ReportWire

Tag: Android

  • Google dismantles 9M-device Android hijack network

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Free apps are supposed to cost you nothing but storage space. But in this case, they may have cost millions of people control over their own internet connections.

    Google says it has disrupted what it believes was the world’s largest residential proxy network, one that secretly hijacked around 9 million Android devices, along with computers and smart home gadgets. Most people had no idea their devices were being used since the apps worked normally, and nothing looked broken.

    But behind the scenes, those devices were quietly routing traffic for strangers, including cybercriminals.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE
     

    Google says it disrupted a massive residential proxy network that secretly hijacked about 9 million Android and smart devices. (AaronP/Bauer-Griffin/GC Images)

    How your device became part of a proxy network

    According to Google’s Threat Intelligence Group, the network was tied to a company known as IPIDEA. Instead of spreading through obvious malware, it relied on hidden software development kits, or SDKs, that were embedded inside more than 600 apps. These apps ranged from simple utilities to VPN tools and other free downloads. When you installed one, the app performed its advertised function. But it also enrolled your device into a residential proxy network.

    That means your phone, computer or smart device could be used as a relay point for someone else’s internet traffic. That traffic might include scraping websites, launching automated login attempts or masking the identity of someone conducting shady online activity. From the outside, it looked like that activity came from your home IP address. You wouldn’t see it happening, and in many cases, you wouldn’t notice any major performance issues.

    Google says in a single seven-day period earlier this year, more than 550 separate threat groups were observed using IP addresses linked to this infrastructure. That includes cybercrime operations and state-linked actors. Residential proxy networks are attractive because they make malicious traffic look like normal consumer activity. Instead of coming from a suspicious data center, it appears to come from someone’s living room.

    What Google did to shut it down

    Google says it took legal action in a U.S. federal court to seize domains used to control the infected devices and route proxy traffic. It also worked with companies like Cloudflare and other security firms to disrupt the network’s command-and-control systems. Google claims it also updated Play Protect, the built-in Android security system, so that certified devices would automatically detect and remove apps known to include the malicious SDKs.

    However, Google also warned that many of these apps were distributed outside the official Play Store. That matters because Play Protect can only scan and block threats tied to apps installed through Google Play. Third-party app stores, unofficial downloads and uncertified Android devices carry far greater risk.

    IPIDEA has claimed its service was meant for legitimate business use, such as web research and data collection. But Google’s research suggests the network was heavily abused by criminals. Even if some users knowingly installed bandwidth-sharing apps in exchange for rewards, many did not receive clear disclosure about how their devices were being used.

    Google’s investigation also found significant overlap between different proxy brands and SDK names. What looked like separate services were often tied to the same infrastructure. That makes it harder for consumers to know which apps are safe and which are quietly monetizing their connection.

    300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
     

    Samsung phones sit on display.

    Hidden software inside more than 600 apps allegedly turned phones and computers into internet relays for cybercriminals. (David Paul Morris/Bloomberg via Getty Images)

    7 ways you can protect yourself from Android proxy attacks

    If millions of devices can be quietly turned into internet relay points, the big question is, how do you make sure yours isn’t one of them? These steps reduce the risk that your phone, TV box or smart device gets pulled into a proxy network without you realizing it.

    1) Stick to official app stores

    Only download apps from the Google Play Store or other trusted app marketplaces. Some apps hide small pieces of code that can secretly use your internet connection. These are often spread through third-party app stores or direct app files called “APKs,” which are Android app files installed manually instead of through the Play Store. When you sideload apps this way, you bypass Google’s built-in security checks. Sticking to official stores helps keep those hidden threats off your device.

    2) Avoid “earn money by sharing bandwidth” apps

    If an app promises rewards for sharing your unused internet bandwidth, that’s a major red flag. In many cases, that is exactly how residential proxy networks recruit devices. Even if it sounds legitimate, you are effectively renting out your IP address. That can expose you to abuse, blacklisting or deeper network vulnerabilities.

    3) Review app permissions carefully

    Before installing any app, check what permissions it requests. A simple wallpaper app should not need full network control or background execution privileges. After installation, go into your phone’s settings and audit which apps have constant internet access, background activity rights or special device permissions.

    4) Install strong antivirus software

    Today’s mobile security tools can detect suspicious app behavior, unusual internet activity and hidden background services. Strong antivirus software adds an extra layer of protection beyond what’s built into your device, especially if you’ve installed apps in the past that you’re unsure about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Keep your devices updated

    Android security updates patch vulnerabilities that proxy operators may exploit. If you’re using an older phone, tablet or Android TV box that no longer receives updates, it may be time to upgrade. Unpatched devices are easier targets for hidden SDK abuse and botnet enrollment.

    6) Use a strong password manager

    If your device ever becomes part of a proxy network or is otherwise compromised, attackers often try to pivot into your accounts next. That’s why you should never reuse passwords. A password manager generates long, unique passwords for every account and stores them securely, so one breach does not unlock your email, banking or social media. Many password managers also include breach monitoring tools that alert you if your credentials appear in leaked databases, giving you a chance to act before real damage is done. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    7) Remove apps you don’t fully trust

    Go through your installed apps and delete or uninstall anything you don’t recognize or haven’t used in months. The fewer apps running on your device, the fewer opportunities there are for hidden SDKs to operate. If you suspect your device has been compromised, consider a full reset and reinstall only essential apps from trusted sources.

    ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP

    A person uses a laptop with a Google search tab open on the screen.

    Threat groups and state-linked actors allegedly used compromised devices to mask online activity and automate attacks. (Photo Illustration by Serene Lee/SOPA Images/LightRocket via Getty Images)

    Kurt’s key takeaway

    Residential proxy networks operate in a gray area that sounds harmless on paper but can quickly become a shield for cybercrime. In this case, millions of everyday devices were quietly enrolled into a system that attackers used to hide their tracks. Google’s takedown is a major move, but the broader market for residential proxies is still growing. That means you need to be cautious about what you install and what permissions you grant. Free apps are rarely truly free. Sometimes, the product being sold is you and your internet connection.

    Have you ever installed an app that promised rewards for sharing bandwidth, or used a free VPN without thinking twice about it? Let us know your thoughts by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    Related Article

    Stop Google from following your every move

    [ad_2]

    Source link

  • Samsung’s Galaxy S26 Phones Are Light On Hardware Upgrades, Heavy on AI

    [ad_1]

    Right on schedule: Samsung has just announced its latest flagship smartphones, the Galaxy S26 series, at its Galaxy Unpacked event in San Francisco.

    The Galaxy S26 series follows the same refresh pattern of past years: small tweaks to an established formula. That may make the new Galaxy S26, S26+, and S26 Ultra, which are available for preorder today, Feb. 25, and at retail starting on Mar. 11, sound a bit tame, but that’s just how these annual phone launches are now. That doesn’t mean there’s nothing to get excited about. Specifically, the Galaxy S26 Ultra has a new display feature called “Privacy Screen” that I want every other phone to copy.

    See Galaxy S26/S26+ at Samsung.com

    See Galaxy S26 Ultra at Samsung.com

    Goodbye titanium (on the S26 Ultra)

    The Galaxy S26 Ultra ditches titanium for aluminum. © Adriano Contreras / Gizmodo

    Let’s skip right to the most notable changes first. Just like Apple did with the iPhone 17 Pros, Samsung has ditched titanium for aluminum. Apple justified the metal frame downgrade as a way to improve the iPhone 17 Pro’s thermals, allowing heat to disperse more evenly across the phone’s backside with the aid of a new vapor chamber for better cooling, which in turn prevents performance throttling. In the S26 Ultra’s case, the aluminum means a lighter device at 214g versus the S25 Ultra’s 233g.

    I have not touched any of the Galaxy S26 phones in person—I couldn’t make it to Unpacked because of the blizzard that hit the U.S. Northeast just before the event—but my colleague, Adriano Contreras, who took all of the photos in this article, did, and he told me they definitely feel lighter, though no less solid in the hand.

    Samsung Galaxy S26 Series 3
    The Galaxy S26 and S26+ are largely the same phones as their S25 and S25+ predecessors. © Adriano Contreras / Gizmodo

    The regular S26 and 26+ both stick with aluminum frames. This time around, the S26 Ultra also has the same rounded corner radii as the other S26 models. Altogether, Samsung says the less boxy design on the S26 Ultra gives the whole S26 lineup a more unified design.

    Beyond other small tweaks like an updated camera island that resembles the one found on the Galaxy Z Fold 7 and S25 Edge, the S26 series is just another touchscreen slab. If you’re looking for a less traditional form factor, consider Samsung’s foldables like the Z Fold 7 or the Z Flip 7.

    A screen that’s more private in public

    Samsung Galaxy S26 Series 33
    © Adriano Contreras / Gizmodo

    The biggest selling point the S26 Ultra has going for it is its new “Privacy Display.” This is a pixel-level display technology that lets you darken the sides or top of the screen to prevent others from seeing your content. It’s sort of like one of those privacy screen protectors that you can apply on top of your phone’s screen, except it’s built into the S26 Ultra.

    The Privacy Display feature is also more than just a built-in privacy screen protector. It can also obscure notifications, passwords, PIN codes, and pattern unlocks to safeguard them from potential peepers. Again, I have not seen or tried the Privacy Display feature for myself, but Adriano tells me that it’s “impressive.” In his own words: “When I saw it only blur a text notification bubble up top, that’s when I said out loud, ‘sold!’”

    Samsung Galaxy S26 Series 31
    © Adriano Contreras / Gizmodo

    Sounds really neat. The only downside is that the Privacy Display feature is exclusive to the S26 Ultra; the S26 and S26+ do not have it.

    Faster performance, faster charging, and slightly improved cameras

    As I said, the S26 series is mostly a minor hardware refresh. Almost everything is the same compared to the S25 series. The S26 Ultra has the same 6.9-inch screen; the S26+ has the same 6.7-inch display; the S26 screen is slightly larger at 6.3 inches versus the S25’s 6.2 inches, though it retains the same previous resolution.

    All three S26 phones are powered by Qualcomm’s latest Snapdragon 8 Elite Gen 5 for Galaxy chip. This is a customized version of the regular Snapdragon 8 Elite Gen 5 chip that other phone makers have access to. Samsung says you can expect a CPU that’s up to 19% faster, a GPU that’s up to 24% faster, and an NPU (neural processing unit for AI and machine learning) that’s up to 39% faster. Combined with a redesigned vapor chamber that Samsung claims dissipates more heat, the phones should throttle less, too.

    Samsung Galaxy S26 Series 27
    © Adriano Contreras / Gizmodo

    The battery capacities for all three S26 phones are identical to their predecessors: 4,300mAh on the S26, 4,900 on the S26+, and 5,000mAh on the S26 Ultra. The only difference is in charging speeds on the S26 Ultra, which can now fast wire charge at up to 60W and fast wireless charge at up to 25W. The regular S26 supports fast wired charging at up to 25W; the S26+ at up to 45W. For fast wireless charging, the S26 supports up to 15W and the S26+ up to 20W. To my disappointment, none of the S26 phones have built-in magnetic wireless charging at all. Even Google added magnetic wireless charging (Pixelsnap) to its Pixel 10 series (except the new Pixel 10a). Samsung’s defense is that all of its official S26 cases come with built-in magnets and that adding them would have made the phones thicker. I still think that Samsung shouldn’t have cheaped out here, especially on the S26 Ultra.

    As for the cameras on the S26, S26+, and S26 Ultra—they’re basically the same as before, too. The S26 and S26+ have a triple-lens camera system made up of a 50-megapixel f/1.8 wide, a 12-megapixel f/2.2 ultrawide, and a 10-megapixel f/2.4 3x optical telephoto zoom. The S26 Ultra has a quad-lens camera system comprised of a 200-megapixel f/1.4 wide, 50-megapixel f/1.9 ultrawide, 10-megapixel f/2.4 3x optical telephoto zoom, and a 50-megapixel f/2.9 5x optical telephoto zoom (with 10x optical-quality zoom). Eagle-eyed tech nerds will notice that the apertures on all four of the S26 Ultra cameras are larger (smaller f-stop number). Samsung says the 200-megapixel shooter is 40% brighter and the 50-megapixel tele is 37% brighter, which means low-light shots should look a little better. The company is also highlighting improvements to its “Nightography” video recording.

    Samsung Galaxy S26 Series 30
    The S26 Ultra is the only model with an S Pen stylus. © Adriano Contreras / Gizmodo

    All of the S26 phones have a 12-megapixel f/2.2 selfie camera. Samsung says it’s made improvements to exposing skin tones. No square-shaped image sensor to let you hold the S26 phones in portrait mode to shoot horizontal selfies like you can with the Center Stage camera on the iPhone 17 series and iPhone Air.

    More Galaxy AI… everywhere

    Samsung Galaxy S26 Series 46
    The Now Nudge feature uses AI to offer task suggestions. © Adriano Contreras / Gizmodo

    I expected Samsung to add more Galaxy AI features, but I think it may have gone too far this time. Unlike previous years, when Samsung sprinkled a few new AI features into its phones to get users familiar with what’s possible with the technology, the S26 phones feel like they have too many Galaxy AI features—so many that it might be hard to remember them all.

    Samsung truly stuffed the S26 phones with AI everywhere. “Now Nudge” works like the Pixel 10’s “Magic Cue” feature, proactively looking at your data and suggesting tasks like adding event details to a calendar, setting reminders, or sharing images from a specific day if you mention it in a text message. The “Now Brief” hub can now surface more timely reminders and events, pulling from incoming notifications. An “Automated app action” feature can let you enter a prompt like “call me an Uber to Seoul Station,” and the AI will launch the app and tap through the various buttons, and then ask for your final payment confirmation. This is Samsung’s take on agentic computing, where an AI does everything for you; it’s also limited to Uber at launch.

    Samsung Galaxy S26 Series 50
    The Automated app action AI feature operating Uber on your behalf. © Adriano Contreras / Gizmodo

    AI can now sort your screenshots into eight categories (social media, coupons, boarding passes, events, locations, barcodes, QR codes, and chats) to make it easier to find stuff later. “Circle to Search” can now identify multiple pieces of clothing in images of an outfit, which…. Samsung says will make it easier to shop for those pieces.

    There’s an improved Photo Assist feature that lets you describe changes you want to make to a photo; it’s similar to the Pixel’s “Help me edit” feature that uses Gemini to make photo edits. A “Creative Studio” lets you use a prompt to create images for wallpapers and stickers—I admit, creating stickers seems kind of fun. “Document Scan” is a beefed-up document scanner with settings to automatically remove fingers, creases, or page folds, and then compile the scanned pages into a single PDF. The “Audio Eraser” feature that uses AI to erase background noise from videos now works in select third-party apps like YouTube and Instagram.

    Samsung Galaxy S26 Series 5
    The Creative Studio image generator can be used to create images, wallpapers, and stickers. © Adriano Contreras / Gizmodo

    Samsung is also including “Call Screening,” which uses Galaxy AI to answer calls from unknown numbers and then transcribe them, and “Scam Detection,” which uses AI to identify potential scam callers.

    And if you thought Bixby was dead—it’s not. It’s been rebooted as an “Intelligent Device Agent” that can better understand natural language when it comes to stuff like getting help with your device settings. Samsung also says it’s integrated Perplexity to aid with expanded prompts when you might need an answer for a prompt that requires wider knowledge from the internet.

    Altogether, it’s a lot of AI to take in. How useful any of these features will be will come down to the individual. Tech companies are telling us how useful AI this and that will be in automating time-consuming tasks, but on phones, I’ve yet to fully trust them. Even on the Pixel 10 Pro, which I’m still dailying, I still find myself ignoring most of the Gemini features.

    A $100 Price Hike for the S26 and S26+

    Samsung Galaxy S26 Series 22
    © Adriano Contreras / Gizmodo

    All three S26 phones will be available in four colors: Cobalt Violet, sky blue, black, and white. There will be two online-exclusive colors: Silver Shadow and Pink Gold.

    But the thing that likely won’t sit well with consumers is the $100 price hike for the Galaxy S26 and S26+, which now start at $899.99 and $1,099.99, respectively, for 12GB of RAM and 256GB of storage. The S26 Ultra starts at the same as $1,299.99 as the S25 Ultra did for the same 12GB of RAM and 256GB of storage.

    Samsung didn’t provide any specific reason for the price hike, but if I were to guess, it probably has to do with the RAM and storage shortage caused by AI data center hoarding, which has led to the skyrocketing of almost all consumer electronics that use the components. Or, maybe it’s tariffs. Whatever the reason for the price increase, it sucks.

    See Galaxy S26/S26+ at Samsung.com

    See Galaxy S26 Ultra at Samsung.com

     

    [ad_2]

    Raymond Wong

    Source link

  • Wispr Flow launches an Android app for AI-powered dictation | TechCrunch

    [ad_1]

    AI-powered dictation startup Wispr Flow has launched its Android app today. The company released its app for Mac and Windows first, then launched on iOS in June 2025.

    On iOS, users could use Wispr Flow through a dedicated keyboard. On Android, the interface is a bit different, as you can access the dictionary through a floating bubble. You can hold the bubble and dictate, or press once to start, and then press the close button to stop the process. Just like on other platforms, in addition to dictation, the app cleans up the filter words and also formats the text based on the context of the app and spoken content.

    “Android finally gave us the freedom to build the voice experience we always wanted. Only when the platform gets out of the way can we truly expect voice to replace typing on mobile,” Tanay Kothari, co-founder and CEO of the startup, said.

    The app can support translation in over 100 languages and can work across other apps. Along with the Android app release, Wispr Flow said that it has done an infrastructure rewrite that makes dictation 30% faster than before.

    While there are tons of AI-powered dictation apps available on desktop and iOS, Wispr Flow is one of the few available on Android with this launch, besides Typeless, which launched an app for the platform last month.

    What’s more, the company has also released a new model for Hinglish, a mix of Hindi and English, for people in India who speak in mix-coded way.

    Techcrunch event

    Boston, MA
    |
    June 9, 2026

    “If you’re someone like me, English and Hindi weave together when I’m chatting with family and colleagues back home. This is one of those times when I just had to build something for me: the first voice model to actually support transcription in Hinglish instead of traditional Hindi script,” Kothari said.

    Image Credits: Wispr Flow

    The company noted that even with early rollout to select users, users have spoken over 1.3 million words in English in the last few days.

    Wispr Flow has been one of the more popular startups in the category of AI-powered dictation apps that have also attracted significant venture capital attention. In June, the startup raised $30 million in funding led by Menlo Ventures in June. Within a few months, in November, the company secured $25 million in a round led by Notable Capital. Wispr Flow has raised $81 million in total, with its last round valued at $700 million according to sources.

    [ad_2]

    Ivan Mehta

    Source link

  • Android AI app exposes nearly 2m user files – including private videos – Tech Digest

    [ad_1]

    Share

    Image: Cybernews

    A popular Android AI application has left millions of private user files exposed, allowing anyone with the correct link to view private videos and photos without a password.

    Researchers from Cybernews discovered that “Video AI Art Generator & Maker,” an app designed to transform media using artificial intelligence, suffered from a critical server misconfiguration. The lapse highlights the growing privacy risks associated with the rapid rise of AI-powered creative tools.

    The security failure centered on a misconfigured Google Cloud Storage bucket which lacked any form of authentication. Because the server was left open, every single piece of media uploaded to the app since its launch in June 2023 was accessible to the public.

    In total, the exposed bucket contained approximately 8.27 million media files, creating a massive digital footprint of sensitive user data.

    Millions of private memories at risk

    The breach is particularly severe because it involves nearly 2 million original, private files uploaded by users from their personal devices. Specifically, the leak includes over 1.57 million private images and more than 385,000 personal videos.

    Beyond these original uploads, the database also spilled millions of AI-generated assets, including 2.87 million generated videos, 2.87 million images, and over 386,000 audio files.

    The app was developed by Codeway Dijital Hizmetler Anonim Sirketi, a firm registered in Turkey. While the developers have since secured the bucket, the exposure affects anyone who has used the application to generate AI art over the past several years.

    The scale of the leak is compounded by the app’s own privacy documentation, which explicitly warns that shared information “cannot be regarded as 100% secure” and may be subject to unauthorized access.

    Legal experts suggest these disclaimers may fall short of strict international privacy standards, such as Europe’s General Data Protection Regulation (GDPR), which mandates that companies provide “material and verifiable” security for user data.

    For the affected users, the primary risks include targeted phishing, identity theft, or the potential for private videos to be repurposed for malicious “deepfake” content.

    Security researchers advise that users of AI editing tools should regularly audit their app permissions and remain cautious about uploading highly personal or identifying content to cloud-based platforms that do not guarantee end-to-end encryption.

    This is not the first time the company’s apps have leaked user data. Reportedly, an independent security researcher has discovered that another app developed by Codeway, Chat & Ask AI, had a misconfigured backend using Google Firebase. According to the researcher, he accessed roughly 300 million messages tied to more than 25 million users.

    For more information, see the full report: https://cybernews.com/security/android-ai-app-photo-video-editor-leak/


    For latest tech stories go to TechDigest.tv


    Discover more from Tech Digest

    Subscribe to get the latest posts sent to your email.

    [ad_2]

    Chris Price

    Source link

  • Android malware hidden in fake antivirus app

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you use an Android phone, this deserves your attention. 

    Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to spread dangerous Android malware. 

    At first, the threat appears harmless because it is disguised as a fake antivirus app. Then, once you install it, criminals gain direct access to your device. Because of this, the threat stands out as especially troubling. It combines two things people already trust — security apps and AI platforms.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS

    Researchers say hackers hid Android malware inside a fake antivirus app that looked legitimate at first glance.  (Kurt “CyberGuy” Knutsson)

    What Hugging Face is and why it matters

    For anyone unfamiliar, Hugging Face is an open platform where developers share AI, NLP and machine learning models. It is widely used by researchers and startups and has become a central hub for AI experimentation. That openness is also what attackers exploited. Because Hugging Face allows public repositories and supports many file types, criminals were able to host malicious code in plain sight.

    The fake antivirus app behind the attack

    The malware first appeared in an Android app called TrustBastion. On the surface, it looks like a helpful security tool. It promises virus protection, phishing defense and malware blocking. In reality, it does the opposite. 

    Once installed, TrustBastion immediately claims your phone is infected. It then pressures you to install an update. That update delivers the malicious code. This tactic is known as scareware. It relies on panic and urgency to push users into tapping before thinking.

    FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

    A fake Android antivirus app in the Google Play store

    The fake TrustBastion app mimics a legitimate Google Play update screen to trick users into installing malware.  (Bitdefender)

    How the malware spreads and adapts

    According to Bitdefender, a global cybersecurity company, the campaign centers on a fake Android security app called TrustBastion. Victims were likely shown ads or warnings claiming their device was infected and were instructed to manually install the app.

    The attackers hosted TrustBastion’s APK files directly on Hugging Face, placing them inside public datasets that appeared legitimate at first glance. Once installed, the app immediately prompted users to install a required “update,” which delivered the actual malware.

    After researchers reported the malicious repository, it was taken down. However, Bitdefender observed that nearly identical repositories quickly reappeared, with small cosmetic changes but the same malicious behavior. That rapid re-creation made the campaign harder to fully shut down.

    What this Android malware can actually do

    This Trojan is not minor or annoying. It is invasive. Bitdefender says the malware can:

    Take screenshots of your device

    Show fake login screens for financial services

    Capture your lock screen PIN

    Once collected, that data is sent to a third-party server. From there, attackers can move quickly to drain accounts or lock you out of your own phone.

    What Google says about the threat

    Google says users who stick to official app stores are protected. A Google spokesperson told CyberGuy, “Based on our current detection, no apps containing this malware are found on Google Play.

    “Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.

    “Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play.”

    BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

    A person typing on their Android phone

    Once installed, the malware could capture screenshots, fake login details and even your lock screen PIN. (Kurt “CyberGuy” Knutsson)

    How to stay safe from Hugging Face Android malware

    This threat is a reminder that small choices matter. Here is what you should do right now:

    1) Stick to trusted app stores

    Only download apps from reputable sources like Google Play Store or the Samsung Galaxy Store. These platforms have moderation and scanning in place.

    2) Read reviews before installing

    Look closely at ratings, download counts and recent comments. Fake security apps often have vague reviews or sudden rating spikes.

    3) Use a data removal service

    Even careful users can have personal data exposed. A data removal service helps remove your phone number, email and other details from data broker sites that criminals rely on. That reduces follow-up scams, fake security alerts and account takeover attempts.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. 

    These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Run Play Protect and use strong antivirus software

    Scan your device regularly with Play Protect and back it up with strong antivirus software for added protection. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it hasn’t been 100% effective at removing all known malware from Android devices.

    The best way to protect yourself against malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also help you detect phishing emails and ransomware, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com

    5) Avoid sideloading APK files

    Avoid installing apps from websites outside the app store. These apps bypass security checks, so always verify the publisher name and URL.

    6) Lock down your Google account

    Your phone security depends on it. Enable two-step verification (2FA) first, then use a strong, unique password stored in a password manager to prevent account takeovers.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    7) Be cautious with permissions

    Be cautious with accessibility permissions. Malware often abuses them to take control of your device.

    8) Watch app updates closely

    Malware can hide inside fake updates. Be cautious of urgent fixes that push you outside the app store.

    Kurt’s key takeaways

    This attack shows how quickly trust can be weaponized. A platform designed to advance AI research was repurposed as a delivery system for malware. A fake antivirus app became the threat it claimed to stop. Staying safe no longer means avoiding sketchy-looking apps. It means questioning even those apps that appear helpful and professional.

    Have you seen something on your phone that made you question its security? Let us know your thoughts by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 6 ways to stop your phone from eavesdropping on your conversations – Tech Digest

    [ad_1]

    Share


    Ever felt like your phone is eavesdropping on your conversations? You mention a new pair of hiking boots to a friend, and miraculously, your Instagram feed is awash with walking clobber.

    While tech companies often claim they don’t “listen” in the traditional sense, they do use “passive listening” for wake words as well as massive amounts of behavioural data to predict your interests.

    If you want to reclaim your privacy, here is a short guide on how to shut down the digital ears of your smartphone right now.

    1. Disable Your “Virtual Assistant”

    The primary way your microphone stays “active” is to listen for wake words like “Hey Siri” or “Hey Google.” While these are meant to be helpful, they mean your microphone is technically always on.

    • For iPhone: Go to Settings > Siri & Search. Toggle off “Listen for ‘Hey Siri’” and “Press Side Button for Siri.”

    • For Android: Open the Google App, tap your profile icon, and go to Settings > Google Assistant > Hey Google & Voice Match. Toggle it off.

    2. Audit Your App Permissions

    Many apps request microphone access during installation for no logical reason. Why does a calculator or a photo editor need to hear you?

    • For iPhone: Go to Settings > Privacy & Security > Microphone. You will see a list of every app with mic access. Toggle off anything that doesn’t strictly need it (including social media apps if you don’t record stories).

    • For Android: Go to Settings > Apps > See all apps. Select an app, tap Permissions, then Microphone, and select “Don’t allow.”

    3. Kill “Personalized Advertising”

    Even if the mic is off, apps track your “cross-contextual” behaviour – in other words, they follow you from one app to another to build a profile of your life.

    • For iPhone: Go to Settings > Privacy & Security > Tracking and turn off “Allow Apps to Request to Track.” Then go to Apple Advertising at the bottom of the Privacy menu and turn off “Personalized Ads.”

    • For Android: Go to Settings > Google > Ads and tap “Delete Advertising ID.” This resets the unique string of numbers used by marketers to identify you.

    The orange dot on an iPhone screen means the mic is in use

    4. Watch for the “Warning Lights”

    Modern smartphones have built-in physical indicators to tell you when a hardware component is active.

    • iPhone users: Look for a small orange dot in the top right corner of your screen. If you see it and you aren’t on a call or recording a memo, an app is actively using your microphone.

    • Android users: On newer versions (Android 12+), a green microphone icon or dot appears in the status bar when the mic is being accessed.

    5. Clear Your Voice History

    Big Tech keeps a “memory bank” of your previous voice requests to “improve their service.” You should purge this regularly.

    • Google: Visit myactivity.google.com,click on “Web & App Activity,” and find the section for “Voice & Audio Activity” to delete your recordings.

    • Apple: Go to Settings > Siri & Search > Siri & Dictation History and tap “Delete Siri & Dictation History.”

    6. The “Hardware” Approach

    If you want to go full paranoid mode, consider physical barriers. Some privacy-conscious users use “microphone blockers” – small plugs that go into the headphone jack or charging port to trick the phone into thinking an external mic is plugged in.

    Alternatively, keep your phone in another room or inside a “Faraday bag” during sensitive private conversations.

    By following these steps, you move from being a passive data point to an empowered consumer, ensuring that your private conversations stay exactly that.

     


    For latest tech stories go to TechDigest.tv


    Discover more from Tech Digest

    Subscribe to get the latest posts sent to your email.

    [ad_2]

    Chris Price

    Source link

  • Google confirms over 40% of Android phones at risk – Tech Digest

    [ad_1]

    Share


    Google has confirmed that more than 40% of all Android phones are currently vulnerable to security threats.

    The tech giant’s latest distribution data reveals that over a billion users are operating on unsupported software. These devices no longer receive critical security patches, leaving them open to advanced malware and spyware attacks.

    Google officially ended security support for Android 12 and all older versions last year. According to the internal data, only 58% of active devices are running Android 13 or newer.

    The most recent version, Android 16, currently powers only 7.5% of phones. While Android 15 and 14 hold larger shares, millions of users remain stuck on “legacy” hardware that cannot be updated.

    Security experts warn that these outdated phones are “sitting ducks” for cybercriminals. Without official patches, vulnerabilities like the “Pixnapping” exploit allow hackers to snoop on screens or steal banking credentials without any user interaction.

    Unlike iPhones, which Apple can update simultaneously across its ecosystem, the Android landscape is highly fragmented. Many older flagship phones that were once premium devices are now considered high-risk because they have reached their end-of-life status.

    Google is now urging users to prioritize security over hardware specs. If a device cannot be updated to at least Android 13, the official advice is to replace it. Experts suggest that a modern mid-range phone with active support is far safer than an older, unsupported flagship.

    The warning also highlights the rise of “background” spyware. These attacks often operate in silence, exfiltrating private messages and financial data while the user is unaware their system has been breached.

    While Google Play Protect provides some defence, analysts insist there is no substitute for core operating system updates. For more than 40% of the world’s Android users, therefore, the only way to stay safe may be to buy a new phone.


    For latest tech stories go to TechDigest.tv


    Discover more from Tech Digest

    Subscribe to get the latest posts sent to your email.

    [ad_2]

    Chris Price

    Source link

  • Your phone shares data at night: Here’s how to stop it

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If your smartphone stays on your bedside table overnight, it stays busy long after you fall asleep. 

    Even while it appears idle, your phone continues to send and receive data in the background. Some of that activity is expected. Your device checks for security patches, syncs system settings and keeps essential services running. Other data transfers are far less obvious and far less necessary.

    Experts warn that smartphones routinely transmit tracking and advertising signals without you fully realizing it. In many cases, that data includes information that should only be shared with clear and informed consent.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Even while you sleep, a nearby smartphone can continue sending and receiving data in the background. (Getty Images/monkeybusinessimages)

    What data your phone sends while you sleep

    Your phone is not just charging overnight. It operates in a continuous data loop that generally falls into two categories.

    Legitimate system data

    This includes updates, crash reports and basic diagnostics. Operating systems rely on this information to fix bugs, improve stability and protect against security threats. In most cases, this data collection is disclosed and configurable.

    Tracking and advertising data

    This is where concerns grow. Smartphones also transmit location signals, device identifiers, advertising IDs, usage patterns and app behavior data. Companies combine this information to build detailed user profiles and deliver targeted ads that promise higher engagement. The problem is that the line between necessary diagnostics and commercial tracking is often blurry. Many of us never realize how much data flows out of our phones overnight.

    TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

    Phone and alarm clock

    Phones often stay active overnight, syncing apps, checking networks and refreshing data unless you limit background activity. (Kurt “CyberGuy” Knutsson)

    What we know about phone tracking today

    Independent academic investigations found that some Android devices transmitted data linked to tracking behaviors involving major companies like Meta and Yandex. The research, conducted by teams from IMDEA Networks Institute and European universities, showed that certain apps and services continued communicating with external servers even after users attempted to limit tracking. The researchers observed data flows that could link web activity with app identifiers, raising concerns about how effectively privacy controls were enforced at the system level.

    There is also long-standing concern around smartphones appearing to “listen” to conversations. While no public evidence shows that phones actively record private speech for advertising, many users report ads that closely mirror recent conversations. At a minimum, aggressive data collection combined with location, app usage and search history can make these moments feel unsettling.

    Despite years of scrutiny, most smartphones still operate this way today. The good news is that you can reduce how much data leaves your device.

    How to protect yourself from overnight data sharing

    You do not need to give up your smartphone to regain control. Small settings changes can make a real difference.

    1) Review app permissions

    Start with your installed apps. Focus on those with access to your location, microphone, camera and tracking data. Only allow sensitive permissions while the app is in use. Be especially cautious with apps that run continuously in the background.

    How to review app permissions on iPhone 

    • Open Settings
    • Tap Privacy & Security
    • Tap Location ServicesMicrophoneCamera or Tracking
    • Select an app from the list
    • Choose While Using the App or Never when available

    For tracking controls:

    • Go to Settings
    • Click Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    This prevents apps from accessing your advertising identifier and sharing activity across apps and websites.

    AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

    Phone sharing data at night and how to stop it

    Turning off app tracking on your iPhone blocks apps from linking your activity across other apps and websites. (Kurt “CyberGuy” Knutsson)

    How to review app permissions on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Privacy & Security or Security and privacy 
    • Click More privacy settings 
    • Tap Permission Manager
    • Select LocationMicrophoneCamera or Sensors
    • Tap an app and choose Allow only while using the app or Don’t allow

    To review background access:

    • Go to Settings
    • Click Apps
    • Select an app
    • Tap Mobile data & Wi-Fi
    • Turn off Background data if the app does not need constant access

    This limits silent data transfers when the app is not actively open.

    2) Limit background activity

    Disabling background activity reduces how often apps sync data when you are not using them. This also limits automatic cloud activity. Keep in mind that this may affect real-time backups or notifications. Weigh the convenience against the privacy trade-off.

    How to limit background activity on iPhone

    Turn off Background App Refresh

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Tap Background App Refresh at the top
    • Select Off or Wi-Fi

    To disable it for specific apps:

    • Stay on the Background App Refresh screen
    • Toggle off apps that do not need to update in the background

    This prevents apps from quietly syncing data when they are not open.

    How to limit background activity on Android 

    Settings may vary depending on your Android phone’s manufacturer.

    Restrict background data

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Mobile data & Wi-Fi
    • Turn off Background data

    Restrict background battery usage

    • From the app’s settings screen, tap Battery
    • Select Restricted or Limit background usage

    This reduces background syncing and prevents apps from running silently when you are not actively using them.

    3) Turn off personalized advertising

    Personalized ads rely on device identifiers and activity data collected across apps. Turning this off limits how your behavior is used for ad targeting, even when your phone is idle.

    How to turn off personalized ads on iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    To limit Apple ads:

    • Go to Settings
    • Click Privacy & Security
    • Tap Apple Advertising
    • Turn off Personalized Ads

    This reduces ad targeting based on your activity within Apple services.

    TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

    Phone sharing data at night and how to stop it

    Disabling personalized ads reduces how your behavior is used to target ads, even when your phone is idle. (Kurt “CyberGuy” Knutsson)

    How to turn off personalized ads on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Privacy & Security or Security and privacy
    • Click More privacy settings
    • Tap Ads or Advertising
    • Tap Delete advertising ID or Opt out of Ads Personalization
    • Click Delete advertising ID

    You can also reset your advertising ID from this menu to break the link between past activity and future ads.

    This limits how apps and advertisers track behavior across apps and websites.

    4) Consider a VPN

    A reputable VPN can help obscure your IP address and reduce certain forms of network-based tracking. It does not stop all data collection, but it adds a layer of protection, especially on shared or public networks.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Remove your data from broker sites

    Even if you lock down your phone, much of your personal information already exists online. Data brokers collect and sell details like your name, address, phone number and browsing behavior.

    Using a reputable data removal service can help locate and remove your information from these sites. This reduces how easily advertisers and third parties can link your phone activity to your real identity.

    For ongoing protection, these services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Use airplane mode or power off at night

    If overnight data sharing concerns you, the simplest option is also the most effective. Turning your phone off or using airplane mode cuts off wireless communication while still allowing alarms to work.

    How to turn on airplane mode on iPhone

    • Open Control Center by swiping down from the top right corner
    • Tap the airplane icon so it turns orange
    • Confirm that cellular, Wi Fi and Bluetooth turned off

    How to turn on airplane mode on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Swipe down from the top of the screen to open Quick Settings
    • Tap the airplane mode icon
    • Check that mobile data, Wi Fi and Bluetooth are disabled

    If you still want Bluetooth for a watch or headphones, you can turn it back on manually after enabling airplane mode. This keeps most background data transfers blocked while you sleep.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Your smartphone works around the clock, even when you do not. Some background data sharing keeps your device secure and functional. Other data collection exists primarily to fuel tracking and advertising. The key is awareness and control. By tightening permissions, limiting background activity and disabling ad personalization, you reduce how much of your personal data leaves your phone while you sleep. Privacy is not about fear. It is about informed choices.

    Do you leave your phone fully on overnight, or will tonight be the night you finally switch it off? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • 5 simple tech tips to improve digital privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your privacy doesn’t require advanced tools or technical expertise. Some of the most effective protections are already built into your phone; you just need to know where to look.

    These five privacy tips show you exactly how to reduce tracking and limit data sharing on both iPhone and Android using the latest software.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    Smartphone users can boost privacy by adjusting built-in settings that limit tracking, location sharing and background data collection on iPhone and Android devices. (Neil Godwin/Future via Getty Images)

    1) Reduce app permissions

    Apps often request access to your camera, microphone, contacts, photos and location, even when it’s not necessary. Limiting these permissions reduces background data collection.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Select a permission type such as Microphone, Camera, Photos or Contacts
    • Toggle off access for apps that don’t need it

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Choose a permission category and set apps to Don’t allow or Allow only while using the app

    2) Turn off location access you don’t need

    Location tracking can reveal where you live, work, shop and travel.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services
    • Select an app and choose While Using the App or Never
    • Turn off Precise Location when exact coordinates aren’t needed

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Location
    • Tap App location permissions or App permissions 
    • Scroll through the list and tap the app you want to change
    • Select Allow only while using the app or Don’t allow

    3) Turn off photo sharing with apps

    Some apps request full access to your photo library, giving them visibility into every image and video you’ve taken.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Photos
    • Select an app and choose Selected Photos or None

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Tap Photos and videos 
    • Scroll through the list and tap the app you want to change
    • Set apps to Don’t allow, or Allow limited access

    5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY

    Woman holding her phone.

    Turning off unnecessary app permissions and tracking features helps protect sensitive information stored on your phone. (Sebastian Kahnert/picture alliance via Getty Images)

    4) Turn off app tracking

    App tracking allows advertisers to follow your activity across multiple apps.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security & privacy
    • Scroll down and tap More privacy settings
    • Tap Ads
    • Tap Delete advertising ID to remove the existing ID tied to your device
    • Tap Reset advertising ID to generate a new, blank ID

    This removes the identifier apps use to track you for targeted ads and replaces it with a fresh ID that isn’t linked to your previous activity.

    5) Turn off unnecessary background app activity

    Some apps continue running and collecting data even when you’re not actively using them.

    iPhone

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Turn it off entirely or disable it for individual apps

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Battery
    • Choose Restricted or turn off Allow background usage 

    Pro tip: Use a password manager

    A password manager reduces the need to store logins inside apps, which can limit unnecessary permissions and data collection.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Person selecting an item on their phone.

    Privacy experts say small changes to phone settings can go a long way in reducing digital surveillance and data exposure. (Karl-Josef Hildenbrand/Picture Alliance via Getty Images)

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Kurt’s key takeaways

    Protecting your privacy doesn’t have to be complicated. By reducing app permissions, limiting location access, controlling photo sharing, turning off app tracking and restricting background activity, you can significantly reduce how much personal data your phone shares. A few simple setting changes can go a long way in protecting your digital life.

    What privacy setting surprised you the most, or is there one you’re unsure about? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Street Lines: 2025 Jeep Wagoneer S Limited 4XE

    [ad_1]

    Right off the bat, I am feeling Jeep’s dedication to explore the hybrid and all-electric sectors. Since documenting my enjoyment of the 2025 2025 Wrangler Willys ‘41 4xe, the Wagoneer S Limited 4xe was next up,  blending the brand’s rugged nature with the luxury, comfort, technology, and plug in capability to name a few standouts. Ultimately, I truly enjoyed this SUV from bumper to bumper.

    The 2025 Jeep® Wagoneer S Limited pairs capability, class, and comfort with available best-in-class usable screen space of more than 45 inches, over 170 standard safety and security features and brand-exclusive Selec-Terrain traction management system. It features a distinguishable black roof and mirror caps, low-profile exterior badging, 20-inch machined aluminum wheels, and a standard dual-pane panoramic sunroof.

    The Wagoneer S greets the eyes with a framework that is modern, yet muscular. The striking Fathom Blue Pearl-Coat exterior paint is metallic, has a base of dark blue, with hints of purple that alters spending on how the light hits it. The exterior is complemented with 20-inch painted diamond-cut aluminum wheels, signature illuminated Jeep grille lighting, titanium exterior accents, and dark daylight opening moldings from the optional—and recommended—Dark Appearance Package to elevate the look. A dual-pane panoramic sunroof further enhances the exterior appeal while blessing the cabin with natural light and stargazing at night. A necessary enhancement to any car’s nod to the future, the Wagoneer’s lightwork flexes in numerous ways, including bi-function led premium reflector headlamps, door-handle approach lamps, and led fog lamps. Yes, this automobile is a looker. 

    The 2025 Jeep® Wagoneer S Limited trim interior features a maximum usable screen space of more than 45 inches (best-in-class among EVs), more than 170 standard safety and security features, plus a new Arctic Grey interior color.

    Stepping inside this five-seater, the 4xe makes both tech and comfort a priority. The cabin features ambient LED interior lighting, heated front seats, and a heated steering wheel paired with a tilt-and-telescoping steering column to customize the driver’s positioning. The centerpiece is Jeep’s Uconnect 5 system with an expansive 12.3-inch touchscreen, paired by a secondary comfort control screen. Wireless Apple CarPlay and Android connectivity; a wireless charging pad; 4G LTE Wi-Fi hotspot; and nine-speaker audio system with subwoofer collectively keep the cabin plush.

    The 2025 Jeep® Wagoneer S Limited pairs capability, class, and comfort with available best-in-class usable screen space of more than 45 inches, over 170 standard safety and security features and brand-exclusive Selec-Terrain traction management system. It features a distinguishable black roof and mirror caps, low-profile exterior badging, 20-inch machined aluminum wheels, and a standard dual-pane panoramic sunroof.

    Performance? No problem. This Wagoneer is powered by a 400-volt, 100-kW battery pack, delivering smooth, hushed acceleration topping off at 500 horsepower and 514 pound-feet of torque. With an EPA-estimated 93 MPGe combined, this version delivers a respectable driving range of up to 294 miles. With the ability to charge at three different levels, Level 3 charges up to 80 percent in about an impressive 23 minutes. Jeep’s Selec-Terrain drive mode selector, all-speed traction control, and active driver assistance systems make sure the driver can take on virtually any terrain, which Jeep is proudly renowned for. On the practical side, welcomed touches like front trunk storage, remote climate control, and a hands-free power liftgate make everything from grocery runs to long excursions a lot more effortless.

    Priced at a base of about $65K, with a total as tested of $67,790, the Wagoneer S Limited 4xe is the ideal balance of upscale amenities, innovation, and sustainability, backed by a mind-easing 8-year/100,000-mile battery and electric powertrain warranty. If you’re looking for a well-appointed, all-electric SUV that’s ready to take on whatever road comes its way, this is a solid consideration. For even more power, I am looking forward to reviewing the Launch Edition of the Wagoneer, flexing 600 horsepower to justify its name. Until then, the S Limited will do just fine.

    Fuel Economy MPGe: 100 city/85 highway (93 MPGe combined)

    Price: Starting at $65,200 and reviewed with all the packages and options totaling $67,790. For more information, visit Jeep.com

    [ad_2]

    Dennis Malcolm Byron aka Ale Sharpton

    Source link

  • Why your Android TV box may secretly be a part of a botnet

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Android TV streaming boxes that promise “everything for one price” are everywhere right now. 

    You’ll see them on big retail sites, in influencer videos, and even recommended by friends who swear they’ve cut the cord for good. And to be fair, they look irresistible on paper, offering thousands of channels for a one-time payment. But security researchers are warning that some of these boxes may come with a hidden cost.

    In several cases, devices sold as simple media streamers appear to quietly turn your home internet connection into part of larger networks used for shady online activity. And many buyers have no idea it’s happening.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Android TV streaming boxes promising unlimited channels for a one-time fee may quietly turn home internet connections into proxy networks, according to security researchers. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)

    What’s inside these streaming boxes

    According to an investigation by Krebs on Security, media streaming devices don’t behave like ordinary media streamers once they’re connected to your network. Researchers closely examine SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox markets itself as just hardware. The company claims it doesn’t pre-install pirated apps and insists users are responsible for what they install. That sounds reassuring until you look at how the device actually works.

    To unlock the thousands of channels SuperBox advertises, you must first remove Google’s official app ecosystem and replace it with an unofficial app store. That step alone should raise eyebrows. Once those custom apps are installed, the device doesn’t just stream video but also begins routing internet traffic through third-party proxy networks.

    What this means is that your home internet connection may be used to relay traffic for other people. That traffic can include ad fraud, credential stuffing attempts and large-scale web scraping.

    During testing by Censys, a cyber intelligence company that tracks internet-connected devices, SuperBox models immediately contacted servers tied to Tencent’s QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.

    Grass describes itself as an opt-in network that lets you earn rewards by sharing unused internet bandwidth. This suggests that SuperBox devices may be using SDKs or tooling that hijack bandwidth without clear user consent, effectively turning the box into a node inside a proxy network.

    Why SuperBox activity resembles botnet behavior

    In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without the owners realizing it.

    Researchers discovered SuperBox devices contained advanced networking and remote access tools that have no business being on a streaming box. These included utilities like Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.

    The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled “secondstage,” suggesting additional payloads or functionality beyond streaming.

    SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but often come preloaded with malware or require unofficial app stores that expose users to serious risk.

    In July 2025, Google filed a lawsuit against operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for advertising fraud and proxy services, and many were infected before consumers even bought them.

    Around the same time, the Feds warned that compromised streaming and IoT devices were being used to gain unauthorized access to home networks and funnel traffic into criminal proxy services.

    We reached out to SuperBox for comment but did not receive a response before our deadline.

    8 steps you can take to protect yourself

    If you already own one of these streaming boxes or are thinking about buying one, these steps can help reduce your risk significantly.

    1) Avoid devices that require unofficial app stores

    If a streaming box asks you to remove Google Play or install apps from an unknown marketplace, stop right there. This bypasses Android’s built-in security checks and opens the door to malicious software. Legitimate Android TV devices don’t require this.

    2) Use strong antivirus software on your devices

    Even if the box itself is compromised, strong antivirus software on your computers and phones can detect suspicious network behavior, malicious connections or follow-on attacks like credential stuffing. Strong antivirus software monitors behavior, not just files, which matters when malware operates quietly in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Put streaming devices on a separate or guest network

    If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones or work systems. It’s one of the simplest ways to limit damage if something goes wrong.

    4) Use a password manager

    If your internet connection is being abused, stolen credentials often come next. A password manager ensures every account uses a unique password, so one leak doesn’t unlock everything. Many password managers also refuse to autofill on suspicious or fake websites, which can alert you before you make a mistake.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    AndroidTV logo on a phone.

    Investigators warn some Android-based streaming boxes route user bandwidth through third-party servers linked to ad fraud and cybercrime. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    5) Consider using a VPN for sensitive activity

    A VPN won’t magically fix a compromised device, but it can reduce exposure by encrypting your traffic when browsing, banking or working online. This makes it harder for third parties to inspect or misuse your data if your network is being relayed.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Watch your internet usage and router activity

    Unexpected spikes in bandwidth, slower speeds or strange outbound connections can be warning signs. Many routers show connected devices and traffic patterns.

    If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.

    Also, make sure your router firmware is up to date and that you’ve changed the default admin password. Compromised devices often try to exploit weak router settings to persist on a network.

    7) Be wary of “free everything” streaming promises

    Unlimited premium channels for a one-time fee usually mean you’re paying in some other way, often with your data, bandwidth or legal exposure. If a deal sounds too good to be true, it usually is.

    8) Consider a data removal service

    If your internet connection or accounts have been abused, your personal details may already be circulating among data brokers. A data removal service can help opt you out of people-search sites and reduce the amount of personal information criminals can exploit for follow-up scams or identity theft. While it won’t fix a compromised device, it can limit long-term exposure.

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    An AndroidTV display.

    Cyber experts say certain low-cost streaming devices behave more like botnet nodes than legitimate media players once connected to home networks. (Photo by Alessandro Di Ciommo/NurPhoto via Getty Images)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Kurt’s key takeaway

    Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it’s worth asking what it’s really doing behind the scenes. Research shows that some of these boxes don’t just stream TV. They quietly turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn’t mean giving up control of your internet connection. Before plugging in that “too good to be true” box, it’s worth slowing down and looking a little closer.

    Would you still use a streaming box if it meant sharing your internet with strangers? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 5 tech terms that shape your online privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We’ll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. 

    Learning these concepts will help you limit data exposure and stay in control of who can see what.

    Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you!

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.    

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    1) App permissions

    What your apps are really allowed to see

    Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.

    Once granted, these permissions can allow apps to collect data in the background, sometimes even when you’re not actively using them. Over time, this can quietly expose sensitive personal information.

    Regularly reviewing and limiting app permissions in your phone’s settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library.

    iPhone steps (iOS 18 and later)

    To review permissions by category

    • Open Settings
    • Tap Privacy & Security
    • Select a category such as Location ServicesMicrophoneCameraPhotos or Contacts
    • Review each app listed
    • Change access to Never or While Using the App when available

    To review permissions by app

    • Open Settings
    • Scroll down and tap the app’s name
    • Toggle off any permissions the app does not truly need

    Extra privacy tip

    • For Photos, choose Limited Access instead of full library access when possible

    Many apps request more access than they need, quietly collecting data in the background. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review permissions by category

    • Open Settings
    • Tap Privacy
    • Tap Permission manager
    • Select a category such as LocationCameraMicrophone or Contacts
    • Review apps and change access to Don’t allow or Allow only while using the app

    To review permissions by app

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Permissions
    • Remove any permissions that aren’t essential

    Extra privacy tip

    • Disable Allow background usage for apps that don’t need constant access

    Why this matters

    • Apps can collect data even when you’re not using them
    • Location, microphone and photo access are the most sensitive
    • Fewer permissions mean less data exposure
    • You stay in control without breaking most apps

    Extra protection beyond settings:

    Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. 

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    2) Location services

    When your phone knows where you are, constantly

    Location services use GPS, Wi-Fi, Bluetooth, and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don’t actually need.

    Reducing location access limits, tracking and helps protect your daily routines.

    iPhone steps (iOS 18 and later)

    To review all location access

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services

    For each app

    • Tap an app name
    • Select Never or While Using the App
    • Turn Precise Location off unless required

    Recommended settings

    • Avoid Always unless the app truly needs background tracking
    • Use While Using the App for most apps
    • Disable Precise Location for weather, shopping and social apps

    System services (optional)

    • Scroll down and tap System Services
    • Turn off items you don’t need, such as Location-Based Ads and Location-Based Suggestions
    Person typing on cellphone

    Location tracking can reveal your routines and movements long after you close an app. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review location access

    • Open Settings
    • Tap Privacy
    • Tap Location

    For each app

    • Tap Location access for apps
    • Select an app
    • Choose Don’t allow or Allow only while using the app
    • Turn Use precise location off when available

    Recommended settings

    • Avoid Allow all the time
    • Use Allow only while using for navigation apps
    • Disable precise location for apps that don’t require accuracy 

    Why this matters

    • Location data reveals routines, habits and patterns
    • Many apps track location in the background by default
    • Limiting access reduces profiling and data sharing
    • You keep core features without constant tracking

    3) Two-factor authentication (2FA)

    Your second line of defense

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.

    Even if hackers steal your password through a data breach or phishing attack, 2FA can stop them from accessing your accounts. That’s why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.

    It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available.

    Extra security tip:
    Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    4) VPN (Virtual Private Network)

    Hiding your online activity

    A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.

    VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.

    While a VPN doesn’t make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Cross-app tracking

    How companies follow you across apps

    Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.

    On iPhone, this tracking is controlled by Apple’s App Tracking Transparency system.
    On Android, it relies on advertising IDs and ad personalization controls.

    Turning these off limits how easily companies can connect your behavior across apps. You’ll still see ads, but they won’t be tailored to your personal activity.

    iPhone steps (iOS 18 and later)

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn Allow Apps to Request to Track off

    Optional extra protection

    • Review the app list below and make sure no apps are allowed to track you
    • Apps already denied cannot track you across other apps or websites
    Woman holds a phone

    Two-factor authentication (2FA) adds a critical extra step that helps stop account takeovers. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Privacy
    • Tap Ads
    • Turn Delete advertising ID on
    • Tap Ad topics and turn them off
    • Tap Ad measurement and turn it off

    What this does

    • Removes your advertising ID
    • Stops apps from sharing ad behavior across other apps
    • Limits interest-based and cross-app ad profiling

    One more thing to know:
    Turning off cross-app tracking helps going forward, but it doesn’t remove data that’s already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.       

    Kurt’s key takeaways

    Online privacy doesn’t have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you’re comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking, can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we’ll keep breaking it all down so you can protect your digital life with confidence.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Confused by a tech term or want something explained? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    [ad_2]

    Source link

  • Is This the Thinnest Tablet Ever?

    [ad_1]

    If you think the 12.9-inch iPad Pro is thin at 5.1mm, think again. At CES 2026, I came across a tablet that’s merely 3.1mm—a whole 2mm thinner than the skinniest device that Apple currently sells.

    Tucked in the back sides of CES Unveiled, a mini kickoff event for the main event, is an Android-based tablet called Paper from a company called Haining Toall Technology Co., Ltd. I thought it was an external display at first or even a dummy tablet, but nope, a rep told me it’s a whole tablet.

    © Raymond Wong / Gizmodo

    The Paper’s main selling point is how thin it is. To achieve its slim profile, most of its components are crammed inside a section on the back left of the tablet. The ports—mini HDMI and two USB-C ports—are also jammed in there. This hump also serves as a way to grip the tablet with one hand. Because the Paper is so damn thin and the bezels surrounding the screen are also super slim, there’s really no way to hold the lightweight (400g) device comfortably. So the grip-like design actually works well.

    Toall Paper Tablet 1
    © Raymond Wong / Gizmodo

    It’s also not a new idea. Sony’s Xperia Tablet S from 2012 had a similar design.

    Toall Paper Tablet 4
    © Raymond Wong / Gizmodo

    What I don’t know is almost everything about the specs. The Chinese company reps and translator had a difficult time understanding what I was asking and gave me vague responses like “it’s Chinese innovation” or “because of miniaturization” when I asked them how they made the device so thin or for specific specs on the front-facing camera and battery life. I was able to confirm that the Paper’s screen is AMOLED. And the touchscreen seemed responsive enough when I tapped and swiped on it.

    Oh, and they also told me the Paper costs $1,500. Yes, one, five, zero, zero. That’s a lot of money for a tablet from a brand that almost nobody’s heard of and for which there’s very little online info about.

    Toall Paper Tablet 3
    © Raymond Wong / Gizmodo

    Alas, this is something that’s common at CES. Vendors come from all over the world to show off their innovative products, but don’t always have answers for curious media.

    As for whether the Paper is the world’s thinnest tablet right now? Maybe? I’m not aware of any tablet that’s slim. But do correct me if I’m wrong.

    Gizmodo is on the ground in Las Vegas all week bringing you everything you need to know about the tech unveiled at CES 2026. You can follow our CES live blog here and find all our coverage here.

    [ad_2]

    Raymond Wong

    Source link

  • How to share your estimated arrival time on iPhone and Android

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Sharing your estimated time of arrival (ETA) lets others know when to expect you without constant check-ins. Apple Maps and Google Maps both include built-in tools that send live arrival updates while you drive. Once turned on, the updates run automatically. That means fewer distractions and safer trips.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free — when you join my CYBERGUY.COM newsletter.

    NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS

    Apple Maps and Google Maps let drivers share live ETAs, so contacts can track arrival times without constant texts or calls. (Photographer: David Paul Morris/Bloomberg via Getty Images)

    Why this feature makes everyday travel easier

    Sharing your ETA is quick and practical. It lets contacts know you are on your way and see your updated arrival time in real time. It also adds peace of mind during late nights, long routes or unfamiliar areas. Most importantly, you stay focused on moving safely instead of responding to messages.

    We tested these steps using an iPhone 15 Pro Max running iOS 26.2 and a Samsung Galaxy Android phone running Android 16. Make sure Apple Maps or Google Maps is installed and updated to the latest version.

    Enable Share ETA Permissions on iPhone

    Before starting navigation, confirm that Apple Maps has the correct permissions. Without these settings enabled, ETA sharing may never appear.

    • Open Settings.
    • Tap Privacy & Security.
    • Tap Location Services and make sure it is turned on.
    • In Location Services, tap Maps.
    • Set location access to While Using the App or Always.
    • Turn on Precise Location.
    • Return to Settings.
    • Scroll down and tap Apps
    • Click Maps.
    • Scroll down, and next to Share ETA, enable it.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    Woman typing on her phone.

    Sharing your ETA updates automatically as traffic changes, helping drivers stay focused on the road. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    How to Share ETA on iPhone Using Apple Maps

    Follow these steps to share your live ETA with a contact using Apple Maps. Note: ETA sharing only works after navigation begins. You also need Location Services enabled for Maps and Contacts.

    • Open Apple Maps on your iPhone.
    • Search for your destination and tap it.
    • Select your travel mode, then tap Go to start navigation.

    Once navigation starts, tap the route card at the bottom of the screen to expand it.

    • Scroll down and tap Share ETA.
    • Choose a recent contact or tap Contacts to search for someone.
    • Your contact will get a notification and can see your live ETA until you arrive or stop sharing.

    How to share ETA on Android using Google Maps

    Android users can share their ETA just as easily with Google Maps. You can share your live arrival time on any Android phone using Google Maps. The feature is built into the Google Maps app.

    Menu wording or placement may vary slightly depending on your device and Android version.

    • Open the Google Maps app on your Android phone.
    • Search for your destination and tap Directions.
    • Tap Start to begin navigation.
    • While navigation is active, swipe up from the bottom of the screen to open the trip menu.
    • Tap Share trip progress (on some devices, this may appear as Share your trip).
    • Choose a contact or share a link using text message or another app.

    Your contact can follow your live location and see updated arrival times until you reach your destination or stop sharing.

    Pro tip: If you don’t see “Share trip progress,” make sure navigation has already started.

    HOLIDAY TRAVEL PRIVACY RISKS AND HOW TO STAY SAFE

    Person using their iPhone.

    iPhone and Android users can send real-time arrival updates directly from Apple Maps or Google Maps. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    What happens after you share your ETA

    Once sharing is active, both apps handle updates automatically.

    • Arrival times adjust with traffic
    • Delays appear without manual messages
    • Sharing ends when you arrive

    You can stop sharing at any time from the navigation screen. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Sharing your ETA on iPhone or Android removes the pressure of keeping others informed while driving. Apple Maps and Google Maps do the work for you. It is a simple habit that improves safety of communication and peace of mind.

    Do you use ETA sharing when you drive, walk, or take transit, and has it changed how often people check in on you? Let us know by writing to us at Cyberguy.com. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free — when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Never lose your car with Maps parking tools

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Forgetting where you parked happens to everyone. Busy schedules, crowded lots and mental autopilot make it easy to walk away without a second thought. Thankfully, your iPhone can remember for you. Both Google Maps and Apple Maps now make it easy to find your car again with little or no effort. Google recently added smarter automatic parking detection on iPhone. Apple Maps has offered a similar feature for years. Together, they give you a reliable backup when your memory fails. Below is how each one works and how to make sure it is ready when you need it.

    If you use an Android phone, we have steps below that show you how to save and find your parked car using Google Maps on Android.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    GOOGLE MAPS VS WAZE VS APPLE MAPS: WHICH IS BEST?

    Google Maps can automatically save where you parked on an iPhone and drop a clear pin on the map. Once it appears, you can tap it anytime to get walking directions back to your car. (Kurt “CyberGuy” Knutsson)

    How Google Maps saves your parking spot on iPhone

    Google Maps can automatically detect when you park and drop a pin that stays for up to 48 hours or until you drive again. It currently works on iPhone only.

    Connect your iPhone to your car

    Google Maps needs a signal that you stopped driving.

    • Connect your iPhone to your car using Bluetooth: On your iPhone, open Settings, tap Bluetooth and pair it with your vehicle before you drive.
    • Connect your iPhone using USB: Plug your iPhone into the car’s USB port with a cable before you start your journey.
    • Use CarPlay with your iPhone: Go to Settings on your iPhone, tap General, tap CarPlay, then select your car to link your iPhone to the vehicle.

    Any of these connections can trigger parking detection.

    Allow Google Maps to save parking automatically

    If you want this to work every time, adjust one key setting.

    • Open the Settings app on your iPhone
    • Tap Apps
    • Then, click Google Maps
    • Tap Location
    • Select Always

    This allows Google Maps to track parking even when the app is not open.

    Turn on motion-based parking detection

    This helps Google Maps save your parking spot even when Bluetooth or CarPlay is not in use.

    • Open Google Maps on your iPhone
    • Tap your profile photo in the upper right corner
    • Tap Settings
    • Then click Navigation
    • Turn on Automatically save parking
    • To make sure motion detection works:
    • Open the iPhone Settings app
    • Tap Privacy and Security
    • Tap Motion & Fitness
    • Make sure Fitness Tracking is on
    • Make sure Google Maps is enabled

    This allows Google Maps to use movement data to detect when you stop driving.

    Find your parked car

    • Once you park, Google Maps drops a pin labeled You parked here.
    • Open Google Maps to see the pin
    • Tap the search bar
    • Choose Saved parking

    The pin stays visible for up to 48 hours.

    Adjust the location if needed

    If the pin is slightly off:

    • Tap the parked location
    • Select Change location
    • Drag the marker to the correct spot

    FIND A LOST PHONE THAT IS OFF OR DEAD

    Google Maps application on smartphone

    After parking, Google Maps shows your saved location along with a quick Directions button. This makes it easy to return to your car without retracing your steps. (OLIVIER DOULIERY/AFP via Getty Images)

    How Apple Maps saves your parking spot

    Apple Maps uses your iPhone location and car connection to remember where you parked. In many cases, it works automatically without setup.

    Make sure Location Services is enabled

    Apple Maps relies on system settings.

    • Open Settings
    • Tap Privacy and Security
    • Tap Location Services
    • Make sure Location Services is on
    • Tap Maps
    • Select While Using the App

    Use Bluetooth or CarPlay

    Apple Maps detects parking when your iPhone disconnects from:

    • Your car’s Bluetooth system
    • Wired or wireless CarPlay

    This disconnection signals that you parked.

    Find your parked car in Apple Maps

    After parking:

    • Open Apple Maps on your iPhone
    • Look for Parked Car under the Search box or a parked car icon on the map
    • Tap the parked car entry or icon
    • Tap Directions to navigate back to your vehicle

    Apple Maps drops a parked car marker when your iPhone disconnects from Bluetooth or CarPlay as you exit your car. You can also see parking details, like how long ago you parked, if you enabled the proper settings in iPhone Settings.

    Google Maps vs Apple Maps for parking reminders

    Both apps work well, but they shine in different ways.

    • Google Maps: Parking pins last up to 48 hours and are easy to edit
    • Apple Maps: Deep iOS integration and simple automatic detection

    Many iPhone owners keep both enabled for backup.

    Photo of the Apple Maps app.

    Apple Maps can also remember where you parked when your iPhone disconnects from Bluetooth or CarPlay. Open the app and look for your parked car to get directions back. (Kurt “CyberGuy” Knutsson)

    How to find your parked car on Android phones

    If you use an Android phone, you can still save and find your parked car using Google Maps, but the process is manual.

    Save your parking location on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Google Maps on your Android phone
    • Tap the blue dot showing your current location
    • Tap Save your parking
    • Add notes or photos if you want help remembering landmarks

    Google Maps drops a parking pin that stays visible until you remove it or save a new one.

    Find your parked car later on Android 

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Google Maps
    • Tap the saved parking pin on the map
    • Tap Directions to navigate back to your car

    Unlike the iPhone, Android does not currently support automatic parking detection in Google Maps.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Forgetting where you parked happens fast, but finding your car does not have to be stressful. Google Maps and Apple Maps can save your parking location and guide you back when you need it most. On the iPhone, much of this works automatically once settings are enabled. Android users can still save their spot manually with Google Maps. Either way, taking a few minutes to set this up now can save time, steps and frustration later.

    How much time have you already wasted searching for your car that your phone could have saved? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Meet the team that hunts government spyware

    [ad_1]

    For more than a decade, dozens of journalists and human rights activists have been targeted and hacked by governments all over the world. Cops and spies in Ethiopia, Greece, Hungary, India, Mexico, Poland, Saudi Arabia, and United Arab Emirates, among others, have used sophisticated spyware to compromise the phones of these victims, who at times have also faced real-world violence being intimidated, harassed, and in extreme cases, even murdered.

    In the last few years, in the fight to protect these higher-risk communities, a team of a dozen digital security experts, mostly based in Costa Rica, Manila, and Tunisia, among other places, have played a key role. They work for the New York-headquartered nonprofit Access Now, specifically its Digital Security Helpline

    Their mission is to be the team of people who journalists, human rights defenders, and dissidents can go to if they suspect they’ve been hacked, such as with mercenary spyware made by companies like NSO Group, Intellexa, or Paragon

    “The idea is to provide this 24/7 service to civil society and journalists so they can reach out whenever they have… a cybersecurity incident,” Hassen Selmi, who leads the incident response team at the Helpline, told TechCrunch. 

    According to Bill Marczak, a senior researcher at the University of Toronto’s Citizen Lab who has been investigating spyware for almost 15 years, Access Now’s Helpline is a “frontline resource” for journalists and others who may have been targeted or hacked with spyware.

    The helpline has become a critical funnel for victims. So much so that when Apple sends its users a so-called “threat notification” alerting them that they have been targeted with mercenary spyware, the tech giant has long directed victims to Access Now’s investigators

    In speaking with TechCrunch, Selmi described a scenario where someone gets one of these threat notifications, and where Access Now can help victims.

    “Having someone who could explain it to them, tell them what they should do, what they should not do, what this means… This is a big relief for them,” said Selmi. 

    According to several digital rights experts who have investigated spyware cases and previously spoke with TechCrunch, Apple is generally taking the right approach, even if the optics look like a trillion-dollar tech giant offloading its responsibility to a small team of nonprofit workers. 

    Being mentioned by Apple in the notifications, said Selmi, was “one of the biggest milestones” for the helpline.

    Selmi and his colleagues now look into about 1,000 cases of suspected government spyware attacks per year. Around half of those cases turn into actual investigations, and only around 5% of them, around 25, result in a confirmed case of spyware infection, according to Mohammed Al-Maskati, the helpline’s director.

    When Selmi started doing this work in 2014, Access Now were only investigating around 20 cases of suspected spyware attacks per month. 

    At the time, there were three or four people working in each timezone in Costa Rica, Manila, and Tunisia, locations that allowed them to have someone online throughout the whole day. The team isn’t that much bigger now, with fewer than 15 people working for the helpline. The helpline has more people in Europe, the Middle East, North Africa, and Sub-Saharan region, given that these are hotspots for spyware cases, according to Selmi.  

    The increase in cases, Selmi explained, is due to several circumstances. For one, the helpline is now more well known, so it attracts more people. Then, with government spyware going global and becoming more available, there are potentially more cases of abuse. Finally, the helpline team has done more outreach to potentially targeted populations, finding cases of abuse they may not have found otherwise. 

    Contact Us

    Have you received a notification from Apple, Google, or WhatsApp about being targeted with spyware? Or do you have information about spyware makers? We would love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

    When someone contacts the helpline, Selmi told TechCrunch, its investigators first acknowledge receipt, then they do a first check to see if the person who contacted them is within the organization’s mandate, meaning if they are part of civil society — and not, for example, a business executive or lawmaker. Then, the investigators assess the case in triage. If a case is prioritized, the investigators ask questions, such as why the person believes they were targeted (if there was no notification), and what device they own, which helps to establish what kind of information the investigators may need to collect from the victim’s device.

    After an initial, limited check of the device performed remotely over the internet, the helpline’s handlers and investigators may ask the victim to send more data, such as a full backup of their device, to do a more thorough analysis examining for signs of intrusions. 

    “For each known kind of exploit that has been used in the last five years, we have a process on how to check that exploit,” said Selmi, referring to known hacking techniques. 

    “We know more or less what is normal, what is not,” said Selmi.

    The Access Now handlers, who manage communication and often speak the victim’s language, will also give the victim advice on what to do, such as whether to get another device, or take other precautions. 

    Every case that the nonprofit looks into is unique. “It’s different from person to person, from culture to culture,” Selmi told TechCrunch. “I think we should do more research, get more people on board — not just technical people — to know how to deal with these kinds of victims.”

    Selmi said that the helpline has also been supporting similar investigative teams in some regions of the world, sharing documentation, knowledge, and tools, as part of a coalition called CiviCERT, a global network of organizations that can help members of civil society who suspect they were targeted with spyware. 

    Selmi said this network has also helped to reach journalists and others in places where otherwise they could not get to. 

    “No matter where they are, [victims] have people who could talk to and report to,” Selmi told TechCrunch. “Having these people talk their language and know their context helped a lot.”

    [ad_2]

    Lorenzo Franceschi-Bicchierai

    Source link

  • New malware can read your chats and steal your money

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It is still in early development, but it already behaves like a fully mature operation. 

    Once it infects a device, it can take over your screen, steal your banking credentials and even read encrypted chats from apps you trust. The worrying part is how quietly it works in the background. You think your messages are safe because they are end-to-end encrypted, but this malware simply waits for the phone to decrypt them before grabbing everything. 

    It’s important to note, however, that Sturnus does not break encryption; it only captures messages after your apps decrypt them on your device.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Sturnus malware uses deceptive screens that mimic real banking apps to steal your credentials in seconds. (Kurt “CyberGuy” Knutsson )

    A closer look at the malware’s capabilities

    Sturnus combines several attack layers that give the operator nearly full visibility into the device, as reported by cybersecurity research firm ThreatFabric. It uses HTML overlays that mimic real banking apps to trick you into typing your credentials. Everything you enter goes straight to the attacker through a WebView that forwards the data instantly. It also runs an aggressive keylogging system through the Android Accessibility Service. This lets it capture text as you type, follow which app is open, and map every UI element on the screen. Even when apps block screenshots, the malware keeps tracking the UI tree in real time, which is enough to reconstruct what you are doing.

    NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS

    On top of overlays and keylogging, the malware monitors WhatsApp, Telegram, Signal and other messaging apps. It waits for these apps to decrypt messages locally, then captures the text right from the screen. This means your chats may remain encrypted over the network, but once the message appears on your display, Sturnus sees the entire conversation. It also includes a full remote control feature with live screen streaming and a more efficient mode that sends only interface data. This allows precise taps, text injection, scrolling and permission approvals without showing any activity to the victim.

    How Sturnus stays hidden and steals money

    The malware protects itself by grabbing Device Administrator privileges and blocking any attempt to remove it. If you open the settings page that could disable those permissions, Sturnus detects it immediately and moves you away from the screen before you can act. It also monitors battery state, SIM changes, developer mode, network conditions and even signs of forensic investigation to decide how to behave. All this data goes back to the command-and-control server through a mix of WebSocket and HTTP channels protected with RSA and AES encryption.

    When it comes to financial theft, the malware has several ways to take over your accounts. It can collect credentials through overlays, keylogging, UI-tree monitoring and direct text injection. If needed, it can black out your screen with a full-screen overlay while the attacker performs fraudulent transactions in the background. Since the screen is hidden, you have no idea anything is happening until it is too late.

    7 ways you can stay safe from Android malware like Sturnus

    If you want to protect yourself from threats like this, here are a few practical things you can start doing right away.

    1) Install apps only from trusted and verified sources

    Avoid downloading APKs from forwarded links, shady websites, Telegram groups or third-party app stores. Banking malware spreads most effectively through sideloaded installers disguised as updates, coupons or new features. If you need an app that isn’t in the Play Store, verify the developer’s official site, check hashes if provided and read recent reviews to make sure the app hasn’t been hijacked.

    2) Check permission requests carefully before tapping allow

    Most dangerous malware relies on accessibility permissions because they allow full visibility into your screen and interactions. Device administrator rights are even more powerful since they can block removal. If a simple utility app suddenly asks for these, stop immediately. These permissions should only be granted to apps that genuinely need them, such as password managers or accessibility tools you trust.

    3) Keep your phone updated

    Install system updates as soon as they arrive, since many Android banking trojans target older devices that lack the latest security patches. If your phone is no longer receiving updates, you are at a higher risk, especially when using financial apps. Avoid sideloading custom ROMs unless you know how they handle security patches and Google Play Protect.

    HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

    4) Use strong antivirus software

    Person holds iPhone showing the Whatsapp logo

    The malware quietly captures decrypted messages from apps like WhatsApp, Telegram and Signal right as they appear on your screen. (Kurt Knutsson)

    Android phones come with Google Play Protect built in, which catches a large chunk of known malware families and warns you when apps behave suspiciously. But if you want greater security and control, choose a third-party antivirus app. These tools can alert you when an app starts logging your screen or trying to take over your phone.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    5) Use a personal data removal service

    A lot of these campaigns rely on data brokers, leaked databases and scraped profiles to build lists of people to target. If your phone number, email, address or social handles are floating around on dozens of broker sites, it becomes much easier for attackers to reach you with malware links or tailored scams. A personal data removal service helps clean up that footprint by deleting your info from data broker listings.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Treat unusual login screens and pop-ups as red flags

    Trojan overlays often appear when you open your bank app or a popular service. If the screen layout looks different or asks for credentials in a way you don’t recognize, close the app completely. Reopen it from your app drawer and see if the prompt returns. If it doesn’t, you probably caught an overlay. Never type banking details into screens that appear suddenly or seem out of place.

    Man typing on his laptop.

    With remote control tools that stream your screen and automate taps, attackers can move money behind the scenes without you noticing. (Felix Zahn/Photothek via Getty Images)

    7) Be cautious with links and attachments you receive

    Attackers frequently distribute malware through WhatsApp links, SMS messages and email attachments pretending to be invoices, refunds or delivery updates. If you receive a link you weren’t expecting, open your browser manually and search for the service instead. Avoid installing anything that comes from a message, even if it appears to be from someone you know. Compromised accounts are a common delivery method.

    DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

    Kurt’s key takeaway

    Sturnus is still a young malware family, but it already stands out for how much control it gives attackers. It sidesteps encrypted messaging, steals banking credentials with multiple backup methods, and maintains a strong grip on the device through administrator privileges and constant environmental checks. Even if the current campaigns are limited, the level of sophistication here suggests a threat that is being refined for larger operations. If it reaches wide distribution, it could become one of the most damaging Android banking trojans in circulation.

    Have scammers ever tried to trick you into installing an app or clicking a link? How did you handle it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Android Sound Notifications help you catch key alerts

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Staying aware of your surroundings matters. That includes hearing smoke alarms, appliance beeps or a knock at the door. Still, real life gets busy. You wear headphones. You get focused. Sounds slip by. That is where Android Sound Notifications help. This built-in accessibility feature listens for key sounds and sends an alert to your screen. Think of it as a gentle tap on the shoulder when something important happens.

    Although it was designed to help people who are hard of hearing, it is useful for anyone. If you work with noise-canceling headphones or often miss alerts at home, this feature can make a real difference.

    Now, if you use an iPhone, here’s how Apple’s Sound Recognition can alert you to alarms and other key sounds on your device. 

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Android Sound Notifications alert you when important sounds happen around you.  (Kurt “CyberGuy” Knutsson)

    CHROME ROLLS OUT AI PODCAST FEATURE ON ANDROID

    What Sound Notifications do on Android

    Sound Notifications use your phone’s microphone to listen for specific sounds nearby. When it detects one, it sends a visual alert. You will see a pop-up, feel a vibration and may even see the camera flash.

    By default, Android can detect sounds like:

    • Smoke alarms
    • Fire alarms
    • Sirens
    • Door knocks
    • Doorbells
    • Appliance beeps
    • A landline phone ringing
    • Running water
    • A baby crying
    • A dog barking

    That range makes the feature practical at home or at work. Even better, you control which sounds matter to you.

    Why this feature is worth using

    Here is the simple truth. You cannot hear everything all the time. Distractions happen. Headphones block sound. Focus takes over. Sound Notifications fill that gap. While you stay locked into a task, your phone keeps listening. When something important happens, you still get the message. As a result, you worry less about missing alarms or visitors. You gain awareness without extra effort.

    How to turn on Sound Notifications

    Getting started only takes a minute. Note: We tested these steps on a Samsung Galaxy S24 Ultra running the latest version of Android. Menu names and locations may differ slightly on other Android phones, depending on the manufacturer and software version.

    • Open the Settings app
    • Go to Accessibility
    • Tap Hearing enhancements
    • Select Sound Notifications
    • Turn the feature on
    Screens side-by-side displaying how to turn on Sound Notifications

    Turning on Sound Notifications only takes a few taps in Android’s Accessibility settings. (Kurt “CyberGuy” Knutsson)

    When you enable Sound Notifications for the first time, Android will ask how you want to start the feature. Choose the option that works best for you:

    • Tap the button in the quick settings panel
    • Tap the Accessibility button
    • Press the Side and Volume Up buttons
    • Press and hold the Volume Up and Volume Down buttons for three seconds

    After you select a shortcut, Click Ok.  Then, Sound Notifications will start listening in the background.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    If you do not see the option, install the Live Transcribe & Notifications app from the Play Store. You can enable Sound Notifications from there. Once active, your phone listens for selected sounds and alerts you when it detects one. 

    Choose which sounds trigger alerts

    Not every sound deserves your attention. Thankfully, Android lets you fine-tune alerts.

    Settings may vary depending on your Android phone’s manufacturer

    • Go back to Settings
    • Tap Accessibility
    • Click Hearing enhancements
    • Tap Sound Notifications
    • Click Open Sound Notifications. This opens the actual Sound Notifications control screen.
    • On the Sound Notifications screen, tap Settings or the gear icon in the top corner
    • Tap Sound types

    You will now see the full list of detectable sounds.

    • Toggle on the sounds you want alerts for, such as smoke alarms or doorbells
    • Toggle off sounds you do not want, like dog barking or appliance beeps, if they are not important to you
    Screens side-by-side displaying how to turn on Sound Notifications

    You can choose exactly which sounds trigger alerts, helping you avoid unnecessary interruptions. (Kurt “CyberGuy” Knutsson)

    Check the sound history log

    Sound Notifications keep a log of detected sounds. This helps if you were away from your phone and want to see what happened.

    You can also save sounds and name them. That makes it easier to tell the difference between your washer finishing and your microwave timer.

    The log adds context, which makes alerts more helpful.

    GOOGLE’S NEW CALL REASON FEATURE MARKS CALLS AS URGENT

    Teach your phone custom sounds

    Android does not stop at presets. You can train it to recognize sounds unique to your space.

    Maybe your garage door has a distinct tone. Maybe an appliance uses a nonstandard beep. You can record it once, and your phone will listen for it going forward. To add a custom sound:

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Tap the gear icon
    • Select Custom sounds
    • Tap Add sound
    • Hit Record

    Record a clear 20-second clip. The better the audio, the better detection works later.

    Customize how alerts appear

    By default, Sound Notifications use vibration and the camera flash. That visual cue is helpful for urgent alerts. However, not every sound needs that level of attention. You can adjust how alerts appear based on importance.

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Open the gear icon
    • Tap Ways to be notified
    • From there, choose which alerts vibrate, flash or stay subtle

    This flexibility keeps the feature working for your routine.

    Your privacy stays on your phone

    It is reasonable to question constant listening. Here is the key detail. Sound Notifications process audio locally on your device. Sounds never leave your phone. Nothing gets sent to Google. The only exception is if you choose to include audio with feedback. That design keeps the feature private and secure.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Android Sound Notifications quietly solve a real problem. They help you stay aware when your ears cannot. Setup is fast. Controls are flexible. Privacy stays intact. Once you turn it on, you may wonder how you lived without it.

    What important sound have you missed lately that your phone could have caught for you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Street Lines – 2026 Mercedes-Benz EQE 320+ SUV

    [ad_1]

    I was hoping to review another Mercedes-Benz by popular demand before the year ended, and the wait is over. Introducing the 2026 Mercedes-Benz EQE 320+, the carmaker’s successful attempt to bring us a midsize, all-electric luxury SUV, boasting a blend of performance, technology, and pampering the brand is renowned for. 

    Photos courtesy of Mercedes-Benz

    The exterior is all about the curves, with a rounded body for a futuristic look ideal for aerodynamics. A welcomed sporty edginess is always welcome when it comes to the optional AMG Line Exterior ($3,500) appointments, the full-width LED lightband, and 21-inch quad five-spoke wheels with black accents. Friends and onlookers consistently complimented the exterior’s signature Twilight Blue, which I feel has some hues of grey and purple tastefully enhancing in the paint blend unlike any other car I have seen on the road.

    Photos courtesy of Mercedes-Benz

    Inside, the cabin fits up to five adults in pure luxury, greeted by Neva Grey and Biscaya Beige leather upholstery coupled with natural grain anthracite Linden wood trim. The driver gets treated to a vibrant MBUX multimedia system, featuring the vibrant 12.8-inch OLED portrait display, plus a head-up display I am always fond of, a backlit laser-cut star pattern illuminating the cockpit, and 64-color ambient lighting to set the mood. Seats are plush, temperature controlled and hug the body perfectly throughout the spacious interior, while everyone breathes confidently thanks to the HEPA air filtration. Great sound always hits high marks for me, and the optional Burmester 3D Surround Sound with Dolby Atmos kicks anything you play via Apple and Android applications up several tiers with a concert-like experience. 

    Photos courtesy of Mercedes-Benz

    Addressing the driving experience, the EQE 320+ has a more-than-efficient electric drivetrain paired with advanced regenerative braking that can be adjusted directly from the steering wheel. This system, including the Dynamic Select system—choose from Eco, Comfort, Sport, and Individual modes—delivers the welcomed option for drivers to customize their driving style. The optional AIRMATIC air suspension was also added to this version, which made driving smooth and cloudlike, with the option to take things on the more responsive side when desired. Performance specs are more than adequate, with the single-speed transmission delivering 315 horsepower (a 27-hp boost from last year), 0-60 mph in 5.9 seconds, and 416 lb.-ft of torque. I am always a fan of the DC fast-charging capability—up to 170 kW using the available Mercedes-Benz DC Fast Charging Adapter—won’t kill your day, replenishing the battery from 10 to 80 percent in about a half an hour. 80 MPGe is the average for city and highway commutes, combined, with a decent 270-mile range. 

    Photos courtesy of Mercedes-Benz

    Safety standard and optional features include active brake assist, active lane keeping assist, the aforementioned digital LED headlamps with adaptive highbeam assist, and a crisp surround-view camera with active parking assist. The guard 360° vehicle protection keeps drivers at ease when parked, and there is even attention assist to make sure drivers are alert on particularly long excursions. More demands are met with a quick “Hey, Mercedes” followed by a personable multilingual digital assistant to guide you through many of the features this SUV provides. 

    Starting at $64,950 and a completely equipped as-reviewed totaling just under $82K, the 2026 EQE 320+ SUV brings electric efficiency, opulent craftsmanship, and state-of-the-art technology, collectively confirming Mercedes-Benz’s future in the electric world will keep competitors on their toes.  

    Fuel Economy MPGe: 87 city/77 highway/82 combined

    Price: The 2026 Mercedes-Benz EQE 320+ SUV is $64,950 MSRP, and $81,920 with all the mentioned options and fees.

    For more information, visit Mbusa.com.

    [ad_2]

    Dennis Malcolm Byron aka Ale Sharpton

    Source link

  • Chrome rolls out AI podcast feature on Android

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Chrome on Android now offers a fresh way to digest information when your hands are busy or your eyes need a break.

    A new update powered by Google Gemini can turn written webpages into short podcast-style summaries. Two virtual hosts chat about the content, making it feel easier to follow during your commute or while you multitask.

    This upgrade builds on Chrome’s long-standing read-aloud tool, yet now adds a more natural and lively delivery. It does not work on every website, so some pages will still use the original word-for-word reading. When the AI option appears, though, the audio feels polished and smooth.

    Below is how to try it on your Android phone right now.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW TO DISABLE GEMINI AI ON ANDROID AND KEEP CONTROL OF YOUR APPS

    Make sure you have the newest Chrome version so the AI podcast feature works. (Cyberguy.com)

    Update Chrome before you start

    First, make sure Chrome is current in the Play Store by opening the Play Store, searching for Google Chrome and tapping Update if it appears. The AI podcast feature works with version 140.0.7339.124 or newer, so confirm you have at least that version installed. Once you finish the update, open Chrome and pick any webpage with text you want to hear.

    Settings may vary depending on your Android phone’s manufacturer.

    Open the More menu

    • Tap the More icon or the three vertical dots in the upper right corner. This reveals a set of options that control how Chrome displays or reads the page.

    Select Listen to this page

    • Choose Listen to this page. You will see a small Generating AI playback banner at the bottom. The processing is fast, so you will not wait long.

    Hear the AI hosts discuss the page

    • Chrome will start a mini podcast with two voices talking through the content. You can tap the playback bar to pause, rewind or jump ahead. The panel stays on screen and follows you as you scroll.

    Switch to standard playback when you want

    • The AI audio keeps going even if you leave the webpage. If you prefer a traditional word-for-word readback, tap the AI playback icon in the lower left and pick Standard Playback.
    Woman listening to a podcast or music

    Chrome begins creating the AI audio as soon as you tap the “Listen to this Page” option. (iStock)

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    What this means to you

    This feature can make long articles easier to absorb when you are on the move. You get a quick, conversational rundown without having to read a full page. It also helps you revisit information faster since the controls work like any audio player. If you enjoy podcasts, this tool gives you a familiar way to stay informed without draining your attention.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Chrome’s AI podcast feature brings a new layer of convenience to Android. It saves time, reduces eye strain and turns everyday browsing into a hands-free audio experience. Since it still supports the standard read-aloud mode, you can switch back anytime.

    Would you use AI hosts to read your favorite websites, or do you prefer the classic readback style? Let us know by writing to us at Cyberguy.com.

    Jennifer Welch speaks

    Using the new update powered by Google Gemini, you can change from the AI podcast to a simple word-for-word reading at any time. (“I’ve Had It” YouTube channel)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link