ReportWire

Tag: computers

  • Robots learn 1,000 tasks in one day from a single demo

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most robot headlines follow a familiar script: a machine masters one narrow trick in a controlled lab, then comes the bold promise that everything is about to change. I usually tune those stories out. We have heard about robots taking over since science fiction began, yet real-life robots still struggle with basic flexibility. This time felt different.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    ELON MUSK TEASES A FUTURE RUN BY ROBOTS

    Researchers highlight the milestone that shows how a robot learned 1,000 real-world tasks in just one day. (Science Robotics)

    How robots learned 1,000 physical tasks in one day

    A new report published in Science Robotics caught our attention because the results feel genuinely meaningful, impressive and a little unsettling in the best way. The research comes from a team of academic scientists working in robotics and artificial intelligence, and it tackles one of the field’s biggest limitations.

    The researchers taught a robot to learn 1,000 different physical tasks in a single day using just one demonstration per task. These were not small variations of the same movement. The tasks included placing, folding, inserting, gripping and manipulating everyday objects in the real world. For robotics, that is a big deal.

    Why robots have always been slow learners

    Until now, teaching robots physical tasks has been painfully inefficient. Even simple actions often require hundreds or thousands of demonstrations. Engineers must collect massive datasets and fine-tune systems behind the scenes. That is why most factory robots repeat one motion endlessly and fail as soon as conditions change. Humans learn differently. If someone shows you how to do something once or twice, you can usually figure it out. That gap between human learning and robot learning has held robotics back for decades. This research aims to close that gap.

    THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST

    A robot doing dishes

    The research team behind the study focuses on teaching robots to learn physical tasks faster and with less data.  (Science Robotics)

    How the robot learned 1,000 tasks so fast

    The breakthrough comes from a smarter way of teaching robots to learn from demonstrations. Instead of memorizing entire movements, the system breaks tasks into simpler phases. One phase focuses on aligning with the object, and the other handles the interaction itself. This method relies on artificial intelligence, specifically an AI technique called imitation learning that allows robots to learn physical tasks from human demonstrations.

    The robot then reuses knowledge from previous tasks and applies it to new ones. This retrieval-based approach allows the system to generalize rather than start from scratch each time. Using this method, called Multi-Task Trajectory Transfer, the researchers trained a real robot arm on 1,000 distinct everyday tasks in under 24 hours of human demonstration time.

    Importantly, this was not done in a simulation. It happened in the real world, with real objects, real mistakes and real constraints. That detail matters.

    Why this research feels different

    Many robotics papers look impressive on paper but fall apart outside perfect lab conditions. This one stands out because it tested the system through thousands of real-world rollouts. The robot also showed it could handle new object instances it had never seen before. That ability to generalize is what robots have been missing. It is the difference between a machine that repeats and one that adapts.

    AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING

    A robot doing dishes

    The robot arm practices everyday movements like gripping, folding and placing objects using a single human demonstration.  (Science Robotics)

    A long-standing robotics problem may finally be cracking

    This research addresses one of the biggest bottlenecks in robotics: inefficient learning from demonstrations. By decomposing tasks and reusing knowledge, the system achieved an order of magnitude improvement in data efficiency compared to traditional approaches. That kind of leap rarely happens overnight. It suggests that the robot-filled future we have talked about for years may be nearer than it looked even a few years ago.

    What this means for you

    Faster learning changes everything. If robots need less data and less programming, they become cheaper and more flexible. That opens the door to robots working outside tightly controlled environments.

    In the long run, this could enable home robots to learn new tasks from simple demonstrations instead of specialist code. It also has major implications for healthcare, logistics and manufacturing.

    More broadly, it signals a shift in artificial intelligence. We are moving away from flashy tricks and toward systems that learn in more human-like ways. Not smarter than people. Just closer to how we actually operate day to day.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

    Kurt’s key takeaways 

    Robots learning 1,000 tasks in a day does not mean your house will have a humanoid helper tomorrow. Still, it represents real progress on a problem that has limited robotics for decades. When machines start learning more like humans, the conversation changes. The question shifts from what robots can repeat to what they can adapt to next. That shift is worth paying attention to.

    If robots can now learn like us, what tasks would you actually trust one to handle in your own life? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Fake AI chat results are spreading dangerous Mac malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals have always chased whatever people trust the most. First, it was email. Then search results. Now it’s AI chat answers. Researchers are warning about a new campaign where fake AI conversations are showing up in Google search results and quietly pushing Mac users to install dangerous malware. What makes this especially risky is that everything looks helpful, legitimate and step-by-step, right up until your system is compromised.

    The malware being spread is Atomic macOS Stealer, often called AMOS, and the attacks abuse conversations generated by tools people increasingly rely on for everyday help. Investigators have confirmed that both ChatGPT and Grok were misused as part of this campaign.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    One copied terminal command is all it takes for malware like AMOS to quietly install itself on a Mac. (Kurt “CyberGuy” Knutsson)

    How fake AI chat results lead to malware

    Researchers traced one infection back to a simple Google search: “clear disk space on macOS.” Instead of landing on a normal help article, the user was shown what looked like an AI conversation result embedded directly in search. That conversation offered clear, confident instructions and ended by telling the user to run a command in the macOS Terminal. That command installed AMOS.

    When researchers followed the same trail, they found multiple poisoned AI conversations appearing for similar searches. That consistency strongly suggests this was a deliberate operation aimed at Mac users searching for routine maintenance help.

    If this feels familiar, it should. A previous campaign used sponsored search results and SEO-poisoned links that pointed to fake macOS software hosted on GitHub. In that case, attackers impersonated legitimate apps and walked users through terminal commands that installed the same AMOS infostealer.

    According to researchers, once the terminal command is executed, the infection chain kicks off immediately. The base64 string in the command decodes into a URL that hosts a malicious bash script. That script is designed to harvest credentials, escalate privileges and establish persistence, all without triggering a visible security warning.

    The danger here is how clean the process looks. There’s no installer window, obvious permission prompt or any option for you to review what’s about to run. Because everything happens through the command line, normal download protections are sidestepped and the attacker gets to execute whatever they want.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    A fake chatGPT website

    Fake AI chat results can look polished and trustworthy, even when they are designed to trick you into running harmful commands. (Kurt “CyberGuy” Knutsson)

    Why is this attack so effective?

    This campaign combines two powerful ideas. Trust in AI answers and trust in search results. Most major chat tools, including Grok on X, let users delete parts of conversations or share only selected snippets. That means an attacker can carefully curate a short, polished exchange that looks genuinely helpful while hiding the manipulative prompts that produced it.

    Using prompt engineering, attackers get ChatGPT to generate a step-by-step cleanup or installation guide that actually installs malware. ChatGPT’s sharing feature then creates a public link that lives inside the attacker’s account. From there, criminals either pay for sponsored search placement or use SEO tactics to push that shared conversation high in the results.

    Some ads are designed to look almost identical to legitimate links. Unless you check who the advertiser actually is, it’s easy to assume it’s safe. One example documented by researchers showed a sponsored result advertising a fake “Atlas” browser for macOS, complete with professional branding.

    Once those links are live, attackers don’t need to do much else. They wait for users to search, click, trust the AI output and follow the instructions exactly as written.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    An iPhone app screen

    Attackers rely on trust in search results and AI answers, knowing most people will not question step-by-step instructions. (Kurt “CyberGuy” Knutsson)

    8 steps you can take to stay safe from fake AI chat malware

    AI tools are useful, but attackers are now shaping answers that lead you straight into trouble. These steps help you stay protected without giving up search or AI entirely.

    1) Never paste terminal commands from search results or AI chats

    This is the most important rule. If an AI response or webpage tells you to open Terminal and paste a command, stop. Legitimate macOS fixes almost never require you to blindly run scripts copied from the internet. Once you press Enter, you lose visibility into what happens next. Malware like AMOS relies on this moment of trust to bypass normal security checks.

    2) Treat AI instructions as suggestions

    AI chats are not authoritative sources. They can be manipulated through prompt engineering to produce dangerous step-by-step guides that look clean and confident. Before acting on any AI-generated fix, cross-check it with Apple’s official documentation or a trusted developer site. If you cannot verify it easily, do not run it.

    3) Use a password manager to limit the damage

    A password manager creates strong, unique passwords for every account you use. If malware steals one password, it cannot unlock everything else. Many password managers also refuse to autofill credentials on fake or unfamiliar sites, which can alert you that something is wrong before you type anything manually. This single tool dramatically reduces the impact of credential-stealing malware.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com 

    4) Keep macOS and browsers fully updated

    AMOS and similar malware often rely on known weaknesses after the initial infection. Updates patch these holes. Delaying updates gives attackers more room to escalate privileges or maintain persistence. Turn on automatic updates so you are protected even if you forget.

    5) Use a strong antivirus software on macOS

    Modern macOS malware often runs through scripts and memory-only techniques. A strong antivirus software doesn’t just scan files. It monitors behavior, flags suspicious scripts, and can stop malicious activity even when nothing obvious is downloaded. This is especially important when malware is delivered through Terminal commands.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Be skeptical of sponsored search results

    Paid search ads can look almost identical to legitimate results. Always check who the advertiser is before clicking. If a sponsored result leads to an AI conversation, a download or instructions to run commands, close it immediately.

    7) Avoid “cleanup” and “installer” guides from unknown sources

    Search results promising quick fixes, disk cleanup or performance boosts are common malware entry points. If a guide is not hosted by Apple or a well-known developer, assume it could be risky, especially if it pushes command-line solutions.

    8) Slow down when instructions look unusually polished

    Attackers spend time making fake AI conversations look helpful and professional. Clear formatting and confident language are not signs of safety. They are often part of the deception. Slowing down and questioning the source is usually enough to break the attack chain.

    Kurt’s key takeaway

    This campaign shows how attackers are shifting from breaking systems to manipulating trust. Fake AI conversations work because they sound calm, helpful and authoritative. When those conversations are boosted through search results, they inherit credibility they don’t deserve. The technical tricks behind AMOS are complex, but the entry point is simple. Someone follows instructions without questioning where they came from.

    Have you ever followed an AI-generated fix without double-checking it first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • New SantaStealer malware is after your passwords and crypto

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Christmas is around the corner, and so is the SantaStealer malware. While the name sounds jolly, this malware is more than capable of ruining your happiness this festive season. The worst part is that this new strain is available to almost anyone willing to pay a small fee. It essentially works as malware-as-a-service, letting buyers target people at scale, obviously not for any legitimate use.

    SantaStealer is starting to make noise across Telegram channels and underground hacker forums. It is being marketed as a stealthy, memory-only information stealer that can quietly siphon data without leaving obvious traces on disk. 

    Memory-only does not mean undetectable. It simply reduces disk artifacts, which can delay detection rather than prevent it altogether. That promise alone is enough to attract cybercriminals, especially at a time when browser-stored passwords, session cookies and crypto wallets remain high-value targets.

    MALICIOUS BROWSER EXTENSIONS HIT 4.3M USERS

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SantaStealer malware is spreading ahead of Christmas, with cybercriminals marketing the data-stealing tool for hire across Telegram and underground forums. (Kurt “CyberGuy” Knutsson)

    SantaStealer and how it actually works

    SantaStealer operates as a malware-as-a-service, charging $175 per month for its basic tier and $300 per month for the premium plan. Researchers at Rapid7 say the operation rebrands an earlier project called BluelineStealer, with a Russian-speaking developer pushing toward a wider launch before the end of the year.

    Despite bold claims about evading detection, Rapid7’s analysis paints a more grounded picture. The samples they examined were not particularly difficult to analyze and lacked the advanced anti-analysis techniques being advertised, which is good news for us. If it can be detected, security tools have a better chance of removing it before it can do serious damage.

    Functionally, SantaStealer is still dangerous. It uses 14 separate data-collection modules that run in parallel, pulling information from browsers, messaging apps like Telegram and Discord, gaming platforms such as Steam, crypto wallet apps and extensions, and even local documents. The malware can also take screenshots of your desktop. Stolen data is written to memory, compressed into ZIP files and sent out in 10MB chunks to a hardcoded command-and-control server.

    One notable capability is its use of an embedded executable to get around Chrome’s App-Bound Encryption, a security feature introduced in mid-2024. This workaround typically requires the malware to be executed at the user level and is not a remote bypass of Chrome’s security model. Similar tricks have already been used by other info-stealers, showing how quickly attackers test and adapt to new browser protections. 

    What this says about the current threat landscape

    SantaStealer is not fully operational yet and has not been distributed at scale, but it reflects a broader trend in cybercrime. Modern info-stealers are modular, configurable and sold much like regular software. The affiliate panel that Rapid7 observed allows buyers to fine-tune exactly what data the malware steals, from full system sweeps to narrowly targeted attacks focused on specific apps or crypto wallets.

    The malware also includes options to avoid infecting systems in certain regions and to delay execution, which can throw off both victims and security analysts. As for how SantaStealer might spread, researchers say recent campaigns increasingly rely on ClickFix-style attacks. These tricks push victims into pasting malicious commands directly into the Windows terminal, often disguised as steps to fix an issue or enable a feature.

    More traditional methods are still very much in play. Phishing emails, pirated software, torrent downloads, malicious ads and even deceptive YouTube comments remain effective delivery channels. Once malware like this runs on a system, it needs very little time to grab saved passwords, session cookies and wallet data that can later be abused or sold.

    7 steps you can take to stay safe from SantaStealer malware

    A few sensible habits and the right tools can significantly reduce your risk, even if malware like this continues to evolve. Here are seven practical steps you can take to stay safe:

    1) Use strong antivirus software

    Modern antivirus tools don’t just look for known malware signatures. They also monitor suspicious behavior, such as programs trying to grab browser data or run hidden processes. Keep real-time protection enabled and take alerts seriously instead of dismissing them.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    Someone typing on a computer in a dark room.

    A new malware-as-a-service threat known as SantaStealer targets passwords, session cookies and crypto wallets while promoting itself as a stealthy, memory-only attack. (Thomas Trutschel/Photothek via Getty Images)

    2) Keep your operating system and apps updated

    Updates are not just about new features. They often patch security flaws that malware actively targets. This includes your OS, browser, browser extensions, crypto wallet apps and messaging tools. Delaying updates gives attackers a wider window to exploit known weaknesses.

    3) Switch to a password manager

    Info-stealers love browser-saved passwords because they are easy to grab. A password manager stores your credentials in an encrypted vault and reduces what your browser keeps locally. It also helps you use strong, unique passwords for every service without having to remember them.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com. 

    FAKE WINDOWS UPDATE PUSHES MALWARE IN NEW CLICKFIX ATTACK

    4) Turn on two-factor authentication wherever possible

    Even if your password is stolen, 2FA can stop attackers from getting in. App-based authenticators are more secure than SMS codes and should be your first choice for email, crypto exchanges, cloud services and social media accounts.

    5) Be extremely careful with commands and “quick fixes”

    ClickFix-style attacks rely on trust and urgency. If a website, pop-up or video tells you to paste a command into the Windows terminal to fix something, stop. Unless you fully understand what that command does, assume it is dangerous.

    6) Use a personal data removal service

    When your email, phone number or other personal details are widely available online, attackers can target you more convincingly. Personal data removal services help take your information down from data broker sites, reducing the chances of targeted phishing or malware lures.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    HACKERS PUSH FAKE APPS WITH MALWARE IN GOOGLE SEARCHES

    7) Avoid pirated software and unverified extensions

    Cracked software, torrents and shady browser extensions remain some of the most reliable malware delivery methods. They often bundle info-stealers that run quietly in the background. Stick to official app stores, trusted developers and verified extensions, even if it means skipping a “free” download.

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    SantaStealer can quietly siphon sensitive data. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaway

    SantaStealer may not yet live up to its own hype, but that should not make you complacent. Early-stage malware often improves quickly once developers patch obvious mistakes. Be cautious with links and attachments from unfamiliar emails, and think twice before running unverified code or browser extensions pulled from public repositories.

    When was the last time you checked which extensions have access to your data? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • My Favorite Laptops, Chromebooks, and Gaming Laptops Are on Sale For Black Friday

    [ad_1]

    It’s almost the end of the year, and with Black Friday upon us, it’s a great time to buy a laptop. I’ve sorted through the junk to find the best Black Friday laptop deals, and I’m happy to report that most of my favorite laptops I tested this year are on sale right now. Even better, some laptops I thought were overpriced at launch now have such steep discounts that they’ve risen in value in my estimation. So, if you’ve been waiting to buy a laptop at the right moment, this is it. One of these laptops should fit exactly what you’re looking for at a wide range of prices.

    Hunting for more deals? Read our Absolute Best Black Friday Deals roundup, and check out our Black Friday liveblog for the highlights.

    Updated on November 28: We’ve added the Asus Zenbook A14, Razer Blade 14, and Acer Chromebook Plus 516.

    The Best Windows Laptop Deal

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    If you’re shopping for a laptop on Black Friday, you’re probably looking for something a bit more budget-friendly. And while the MacBook Air is the better laptop, there’s no question that the Dell 14 Plus is the best deal. It comes with great specs: 16 GB of RAM, 512 GB of storage, and an Intel Core Ultra 5 226V. I reviewed the model with the Core Ultra 7 258V, but either way, you’re getting really good battery life and integrated graphics performance.

    Most importantly, it avoids the two main pitfalls of budget laptops: poor displays and touchpads. The Dell 14 Plus comes with a high-resolution display (2560 x 1600) and a very smooth-feeling touchpad. It’s literally a premium laptop for an affordable price, and at $500, it’s officially the best deal on a laptop this Black Friday. It’s a doorbuster-style deal, however, so once it’s sold out, the price may change.

    The Best MacBook Deal

    Front view of an open Apple MacBook Air 13-inch 2025  laptop sitting on a couch with the screen showing the desktop

    Photograph: Brenda Stolyar

    Apple

    MacBook Air (M4, 2025)

    Since its launch this spring, the M4 MacBook Air has been the best laptop you can buy. It has also continued to drop in price slowly month after month, now down to just $749. That’s low enough that it’s not worth buying cheaper, older MacBook Airs, such as the M2 model. The difference in performance (and external display support) is worth far more. The M5 model is likely coming sometime in early 2026, but it’ll be a long time before it comes down to the price of the M4 right now. Come and get it while it’s hot.

    I’ve collected the best Black Friday MacBook deals here for more recommendations and discussion on which MacBook deal is right for you.

    The Best Chromebook Deal

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    There’s never been a Chromebook at this price as good as the Acer Chromebook Plus 516—at least, not at it’s current Black Friday. Despite being a new laptop from this year, it’s great to see the price drop by well under $300, making the higher specs of Chromebook Plus devices accessible to nearly everyone. The display and performance are far and above other Chromebooks at this price though. My biggest pet peeve on budget laptops is the typical low quality of the touchpad. And even there, the Acer Chromebook Plus 516 has a touchpad that you make you hate your life.

    Another Good Chromebook Deal

    Lenovo Flex 5i Chromebook Plus

    Courtesy of Lenovo

    Lenovo

    Flex 5i Chromebook Plus

    There are Chromebooks I like more than the Lenovo Flex 5i Chromebook Plus (8/10, WIRED Recommends), such as the Lenovo Chromebook Plus 14. But none are this cheap. And while the Acer Chromebook Plus 516 above is a better deal, you might want something a bit more compact with a smaller screen—or maybe with a touchscreen. At $350, the Lenovo Flex 5i Chromebook Plus is one of the most affordable Chromebook Plus models you can find—it’s in a different league over standard Chromebooks at this price. It has a better screen, faster performance, more storage, and even a crisper webcam. The Flex 5i Chromebook Plus even has a 360-degree hinge and touchscreen, sweetening the deal even more.

    The Latest MacBook, Already on Sale

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    The MacBook Air is a better value, yes. And the M4 Pro or M4 Max MacBooks are more powerful. But the base 14-inch MacBook Pro is the only Mac right now with the latest M5 chip, which launched just a month ago. I wish Apple had included other features in this update, as the M5 is the only change over the M4 model. The good news is that the M5 MacBook Pro (8/10, WIRED Recommends) offers a solid performance increase in all areas, including CPU, GPU, and even the Neural Engine. More important is the $200 discount just a month after it launched.

    The Best Gaming Laptop Deal

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    Want a gaming laptop that doesn’t really feel like a gaming laptop? That’s what the Razer Blade 14 (8/10, WIRED Recommends) has always been good at. If it weren’t for the green snake logo on the lid, you might never know this thing has a powerful discrete GPU inside. You certainly wouldn’t be able to tell from the size of the laptop, which is supremely compact. It even gets decent battery life for a gaming laptop. And when it comes to gaming, the high-resolution, OLED 120-Hz display keeps your games sharp and smooth, while the RTX 5060 (or 5070) deliver some solid performance for the size.

    The Best 2-in-1 Laptop Deal

    • Photograph: Christopher Null

    • Courtesy of Microsoft

    • Courtesy of Microsoft

    • Photograph: Christopher Null

    Microsoft

    Surface Pro 13-inch (11th Edition, 2024)

    The OLED Surface Pro was excellent when it came out in mid-2024. It was the first time the Surface Pro got an OLED panel, and the Qualcomm Snapdragon X Plus/Elite chip finally gave this Windows tablet the performance and battery life needed to compete with the iPad Pro. The only problem? It was too expensive. But for Black Friday, the OLED Surface Pro is $500 off, bringing the price down to just $900. The one caveat to remember is that you’ll still need to buy a Surface Type Cover Keyboard to pair it with. Together, you have a 2-in-1 laptop that’s the ultimate travel companion and a full PC replacement.

    An Extremely Lightweight Laptop

    Front view of the Asus Zenbook A14 laptop while open with the screen showing abstract art

    Photograph: Christopher Null

    The Asus Zenbook A14 is one of the lightest laptops you can buy right now. At 2.16 pounds, it’s a fair bit lighter even than the MacBook Air. Throw this thing in your bag, and you’ll hardly even notice it’s there. That makes it a great option for students needing to trek across campus or frequent travelers bringing their work on the go. But what really makes this laptop special is the lack of compromises it makes to achieve that weight. It’s well-built, thin, and has a comfortable keyboard and touchpad. And thanks to the Qualcomm Snapdragon X Plus inside, it gets fantastic, all-day battery life. I also really like the glossy OLED display. So, while the Dell 14 Plus is a more well-rounded Windows laptop with a higher-resolution screen, the Zenbook A14’s portability is hard to beat—especially at this price.

    A Solid Budget Laptop

    Image may contain: Computer, Electronics, Laptop, and Pc

    Photograph: Luke Larsen

    Asus

    Vivobook 14 (X1407QA)

    The Asus Vivobook 14 is one of the few Snapdragon X-powered laptops bringing efficient performance and excellent battery life to surprisingly low prices. It’s $200 off for Black Friday, which brings it down to the same price as on the last Amazon Prime Day. There’s really only one problem: the Dell 14 Plus. By every measure, that’s the laptop you should buy. Not only is it cheaper, but it also has a much better display, touchpad, and integrated GPU performance. However, if the limited Doorbuster prices on the Dell 14 Plus have run out, the Asus Vivobook 14 is your next best bet for a Windows laptop around this price.

    What to Look for in a Black Friday Laptop Deal

    Shopping around for a good Black Friday deal isn’t so different from buying a laptop at any other time of the year. We never recommend products we don’t test ourselves, so if you’re interested in a particular laptop on this list, check out the corresponding review. But as you shop around, you may want to factor in the following specs along with the current price of the laptop:

    • CPU
    • GPU
    • Memory (RAM)
    • Storage
    • Display resolution, panel type, and refresh rate
    • Battery life

    Lastly, consider the price history. CamelCamelCamel is a useful tool to see some historical data on price drops for individual laptops. Some of the laptops included above (such as the Dell 14 Plus) are hitting new historic lows in terms of price, while others are returning to the same low price as they were on Prime Day. That doesn’t mean these aren’t a good deal necessarily, but it’s important to know that not every deal labeled “Black Friday Deal” is equal, even if the percentage drop looks similar. Many products these days have permanent discounted prices at retailers, which can obscure how big of a sale it really is.

    For an in-depth breakdown that explains each element of a laptop, read our detailed How to Choose the Right Laptop guide.

    Is Now a Good Time to Buy a Laptop?

    Yes. Black Friday isn’t the only big shopping event throughout the year, and it’s not uncommon to find great sales on laptops at other times, whether that’s on a random day or on Amazon Prime Day(s). But Black Friday remains important as the beginning of the holiday shopping season. The entire annual cycle of laptop refreshes revolves around this timing. The beginning of the year starts with lots of products getting announced at CES, and then launching throughout the year. By the time Black Friday rolls around, companies and retailers are looking to clear out inventory to make room for incoming new stuff, which is why we still often see the biggest discounts for Black Friday.

    This year, that timing even applies to MacBooks. Because Apple didn’t refresh any Macs this fall outside the 14-inch M5 MacBook Pro, laptops like the M4 MacBook Air or M4 Pro/Max MacBook Pro are discounted with the anticipation of a refresh coming sometime in early 2026.

    [ad_2]

    Luke Larsen

    Source link

  • This $500 Dell Laptop Will Blow You Away, and It’s Only This Cheap Today

    [ad_1]

    This is the best deal on a laptop I’ve seen all year. It’s one of the few Black Friday laptop deals that actually lives up to the hype, the kind that I hope for at every major sale event.

    I’m talking about the new price of the Dell 14 Plus. Dell has dropped the price of the Dell 14 Plus to a new low: $500. I’ve been watching the price of this laptop all year, and this is rock bottom. This is a premium-tier laptop selling for a budget price. When I first tested the laptop earlier this year, it was only sold in high-end configurations, with the Intel Core Ultra 7 258V, 32 GB of RAM, and 1 TB of storage, and sold for $1,100.

    As good as this laptop was, I didn’t think it was quite worth that much. But I did hope that Dell would drop the price. That’s exactly what happened. Now a laptop with great specs, excellent battery life, high resolution display, and quality touchpad is on sale for the price of a cheap laptop. They are easy features to compromise on, but they’re also what makes the average budget laptop feel so cheap. This configuration is currently on sale for $650, down from around $800, and it’s well worth the money.

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    • Photograph: Luke Larsen

    This lower-tier $500 configuration really takes it to another level. It comes with the same 2560 x 1600 display, but drops the other specs slightly. You get an Intel Core Ultra 5 226V processor, 16 GB of RAM, and 512 GB of storage. These are still really impressive specs for $500. The Core Ultra 5 is slightly slower than the Core Ultra 7, but you still get the efficient, long-lasting performance of Intel’s highest end V-series chips. You simply won’t find another $500 laptop that feels this nice.

    In fact, it’s the same price Dell normally sells its entry-level Windows laptop, the Dell 14, despite it coming with a lower resolution panel and a much worse Intel U-series processor that isn’t nearly as powerful or long-lasting.

    In addition to all that, the Dell 14 Plus comes with a good mix of ports, including a Thunderbolt 4 USB-C port, one USB-A (5 Gbps), an HDMI 2.1 port, and an audio jack. It’s also reasonably portable at 0.67 inches thick and 3.4 pounds. It’s not as thin as a MacBook Air, but it’s not much thicker than the 14-inch MacBook Pro. My only complaints about this laptop are the plastic (and somewhat thick) bezels around the screen, which make it look cheap. I also wish it had Windows Hello facial recognition, but the fingerprint reader built into the power button works well.

    All in all, I can’t imagine a better option for both remote workers and college students. Trust me: don’t buy another Windows laptop around this price for Black Friday this year. You’ll need to act fast. This is Black Friday-only Doorbuster deal, meaning it’ll be gone starting Saturday and will only be around as long as supplies last. If you miss out on it, you can still opt for the $650 configuration, which gets you that faster processor and twice the storage.

    [ad_2]

    Luke Larsen

    Source link

  • The Alienware Aurora Gaming Desktop Punches Above Its Weight

    [ad_1]

    It also came with two sticks of Kingston Fury 16-GB RAM and a Wi-Fi 7 card. All that for $1,550 is a really solid deal. There are cheaper ways to get RTX 5070-level performance, such as this iBuyPower system, but the Alienware Aurora is also far from the most expensive either. The Asus ROG G700, for example, is hundreds of dollars more, even when similarly configured. I haven’t tested these yet myself, so I don’t know how equivalent the performance or fan noise is. But the Alienware Aurora Gaming Desktop is a great deal, especially if you catch it on sale.

    The Alienware Aurora Gaming Desktop performs fine enough. It’s about 5 percent behind the typical RTX 5070 scores in 3DMark Steel Nomad, a standard benchmark for measuring gaming PCs. The RTX 5070 is considered primarily a 1080p video card that can occasionally jump up to 1440p, depending on the game. You can see the frame rates in the chart below, all of which were tested at max settings without ray tracing, frame generation, or upscaling. Cyberpunk 2077 and Black Myth: Wukong are both more GPU-intensive, while Marvel Rivals and Monster Hunter Wilds are more bottlenecked by the CPU.

    The performance in Cyberpunk 2077, in particular, felt impressive. I was even able to average 71 fps (frames per second) in the Ray Tracing Ultra preset in 1080p without relying on DLSS. It’s really too bad that it couldn’t get Black Myth: Wukong over 60 fps at 1080p, though. It’s a heavy game, but when you spend over $1,500, you hope that you can play modern games at 1080p at smooth frame rates. You can always drop the graphics preset in the game settings or sprinkle in some light DLSS upscaling for better performance. It was also around 5 percent behind our testing of the RTX 5070 Founders Edition on our test bench.

    While performance didn’t blow me away, I was overall impressed by what’s on offer with the Alienware Aurora Gaming Desktop. This isn’t the PC to buy if you want ultimate control over upgrades in the future or even the most powerful gaming desktop. But if you want a pretty computer that you can upgrade the graphics for in the future, it does the job—just make sure to get it with the 1,000-watt power supply.

    [ad_2]

    Luke Larsen

    Source link

  • This Lightweight Laptop Is Almost Half Off

    [ad_1]

    On the hunt for a lightweight and budget-friendly laptop that won’t let you down? Best Buy has the Asus Zenbook A14 discounted from its usual $1,000 price point to just $550 for an early Black Friday deal. This featherweight laptop is a Windows Copilot+ PC, with a Qualcomm Snapdragon X Plus at its core, and is a great deal for students or occasionally putting in some hours from your local café.

    Photograph: Christopher Null

    Weighing in at just 2.1 pounds, this Zenbook is one of the lightest laptops we’ve tested to date, with most machines starting closer to 2.4, and only Lenovo’s Thinkpad X1 Carbon coming anywhere close at 2.2 pounds. That’s largely thanks to a material developed by Asus called Ceraluminum, a combination of ceramic and aluminum that’s both extremely light and very durable.

    Like a lot of laptops in the Copilot+ range, the Zenbook sports an FHD+ (1920 x 1200) resolution screen, but it’s at least an OLED panel, which is great news for those of you who put your laptop on the coffee table to watch movies. Our reviewer Christopher Null ran a video playback test, and even with the screen at full brightness, the laptop managed to run for over 20 hours. That’s a truly impressive feat, particularly for a laptop so thin and light.

    The heart of this machine is a Snapdragon X Plus from Qualcomm, a brand you might be more used to seeing in mobile phones than Windows machines. While it does help give you that awesome battery life, the performance leaves a bit to be desired. While it’s totally fine for web browsing, text documents, and email, don’t expect to play the latest games, or do anything more strenuous than some light graphics work.

    Qualcomm chips are slowly becoming a more appealing option for laptops, and if you’re trying not to spend a ton of money on a laptop, they’re worth a look. While gamers and video editors should swing by our laptop roundup for more serious options, at just $550 the Zenbook A14 offers a surprising amount of value in a petite package.

    [ad_2]

    Brad Bourque

    Source link

  • Netherlands Hands Back Control of Chip Maker Nexperia to Chinese Owner

    [ad_1]

    The Dutch government handed back control of semiconductor manufacturer Nexperia to its Chinese owner, moving toward resolving a spat that had blocked vital chip supply to the auto industry.

    Dutch economic-affairs minister Vincent Karremans said Wednesday that the decision had been made in consultation with the Netherlands’ European and international partners and followed recent meetings with Chinese authorities.

    Copyright ©2025 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

    [ad_2]

    Adrià Calatayud

    Source link

  • Razer’s Cobra HyperSpeed Is Not Your Standard Gaming Mouse

    [ad_1]

    Breaking open the mouse requires only four screws: two covered by one of the mouse’s adhesive feet, and two underneath the removable puck. Covering two of the screws with an adhesive panel limits repairability, since it will slowly lose stickiness over time. After removing the screws, there are two plastic clips up front and two in the back that need to be released. Like any plastic clip, you risk breaking them during disassembly.

    Inside the mouse is a single-sided printed circuit board that houses the sensor, micro switches, and the mouse wheel. The overall design is simple; with replacement parts and some soldering skills, repair should be straightforward. The battery is attached to a removable section on the top shell of the mouse using a rubbery adhesive. This adhesive panel stretches and sticks to itself when removed, making it nearly impossible to reuse with a new battery, but it leaves no residue on the actual plastic of the mouse. A new battery should be easy to install using double-sided tape.

    The Cobra HyperSpeed’s simple internal design has nothing unnecessary, and no added confusion or failure points. While some other models, like the Logitech MX Master 4 or the Razer Basilisk 35K, boast a lot of premium features (with added complexity), it’s always refreshing to see something only as complex as it needs to be.

    Alongside the $100 Cobra HyperSpeed, Razer also offers the $35 Cobra and the $130 Cobra Pro. Compared to the Pro model, the HyperSpeed’s slightly less responsive sensor and scaled-back RGB aren’t huge hits to performance or usability, and the HyperSpeed’s lower weight is a distinct advantage. Compared to the standard wired model, the addition of wireless is a major benefit to both performance and usability. The HyperSpeed’s optical scroll wheel is a definitive improvement over its siblings.

    Overall, this mouse is a solid workhorse for gaming and general browsing. It’s fast, comfortable, and compact. The simple yet robust build will stand up to normal day-to-day use. While it doesn’t push the limits of performance or functionality like some of the more expensive esports-focused mice available today, the Cobra HyperSpeed is a great option for someone who doesn’t need cutting-edge specs but wants a mouse that gets things done.

    [ad_2]

    Henri Robbins

    Source link

  • The Gaza War Has Been Big Business for U.S. Companies

    [ad_1]

    Two years on, Israel’s war in Gaza might be finally drawing to a close. The conflict built an unprecedented arms pipeline from the U.S. to Israel that continues to flow, generating substantial business for big U.S. companies—including Boeing, Northrop Grumman and Caterpillar.

    Sales of U.S. weapons to Israel have surged since October 2023, with Washington approving more than $32 billion in armaments, ammunition and other equipment to the Israeli military over that time, according to a Wall Street Journal analysis of State Department disclosures.

    Copyright ©2025 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

    [ad_2]

    Benoit Faucon

    Source link

  • Healthcare system apologizes after over 500 living patients told they were dead via mail: ‘Pretty upsetting’

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Maine’s biggest healthcare network is apologizing after hundreds of living patients received letters telling them they were dead.

    MaineHealth said a computer malfunction Oct. 20 caused 521 letters to go out through a third-party vendor system, each addressed to a patient and written as if the recipient had died.

    “MaineHealth sincerely regrets this error,” the organization said in a statement. “We have since resolved the issue and sent apology letters to every affected patient.”

    Officials stressed that no one was marked deceased in their medical records and that patient care wasn’t affected. 

    The glitch was confined to an automated estate-notification process based at MaineHealth’s Portland headquarters, which oversees Maine Medical Center and eight other hospitals across Maine and New Hampshire.

    DELIVERY GIANT’S DATA BREACH EXPOSES 40,000 PERSONAL RECORDS

    MaineHealth released a statement apologizing for the false death letters sent to over 500 patients last month. (Google Maps)

    MaineHealth, which employs more than 20,000 people, recently updated its digital record and messaging systems and is now reviewing the automation tool that produced the letters.

    Automation mishaps have plagued hospital networks nationwide, from billing statements sent to the wrong families to “deceased” alerts popping up in online patient portals. 

    According to a 2022 Pew Charitable Trusts report, electronic health records complexity and usability problems can lead to wrong drug orders, missed test results or other patient-safety risks.

    HACKERS STEAL MEDICAL RECORDS AND FINANCIAL DATA FROM 1.2M PATIENTS IN MASSIVE HEALTHCARE BREACH

    Patient on hospital bed

    Patients were reportedly sent letters from MaineHealth who claim that at no time they were listed as deceased. (iStock)

    Patients who received the erroneous letters can contact MaineHealth’s patient relations department to confirm their status — alive and well — and ensure their records remain accurate.

    “It was pretty upsetting to open that,” one woman told WGME. “Why would they say I was dead? So it was really shocking and upsetting.”

    doctor seated with patient

    Over 500 patients of MaineHealth reportedly received letters informing them of their own death. (iStock)

    “I mean, I’ve had some tests done, and my doctor is part of MaineHealth,” the woman said. “But I haven’t even been in the hospital for anything serious that I could have died from. So I don’t even know where they got that information.”

    No protected health information was exposed, the hospital said.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Fox News Digital has reached out to MaineHealth for additional comment.

    [ad_2]

    Source link

  • Exclusive | Trump Officials Torpedoed Nvidia’s Push to Export AI Chips to China

    [ad_1]

    Shortly before President Trump met Chinese leader Xi Jinping in South Korea, an urgent issue emerged. Trump wanted to discuss a request by Nvidia Chief Executive Jensen Huang to allow sales of a new generation of artificial-intelligence chips to China, current and former administration officials said.

    Greenlighting the export of Nvidia’s Blackwell chips would be a seismic policy shift potentially giving China, the U.S.’s biggest geopolitical competitor, a technological accelerant. Huang—who speaks to Trump often—has lobbied relentlessly to maintain access to the Chinese market.

    Copyright ©2025 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

    [ad_2]

    Lingling Wei

    Source link

  • A supercomputer chip going to space could change life on Earth

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A computer chip so powerful that it fuels today’s artificial intelligence is about to leave Earth. NVIDIA’s H100 GPU, used to train advanced AI models, will soon travel aboard a Starcloud satellite.

    Starcloud, a startup based in Redmond, Washington, wants to see if the world can move data centers into orbit. These centers power nearly everything online, from streaming to AI tools. Shifting them into space could help reduce pollution, save resources and speed up computing for everyone.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    LIVING IN GIANT MOON GLASS SPHERES COULD BE OUR FUTURE

    Starcloud aims to build the first orbital data centers, cutting emissions and speeding up global computing. (Dean Mouhtaropoulos/Getty Images)

    Why space data centers matter for the future

    Every time you send a message, store a file in the cloud or use AI, large computers on Earth handle the work. These data centers use massive amounts of electricity and water to stay cool. They also release heat, noise and greenhouse gases that affect local communities.

    Space offers a different environment. Solar energy is abundant, and cooling happens naturally in the cold vacuum. “The only environmental cost is the launch,” said Starcloud CEO Philip Johnston. “After that, we could save ten times the carbon emissions compared with running data centers on Earth.”

    For a world searching for greener technology, that goal matters.

    How the NVIDIA GPU will work in orbit

    The Starcloud-1 satellite, about the size of a small refrigerator, will carry NVIDIA’s H100 GPU. It is nearly one hundred times more powerful than any chip ever sent into orbit.

    Once in space, the GPU will process huge amounts of satellite data. It will study images of Earth to identify wildfires, track crops and monitor weather. Normally, satellites send this data back to Earth for processing, which can cause long delays. Doing the analysis in orbit allows faster results and better decisions on the ground.

    The mission will also test Google’s Gemma language model in orbit. It will be the first time a large AI model operates in space.

    THE NEW ARMS RACE IS FOR COMPUTE — AND AMERICA CAN’T AFFORD TO FALL BEHIND

    By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient.

    By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient. (Dean Mouhtaropoulos/Getty Images)

    Starcloud plans to build space data centers

    Starcloud hopes this is only the beginning. The company plans to build larger data centers in space powered by sunlight and cooled by the natural chill of orbit. Future systems will include the next generation of NVIDIA GPUs called Blackwell, which promise even higher performance.

    Starcloud’s long-term goal is to create a five-gigawatt orbital data center about 2.5 miles wide (around 13,000 feet across). It could handle massive AI workloads while cutting costs and carbon emissions. As launch prices continue to fall, building data centers beyond Earth could soon become practical.

    Johnston believes that by the 2030s, many new data centers will operate in orbit instead of on land.

    What this space mission means for you

    If this works, the technology that powers your apps, games and AI tools might soon be running in space. This change could make cloud services faster, more efficient and less harmful to the planet.

    Space-based data centers could also speed up disaster response, improve weather forecasts and save millions of gallons of water every year. The idea shows that innovation and sustainability can grow together.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    RAPID RISE OF AI PUTS NEW URGENCY ON CONGRESS TO UNLEASH AMERICAN ENERGY

    NVIDIA logo.

    NVIDIA’s powerful H100 GPU is heading to space aboard Starcloud-1 to test AI data processing in orbit. (Kent Nishimura/Bloomberg via Getty Images)

    Kurt’s key takeaways

    Sending an NVIDIA GPU into orbit shows how quickly technology is changing. The mission combines curiosity, innovation and a genuine push to make computing cleaner and faster. As space becomes more reachable, the idea of data centers floating above Earth feels less like fiction and more like something that could actually happen. Each of these missions could teach us a little more about how to build a sustainable digital future.

    How do you feel about the idea of data centers operating in space? Is it exciting, risky or both?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
     

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

    When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Why are unsupported systems dangerous

    Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

    It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

    The “just one more year” trap

    Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

    Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

    Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    The hidden costs of waiting to upgrade to Windows 11

    It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

    Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

    How to stay safe from unsupported Windows 10 security risks

    You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

    1) Upgrade your system to Windows 11

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

    2) Watch out for phishing scams and install strong antivirus software

    Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Signage outside the Microsoft Campus

    Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Secure your logins

    Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

    WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Man typing on his laptop.

    Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Back up your data regularly

    Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

    6) Stay informed and proactive

    Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

    Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • How to use passkeys to keep your computer safe

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Keeping your computer secure is more important than ever. Cyberattacks target computers, accounts and sensitive data daily. Traditional passwords have long been the cornerstone of security, but they come with real challenges. Many of us reuse passwords across sites, and even strong passwords can be compromised in data breaches.

    Passkeys offer a safer and more convenient way to authenticate. However, they’re still relatively new, and many of us are still trying to figure out how they work. For example, Peter recently reached out asking, “How do I get a passkey from a PC desktop that doesn’t have a camera or fingerprint device?”

    That’s a great question, Peter, and you’re not alone in wondering about this. The good news is that passkeys are designed to work on virtually any device, whether or not it has biometric hardware like a fingerprint reader or camera. Let’s explore what passkeys are, why they’re worth using and how to set them up on both Windows and Mac, regardless of your hardware setup.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Passkeys make signing in faster and safer by replacing traditional passwords with encrypted keys. (Kurt “CyberGuy” Knutsson)

    What are passkeys?

    Passkeys use cryptography to prove who you are. When you create a passkey, your device makes two keys, one public and one private. The public key goes to the website, and your private key stays on your device. During login, your device confirms your identity with the private key. The website never sees or stores it.

    This process blocks phishing and password theft. It also makes sign-in faster. You don’t need to remember or type long passwords anymore.

    While passkeys simplify authentication, they don’t eliminate the need for a secure password manager. Password managers can safely store and sync your passkeys, just as they do with passwords, allowing you to access your credentials across devices and browsers — even if those devices don’t natively sync passkeys, such as between Windows and Apple systems. Using a password manager alongside passkeys creates a bridge between platforms and provides an additional layer of security and convenience.

    Can you use passkeys without biometrics?

    Yes, you can. A PC or Mac without a camera or fingerprint reader can still use passkeys. On Windows, you unlock them with your Windows Hello PIN. On Apple devices, you can use Touch ID, Face ID or your passcode. The key is having an updated operating system and browser that support passkeys.

    If you manage multiple accounts or devices, a password manager that supports passkeys can act as your central vault. This lets you use passkeys even on systems that don’t directly support syncing through iCloud or Google Password Manager. It’s an easy way to ensure you always have access to your credentials, no matter what kind of device you use.

    Why you still need passwords

    Not every website supports passkeys yet. Some services still rely on passwords. Keep strong, unique passwords for those accounts. Passwords also serve as backup if you lose a device or can’t use your passkey. Over time, more sites will support password-free logins.

    This is where password managers continue to play an important role. They bridge the gap between old and new authentication methods, allowing you to store both traditional passwords and passkeys in one secure place. Until the web is fully passkey-ready, combining the two provides both convenience and resilience, giving you a seamless experience across multiple devices and services.

    A MacBook

    Passkeys also prevent phishing because your private key never leaves your device during sign-in. (Kurt “CyberGuy” Knutsson)

    Passkey support by platform 

    Windows

    • Works on Windows 10 and 11.
    • Windows 11 version 22H2 (KB5030310+) includes passkey management.
    • Unlock with Windows Hello PIN, face, or fingerprint.

    If your browser or operating system doesn’t yet sync passkeys automatically, a third-party password manager with passkey support can store them for cross-platform access.

    macOS and iOS

    • Works on macOS 13 Ventura or later and iOS/iPadOS 16 or later.
    • Passkeys sync through iCloud Keychain with end-to-end encryption.
    • Two-factor authentication must be turned on.
    • Use Touch ID, Face ID or your device passcode to confirm logins.

    While Apple’s iCloud Keychain handles passkeys securely within its ecosystem, using a password manager that supports passkeys provides extra flexibility, letting you securely access the same credentials on non-Apple devices or browsers outside Safari.

    Android

    • Available on Android 9 and later.
    • Android 14 adds third-party passkey manager support.
    • Passkeys sync through Google Password Manager by default.

    Alternatively, password managers now integrate passkey syncing, letting you use your passkeys seamlessly on both desktop and mobile devices.

    Browsers

    • Chrome, Edge, Safari and Firefox all support passkeys.
    • Keep your browser updated for the best compatibility.

    Browser-based password managers can also sync passkeys, adding flexibility if you switch between devices or operating systems.

    Major services that support passkeys

    As of publishing, these major services offer passkey sign-in:

    • Google
    • Microsoft
    • Apple
    • Amazon
    • PayPal
    • GitHub
    • Uber
    • eBay
    • WhatsApp
    • Facebook

    Support continues to expand every month. Most new accounts on these platforms can now use passkeys.

    How to set up passkeys on Windows

    • Open Settings → Accounts → Sign-in options.
    • Set up Windows Hello PIN or biometrics.
    • Visit a site that supports passkeys.
    • Choose Create a passkey and confirm with your PIN or biometric.
    • Manage passkeys later under Settings → Accounts → Passkeys on Windows 11.

    If your PC lacks biometrics, you can still approve sign-ins using your phone nearby or a synced password manager that supports passkeys.

    Windows passkey

    (Kurt “CyberGuy” Knutsson)

    How to set up passkeys on Mac

    Apple devices also provide a simple and secure way to use passkeys through iCloud Keychain. There’s no separate setup for passkeys if you have iCloud Keychain enabled. Once it’s on, an eligible app or service will ask you to create a passkey at the time of login, and you’ll be able to do so by following the instructions on the screen. Below is how you can enable iCloud Keychain.

    • Go to Apple menu → System Settings → your name → iCloud.
    • Click Passwords and turn on Passwords & Keychain and enable syncing.
    • Visit a site that supports passkeys.
    • Select Create a passkey and confirm with Touch ID or your passcode.
    • Passkeys will sync to your other Apple devices through iCloud Keychain.

    You can also approve logins on a non-Apple device using your iPhone nearby, or access them through a password manager that stores both your passkeys and passwords in one place.

    iCloud Keychain

    On Windows, you can use passkeys with a simple Hello PIN, even without a camera or fingerprint reader. (Kurt “CyberGuy” Knutsson)

    Common questions about passkeys

    Can I move passkeys between devices?

    Yes. iCloud and Google Password Manager sync passkeys securely. For more flexibility, password managers now support passkey portability across different ecosystems, perfect if you use both Mac and Windows, or Android and iPhone.

    What if I lose my device?

    You can recover passkeys from iCloud, Google or your password manager. Always keep a backup login method and 2FA enabled. Storing your passkeys in a secure password manager ensures recovery even if you lose access to one platform’s ecosystem.

    Are passkeys fully replacing passwords?

    Not yet. Many major platforms support them, but full adoption will take time. Until then, password managers remain an essential bridge technology, providing secure storage, synchronization and transition support as passkeys continue to expand.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    5 additional steps you can take to keep your computer safe

    Even with passkeys and strong passwords, there are other steps you can take to enhance the security of your computer.

    1) Use a password manager

    Password managers help generate and store strong, unique passwords for every account. This reduces the risk of password reuse and ensures that your backup passwords are secure. Now that many password managers support passkeys, they also act as your universal credential vault, letting you log in with either method depending on what a website supports.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    2) Install strong antivirus software

    Strong antivirus software protects against malware, ransomware and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    3) Keep your system updated

    Regular updates fix security vulnerabilities in your operating system and software. Enable automatic updates whenever possible to stay protected.

    4) Enable two-factor authentication

    Two-factor authentication (2FA) adds a second verification step, usually through a code sent to your phone or email, or through an authentication app. This makes it harder for attackers to access your accounts even if your password or passkey is compromised.

    5) Backup your data

    Regularly backing up your Mac or PC to a secure cloud service or external drive ensures that you can recover important data in case of hardware failure, malware attack, or accidental deletion.

    Kurt’s key takeaway

    Passkeys are a major upgrade over traditional passwords, but we’re not living in an all-passkey world just yet. Many sites still rely on passwords, and you’ll need backups if something happens to your device. Supplementing passkeys with a password manager is the best move right now; it lets you store, sync and protect both passkeys and passwords under one roof. The good news is that setting up passkeys takes just a few minutes, and once they’re enabled, logging in becomes faster and more secure.

    Have you tried using passkeys yet? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • These 5 tech stocks could let you play earnings season like a pro

    [ad_1]

    These 5 tech stocks could let you play earnings season like a pro

    [ad_2]

    Source link

  • Payroll scam hits US universities as phishing wave tricks staff

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Phishing scams target every kind of institution, whether it’s a hospital, a big tech firm or even a fast-food chain. Educational institutions aren’t an exception, especially in 2025, when attackers are actively directing their efforts toward them. Universities across the U.S. are facing a new type of cybercrime where attackers are targeting staff to hijack salary payments. Researchers have discovered that since March 2025, a hacking group known as Storm-2657 has been running “pirate payroll” attacks, using phishing tactics to gain access to payroll accounts. Let’s talk more about this attack and how you can stay safe.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    How does the university payroll scam work

    According to Microsoft Threat Intelligence, Storm-2657 primarily targets Workday, a widely used human resources platform, though other payroll and HR software could be at risk as well. The attackers begin with highly convincing phishing emails, carefully crafted to appeal to individual staff members. Some messages warn of a sudden campus illness outbreak, creating a sense of urgency, while others claim that a faculty member is under investigation, prompting recipients to check documents immediately. In some cases, emails impersonate the university president or HR department, sharing “important” updates about compensation and benefits.

    Phishing scams are evolving fast and now universities have become prime targets for payroll theft. (Kurt “CyberGuy” Knutsson)

    These emails contain links designed to capture login credentials and multi-factor authentication (MFA) codes in real time using adversary-in-the-middle techniques. Once a staff member enters their information, the attackers can access the account as if they were the legitimate user. After gaining control, the hackers set up inbox rules to delete Workday notifications, so the victims do not see alerts about changes. This stealthy approach allows the attackers to modify payroll profiles, adjust salary payment settings and redirect funds to accounts they control, all without raising immediate suspicion.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    Hackers are exploiting universities at scale

    The hackers don’t stop at a single account. Once they control one mailbox, they use it to spread the attack further. Microsoft reports that from just 11 compromised accounts at three universities, Storm-2657 sent phishing emails to nearly 6,000 email addresses at 25 institutions. By using trusted internal accounts, their emails appear more legitimate, increasing the likelihood that recipients will fall for the scam.

    To maintain access over time, the attackers sometimes enroll their own phone numbers as MFA devices, either through Workday profiles or through Duo MFA. This gives them persistent access, allowing them to approve further malicious actions without needing to phish again. Combined with inbox rules that hide notifications, this strategy lets them operate undetected for longer periods.

    Microsoft emphasizes that these attacks don’t exploit a flaw in Workday itself. Instead, they rely on social engineering, the absence of strong phishing-resistant MFA and careful manipulation of internal systems. In essence, the threat comes from human behavior and insufficient protection, not software bugs.

    A fake email

    Hackers lure staff with convincing emails that mimic campus alerts or HR updates and steal login details in real time.  (Microsoft)

    6 ways to stay safe from payroll and phishing scams

    Protecting yourself from payroll and phishing scams isn’t complicated. By taking a few careful steps, you can make it much harder for attackers to gain access to your accounts or personal information.

    1) Limit what personal information is online

    The more information scammers can find about you, the easier it is to craft convincing phishing messages. Services that remove or monitor personal data online can reduce exposure, making it harder for attackers to trick you with targeted emails.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    2) Think before you click

    Scammers often send emails that look like they come from your HR department or university leadership, warning about payroll, benefits or urgent issues. Don’t click links or download attachments unless you are 100% sure they are legitimate. Even small mistakes can give attackers access to your accounts.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    College Students on University Campus

    Researchers have discovered that since March 2025, a hacking group known as Storm-2657 has been running “pirate payroll” attacks, using phishing tactics to gain access to payroll accounts. (Javi Sanz/Getty Images)

    3) Verify directly with the source

    If an email mentions salary changes or requires action, call or email the HR office or the person directly using contact information you already know. Phishing emails are designed to create panic and rush decisions, so taking a moment to verify can stop attackers in their tracks.

    4) Use strong, unique passwords

    Never reuse passwords across multiple accounts. Scammers often try to use credentials stolen from other breaches. A password manager can help you generate strong passwords and store them securely, so you don’t have to remember dozens of different combinations.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Enable two-factor authentication (2FA)

    Add an extra layer of security by enabling 2FA on all accounts that support it. This means even if someone steals your password, they still can’t log in without a second verification step, such as a code sent to your phone.

    6) Regularly check financial and payroll accounts

    Even if you follow all precautions, it’s smart to monitor your accounts for any unusual activity. Catching unauthorized transactions quickly can prevent bigger losses and alert you to potential scams before they escalate.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Hackers will reroute payments after gaining access to users' login information.

    Hackers will reroute payments after gaining access to users’ login information. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaway

    The Storm-2657 attacks show that cybercriminals are targeting trust, not software. Universities are appealing because payroll systems handle money directly, and staff can be manipulated through well-crafted phishing. The scale and sophistication of these attacks highlight how vulnerable even well-established institutions can be to financially motivated threat actors.

    How often do you check your payroll or bank accounts for unusual activity? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.   

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Apple, Trade Thaw Lift Stocks Toward New Highs

    [ad_1]

    Easing trade tensions and a big gain in Apple shares helped drive stocks back toward records on Monday, the start of a heavy week of corporate earnings.

    Indexes opened with gains, with some investors saying sentiment was buoyed by President Trump saying he will soon meet with China’s leader, Xi Jinping, and Treasury Secretary Scott Bessent’s Friday comments that he will meet with his Chinese counterpart in person this week. 

    Copyright ©2025 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

    [ad_2]

    Source link

  • HP’s EliteBook 6 G1q Laptop Has Always-Connected 5G, but That’s About It

    [ad_1]

    Benchmark scores were unsurprising, turning in slightly above-average numbers across the board when compared to other Snapdragon X Plus laptops. Even its battery life of just over 17 hours when playing a full-screen video via YouTube (over Wi-Fi, not HP Go) is about in the middle of all Qualcomm-based systems I’ve encountered—though that’s admittedly still an excellent mark compared to all laptops.

    The industrial design is utilitarian, though just shy of being completely boring. The silver machine, crafted from partially recycled aluminum and plastic, has a look that feels dated, and at 24 mm thick and 3.2 pounds, it’s also very heavy for a 14-inch system. (It feels heavy in the hand and on the lap as well.) Props, however, for the textured surface on the keyboard caps, which makes for a more pleasant typing experience than most laptops provide—though note it does not offer any backlighting. The trackpad is spacious without being obtrusive in size.

    Port selection is also solid, including two USB-C ports with USB4 support, two USB-A ports, a full-size HDMI jack, and a drop-jaw Ethernet port. The SIM card slot is also accessible from the side of the device; users can bring their own data plan if they don’t want to use the multicarrier HP Go, which works via eSIM.

    Poor Value

    Photograph: Chris Null

    The G1q is a Copilot+ PC and, as with more general workloads, it turned in perfectly acceptable scores on AI-based jobs like image generation and computer vision tests. It’s plenty stable in daily use; in fact, the only trouble I encountered was during initial setup, when it lost its internet connection midway and forced me to start over from scratch—annoying, but a one-time problem that never cropped up again.

    [ad_2]

    Christopher Null

    Source link