirds of the way in to act as a low-key sequel to an episode from season two. But since we’ve only got ten minutes left, it feels thrown in as an afterthought, or to resolve a thread the creative team felt they were obliged to deal with (they didn’t). In fact, this and the recently-finished run of Doctor Who suffered from the same problem that blights so many streaming-era shows, which is the limited episode order. Rather than producing TV on the scale broadcast networks were able to — yearly runs of 22-, 24- or 26 episodes, a lot of (expensive) genre shows get less than half that. The result is that each episode has to be More Important Than The Last One in a way that’s exhausting for a viewer. But Strange New Worlds can’t solve all the economic issues with the streaming model on its own. My hope is that, much like in its first season, the weaker episodes are all in its front half to soften us up for the moments of quality that followed toward its conclusion. ASIDE: Shortly before publication, Paramount announced Strange New Worlds would end in its fifth season, which would be cut from ten episodes to six. It's not surprising — given the equally-brilliant Lower Decks was also axed after passing the same milestone — but it is disappointing. My only hope is that the series doesn't spend that final run awkwardly killing off the series' young ensemble one by one in order to replace them with the entire original series' roster as to make it "line up." Please, let them be their own things. This article originally appeared on Engadget at https://www.engadget.com/entertainment/tv-movies/star-trek-strange-new-worlds-third-season-falls-short-of-its-second-020030139.html?src=rss
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Massive DMV phishing scam tricks drivers with fake texts

    Published
    June 7, 2025 10:00am EDT close Tennessee DMV experiencing long lines ahead of REAL ID deadline May 7 is the deadline to get a REAL ID, and some DMVs are facing large crowds and major backup. FOX's Asher Reed spoke with FOX 35 Orlando from outside a DMV in Antioch, Tennessee, with more on the issue. NEWYou can now listen to Fox News articles!
    If you've received a text message claiming to be from your state's Department of Motor Vehiclesand threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. DMV scam text.How the DMV scam text message worksThese scam messages vary slightly depending on the state you're in, but they’re generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEPro tip: If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. A person receiving a scam text message on their phone.Why DMV text scams are so convincingThe scam relies on two key elements to be effective: fear and a sense of urgency. These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: DMV scam text.States known to have issued warnings about DMV scam texts:ConnecticutPennsylvaniaGeorgiaFloridaNew YorkCaliforniaIllinoisNew JerseyVirginiaColoradoVermontTexasNorth CarolinaWashington, D.C.Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.How to spot and avoid DMV text message scamsIf you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself:1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag.2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website.3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text.5. Consider a Personal Data Removal Service: Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to block phone numbers and texts that send spam or scam messages, reducing future risk.7. Register your number with the National Do Not Call Registry: While this won't stop all scams, it can help reduce unwanted communications.8. Don't provide any personal or financial information: Never share your Social Security number, driver's license number, banking information, or passwords in response to an unsolicited text.9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage.10. Keep your phone's security features updated: Ensure your device's operating system and security software are current to help block known scam numbers and malicious links.11. Report the scam: Forward the message to 7726to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at ic3.gov.Kurt’s key takeawaysScam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.CLICK HERE TO GET THE FOX NEWS APPShould tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #massive #dmv #phishing #scam #tricks
    Massive DMV phishing scam tricks drivers with fake texts
    Published June 7, 2025 10:00am EDT close Tennessee DMV experiencing long lines ahead of REAL ID deadline May 7 is the deadline to get a REAL ID, and some DMVs are facing large crowds and major backup. FOX's Asher Reed spoke with FOX 35 Orlando from outside a DMV in Antioch, Tennessee, with more on the issue. NEWYou can now listen to Fox News articles! If you've received a text message claiming to be from your state's Department of Motor Vehiclesand threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. DMV scam text.How the DMV scam text message worksThese scam messages vary slightly depending on the state you're in, but they’re generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEPro tip: If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. A person receiving a scam text message on their phone.Why DMV text scams are so convincingThe scam relies on two key elements to be effective: fear and a sense of urgency. These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: DMV scam text.States known to have issued warnings about DMV scam texts:ConnecticutPennsylvaniaGeorgiaFloridaNew YorkCaliforniaIllinoisNew JerseyVirginiaColoradoVermontTexasNorth CarolinaWashington, D.C.Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.How to spot and avoid DMV text message scamsIf you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself:1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag.2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website.3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text.5. Consider a Personal Data Removal Service: Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to block phone numbers and texts that send spam or scam messages, reducing future risk.7. Register your number with the National Do Not Call Registry: While this won't stop all scams, it can help reduce unwanted communications.8. Don't provide any personal or financial information: Never share your Social Security number, driver's license number, banking information, or passwords in response to an unsolicited text.9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage.10. Keep your phone's security features updated: Ensure your device's operating system and security software are current to help block known scam numbers and malicious links.11. Report the scam: Forward the message to 7726to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at ic3.gov.Kurt’s key takeawaysScam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.CLICK HERE TO GET THE FOX NEWS APPShould tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #massive #dmv #phishing #scam #tricks
    WWW.FOXNEWS.COM
    Massive DMV phishing scam tricks drivers with fake texts
    Published June 7, 2025 10:00am EDT close Tennessee DMV experiencing long lines ahead of REAL ID deadline May 7 is the deadline to get a REAL ID, and some DMVs are facing large crowds and major backup. FOX's Asher Reed spoke with FOX 35 Orlando from outside a DMV in Antioch, Tennessee, with more on the issue. NEWYou can now listen to Fox News articles! If you've received a text message claiming to be from your state's Department of Motor Vehicles (DMV) and threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. DMV scam text. (Kurt "CyberGuy" Knutsson)How the DMV scam text message worksThese scam messages vary slightly depending on the state you're in, but they’re generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEPro tip: If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. A person receiving a scam text message on their phone. (Kurt "CyberGuy" Knutsson)Why DMV text scams are so convincingThe scam relies on two key elements to be effective: fear and a sense of urgency. These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: DMV scam text. (Kurt "CyberGuy" Knutsson)States known to have issued warnings about DMV scam texts (as of June 2025):ConnecticutPennsylvaniaGeorgiaFloridaNew YorkCaliforniaIllinoisNew JerseyVirginiaColoradoVermontTexasNorth CarolinaWashington, D.C.Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.How to spot and avoid DMV text message scamsIf you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself:1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag.2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website.3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text.5. Consider a Personal Data Removal Service: Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to block phone numbers and texts that send spam or scam messages, reducing future risk.7. Register your number with the National Do Not Call Registry: While this won't stop all scams, it can help reduce unwanted communications.8. Don't provide any personal or financial information: Never share your Social Security number, driver's license number, banking information, or passwords in response to an unsolicited text.9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage.10. Keep your phone's security features updated: Ensure your device's operating system and security software are current to help block known scam numbers and malicious links.11. Report the scam: Forward the message to 7726 (SPAM) to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at ic3.gov.Kurt’s key takeawaysScam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.CLICK HERE TO GET THE FOX NEWS APPShould tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    601
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Major data broker hack impacts 364,000 individuals’ data

    Published
    June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles!
    Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at workLexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptopWhy the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers. You might switch to a more private search enginethat doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups. Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #major #data #broker #hack #impacts
    Major data broker hack impacts 364,000 individuals’ data
    Published June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles! Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at workLexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptopWhy the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers. You might switch to a more private search enginethat doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups. Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #major #data #broker #hack #impacts
    WWW.FOXNEWS.COM
    Major data broker hack impacts 364,000 individuals’ data
    Published June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles! Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at work (Kurt "CyberGuy" Knutsson)LexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptop (Kurt "CyberGuy" Knutsson)Why the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work (Kurt "CyberGuy" Knutsson)7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers (such as uBlock Origin or Privacy Badger). You might switch to a more private search engine (like DuckDuckGo or Brave) that doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups (so marketing emails don’t go to your main inbox). Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    369
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • AI robots help nurses beat burnout and transform hospital care

    Tech AI robots help nurses beat burnout and transform hospital care Hospitals using AI-powered robots to support nurses, redefine patient care
    Published
    June 4, 2025 6:00am EDT close AI robots help nurses beat burnout and transform hospital care Artificial intelligence and robotics may help with nursing shortage. NEWYou can now listen to Fox News articles!
    The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. AI-powered NurabotNurabot: The AI nursing robot changing patient careNurabot, a collaborative nursing robot developed by Foxconn and Kawasaki Heavy Industries with Nvidia's AI technology, is designed to take on some of the most physically demanding and repetitive tasks in clinical care. These include delivering medications, transporting samples, patrolling wards and guiding visitors through hospital corridors. By handling these responsibilities, Nurabot allows nurses to focus on more meaningful aspects of patient care and helps reduce the physical fatigue that often leads to burnout. AI-powered NurabotUsing AI to build the hospitals of the futureFoxconn's approach to smart hospitals goes beyond deploying robots. The company has developed a suite of digital tools using Nvidia platforms, including AI models that monitor patient vitals and digital twins that simulate hospital environments for planning and training purposes.The process starts in the data center, where large AI models are trained on Nvidia supercomputers. Hospitals then use digital twins to test and train robots in virtual settings before deploying them in real-world scenarios, ensuring that these systems are both safe and effective.ARTIFICIAL INTELLIGENCE TRANSFORMS PATIENT CARE AND REDUCES BURNOUT, PHYSICIAN SAYS AI-powered NurabotAI robots in real hospitals: Results from Taiwan's Healthcare SystemTaichung Veterans General Hospital, along with other top hospitals in Taiwan, is at the forefront of this digital transformation. TCVGH has built digital twins of its wards and nursing stations, providing a virtual training ground for Nurabot before it is introduced to real hospital floors. According to Shu-Fang Liu, deputy director of the nursing department at TCVGH, robots like Nurabot are augmenting the capabilities of healthcare staff, enabling them to deliver more focused and meaningful care to patients. AI-powered NurabotWays Nurabot reduces nurse burnout and boosts efficiencyNurabot is already making a difference in daily hospital operations. The robot handles medicine deliveries, ward patrols and visitor guidance, which Foxconn estimates can reduce nurse workloads by up to 30%. In one ward, Nurabot delivers wound care kits and educational materials directly to patient bedsides, saving nurses multiple trips to supply rooms and allowing them to dedicate more time to their patients. The robot is also especially helpful during visiting hours and night shifts, when staffing levels are typically lower.Nurses hope future versions of Nurabot will be able to converse with patients in multiple languages, recognize faces for personalized interactions and even assist with lifting patients when needed. For example, a lung patient who needs two nurses to sit up for breathing exercises might only require one nurse with Nurabot's help, freeing the other to care for other patients. AI-powered NurabotKurt's key takeawaysWhen it comes to addressing the nursing shortage, Taiwan is demonstrating that AI and robotics can make a significant difference in hospitals. Instead of spending their shifts running errands or handling repetitive tasks, nurses now have robots like Nurabot to lend a hand. This means nurses can focus their energy on what matters most – caring for patients – while robots handle tasks such as delivering medication or guiding visitors around the hospital.It's a team effort between people and technology, and it's already helping healthcare staff provide better care for everyone.CLICK HERE TO GET THE FOX NEWS APPHow would you feel if a robot, not a human, delivered your medication during a hospital stay? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #robots #help #nurses #beat #burnout
    AI robots help nurses beat burnout and transform hospital care
    Tech AI robots help nurses beat burnout and transform hospital care Hospitals using AI-powered robots to support nurses, redefine patient care Published June 4, 2025 6:00am EDT close AI robots help nurses beat burnout and transform hospital care Artificial intelligence and robotics may help with nursing shortage. NEWYou can now listen to Fox News articles! The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. AI-powered NurabotNurabot: The AI nursing robot changing patient careNurabot, a collaborative nursing robot developed by Foxconn and Kawasaki Heavy Industries with Nvidia's AI technology, is designed to take on some of the most physically demanding and repetitive tasks in clinical care. These include delivering medications, transporting samples, patrolling wards and guiding visitors through hospital corridors. By handling these responsibilities, Nurabot allows nurses to focus on more meaningful aspects of patient care and helps reduce the physical fatigue that often leads to burnout. AI-powered NurabotUsing AI to build the hospitals of the futureFoxconn's approach to smart hospitals goes beyond deploying robots. The company has developed a suite of digital tools using Nvidia platforms, including AI models that monitor patient vitals and digital twins that simulate hospital environments for planning and training purposes.The process starts in the data center, where large AI models are trained on Nvidia supercomputers. Hospitals then use digital twins to test and train robots in virtual settings before deploying them in real-world scenarios, ensuring that these systems are both safe and effective.ARTIFICIAL INTELLIGENCE TRANSFORMS PATIENT CARE AND REDUCES BURNOUT, PHYSICIAN SAYS AI-powered NurabotAI robots in real hospitals: Results from Taiwan's Healthcare SystemTaichung Veterans General Hospital, along with other top hospitals in Taiwan, is at the forefront of this digital transformation. TCVGH has built digital twins of its wards and nursing stations, providing a virtual training ground for Nurabot before it is introduced to real hospital floors. According to Shu-Fang Liu, deputy director of the nursing department at TCVGH, robots like Nurabot are augmenting the capabilities of healthcare staff, enabling them to deliver more focused and meaningful care to patients. AI-powered NurabotWays Nurabot reduces nurse burnout and boosts efficiencyNurabot is already making a difference in daily hospital operations. The robot handles medicine deliveries, ward patrols and visitor guidance, which Foxconn estimates can reduce nurse workloads by up to 30%. In one ward, Nurabot delivers wound care kits and educational materials directly to patient bedsides, saving nurses multiple trips to supply rooms and allowing them to dedicate more time to their patients. The robot is also especially helpful during visiting hours and night shifts, when staffing levels are typically lower.Nurses hope future versions of Nurabot will be able to converse with patients in multiple languages, recognize faces for personalized interactions and even assist with lifting patients when needed. For example, a lung patient who needs two nurses to sit up for breathing exercises might only require one nurse with Nurabot's help, freeing the other to care for other patients. AI-powered NurabotKurt's key takeawaysWhen it comes to addressing the nursing shortage, Taiwan is demonstrating that AI and robotics can make a significant difference in hospitals. Instead of spending their shifts running errands or handling repetitive tasks, nurses now have robots like Nurabot to lend a hand. This means nurses can focus their energy on what matters most – caring for patients – while robots handle tasks such as delivering medication or guiding visitors around the hospital.It's a team effort between people and technology, and it's already helping healthcare staff provide better care for everyone.CLICK HERE TO GET THE FOX NEWS APPHow would you feel if a robot, not a human, delivered your medication during a hospital stay? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #robots #help #nurses #beat #burnout
    WWW.FOXNEWS.COM
    AI robots help nurses beat burnout and transform hospital care
    Tech AI robots help nurses beat burnout and transform hospital care Hospitals using AI-powered robots to support nurses, redefine patient care Published June 4, 2025 6:00am EDT close AI robots help nurses beat burnout and transform hospital care Artificial intelligence and robotics may help with nursing shortage. NEWYou can now listen to Fox News articles! The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. AI-powered Nurabot (Nvidia)Nurabot: The AI nursing robot changing patient careNurabot, a collaborative nursing robot developed by Foxconn and Kawasaki Heavy Industries with Nvidia's AI technology, is designed to take on some of the most physically demanding and repetitive tasks in clinical care. These include delivering medications, transporting samples, patrolling wards and guiding visitors through hospital corridors. By handling these responsibilities, Nurabot allows nurses to focus on more meaningful aspects of patient care and helps reduce the physical fatigue that often leads to burnout. AI-powered Nurabot (Nvidia)Using AI to build the hospitals of the futureFoxconn's approach to smart hospitals goes beyond deploying robots. The company has developed a suite of digital tools using Nvidia platforms, including AI models that monitor patient vitals and digital twins that simulate hospital environments for planning and training purposes.The process starts in the data center, where large AI models are trained on Nvidia supercomputers. Hospitals then use digital twins to test and train robots in virtual settings before deploying them in real-world scenarios, ensuring that these systems are both safe and effective.ARTIFICIAL INTELLIGENCE TRANSFORMS PATIENT CARE AND REDUCES BURNOUT, PHYSICIAN SAYS AI-powered Nurabot (Nvidia)AI robots in real hospitals: Results from Taiwan's Healthcare SystemTaichung Veterans General Hospital (TCVGH), along with other top hospitals in Taiwan, is at the forefront of this digital transformation. TCVGH has built digital twins of its wards and nursing stations, providing a virtual training ground for Nurabot before it is introduced to real hospital floors. According to Shu-Fang Liu, deputy director of the nursing department at TCVGH, robots like Nurabot are augmenting the capabilities of healthcare staff, enabling them to deliver more focused and meaningful care to patients. AI-powered Nurabot (Nvidia)Ways Nurabot reduces nurse burnout and boosts efficiencyNurabot is already making a difference in daily hospital operations. The robot handles medicine deliveries, ward patrols and visitor guidance, which Foxconn estimates can reduce nurse workloads by up to 30%. In one ward, Nurabot delivers wound care kits and educational materials directly to patient bedsides, saving nurses multiple trips to supply rooms and allowing them to dedicate more time to their patients. The robot is also especially helpful during visiting hours and night shifts, when staffing levels are typically lower.Nurses hope future versions of Nurabot will be able to converse with patients in multiple languages, recognize faces for personalized interactions and even assist with lifting patients when needed. For example, a lung patient who needs two nurses to sit up for breathing exercises might only require one nurse with Nurabot's help, freeing the other to care for other patients. AI-powered Nurabot (Nvidia)Kurt's key takeawaysWhen it comes to addressing the nursing shortage, Taiwan is demonstrating that AI and robotics can make a significant difference in hospitals. Instead of spending their shifts running errands or handling repetitive tasks, nurses now have robots like Nurabot to lend a hand. This means nurses can focus their energy on what matters most – caring for patients – while robots handle tasks such as delivering medication or guiding visitors around the hospital.It's a team effort between people and technology, and it's already helping healthcare staff provide better care for everyone.CLICK HERE TO GET THE FOX NEWS APPHow would you feel if a robot, not a human, delivered your medication during a hospital stay? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    251
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Adidas data breach reveals customer info in vendor attack

    Published
    June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles!
    Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #adidas #data #breach #reveals #customer
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #adidas #data #breach #reveals #customer
    WWW.FOXNEWS.COM
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at work (Kurt "CyberGuy" Knutsson)Adidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas sign (Kurt "CyberGuy" Knutsson)What Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harm (such as identity theft or fraud) being caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at https://www.adidas.com/us/helpWe apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe (Kurt "CyberGuy" Knutsson)6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    216
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Spot fake online stores, avoid Facebook subscription scams

    Published
    June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles!
    Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping onlineWhat you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake productsThe scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #spot #fake #online #stores #avoid
    Spot fake online stores, avoid Facebook subscription scams
    Published June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles! Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping onlineWhat you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake productsThe scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #spot #fake #online #stores #avoid
    WWW.FOXNEWS.COM
    Spot fake online stores, avoid Facebook subscription scams
    Published June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles! Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping online (Kurt "CyberGuy" Knutsson)What you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake products (Bitdefender) (Kurt "CyberGuy" Knutsson)The scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online (Kurt "CyberGuy" Knutsson)10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Flying motorcycle zooms at 124 mph without touching the ground

    Tech Flying motorcycle zooms at 124 mph without touching the ground A jet-powered flying bike that combines speed, agility, and futuristic design
    Published
    June 1, 2025 6:00am EDT close Flying motorcycle zooms at 124 mph without touching the ground Soar above traffc in the air with ease. Imagine gliding through city traffic, not stuck in traffic jams on the road, but soaring above them in the air with ease. The Volonaut Airbike, a jet-powered flying bike developed by Polish entrepreneur Tomasz Patan, is turning this vision into reality. With a top speed of 124 mph and a frame that is seven times lighter than a typical motorcycle, this innovative vehicle could change the way we get around in cities, making travel faster and easier. Jet-powered flying bike Jet power and featherweight designUnlike many personal flying devices that depend on large, noisy propellers, the Volonaut Airbike uses a jet propulsion system. While the exact technical details have not been disclosed, the Airbike's design emphasizes extreme lightness and agility.CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHTExtensive use of carbon fiber and 3D-printed parts allows the vehicle to weigh just 86 pounds without a rider. This is approximately seven times lighter than an average motorcycle, which typically weighs around 600 pounds. This featherweight construction makes the Airbike nimble and efficient in the air. Jet-powered flying bike Performance and featuresThe Volonaut Airbike can reach speeds of up to 124 miles per hour, making it faster than most motorcycles in traffic. It features a proprietary stabilization system enhanced by a flight computer, which automatically maintains hover and provides ease of control for the rider. This technology allows even those with limited flying experience to handle the bike safely and confidently. The Airbike's open, roofless design offers the rider an unobstructed 360-degree view, creating a sense of complete freedom and immersion in the flying experience. Additionally, the absence of spinning propellers means the Airbike can navigate through tight spaces with greater ease and safety. Jet-powered flying bike A real-life flying bike inspired by imaginationThe Volonaut Airbike's sleek, futuristic silhouette and compact size evoke the image of a flying motorcycle that many have dreamed about for years. Its design and performance bring to life a concept often seen in movies and stories about the future of transportation. Volonaut's promotional videos even feature a rider dressed as a Stormtrooper, highlighting the bike's resemblance to the flying vehicles of popular culture. This playful nod underscores the Airbike's blend of cutting-edge technology and imaginative design. Jet-powered flying bike Meet the inventor: Tomasz PatanTomasz Patan is a visionary engineer with a talent for creating groundbreaking airborne vehicles. He is best known for the Jetson One, a quad-rotor electric vertical take-off and landingdrone that can carry a human pilot. Building on the success of that project, Patan has now introduced the Volonaut Airbike, a smaller, more agile flying machine that relies on jet propulsion rather than propellers. His work continues to push the boundaries of what personal flight can achieve. Jet-powered flying bike What about the cost?When it comes to price, the Volonaut Airbike is still something of a mystery. Patan has not yet revealed an official cost, but if you look at his previous project, the Jetson One drone, which was priced at around you can get a rough idea of where the Airbike might land. Given the advanced materials, jet propulsion and sophisticated flight computer involved, it's safe to assume this won't be a budget-friendly ride. However, as with most new technologies, prices often come down over time as production scales up and designs are refined. So, while it might start out as a high-end gadget for early adopters and enthusiasts, there's hope that flying bikes like this could become more accessible in the years ahead.WHAT IS ARTIFICIAL INTELLIGENCE? Jet-powered flying bike What lies ahead for the Volonaut Airbike?Although the Volonaut Airbike has already been demonstrated in flight, many details remain undisclosed. Patan has not yet revealed the exact propulsion technology, pricing or release date, but he has expressed optimism the Airbike will be available to the public in the near future. As development continues, this flying motorcycle could soon become a practical option for urban commuters seeking a faster, more flexible way to travel. Jet-powered flying bike Kurt's key takeawaysHonestly, the Volonaut Airbike feels like something we've all dreamed about but never thought we'd actually see. It's exciting to watch this blend of bold engineering and creative design come to life, making personal flight more real than ever before. Sure, it might be a bit pricey at first, but who knows? Maybe in a few years, zipping through the skies on a flying bike will be just as normal as hopping on a motorcycle today.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable trading your motorcycle for a flying bike that soars above city traffic? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #flying #motorcycle #zooms #mph #without
    Flying motorcycle zooms at 124 mph without touching the ground
    Tech Flying motorcycle zooms at 124 mph without touching the ground A jet-powered flying bike that combines speed, agility, and futuristic design Published June 1, 2025 6:00am EDT close Flying motorcycle zooms at 124 mph without touching the ground Soar above traffc in the air with ease. Imagine gliding through city traffic, not stuck in traffic jams on the road, but soaring above them in the air with ease. The Volonaut Airbike, a jet-powered flying bike developed by Polish entrepreneur Tomasz Patan, is turning this vision into reality. With a top speed of 124 mph and a frame that is seven times lighter than a typical motorcycle, this innovative vehicle could change the way we get around in cities, making travel faster and easier. Jet-powered flying bike Jet power and featherweight designUnlike many personal flying devices that depend on large, noisy propellers, the Volonaut Airbike uses a jet propulsion system. While the exact technical details have not been disclosed, the Airbike's design emphasizes extreme lightness and agility.CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHTExtensive use of carbon fiber and 3D-printed parts allows the vehicle to weigh just 86 pounds without a rider. This is approximately seven times lighter than an average motorcycle, which typically weighs around 600 pounds. This featherweight construction makes the Airbike nimble and efficient in the air. Jet-powered flying bike Performance and featuresThe Volonaut Airbike can reach speeds of up to 124 miles per hour, making it faster than most motorcycles in traffic. It features a proprietary stabilization system enhanced by a flight computer, which automatically maintains hover and provides ease of control for the rider. This technology allows even those with limited flying experience to handle the bike safely and confidently. The Airbike's open, roofless design offers the rider an unobstructed 360-degree view, creating a sense of complete freedom and immersion in the flying experience. Additionally, the absence of spinning propellers means the Airbike can navigate through tight spaces with greater ease and safety. Jet-powered flying bike A real-life flying bike inspired by imaginationThe Volonaut Airbike's sleek, futuristic silhouette and compact size evoke the image of a flying motorcycle that many have dreamed about for years. Its design and performance bring to life a concept often seen in movies and stories about the future of transportation. Volonaut's promotional videos even feature a rider dressed as a Stormtrooper, highlighting the bike's resemblance to the flying vehicles of popular culture. This playful nod underscores the Airbike's blend of cutting-edge technology and imaginative design. Jet-powered flying bike Meet the inventor: Tomasz PatanTomasz Patan is a visionary engineer with a talent for creating groundbreaking airborne vehicles. He is best known for the Jetson One, a quad-rotor electric vertical take-off and landingdrone that can carry a human pilot. Building on the success of that project, Patan has now introduced the Volonaut Airbike, a smaller, more agile flying machine that relies on jet propulsion rather than propellers. His work continues to push the boundaries of what personal flight can achieve. Jet-powered flying bike What about the cost?When it comes to price, the Volonaut Airbike is still something of a mystery. Patan has not yet revealed an official cost, but if you look at his previous project, the Jetson One drone, which was priced at around you can get a rough idea of where the Airbike might land. Given the advanced materials, jet propulsion and sophisticated flight computer involved, it's safe to assume this won't be a budget-friendly ride. However, as with most new technologies, prices often come down over time as production scales up and designs are refined. So, while it might start out as a high-end gadget for early adopters and enthusiasts, there's hope that flying bikes like this could become more accessible in the years ahead.WHAT IS ARTIFICIAL INTELLIGENCE? Jet-powered flying bike What lies ahead for the Volonaut Airbike?Although the Volonaut Airbike has already been demonstrated in flight, many details remain undisclosed. Patan has not yet revealed the exact propulsion technology, pricing or release date, but he has expressed optimism the Airbike will be available to the public in the near future. As development continues, this flying motorcycle could soon become a practical option for urban commuters seeking a faster, more flexible way to travel. Jet-powered flying bike Kurt's key takeawaysHonestly, the Volonaut Airbike feels like something we've all dreamed about but never thought we'd actually see. It's exciting to watch this blend of bold engineering and creative design come to life, making personal flight more real than ever before. Sure, it might be a bit pricey at first, but who knows? Maybe in a few years, zipping through the skies on a flying bike will be just as normal as hopping on a motorcycle today.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable trading your motorcycle for a flying bike that soars above city traffic? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #flying #motorcycle #zooms #mph #without
    WWW.FOXNEWS.COM
    Flying motorcycle zooms at 124 mph without touching the ground
    Tech Flying motorcycle zooms at 124 mph without touching the ground A jet-powered flying bike that combines speed, agility, and futuristic design Published June 1, 2025 6:00am EDT close Flying motorcycle zooms at 124 mph without touching the ground Soar above traffc in the air with ease. Imagine gliding through city traffic, not stuck in traffic jams on the road, but soaring above them in the air with ease. The Volonaut Airbike, a jet-powered flying bike developed by Polish entrepreneur Tomasz Patan, is turning this vision into reality. With a top speed of 124 mph and a frame that is seven times lighter than a typical motorcycle, this innovative vehicle could change the way we get around in cities, making travel faster and easier. Jet-powered flying bike  (Volonaut)Jet power and featherweight designUnlike many personal flying devices that depend on large, noisy propellers, the Volonaut Airbike uses a jet propulsion system. While the exact technical details have not been disclosed, the Airbike's design emphasizes extreme lightness and agility.CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHTExtensive use of carbon fiber and 3D-printed parts allows the vehicle to weigh just 86 pounds without a rider. This is approximately seven times lighter than an average motorcycle, which typically weighs around 600 pounds. This featherweight construction makes the Airbike nimble and efficient in the air. Jet-powered flying bike  (Volonaut)Performance and featuresThe Volonaut Airbike can reach speeds of up to 124 miles per hour, making it faster than most motorcycles in traffic. It features a proprietary stabilization system enhanced by a flight computer, which automatically maintains hover and provides ease of control for the rider. This technology allows even those with limited flying experience to handle the bike safely and confidently. The Airbike's open, roofless design offers the rider an unobstructed 360-degree view, creating a sense of complete freedom and immersion in the flying experience. Additionally, the absence of spinning propellers means the Airbike can navigate through tight spaces with greater ease and safety. Jet-powered flying bike  (Volonaut)A real-life flying bike inspired by imaginationThe Volonaut Airbike's sleek, futuristic silhouette and compact size evoke the image of a flying motorcycle that many have dreamed about for years. Its design and performance bring to life a concept often seen in movies and stories about the future of transportation. Volonaut's promotional videos even feature a rider dressed as a Stormtrooper, highlighting the bike's resemblance to the flying vehicles of popular culture. This playful nod underscores the Airbike's blend of cutting-edge technology and imaginative design. Jet-powered flying bike  (Volonaut)Meet the inventor: Tomasz PatanTomasz Patan is a visionary engineer with a talent for creating groundbreaking airborne vehicles. He is best known for the Jetson One, a quad-rotor electric vertical take-off and landing (eVTOL) drone that can carry a human pilot. Building on the success of that project, Patan has now introduced the Volonaut Airbike, a smaller, more agile flying machine that relies on jet propulsion rather than propellers. His work continues to push the boundaries of what personal flight can achieve. Jet-powered flying bike  (Volonaut)What about the cost?When it comes to price, the Volonaut Airbike is still something of a mystery. Patan has not yet revealed an official cost, but if you look at his previous project, the Jetson One drone, which was priced at around $92,000, you can get a rough idea of where the Airbike might land. Given the advanced materials, jet propulsion and sophisticated flight computer involved, it's safe to assume this won't be a budget-friendly ride. However, as with most new technologies, prices often come down over time as production scales up and designs are refined. So, while it might start out as a high-end gadget for early adopters and enthusiasts, there's hope that flying bikes like this could become more accessible in the years ahead.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Jet-powered flying bike  (Volonaut)What lies ahead for the Volonaut Airbike?Although the Volonaut Airbike has already been demonstrated in flight, many details remain undisclosed. Patan has not yet revealed the exact propulsion technology, pricing or release date, but he has expressed optimism the Airbike will be available to the public in the near future. As development continues, this flying motorcycle could soon become a practical option for urban commuters seeking a faster, more flexible way to travel. Jet-powered flying bike  (Volonaut)Kurt's key takeawaysHonestly, the Volonaut Airbike feels like something we've all dreamed about but never thought we'd actually see. It's exciting to watch this blend of bold engineering and creative design come to life, making personal flight more real than ever before. Sure, it might be a bit pricey at first, but who knows? Maybe in a few years, zipping through the skies on a flying bike will be just as normal as hopping on a motorcycle today.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable trading your motorcycle for a flying bike that soars above city traffic? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri 0 önizleme
  • Invisible Need, Visible Care: Beaverton Heights, Beaverton, Ontario

    Standard modular construction was given a softened appearance with the addition of residential wood truss roofs and the introduction of shorter modules in select locations to create courtyards. Photo by doublespace photography
    PROJECT Durham Modular Transitional Housing, Beaverton, Ontario
    ARCHITECT Montgomery Sisam Architects Inc.
    In cities, homelessness can be painfully visible, in the form of encampments or people sleeping rough. But in rural areas, people experiencing homelessness are often hidden away.
    It’s this largely invisible but clearly present need that led to the construction of Beaverton Heights, a 47-unit transitional housing residence about 100 kilometres from Toronto that serves the northern part of the Regional Municipality of Durham. The region had run a pilot project for transitional housing in Durham during the Covid pandemic, out of a summer camp property—so when provincial and federal funding became available for modular, rapidly delivered transitional housing, they were quick to apply.
    Montgomery Sisam Architects is no stranger to modular supportive housing, or to the site, for that matter. 15 years ago, they designed Lakeview Manor, a 200-bed long-term care facility for the region, on an adjoining parcel of land. At the time that they took on Beaverton Heights, they had completed two modular supportive housing projects for the City of Toronto. 
    The initial Toronto projects were done on a massively compressed timeline—a mere eight months from design to the move-in date for the first, and nine months for the second. “So we knew that’s as tight as you can crunch it—and that’s with all the stars aligned,” says Montgomery Sisam principal Daniel Ling. 
    As transitional housing, the Beaverton facility is designed to help residents overcome their barriers to housing. To achieve this, the program not only includes residential units, but communal spaces, including a double-height dining room and lounge that occupy the western half of the project. This part of the complex can also be used independently, such as for community activities and health supports. To create the needed volume, Montgomery Sisam decided to prefabricate the community structure in steel: the entire west half of the project was constructed and assembled in a factory to ensure that it would fit together as intended, then disassembled and reassembled on site.
    The double-height community space includes a reading room, terrace, administrative areas, and communal dining room served by a full commercial kitchen. The building can also be used for community-wide functions, such as medical clinics. A cluster of columns marks the area where the dining area’s eight steel modular units join together. Photo by Tom Ridout
    For both the steel community structure and its wood residential counterpart, the prefabrication process was extensive, and included the in-factory installation of plumbing, electrical and mechanical systems, interior and exterior finishes, and even furnishings in each module. “Basically, just remove the plastic from the mattress and take the microwave from the box that’s already in the unit,” says Jacek Sochacki, manager of facilities design, construction, and asset management at the works department of the Regional Municipality of Durham. Within the building, the most extensive on-site work was in the hallways, where the modules met: building systems needed to connect up, and flooring and finishes needed to be completed over the joints after the modules were installed.
    One of the most surprising aspects of the project is how un-modular it looks. Montgomery Sisam’s previous experience with modular construction allowed them to find leeway in the process—small tweaks that would change the look of the project, without affecting the construction cost. The long site allowed the architects to use a single module as a glazed hallway, connecting the two buildings, and creating generous courtyards on its two sides. In two other areas, shorter modules are specified to transform the massing of the building. The resulting cut-outs serve as an entry forecourt and as a dining terrace. Instead of flat roofs, the team used residential trusses—“the same wood trusses you would see in subdivisions,” says Ling—to create sloped roof forms. From the outside, the windows of the residential units are slightly recessed behind a frame of wood cladding, adding further dimension to the façade. 
    Photo by doublespace photography
    Since it was a design-build process, all of these decisions were vetted through the builder for their cost effectiveness. “It wasn’t hard to convince them, we’re going to use some shorter modules—you are going to build less there,” recalls Ling. “These are things that actually don’t cost a lot of money.”
    The resulting massing is intentionally lower towards the front of the property, where the community space faces residential neighbours, and doubles to four storeys towards the back. As you approach the project, the courtyards and cut-outs give it the appearance of smaller discrete masses, rather than a single volume.
    Topping the project is the region’s largest solar panel array, which provides 35 to 40 percent of the all-electric building’s energy needs. Modular construction aided in airtightness and performance—in its first months of operation, it delivered an EUI of 102 kWh/m2/year.  
    Balancing between independence and community was an important principle for the program, and for the design. To this end, each studio is designed to function as a self-sufficient dwelling, with its own kitchen, full washroom, and heat pump with independent temperature control. Small spatial nudges—like daylight at both ends of corridors, seating nooks with built-in benches throughout the project, and generous common rooms—aim to coax residents outside of their units. The property is bracketed by the dining area at the front, and an outdoor basketball court at the rear. A long storage shed holds some of the facility’s mechanical equipment along with bikes—an easy way to get into town for residents who may not have cars. 
    Located between the residences and the community building, a semi-private courtyard offers a quiet place for clients to rest or socialize with others. Photo by doublespace photography
    The building looks so good that, had the finishes be chosen for luxury rather than durability, it could easily pass as a family resort. But is that too nice? Often, government-funded buildings—especially for a stigmatized program such as transitional housing—come under criticism if they appear to be too fancy. 
    I put this to Sochacki, who replies: “There’s this misnomer that if the building looks good or unique, it costs a lot of money. I think we proved that it doesn’t.” Apart from a wood surround for the fireplace, the components of the building are utilitarian and basic, he says. “It’s just like: how do you make the most out of common materials? It costs us exactly the same, but we’re doing things that are actually nice.”
    Screenshot
    That niceness is not just a perk, but essential to the core purpose of helping people experiencing homelessness to make their way back into society. “Making it nice is important,” says Sochacki. “Nice lighting, nice windows, nice places to sit, nice spaces that people enjoy being at—because that’s what’s going to make the difference.” 
    “If you build a place that people just want to spend all their time in their room and they don’t come out, that’s not going to help them with transitioning back to a sustainable, permanent housing lifestyle,” he adds. “You’ve got to create a place where they feel welcome and that they want to spend time in—they want to meet other people and they want to get the support, because there’s a place and space for it, and it’s successful for them to get the support.”
    A terrace adjoins the reading lounge and dining area, inviting outdoor barbecues and gatherings in warm weather. The cut-out was created by using a shorter module in this section of the building, minimizing the impact to construction costs and logistics. Photo by Tom Ridout
    CLIENT Regional Municipality of Durham | ARCHITECT TEAM Daniel Ling, Enda McDonagh, Kevin Hutchinson, Sonja Storey-Fleming, Mateusz Nowacki, Zheng Li, Grace Chang, Jake Pauls Wolf, Mustafa Munawar, Paul Kurti, William Tink, Victoria Ngai, Kavitha Jayakrishnan, Max Veneracion, Megan Lowes | STRUCTURAL/MECHANICAL/ELECTRICAL Design Works Engineering | LANDSCAPE Baker Turner | INTERIORS Montgomery Sisam Architects | CONTRACTOR NRB Modular Solutions | CIVIL Design Works Engineering | CODE Vortex Fire | FOOD SERVICES Kaizen Foodservice Planning & Design | ENERGY MODELlING Design Work Engineering | SPECIFICATIONS DGS Consulting Services | AREA 3,550 m2 | COMPLETION October 2024
    ENERGY USE INTENSITY101.98 kWh/m2/year 

     As appeared in the June 2025 issue of Canadian Architect magazine 

    The post Invisible Need, Visible Care: Beaverton Heights, Beaverton, Ontario appeared first on Canadian Architect.
    #invisible #need #visible #care #beaverton
    Invisible Need, Visible Care: Beaverton Heights, Beaverton, Ontario
    Standard modular construction was given a softened appearance with the addition of residential wood truss roofs and the introduction of shorter modules in select locations to create courtyards. Photo by doublespace photography PROJECT Durham Modular Transitional Housing, Beaverton, Ontario ARCHITECT Montgomery Sisam Architects Inc. In cities, homelessness can be painfully visible, in the form of encampments or people sleeping rough. But in rural areas, people experiencing homelessness are often hidden away. It’s this largely invisible but clearly present need that led to the construction of Beaverton Heights, a 47-unit transitional housing residence about 100 kilometres from Toronto that serves the northern part of the Regional Municipality of Durham. The region had run a pilot project for transitional housing in Durham during the Covid pandemic, out of a summer camp property—so when provincial and federal funding became available for modular, rapidly delivered transitional housing, they were quick to apply. Montgomery Sisam Architects is no stranger to modular supportive housing, or to the site, for that matter. 15 years ago, they designed Lakeview Manor, a 200-bed long-term care facility for the region, on an adjoining parcel of land. At the time that they took on Beaverton Heights, they had completed two modular supportive housing projects for the City of Toronto.  The initial Toronto projects were done on a massively compressed timeline—a mere eight months from design to the move-in date for the first, and nine months for the second. “So we knew that’s as tight as you can crunch it—and that’s with all the stars aligned,” says Montgomery Sisam principal Daniel Ling.  As transitional housing, the Beaverton facility is designed to help residents overcome their barriers to housing. To achieve this, the program not only includes residential units, but communal spaces, including a double-height dining room and lounge that occupy the western half of the project. This part of the complex can also be used independently, such as for community activities and health supports. To create the needed volume, Montgomery Sisam decided to prefabricate the community structure in steel: the entire west half of the project was constructed and assembled in a factory to ensure that it would fit together as intended, then disassembled and reassembled on site. The double-height community space includes a reading room, terrace, administrative areas, and communal dining room served by a full commercial kitchen. The building can also be used for community-wide functions, such as medical clinics. A cluster of columns marks the area where the dining area’s eight steel modular units join together. Photo by Tom Ridout For both the steel community structure and its wood residential counterpart, the prefabrication process was extensive, and included the in-factory installation of plumbing, electrical and mechanical systems, interior and exterior finishes, and even furnishings in each module. “Basically, just remove the plastic from the mattress and take the microwave from the box that’s already in the unit,” says Jacek Sochacki, manager of facilities design, construction, and asset management at the works department of the Regional Municipality of Durham. Within the building, the most extensive on-site work was in the hallways, where the modules met: building systems needed to connect up, and flooring and finishes needed to be completed over the joints after the modules were installed. One of the most surprising aspects of the project is how un-modular it looks. Montgomery Sisam’s previous experience with modular construction allowed them to find leeway in the process—small tweaks that would change the look of the project, without affecting the construction cost. The long site allowed the architects to use a single module as a glazed hallway, connecting the two buildings, and creating generous courtyards on its two sides. In two other areas, shorter modules are specified to transform the massing of the building. The resulting cut-outs serve as an entry forecourt and as a dining terrace. Instead of flat roofs, the team used residential trusses—“the same wood trusses you would see in subdivisions,” says Ling—to create sloped roof forms. From the outside, the windows of the residential units are slightly recessed behind a frame of wood cladding, adding further dimension to the façade.  Photo by doublespace photography Since it was a design-build process, all of these decisions were vetted through the builder for their cost effectiveness. “It wasn’t hard to convince them, we’re going to use some shorter modules—you are going to build less there,” recalls Ling. “These are things that actually don’t cost a lot of money.” The resulting massing is intentionally lower towards the front of the property, where the community space faces residential neighbours, and doubles to four storeys towards the back. As you approach the project, the courtyards and cut-outs give it the appearance of smaller discrete masses, rather than a single volume. Topping the project is the region’s largest solar panel array, which provides 35 to 40 percent of the all-electric building’s energy needs. Modular construction aided in airtightness and performance—in its first months of operation, it delivered an EUI of 102 kWh/m2/year.   Balancing between independence and community was an important principle for the program, and for the design. To this end, each studio is designed to function as a self-sufficient dwelling, with its own kitchen, full washroom, and heat pump with independent temperature control. Small spatial nudges—like daylight at both ends of corridors, seating nooks with built-in benches throughout the project, and generous common rooms—aim to coax residents outside of their units. The property is bracketed by the dining area at the front, and an outdoor basketball court at the rear. A long storage shed holds some of the facility’s mechanical equipment along with bikes—an easy way to get into town for residents who may not have cars.  Located between the residences and the community building, a semi-private courtyard offers a quiet place for clients to rest or socialize with others. Photo by doublespace photography The building looks so good that, had the finishes be chosen for luxury rather than durability, it could easily pass as a family resort. But is that too nice? Often, government-funded buildings—especially for a stigmatized program such as transitional housing—come under criticism if they appear to be too fancy.  I put this to Sochacki, who replies: “There’s this misnomer that if the building looks good or unique, it costs a lot of money. I think we proved that it doesn’t.” Apart from a wood surround for the fireplace, the components of the building are utilitarian and basic, he says. “It’s just like: how do you make the most out of common materials? It costs us exactly the same, but we’re doing things that are actually nice.” Screenshot That niceness is not just a perk, but essential to the core purpose of helping people experiencing homelessness to make their way back into society. “Making it nice is important,” says Sochacki. “Nice lighting, nice windows, nice places to sit, nice spaces that people enjoy being at—because that’s what’s going to make the difference.”  “If you build a place that people just want to spend all their time in their room and they don’t come out, that’s not going to help them with transitioning back to a sustainable, permanent housing lifestyle,” he adds. “You’ve got to create a place where they feel welcome and that they want to spend time in—they want to meet other people and they want to get the support, because there’s a place and space for it, and it’s successful for them to get the support.” A terrace adjoins the reading lounge and dining area, inviting outdoor barbecues and gatherings in warm weather. The cut-out was created by using a shorter module in this section of the building, minimizing the impact to construction costs and logistics. Photo by Tom Ridout CLIENT Regional Municipality of Durham | ARCHITECT TEAM Daniel Ling, Enda McDonagh, Kevin Hutchinson, Sonja Storey-Fleming, Mateusz Nowacki, Zheng Li, Grace Chang, Jake Pauls Wolf, Mustafa Munawar, Paul Kurti, William Tink, Victoria Ngai, Kavitha Jayakrishnan, Max Veneracion, Megan Lowes | STRUCTURAL/MECHANICAL/ELECTRICAL Design Works Engineering | LANDSCAPE Baker Turner | INTERIORS Montgomery Sisam Architects | CONTRACTOR NRB Modular Solutions | CIVIL Design Works Engineering | CODE Vortex Fire | FOOD SERVICES Kaizen Foodservice Planning & Design | ENERGY MODELlING Design Work Engineering | SPECIFICATIONS DGS Consulting Services | AREA 3,550 m2 | COMPLETION October 2024 ENERGY USE INTENSITY101.98 kWh/m2/year   As appeared in the June 2025 issue of Canadian Architect magazine  The post Invisible Need, Visible Care: Beaverton Heights, Beaverton, Ontario appeared first on Canadian Architect. #invisible #need #visible #care #beaverton
    WWW.CANADIANARCHITECT.COM
    Invisible Need, Visible Care: Beaverton Heights, Beaverton, Ontario
    Standard modular construction was given a softened appearance with the addition of residential wood truss roofs and the introduction of shorter modules in select locations to create courtyards. Photo by doublespace photography PROJECT Durham Modular Transitional Housing, Beaverton, Ontario ARCHITECT Montgomery Sisam Architects Inc. In cities, homelessness can be painfully visible, in the form of encampments or people sleeping rough. But in rural areas, people experiencing homelessness are often hidden away. It’s this largely invisible but clearly present need that led to the construction of Beaverton Heights, a 47-unit transitional housing residence about 100 kilometres from Toronto that serves the northern part of the Regional Municipality of Durham. The region had run a pilot project for transitional housing in Durham during the Covid pandemic, out of a summer camp property—so when provincial and federal funding became available for modular, rapidly delivered transitional housing, they were quick to apply. Montgomery Sisam Architects is no stranger to modular supportive housing, or to the site, for that matter. 15 years ago, they designed Lakeview Manor, a 200-bed long-term care facility for the region, on an adjoining parcel of land. At the time that they took on Beaverton Heights, they had completed two modular supportive housing projects for the City of Toronto. (They have since completed four more.)  The initial Toronto projects were done on a massively compressed timeline—a mere eight months from design to the move-in date for the first, and nine months for the second. “So we knew that’s as tight as you can crunch it—and that’s with all the stars aligned,” says Montgomery Sisam principal Daniel Ling.  As transitional housing, the Beaverton facility is designed to help residents overcome their barriers to housing. To achieve this, the program not only includes residential units, but communal spaces, including a double-height dining room and lounge that occupy the western half of the project. This part of the complex can also be used independently, such as for community activities and health supports. To create the needed volume, Montgomery Sisam decided to prefabricate the community structure in steel: the entire west half of the project was constructed and assembled in a factory to ensure that it would fit together as intended, then disassembled and reassembled on site. The double-height community space includes a reading room, terrace, administrative areas, and communal dining room served by a full commercial kitchen. The building can also be used for community-wide functions, such as medical clinics. A cluster of columns marks the area where the dining area’s eight steel modular units join together. Photo by Tom Ridout For both the steel community structure and its wood residential counterpart, the prefabrication process was extensive, and included the in-factory installation of plumbing, electrical and mechanical systems, interior and exterior finishes, and even furnishings in each module. “Basically, just remove the plastic from the mattress and take the microwave from the box that’s already in the unit,” says Jacek Sochacki, manager of facilities design, construction, and asset management at the works department of the Regional Municipality of Durham. Within the building, the most extensive on-site work was in the hallways, where the modules met: building systems needed to connect up, and flooring and finishes needed to be completed over the joints after the modules were installed. One of the most surprising aspects of the project is how un-modular it looks. Montgomery Sisam’s previous experience with modular construction allowed them to find leeway in the process—small tweaks that would change the look of the project, without affecting the construction cost. The long site allowed the architects to use a single module as a glazed hallway, connecting the two buildings, and creating generous courtyards on its two sides. In two other areas, shorter modules are specified to transform the massing of the building. The resulting cut-outs serve as an entry forecourt and as a dining terrace. Instead of flat roofs, the team used residential trusses—“the same wood trusses you would see in subdivisions,” says Ling—to create sloped roof forms. From the outside, the windows of the residential units are slightly recessed behind a frame of wood cladding, adding further dimension to the façade.  Photo by doublespace photography Since it was a design-build process, all of these decisions were vetted through the builder for their cost effectiveness. “It wasn’t hard to convince them, we’re going to use some shorter modules—you are going to build less there,” recalls Ling. “These are things that actually don’t cost a lot of money.” The resulting massing is intentionally lower towards the front of the property, where the community space faces residential neighbours, and doubles to four storeys towards the back. As you approach the project, the courtyards and cut-outs give it the appearance of smaller discrete masses, rather than a single volume. Topping the project is the region’s largest solar panel array, which provides 35 to 40 percent of the all-electric building’s energy needs. Modular construction aided in airtightness and performance—in its first months of operation, it delivered an EUI of 102 kWh/m2/year.   Balancing between independence and community was an important principle for the program, and for the design. To this end, each studio is designed to function as a self-sufficient dwelling, with its own kitchen, full washroom, and heat pump with independent temperature control. Small spatial nudges—like daylight at both ends of corridors, seating nooks with built-in benches throughout the project, and generous common rooms—aim to coax residents outside of their units. The property is bracketed by the dining area at the front, and an outdoor basketball court at the rear. A long storage shed holds some of the facility’s mechanical equipment along with bikes—an easy way to get into town for residents who may not have cars.  Located between the residences and the community building, a semi-private courtyard offers a quiet place for clients to rest or socialize with others. Photo by doublespace photography The building looks so good that, had the finishes be chosen for luxury rather than durability, it could easily pass as a family resort. But is that too nice? Often, government-funded buildings—especially for a stigmatized program such as transitional housing—come under criticism if they appear to be too fancy.  I put this to Sochacki, who replies: “There’s this misnomer that if the building looks good or unique, it costs a lot of money. I think we proved that it doesn’t.” Apart from a wood surround for the fireplace, the components of the building are utilitarian and basic, he says. “It’s just like: how do you make the most out of common materials? It costs us exactly the same, but we’re doing things that are actually nice.” Screenshot That niceness is not just a perk, but essential to the core purpose of helping people experiencing homelessness to make their way back into society. “Making it nice is important,” says Sochacki. “Nice lighting, nice windows, nice places to sit, nice spaces that people enjoy being at—because that’s what’s going to make the difference.”  “If you build a place that people just want to spend all their time in their room and they don’t come out, that’s not going to help them with transitioning back to a sustainable, permanent housing lifestyle,” he adds. “You’ve got to create a place where they feel welcome and that they want to spend time in—they want to meet other people and they want to get the support, because there’s a place and space for it, and it’s successful for them to get the support.” A terrace adjoins the reading lounge and dining area, inviting outdoor barbecues and gatherings in warm weather. The cut-out was created by using a shorter module in this section of the building, minimizing the impact to construction costs and logistics. Photo by Tom Ridout CLIENT Regional Municipality of Durham | ARCHITECT TEAM Daniel Ling (FRAIC), Enda McDonagh, Kevin Hutchinson, Sonja Storey-Fleming, Mateusz Nowacki, Zheng Li, Grace Chang, Jake Pauls Wolf, Mustafa Munawar, Paul Kurti, William Tink, Victoria Ngai, Kavitha Jayakrishnan, Max Veneracion, Megan Lowes | STRUCTURAL/MECHANICAL/ELECTRICAL Design Works Engineering | LANDSCAPE Baker Turner | INTERIORS Montgomery Sisam Architects | CONTRACTOR NRB Modular Solutions | CIVIL Design Works Engineering | CODE Vortex Fire | FOOD SERVICES Kaizen Foodservice Planning & Design | ENERGY MODELlING Design Work Engineering | SPECIFICATIONS DGS Consulting Services | AREA 3,550 m2 | COMPLETION October 2024 ENERGY USE INTENSITY (operational) 101.98 kWh/m2/year   As appeared in the June 2025 issue of Canadian Architect magazine  The post Invisible Need, Visible Care: Beaverton Heights, Beaverton, Ontario appeared first on Canadian Architect.
    0 Yorumlar 0 hisse senetleri 0 önizleme
Arama Sonuçları
CGShares https://cgshares.com