ReportWire

Tag: Security

  • Hacker exploits AI chatbot in cybercrime spree

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A hacker has pulled off one of the most alarming AI-powered cyberattacks ever documented. According to Anthropic, the company behind Claude, a hacker used its artificial intelligence chatbot to research, hack, and extort at least 17 organizations. This marks the first public case where a leading AI system automated nearly every stage of a cybercrime campaign, an evolution that experts now call “vibe hacking.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW AI CHATBOTS ARE HELPING HACKERS TARGET YOUR BANKING ACCOUNTS

    Simulated ransom guidance created by Anthropic’s threat intelligence team for research and demonstration purposes. (Anthropic)

    How a hacker used an AI chatbot to strike 17 targets

    Anthropic’s investigation revealed how the attacker convinced Claude Code, a coding-focused AI agent, to identify vulnerable companies. Once inside, the hacker:

    • Built malware to steal sensitive files.
    • Extracted and organized stolen data to find high-value information.
    • Calculated ransom demands based on victims’ finances.
    • Generated tailored extortion notes and emails.

    Targets included a defense contractor, a financial institution and multiple healthcare providers. The stolen data included Social Security numbers, financial records and government-regulated defense files. Ransom demands ranged from $75,000 to over $500,000.

    Why AI cybercrime is more dangerous than ever

    Cyber extortion is not new. But this case shows how AI transforms it. Instead of acting as an assistant, Claude became an active operator scanning networks, crafting malware and even analyzing stolen data. AI lowers the barrier to entry. In the past, such operations required years of training. Now, a single hacker with limited skills can launch attacks that once took a full criminal team. This is the frightening power of agentic AI systems.

    HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

    Webpage of AI generated ransom note

    A simulated ransom note template that hackers could use to scam victims. (Anthropic)

    What vibe hacking reveals about AI-powered threats

    Security researchers refer to this approach as vibe hacking. It describes how hackers embed AI into every phase of an operation.

    • Reconnaissance: Claude scanned thousands of systems and identified weak points.
    • Credential theft: It extracted login details and escalated privileges.
    • Malware development: Claude generated new code and disguised it as trusted software.
    • Data analysis: It sorted stolen information to identify the most damaging details.
    • Extortion: Claude created alarming ransom notes with victim-specific threats.

    This systematic use of AI marks a shift in cybercrime tactics. Attackers no longer just ask AI for tips; they use it as a full-fledged partner.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    A dark web page selling ransomware services

    A cybercriminal’s initial sales offering on the dark web seen in January 2025. (Anthropic)

    How Anthropic is responding to AI abuse

    Anthropic says it has banned the accounts linked to this campaign and developed new detection methods. Its threat intelligence team continues to investigate misuse cases and share findings with industry and government partners. The company admits, however, that determined actors can still bypass safeguards. And experts warn that these patterns are not unique to Claude; similar risks exist across all advanced AI models.

    How to protect yourself from AI cyberattacks

    Here’s how to defend against hackers now using AI tools to their advantage:

    1. Use strong, unique passwords everywhere

    Hackers who break into one account often attempt to use the same password across your other logins. This tactic becomes even more dangerous when AI is involved because a chatbot can quickly test stolen credentials across hundreds of sites. The best defense is to create long, unique passwords for every account you have. Treat your passwords like digital keys and never reuse the same one in more than one lock.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2. Protect your identity and use a data removal service

    The hacker who abused Claude didn’t just steal files; they organized and analyzed them to find the most damaging details. That illustrates the value of your personal information in the wrong hands. The less data criminals can find about you online, the safer you are. Review your digital footprint, lock down privacy settings, and reduce what’s available on public databases and broker sites.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    Chinese hackers target US telecoms: What you need to know to protect your data

    Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

    3. Turn on two-factor authentication (2FA)

    Even if a hacker obtains your password, 2FA can stop them in their tracks. AI tools now help criminals generate highly realistic phishing attempts designed to trick you into handing over logins. By enabling 2FA, you add an extra layer of protection that they cannot easily bypass. Choose app-based codes or a physical key whenever possible, as these are more secure than text messages, which are easier for attackers to intercept.

    4. Keep devices and software updated

    AI-driven attacks often exploit the most basic weaknesses, such as outdated software. Once a hacker knows which companies or individuals are running old systems, they can use automated scripts to break in within minutes. Regular updates close those gaps before they can be targeted. Setting your devices and apps to update automatically removes one of the easiest entry points that criminals rely on.

    5. Be suspicious of urgent messages

    One of the most alarming details in the Anthropic report was how the hacker used AI to craft convincing extortion notes. The same tactics are being applied to phishing emails and texts sent to everyday users. If you receive a message demanding immediate action, such as clicking a link, transferring money or downloading a file, treat it with suspicion. Stop, check the source and verify before you act.

    6. Use a strong antivirus software

    The hacker in this case built custom malware with the help of AI. That means malicious software is getting smarter, faster and harder to detect. Strong antivirus software that constantly scans for suspicious activity provides a critical safety net. It can identify phishing emails and detect ransomware before it spreads, which is vital now that AI tools make these attacks more adaptive and persistent.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    Hacker typing code.

    Over 40,000 Americans were previously exposed in a massive OnTrac security breach, leaking sensitive medical and financial records. (Jakub Porzycki/NurPhoto via Getty Images)

    7. Stay private online with a VPN

    AI isn’t only being used to break into companies; it’s also being used to analyze patterns of behavior and track individuals. A VPN encrypts your online activity, making it much harder for criminals to connect your browsing to your identity. By keeping your internet traffic private, you add another layer of protection for hackers trying to gather information they can later exploit.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    CLICK HERE TO GET THE FOX NEWS APP  

    Kurt’s key takeaways

    AI isn’t just powering helpful tools; it’s also arming hackers. This case proves that cybercriminals can now automate attacks in ways once thought impossible. The good news is, you can take practical steps today to reduce your risk. By making smart moves, such as enabling two-factor authentication (2FA), updating devices, and using protective tools, you can stay one step ahead.

    Do you think AI chatbots should be more tightly regulated to prevent abuse? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Sacramento restaurants embrace cryptocurrency with Food Token

    [ad_1]

    Sacramento startup, Food Token, is adding another way local restaurants can accept payment – cryptocurrency. Brian Barton, founder of Food Token, shared his journey with KCRA 3, inspired by his frustrations with traditional banking, leading to the idea for Food Token.”I want to do my banking with a restaurant. I don’t need a bank in between,” he said.In 2024, approximately 17% of American adults say they have invested in or own cryptocurrencies.Food Token is already operational in select Sacramento restaurants, including Jim Boys, Brookfield’s, Chocolate Fish, and Beach Hut Deli. Barton explained that the platform allows restaurants to accept the five major cryptocurrencies.Barton also addressed concerns about security for consumers.“From the restaurant’s point of view, the restaurant is never seeing the cryptocurrency. The restaurant is just accepting it just as they would a digital gift card,” Barton said. Barton noted that convincing restaurants to do something new has been an uphill battle, particularly when it’s about a new field like cryptocurrency. Sacramento was chosen as the launch site for Food Token due to its status as the “farm-to-fork capital” and Barton’s personal connection to the area. “We want to find a use case first for restaurants in the Sacramento area and for consumers in the Sacramento area,” Barton said, emphasizing the importance of understanding local needs before expanding.For those interested in using Food Token, Barton encouraged restaurants to reach out via their website, offering a straightforward way to start accepting cryptocurrency.”We only charge $0.10 per transaction, unlike Visa and Mastercard,” he said, highlighting the financial benefits for restaurants.As cryptocurrency continues to gain popularity, Food Token aims to simplify the process for both consumers and restaurants, paving the way for a new era of digital payments in the restaurant industry.See more coverage of top California stories here | Download our app | Subscribe to our morning newsletter | Find us on YouTube here and subscribe to our channel

    Sacramento startup, Food Token, is adding another way local restaurants can accept payment – cryptocurrency.

    Brian Barton, founder of Food Token, shared his journey with KCRA 3, inspired by his frustrations with traditional banking, leading to the idea for Food Token.

    “I want to do my banking with a restaurant. I don’t need a bank in between,” he said.

    In 2024, approximately 17% of American adults say they have invested in or own cryptocurrencies.

    Food Token is already operational in select Sacramento restaurants, including Jim Boys, Brookfield’s, Chocolate Fish, and Beach Hut Deli. Barton explained that the platform allows restaurants to accept the five major cryptocurrencies.

    Barton also addressed concerns about security for consumers.

    “From the restaurant’s point of view, the restaurant is never seeing the cryptocurrency. The restaurant is just accepting it just as they would a digital gift card,” Barton said.

    Barton noted that convincing restaurants to do something new has been an uphill battle, particularly when it’s about a new field like cryptocurrency.

    Sacramento was chosen as the launch site for Food Token due to its status as the “farm-to-fork capital” and Barton’s personal connection to the area.

    “We want to find a use case first for restaurants in the Sacramento area and for consumers in the Sacramento area,” Barton said, emphasizing the importance of understanding local needs before expanding.

    For those interested in using Food Token, Barton encouraged restaurants to reach out via their website, offering a straightforward way to start accepting cryptocurrency.

    “We only charge $0.10 per transaction, unlike Visa and Mastercard,” he said, highlighting the financial benefits for restaurants.

    As cryptocurrency continues to gain popularity, Food Token aims to simplify the process for both consumers and restaurants, paving the way for a new era of digital payments in the restaurant industry.

    See more coverage of top California stories here | Download our app | Subscribe to our morning newsletter | Find us on YouTube here and subscribe to our channel

    [ad_2]

    Source link

  • Peabody police hosting 20th Citizens Academy

    [ad_1]

    PEABODY — The Peabody Police Department is accepting applications for its 20th session of its Citizens Academy.

    Classes for this session will be held each Wednesday from 6-9 p.m. starting on Oct. 15 and running through Dec. 17.


    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAmpAA=:42E:@?D 2C6 5F6 @? ~4E] g] $62ED 2C6 =:>:E65 2?5 H:== 36 7:==65 😕 E96 @C56C 2AA=:42E:@?D 2C6 C646:G65[ E96 A@=:46 56A2CE>6?E D2:5]k^Am

    kAm“(6 9@A6 2?5 6IA64E E92E A2CE:4:A2?ED H:== 8C25F2E6 7C@> E96 r:E:K6?D p4256>J H:E9 2 ?6H7@F?5 2AAC64:2E:@? 7@C H92E H6 2D A@=:46 @77:46CD 5@[” AC@8C2> 5:C64E@C r2AE] $4@EE #:492C5D D2:5 😕 2 DE2E6>6?E]k^Am

    kAm“!2CE:4:A2?ED H:== 7:?:D9 H:E9 2 8@@5 562= @7 7:CDE92?5 @H=6586 @7 9@H E96 56A2CE>6?E @A6C2E6D 2?5 E96 492==6?86D E92E A@=:46 @77:46CD 7246 52:=J] xE H:== 36 2 C62= 6J6@A6?6C]”k^Am

    kAm%@A:4D E92E H:== 36 4@G6C65 😕 E96D6 4=2DD6D :?4=F56[ 3FE 2C6 ?@E =:>:E65 E@[ A@=:E:4D 😕 A@=:4:?8[ E6CC@C:D>[ E96 =682= AC@46DD[ >@E@C G69:4=6 =2H[ A2EC@= AC@465FC6D[ 5@>6DE:4 G:@=6?46[ 4C:>:?2= :?G6DE:82E:@?D 2?5 4@>>F?:EJ A@=:4:?8]k^Am

    kAm$EF56?ED H:== 92G6 56>@?DEC2E:@?D 😕 zh FD6 2?5 5C@?6D 2?5 H:== E2<6 2 7:C62C>D 4=2DD 2E E96 !623@5J !@=:46 $E2E:@?’D @FE5@@C 7:C:?8 C2?86] %96J H:== 2=D@ E@FC E96 DE2E:@? 2?5 E96 |:55=6E@? w@FD6 @7 r@CC64E:@?D[ 2?5 A2CE:4:A2E6 😕 >@E@C G69:4=6 DE@A D46?2C:@D]k^Am

    kAmx?DECF4E@CD :?4=F56 >6>36CD @7 E96 !623@5J !@=:46 s6A2CE>6?E[ tDD6I r@F?EJ s:DEC:4E pEE@C?6J’D ~77:46 2?5 tDD6I r@F?EJ $96C:77’D ~77:46]k^Am

    [ad_2]

    By News Staff

    Source link

  • Seven HBCUs across the country on lockdown for threats

    [ad_1]

    Seven Historically Black Colleges and Universities are closed or on lockdown because of terroristic threats, according to Hearst sister stations and NBC affiliates.Alabama State University was briefly on lockdown Thursday morning because of a “terroristic threat” aimed at the campus.The university sent a statement to WVTM, stating that campus operations had been shut down that morning into the afternoon: “Alabama State University has received the all-clear from law enforcement and University officials. While the immediate threat has been resolved, all non-essential day-to-day operations remain suspended for the remainder of the day, and the campus is still closed to the public. We are still asking all students to shelter-in-place in their residence halls until further notice. The safety and well-being of our Hornet family continues to be our top priority.”FloridaIn Florida, Bethune-Cookman University is on lockdown and classes have been canceled after “a potential threat to campus safety” was made, the school told sister station WESH.GeorgiaClark Atlanta University received threats and is on lockdown, causing Spellman College to also go under lockdown because of proximity, according to a post on its social media page.”At this time, no threats have been directed toward Spelman’s campus. However, we have increased security presence across campus and at our two main entrances,” Spellman posted.LouisianaSouthern University is on lockdown due to a potential threat, according to NBC affiliate WAFB. VirginiaVirginia State University and Hampton University closed for terroristic threats, according to our NBC affiliates WWBT and WAVY. This is a developing story and will be updated as information becomes available.

    Seven Historically Black Colleges and Universities are closed or on lockdown because of terroristic threats, according to Hearst sister stations and NBC affiliates.

    Alabama State University was briefly on lockdown Thursday morning because of a “terroristic threat” aimed at the campus.

    The university sent a statement to WVTM, stating that campus operations had been shut down that morning into the afternoon:

    “Alabama State University has received the all-clear from law enforcement and University officials. While the immediate threat has been resolved, all non-essential day-to-day operations remain suspended for the remainder of the day, and the campus is still closed to the public. We are still asking all students to shelter-in-place in their residence halls until further notice. The safety and well-being of our Hornet family continues to be our top priority.”

    Florida

    In Florida, Bethune-Cookman University is on lockdown and classes have been canceled after “a potential threat to campus safety” was made, the school told sister station WESH.

    Georgia

    Clark Atlanta University received threats and is on lockdown, causing Spellman College to also go under lockdown because of proximity, according to a post on its social media page.

    “At this time, no threats have been directed toward Spelman’s campus. However, we have increased security presence across campus and at our two main entrances,” Spellman posted.

    Louisiana

    Southern University is on lockdown due to a potential threat, according to NBC affiliate WAFB.

    Virginia

    Virginia State University and Hampton University closed for terroristic threats, according to our NBC affiliates WWBT and WAVY.

    This is a developing story and will be updated as information becomes available.

    [ad_2]

    Source link

  • How to safeguard your credit score in retirement as fraud and identity theft rise among seniors

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’ve worked hard, saved smart, and now it’s time to enjoy your retirement years. But here’s the catch: your credit score still matters, even when you’re no longer applying for mortgages, car loans or new credit cards. Why? Scammers know many seniors don’t monitor their credit very often, and that makes retirees prime targets for identity theft. Due largely to increased scam attempts, financial losses for seniors reached $4.9 billion in 2024. And anyone can become a target. The good news is there are simple, powerful steps you can take right now to lock down your credit score and make sure your hard-earned nest egg is safe.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why your credit score matters in retirement

    A lot of people assume that once they stop working, their credit score doesn’t matter anymore. After all, you’re not buying a new house or car, right? Not so fast. Your credit score can still affect:

    • Insurance premiums. Some insurers factor your credit into your rates.
    • Retirement community applications. Senior housing and assisted living facilities often run credit checks.
    • Loan approvals. You may still need financing for medical bills, home repairs or emergencies.
    • Identity theft risk. A clean, unused credit file is like a blank check to a scammer.

    The hands of Karin Seelmann, a 70-year-old participant of a computer course for seniors, handle the keyboard of a laptop in Hanover, Germany, Feb. 21, 2017. (Peter Steffen/picture alliance)

    Keeping your credit score safe is about protecting both your financial reputation and your retirement savings.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Step 1: Monitor your credit regularly

    Even if you’re not applying for credit, you should know what’s in your file. Seniors are often the last to find out when a scammer has taken out a loan or opened a card in their name. The three big credit bureaus, Equifax, Experian and TransUnion, are required to give you a free report once a year. Here’s the trick: thanks to recent changes, you can now get a free weekly credit report at AnnualCreditReport.com. Set a calendar reminder to check your reports once a month. Look for accounts you don’t recognize, suspicious credit inquiries or sudden drops in your score.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    man writing in journal next to laptop while sittign at table

    A man looking into his retirement matters. (Kurt “CyberGuy” Knutsson)

    Step 2: Place a fraud alert

    If you suspect you’ve been targeted, a fraud alert makes it harder for identity thieves to open new accounts in your name. It tells creditors they need to take extra steps to verify your identity before approving anything.

    • A fraud alert is free.
    • It lasts for one year (you can renew it).
    • You only need to contact one bureau. They’ll notify the others.

    This is a great first line of defense if you’ve received scam calls, phishing emails or notice odd activity in your accounts. 

    woman types on laptop while sitting at table

    A woman looking up her credit score on a laptop. (Kurt “CyberGuy” Knutsson)

    Step 3: Freeze your credit (the gold standard)

    A credit freeze is the single most powerful tool retirees have to protect their credit score. Also, it’s completely free. Here’s why you should do it today:

    • It blocks anyone from opening new credit in your name.
    • It doesn’t affect your current accounts, score or benefits.
    • You can unfreeze it anytime if you need new credit.

    Since most retirees don’t apply for new loans often, a credit freeze is a “set it and forget it” safeguard. Think of it as putting your credit file in a vault.

    How to do it:

    • Contact Equifax, Experian and TransUnion individually (you’ll need to freeze your credit with each one).
    • Provide proof of identity (usually SSN, date of birth and address).
    • Keep the PIN or password they give you; you’ll need it if you ever want to lift the freeze.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    woman sitting on couch typing on laptop

    A woman looking into her retirement matters on her laptop. (Kurt “CyberGuy” Knutsson)

    Step 4: Lock down your personal data online

    Here’s something many seniors don’t realize: even if your credit is frozen, scammers can still target you through other leaks of personal information.

    Data brokers publish your name, address history, phone numbers, relatives and even property records online. Scammers use this information to:

    • Impersonate family members in “grandparent scams.”
    • Craft convincing phishing messages.
    • Trick banks or creditors with stolen details.

    That’s why removing your personal information from these sites is just as important as freezing your credit. Doing it manually means tracking down dozens (sometimes hundreds) of data broker websites and sending formal removal requests and repeating the process every few months as your info pops back up.

    Data removal services can handle this automatically, requesting removals from dozens of data brokers at a time and monitoring for re-uploads. It’s one of the simplest ways to cut off scammers at the source and keep your retirement profile off the web.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5 STEPS TO PROTECT YOUR FINANCES FROM FAMILY SCAMS

    Step 5: Watch for warning signs of identity theft

    Even with strong protections in place, it pays to stay alert. Here are a few red flags to watch for:

    • Bills or medical statements for services you never used
    • Collection calls about debts that aren’t yours
    • New credit cards or loans arriving in your mail
    • Denials for credit or insurance you didn’t apply for
    • A sudden, unexplained drop in your credit score.

    If you see any of these, act fast: file a report at IdentityTheft.gov, contact your bank or creditors and double-check that your credit freeze is active.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Retirement should be about peace of mind; you’ve earned your retirement. Protecting your credit score may not be the most exciting task on your to-do list, but it’s one of the smartest. By monitoring your credit, freezing your file, removing your data from broker sites and staying alert for red flags, you can keep scammers out of your finances and focus on enjoying the retirement you deserve. Want to take one major worry off your list? Start by having your personal information automatically pulled from the internet. It’s an easy way to reduce your digital footprint and keep your credit and your retirement fund safe.

    Should more be done to protect retirees from identity theft and financial scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • Poland says it shot down Russian drones that violated its airspace during strikes on Ukraine

    [ad_1]

    Poland said early Wednesday that multiple Russian drones entered and were shot down over its territory with help from NATO allies, describing the incident as an “act of aggression” carried out during a wave of Russian strikes on Ukraine.Several European leaders said they believed Russia was intentionally escalating the war, and NATO was discussing the incident in a meeting. It came three days after Russia’s largest aerial attack on Ukraine since the war began, an attack that for the first time hit a key government building in Kyiv.“Russia’s war is escalating, not ending,” European Union foreign policy chief Kaja Kallas said. “Last night in Poland we saw the most serious European airspace violation by Russia since the war began, and indications suggest it was intentional, not accidental.”Polish Prime Minister Donald Tusk wrote on social media that Polish airspace was violated by multiple Russian drones. “Those drones that posed a direct threat were shot down,” Tusk said.Defense Minister Władysław Kosiniak-Kamysz wrote on X that more than 10 objects crossed into Polish air space, but he did not specify an exact number. He thanked NATO Air Command and The Royal Netherlands Air and Space Force for supporting the action with F-35 fighter jets.Polish airspace has been violated multiple times since Russia’s full-scale invasion of Ukraine in 2022, but there has been nothing on this scale either in Poland or in any other Western nation along the eastern flank of NATO and the European Union.Drones rattle Baltic NATO membersLeaders in the strategically located Baltic states of Lithuanian, Latvia and Estonia — the NATO members that are most nervous about Russian aggression — expressed deep concerns.“Russia is deliberately expanding its aggression, posing an ever-growing threat to Europe,” Lithuanian President Gitanas Nausėda wrote on X. Estonia’s foreign minister Margus Tsahkna said that the overnight attacks on Ukraine and violations of Polish airspace were “yet another stark reminder that Russia is not just a threat to Ukraine, but to all of Europe and NATO.”Bernard Blaszczuk, mayor of the village of Wyryki in Lublin region, told TVP Info that a house was hit by “either a missile or a drone, we don’t know yet.” He said people were inside the building but nobody was hurt.The Polish armed forces said Wednesday morning that a search for possible crash sites is ongoing and urged people not to approach, touch or move any objects they see, warning that they may pose a threat and could contain hazardous material.Warsaw’s Chopin Airport suspended flights for several hours, citing the closure of airspace due to military operations.Russian objects have entered Polish airspace beforePoland has complained about Russian objects entering its airspace during attacks on Ukraine before.In August, Poland’s defense minister said that a flying object that crashed and exploded in a cornfield in eastern Poland was identified as a Russian drone, and called it a provocation by Russia.In March, Poland scrambled jets after a Russian missile briefly passed through Polish air space on its way to a target in western Ukraine, and in 2022, a missile that was likely fired by Ukraine to intercept a Russian attack landed in Poland, killing two people.NATO members vow supportNATO said its air defenses supported Poland, and chief spokesperson Allison Hart said the military organization’s 32 national envoys will discuss the matter at a pre-planned meeting.Col. Martin O’Donnell, NATO’s Supreme Allied Powers Europe, said: “This is the first time NATO planes have engaged potential threats in Allied airspace.”Dutch Prime Minister Dick Schoof confirmed in a message on X that Dutch F-35 fighter jets stationed in Poland under NATO provided support to the Polish air force overnight.“Let me be clear: the violation of Polish airspace last night by Russian drones is unacceptable. It is further proof that the Russian war of aggression poses a threat to European security,” Schoof said in the Dutch language message on X.German Patriot defense systems in Poland were also placed “on alert,” and an Italian airborne early warning plane and an aerial refueler from NATO’s Multinational Multi-Role Tanker Transport aircraft fleet were launched, O’Donnell said.NATO, he said, “is committed to defending every kilometer of NATO territory, including our airspace.”Ukrainian President Volodymyr Zelenskyy said in a message on Telegram that the deployment of European aircraft to intercept the drones was an “important precedent.”Russia must know the response to escalation “will be a clear and strong reaction from all partners,” Zelenskyy said.Russian attacks hit central and western UkraineUkraine’s Air Force says Russia fired 415 strike and decoy drones, as well as 42 cruise missiles and one ballistic missiles overnight.Ukrainian air defenses intercepted or jammed 386 drones and 27 cruise missiles, according to the report.“At least eight enemy UAVs crossed Ukraine’s state border in the direction of the Republic of Poland,” the Air Force message said.Russian drones injured three people in Ukraine’s western Khmelnytskyi region, its head Serhii Tiurin wrote on Telegram early Wednesday morning. He said a sewing factory was destroyed, a gas station and vehicles were damaged, and windows in several houses were blown out.One person was killed and one injured in Zhytomyr region overnight, regional administration head Vitalii Bunechko wrote on Telegram, while homes and businesses suffered damage.In Vinnytsia region, Russian drones damaged “civilian and industrial infrastructure,” according to regional head Natalia Zabolotna. Nearly 30 residential buildings were damaged and one person was injured.In Cherkasy region, several houses and a power grid were damaged in a Russian attack. In Zolotonosha district, a shock wave destroyed a barn killing two cows, regional head Ihor Taburets wrote on Telegram.The Russian Defense Ministry said in its morning report on Wednesday that it had destroyed 122 Ukrainian drones over various Russian regions overnight, including over the illegally annexed Crimea and areas of the Black Sea.___Novikov reported from Kyiv, Ukraine. AP writers Lorne Cook in Brussels and Geir Moulson in Berlin contributed to this report.

    Poland said early Wednesday that multiple Russian drones entered and were shot down over its territory with help from NATO allies, describing the incident as an “act of aggression” carried out during a wave of Russian strikes on Ukraine.

    Several European leaders said they believed Russia was intentionally escalating the war, and NATO was discussing the incident in a meeting. It came three days after Russia’s largest aerial attack on Ukraine since the war began, an attack that for the first time hit a key government building in Kyiv.

    “Russia’s war is escalating, not ending,” European Union foreign policy chief Kaja Kallas said. “Last night in Poland we saw the most serious European airspace violation by Russia since the war began, and indications suggest it was intentional, not accidental.”

    Polish Prime Minister Donald Tusk wrote on social media that Polish airspace was violated by multiple Russian drones. “Those drones that posed a direct threat were shot down,” Tusk said.

    Defense Minister Władysław Kosiniak-Kamysz wrote on X that more than 10 objects crossed into Polish air space, but he did not specify an exact number. He thanked NATO Air Command and The Royal Netherlands Air and Space Force for supporting the action with F-35 fighter jets.

    Polish airspace has been violated multiple times since Russia’s full-scale invasion of Ukraine in 2022, but there has been nothing on this scale either in Poland or in any other Western nation along the eastern flank of NATO and the European Union.

    Chancellery of the Prime Minister of Poland via AP

    Polish Prime Minister Donald Tusk holds an extraordinary government meeting at the chancellery, with military and emergency services officials, following violations of Polish airspace during a Russian attack, in Warsaw, Poland, Wednesday, Sept. 10, 2025.

    Drones rattle Baltic NATO members

    Leaders in the strategically located Baltic states of Lithuanian, Latvia and Estonia — the NATO members that are most nervous about Russian aggression — expressed deep concerns.

    “Russia is deliberately expanding its aggression, posing an ever-growing threat to Europe,” Lithuanian President Gitanas Nausėda wrote on X. Estonia’s foreign minister Margus Tsahkna said that the overnight attacks on Ukraine and violations of Polish airspace were “yet another stark reminder that Russia is not just a threat to Ukraine, but to all of Europe and NATO.”

    Bernard Blaszczuk, mayor of the village of Wyryki in Lublin region, told TVP Info that a house was hit by “either a missile or a drone, we don’t know yet.” He said people were inside the building but nobody was hurt.

    The Polish armed forces said Wednesday morning that a search for possible crash sites is ongoing and urged people not to approach, touch or move any objects they see, warning that they may pose a threat and could contain hazardous material.

    Warsaw’s Chopin Airport suspended flights for several hours, citing the closure of airspace due to military operations.

    Russian objects have entered Polish airspace before

    Poland has complained about Russian objects entering its airspace during attacks on Ukraine before.

    In August, Poland’s defense minister said that a flying object that crashed and exploded in a cornfield in eastern Poland was identified as a Russian drone, and called it a provocation by Russia.

    In March, Poland scrambled jets after a Russian missile briefly passed through Polish air space on its way to a target in western Ukraine, and in 2022, a missile that was likely fired by Ukraine to intercept a Russian attack landed in Poland, killing two people.

    NATO members vow support

    NATO said its air defenses supported Poland, and chief spokesperson Allison Hart said the military organization’s 32 national envoys will discuss the matter at a pre-planned meeting.

    Col. Martin O’Donnell, NATO’s Supreme Allied Powers Europe, said: “This is the first time NATO planes have engaged potential threats in Allied airspace.”

    Dutch Prime Minister Dick Schoof confirmed in a message on X that Dutch F-35 fighter jets stationed in Poland under NATO provided support to the Polish air force overnight.

    “Let me be clear: the violation of Polish airspace last night by Russian drones is unacceptable. It is further proof that the Russian war of aggression poses a threat to European security,” Schoof said in the Dutch language message on X.

    German Patriot defense systems in Poland were also placed “on alert,” and an Italian airborne early warning plane and an aerial refueler from NATO’s Multinational Multi-Role Tanker Transport aircraft fleet were launched, O’Donnell said.

    NATO, he said, “is committed to defending every kilometer of NATO territory, including our airspace.”

    Ukrainian President Volodymyr Zelenskyy said in a message on Telegram that the deployment of European aircraft to intercept the drones was an “important precedent.”

    Russia must know the response to escalation “will be a clear and strong reaction from all partners,” Zelenskyy said.

    Russian attacks hit central and western Ukraine

    Ukraine’s Air Force says Russia fired 415 strike and decoy drones, as well as 42 cruise missiles and one ballistic missiles overnight.

    Ukrainian air defenses intercepted or jammed 386 drones and 27 cruise missiles, according to the report.

    “At least eight enemy UAVs crossed Ukraine’s state border in the direction of the Republic of Poland,” the Air Force message said.

    Russian drones injured three people in Ukraine’s western Khmelnytskyi region, its head Serhii Tiurin wrote on Telegram early Wednesday morning. He said a sewing factory was destroyed, a gas station and vehicles were damaged, and windows in several houses were blown out.

    One person was killed and one injured in Zhytomyr region overnight, regional administration head Vitalii Bunechko wrote on Telegram, while homes and businesses suffered damage.

    In Vinnytsia region, Russian drones damaged “civilian and industrial infrastructure,” according to regional head Natalia Zabolotna. Nearly 30 residential buildings were damaged and one person was injured.

    In Cherkasy region, several houses and a power grid were damaged in a Russian attack. In Zolotonosha district, a shock wave destroyed a barn killing two cows, regional head Ihor Taburets wrote on Telegram.

    The Russian Defense Ministry said in its morning report on Wednesday that it had destroyed 122 Ukrainian drones over various Russian regions overnight, including over the illegally annexed Crimea and areas of the Black Sea.

    ___

    Novikov reported from Kyiv, Ukraine. AP writers Lorne Cook in Brussels and Geir Moulson in Berlin contributed to this report.

    [ad_2]

    Source link

  • FBI warns of QR code scam disguised in mystery packages

    [ad_1]

    NEWYou can now listen to Fox News articles!

    QR codes that were once seen as a convenient shortcut for checking menus or paying bills have increasingly been turned into weapons. Fake delivery texts, counterfeit payment links and malicious codes pasted over legitimate ones have all become part of the modern fraud playbook.

    The latest warning from federal authorities shows just how far these tactics have gone. Criminals are now mailing out packages that people never ordered. Inside these boxes is a QR code that, when scanned, can lead to stolen personal details, drained bank accounts or malware running silently in the background of a phone.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    QR CODE SCAMS RISE AS 73% OF AMERICANS SCAN WITHOUT CHECKING

    What you need to know about the QR code scam

    The scheme is a twist on what is known as a brushing scam. Traditionally, brushing scams involved online sellers sending products to strangers and then using the recipient’s details to post fake reviews. It was more of a nuisance than a serious crime.

    An Amazon package with a QR code. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images)

    Now the practice has shifted from harmless free items to deliberate fraud. Instead of receiving a product, many victims find only a printed QR code. Once scanned, the code redirects them to fraudulent websites that ask for sensitive personal information, such as banking information, credit card numbers or login credentials. Some codes go a step further and install malicious software designed to track activity and steal data directly from the device.

    “The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone,” the agency said in a public notice. “To encourage the victim to scan the QR code, the criminals often ship the packages without sender information to entice the victim to scan the QR code.”

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    Why QR codes appeal to scammers

    QR codes have become common in everyday life. They are used in restaurants, stores, airports, on polls and payment systems and most people scan them without a second thought. Unlike suspicious links that can be spotted, a QR code reveals nothing until it is scanned.

    That makes it a perfect disguise for a scam. The setup is simple: a package arrives with no sender information and no explanation. The mystery sparks curiosity, and many people scan the code to figure out who sent it. That moment of curiosity is what the scammers rely on.

    A woman scanning a QR code on a building

    Taylor Swift fans gather outside a building where a mural featuring a large QR code was being painted to promote Swift’s latest album, “The Tortured Poets Department,” on April 17, 2024, in Chicago. (Scott Olson/Getty Images)

    The consequences can be serious. Fake websites may harvest names, addresses and financial details. Malware may silently monitor accounts, log keystrokes or even target cryptocurrency wallets. Victims often do not notice until they see unauthorized charges or suspicious withdrawals. By then, their information may already be in the hands of criminals.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    7 ways to stay safe from QR code scams

    Scammers rely on curiosity and convenience to trick people into scanning malicious QR codes. A few simple habits can help you avoid becoming a target. Here are seven ways to stay safe from QR code scams.

    1) Be cautious with unsolicited QR codes and use strong antivirus software

    Avoid scanning QR codes from mystery deliveries, random flyers or stickers on public signs. A QR code is just a disguised link, and until you know where it leads, it shouldn’t be trusted. To stay safe even if you accidentally scan a risky code, keep strong antivirus software on your phone. Mobile security apps can block fraudulent sites, warn you before downloads and protect against malicious QR code attacks.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Stick to trusted sources

    Only scan QR codes from businesses and organizations you already trust. Examples include your bank’s mobile app, an airline boarding pass or a known retailer’s checkout page. If you wouldn’t click a random link in a text message, don’t scan a random QR code either.

    3) Preview links before opening

    Most phones let you press and hold a QR code link to preview where it goes. If the URL looks suspicious, with misspellings, random numbers or shortened links, don’t open it. Taking a second to check can save you from a phishing trap. 

    A man holding a package

    Scammers are sending fake packages with QR codes that trick recipients into scanning and giving criminals access to their personal data. (Kurt “CyberGuy” Knutsson)

    4) Limit your digital footprint

    The less personal data available about you online, the harder it is for scammers to target you with convincing fraud attempts. Consider using data removal services that scrub your information from people-search sites and marketing databases. This reduces the chances that your address or phone number ends up in the wrong hands and is connected to a scam package.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Enable two-factor authentication (2FA)

    Even if your login details are stolen, 2FA makes it harder for criminals to access your accounts. By requiring a secondary code sent to your phone or generated through an authenticator app, 2FA helps prevent unauthorized logins to your banking, email and trading accounts.

    6) Keep your device updated

    Software updates often contain fixes for security vulnerabilities that scammers try to exploit. Running the latest version of your phone’s operating system, as well as updating apps regularly, gives you stronger protection against malware that can be delivered through a malicious QR code.

    7) Report suspicious activity

    If an unexpected package arrives at your door with a QR code inside, do not simply throw it away. Report it to local authorities and consider filing a complaint with the FBI’s Internet Crime Complaint Center. Reporting not only helps protect you, but it also gives law enforcement more information to track how these scams are spreading.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    This scam might not be everywhere yet, but it shows just how quickly criminals adapt to new technology. QR codes were meant to make life easier, and most of the time they do, but that same convenience can turn into a weakness when people let curiosity override caution. The lesson here is that a mystery package with a QR code is not some fun puzzle to figure out. It is a red flag. The safest move is to step back, resist the urge to scan and if something feels off, report it instead of interacting with it.

    Have you ever scanned a QR code without thinking twice about where it might lead? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Passwords Won’t Secure Your Identity. Here’s What Will. | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.

    The tech titans who handle our data and boast a robust security infrastructure are the same ones who lost control of our data. With 16 billion Apple, Facebook, Google and other passwords leaked, a large question mark looms over the reliability of traditional security systems. The centralized databases and login processes of yesteryear are simply unable to keep up with today’s increasingly sophisticated cyber threats. Our passwords and two-factor authentication fall short in securing our digital identities.

    Related: Why Businesses Should Implement Passwordless Authentication Right Now

    Digitization outpacing security

    Digitization has become deeply entrenched in the fabric of how we operate as a society on a global scale, with 5.56 billion people online today and 402.74 million terabytes of data generated on a daily basis. The dizzying numbers demonstrate the breakneck speed with which every aspect of our lives has taken a virtual shape, and with it, the proliferation of the conversation about how we secure the digital world we have created.

    With the current security measures in use, cybercrime is expected to cost over $639 billion in the United States this year, with the costs expected to balloon as far as $1.82 trillion by 2028. In light of such projected costs, the development of a secure infrastructure is a priority that requires immediate attention, one that could compromise digital identity if disregarded.

    Decentralize to prevent compromise

    The centralized databases of tech titans mean that there is one location, one source of truth, that if compromised, all that it contains is leaked, as was the case with the passwords that were leaked. If not a leak, then a ransomware attack that disrupts the systems on which our digital lives operate. This kind of disruption can cascade to fundamental services such as healthcare, as a recent ransomware attack caused a system-wide tech outage at a large network of medical centers in Ohio, cancelling inpatient and outpatient procedures.

    Centralization’s single point of failure calls for a shift in how to operate tech infrastructures — a shift to decentralized data storage. Unlike centralized systems, blockchain networks distribute data across a large multitude of nodes that are in constant verification of one another through cryptographic consensus. To verify the data, the majority of nodes must be in agreement, a majority that rejects tampered “blocks” or compromised nodes. This means that there is no single repository that can be compromised, as attackers would need to compromise the majority of the nodes, a task immensely more challenging than the common compromise of a centralized server.

    Related: Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

    Use the physical to verify the virtual

    The beauty of blockchain technology is its ownership element. As everything is secured by cryptography, the only way to “decrypt” the data and access it is through your own private keys. However, if a threat actor is to gain access to your private keys, they also gain access to your data and funds, posing a threat that puts in question how secure the shift from centralized to decentralized storage really is.

    If a private key is proof of one’s identity, then its loss equates to the loss of one’s digital identity, a compromise that can only be secured by undeniable proof that the owner of the keys is indeed who they claim to be. This is where biometric authentication becomes the final piece in the puzzle of securing one’s digital identity in a decentralized infrastructure.

    Using one’s fingerprint in an offline environment for identity verification not only ensures ownership of data and its security but also prevents the exposure of biometric data to a server where it could be breached. This creates a new paradigm that deems passwords and two-factor authentication obsolete. Building on such a methodology opens pathways for a secure digital identity and KYC verification on a decentralized infrastructure, leaving no room for threat actors to compromise digital identities.

    The conversation on digital security is the result of an absolute necessity in the face of increasingly sophisticated cyber attacks. However, adding uppercase letters, symbols and numbers to your password will not be enough. The added layer of two-factor authentication will not be enough either. More steps do not equate to more security. The future of security lies in an infrastructure shift from the centralized to the decentralized, protected by a layer of biometric authentication that ensures that one’s digital identity is secured.

    Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.

    The tech titans who handle our data and boast a robust security infrastructure are the same ones who lost control of our data. With 16 billion Apple, Facebook, Google and other passwords leaked, a large question mark looms over the reliability of traditional security systems. The centralized databases and login processes of yesteryear are simply unable to keep up with today’s increasingly sophisticated cyber threats. Our passwords and two-factor authentication fall short in securing our digital identities.

    Related: Why Businesses Should Implement Passwordless Authentication Right Now

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    [ad_2]

    Venket Naga

    Source link

  • AI meeting notes are recording your private conversations

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence has slipped quietly into our meetings. Zoom, Google Meet and other platforms now offer AI notetakers that listen, record and share summaries. At first, it feels like a helpful assistant. No more scrambling to jot down every point. But there’s a catch. It records everything, including comments you never planned to share.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    When private conversations end up in recaps

    Many people are discovering that AI notetakers capture more than project updates and strategy points. Jokes, personal stories and even casual side comments often slip into the official meeting summaries.

    What might feel harmless in the moment, like teasing someone, chatting about lunch plans or venting about a frustrating errand, can suddenly reappear in a recap email sent to the whole group. In some cases, even affectionate nicknames or pet mishaps have shown up right alongside serious action items.

    Experts warn that AI note-taking tools integrated into Zoom and Google Meet could capture more than the meeting agenda. (Korea Pool/Getty Images)

    Examples of what could go wrong:

    • Jokes or sarcasm taken out of context
    • Personal errands or gossip appearing in a recap
    • Casual catch-ups mixed into meeting notes
    • Embarrassing slip-ups becoming part of official records

    These surprises can be funny in hindsight, but they highlight a bigger issue. AI notetakers don’t separate casual conversation from work-related discussion. And once your words are written down, they can be saved, forwarded or even archived in ways you didn’t intend. That means an offhand remark could live far longer than the meeting itself.

    AI AND LEARNING RETENTION: DOES CHATGPT HELP OR HURT?

    A Google Gemini webpage

    A Google Gemini generative artificial intelligence webpage. (Andrey Rudakov/Bloomberg via Getty Images)

    Why AI notetakers capture too much

    These tools work by recording conversations in real time and then generating automatic summaries. Zoom’s AI Companion flags its presence with a diamond icon. Google Meet’s version uses a pencil icon and an audio cue. Only meeting hosts can switch them on or off.

    That sounds transparent, but most people stop noticing the icons after a few minutes. Once the AI is running, it doesn’t separate “work talk” from “side chatter.” The result? Your casual remarks can end up in a summary sent to colleagues or even clients.

    And mistakes happen. An AI notetaker might mishear a joke, twist sarcasm into something serious or drop a casual remark into notes where it looks out of place. Stripped of tone and context, those words can come across very differently once they’re written down.

    META AI’S NEW CHATBOT RAISES PRIVACY ALARMS

    Google Gemini chat

    The Google Gemini AI interface seen on an iPhone browser. (Jaap Arriens/NurPhoto via Getty Images)

    Steps to protect your privacy from AI notetakers

    Even if you use these tools, you can take control of what they capture. A few simple habits will help you reduce the risks while still getting the benefits.

    1) Stay alert to indicators

    Always check for the flashing icon or audio cue that signals an AI notetaker is active.

    2) Control the settings

    If you’re the host, decide when AI should run. Limit its use to important meetings where notes are truly necessary.

    3) Choose recipients carefully

    Many platforms let you control who receives the notes. Make sure only the right people get access.

    4) Use private chats

    Need to share a side comment? Send it as a direct message rather than saying it out loud.

    5) Save personal talk for later

    Keep casual conversations off recorded calls. If you need to catch up, wait until the AI is off.

    6) Ask before enabling AI

    If you’re not the host, confirm that everyone is comfortable with AI note-taking. Setting expectations up front prevents awkward situations later.

    7) Review and edit recaps

    Check meeting notes before forwarding them. Edit or trim out personal chatter so only useful action items remain.

    8) Check where notes are stored

    Find out whether transcripts are saved in the cloud or on your device. Adjust retention settings, so private conversations don’t linger longer than necessary.

    9) Follow company guidelines

    If your workplace doesn’t yet have a policy on AI notetakers, suggest one. Clear rules protect both employees and clients.

    10) Keep software updated

    AI features improve quickly. Updating your platform reduces errors, misheard comments and accidental leaks.

    CLICK HERE TO GET THE FOX NEWS APP

    What this means for you

    AI notetakers offer convenience, but they also reshape how we communicate at work. Once, small talk in meetings faded into the background. Now, even lighthearted comments can be captured, summarized and circulated. That shift means you need to think twice before speaking casually in a recorded meeting.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    The rise of AI in meetings shows both its promise and its pitfalls. You gain productivity, but risk oversharing. By understanding how these tools work and taking a few precautions, you can get the benefits without the embarrassment.

    Would you trust an AI notetaker to record your next meeting, knowing it might repeat your private conversations word for word? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • Israeli military extends regional campaign with strike on Hamas in Qatar

    [ad_1]

    Israel announced it conducted “a precise targeted strike” on Hamas’s leadership on Tuesday, without elaborating on the strike’s location even as blasts rang out in the Qatari capital Doha and Qatari authorities condemned the “cowardly Israeli attack.”

    The attack comes as Israel is ramping up for a full invasion of Gaza City, even as stalled negotiations with Hamas officials in Doha appeared to have regained some momentum after the weekend.

    “The members of the leadership who were struck led the terror organization’s activities for years, and are directly responsible for carrying out the Oct. 7 massacre and waging the war against the State of Israel,” said a statement from the Israeli military.

    The statement referred to the date in 2023 when the Hamas-led militants killed 1,200 people — two-thirds of them civilians — and kidnapped 251 others to Gaza, according to Israeli figures. More than 64,000 Palestinians, most of them civilians, Palestinian authorities say, have been killed in Israel’s subsequent campaign on the enclave.

    Videos and television broadcasts showed black smoke rising from a series of buildings in Doha’s Katara district, a normally quiet residential area where Hamas and several of its top-ranking members have lived for years. One video depicts pedestrians in Katara running and screaming in fear as a pair of explosions echo through the neighborhood.

    Qatari security personnel were seen swarming the area and setting up roadblocks.

    Qatar agreed to host a political office for Hamas at the request of the U.S. government, it says. Hamas is one of several groups it has allowed on its soil as part of its growing reputation as a regional facilitator. It has hosted repeated mediation efforts between Hamas and Israel over the last 23 months of the war.

    An unnamed Hamas source speaking to Qatari broadcaster Al Jazeera said the attack targeted negotiators meeting to discuss the latest ceasefire proposal issued by President Trump. There were conflicting reports as to whether anyone survived, but the meeting is thought to have included senior Hamas officials Khalil al-Hayya, Khaled Mishaal, Zaher Jabarin and Muhammad Darwish.

    In its statement, the Israeli military said “measures were taken in order to mitigate harm to civilians, including the use of precise munitions and additional intelligence.”

    But Qatari foreign ministry spokesman Majed al-Ansari, in a furious statement issued on the messaging platform X on Tuesday, described the strike as “a criminal assault [that] constitutes a blatant violation of all international laws and norms, and poses a serious threat to the security and safety of Qataris and residents in Qatar.”

    “While the State of Qatar strongly condemns this assault, it confirms that it will not tolerate this reckless Israeli behavior and the ongoing disruption of regional security, nor any act that targets its security and sovereignty.”

    The strike on Doha adds to a growing list of Arab countries Israel has struck in the last month, emphasizing the Israeli government’s more belligerent post-Oct. 7 strategy against its longtime adversaries in the region. Aside from its expanding campaign in Gaza, the Israeli military has over the last few weeks conducted strikes in Lebanon, Syria, Yemen and now Doha.

    The attack coincided with the Israeli military issuing an evacuation order encompassing the entire city of Gaza, the first time it has done so in the run-up to its planned full invasion of the largest urban center in the eponymous enclave’s north.

    An unnamed White House official told the BBC that the Trump administration was informed ahead of time of the strike on Qatar, which is home to Al Udeid, the largest U.S. base in the Middle East and the regional headquarters for U.S. Central Command. Some 10,000 U.S. troops are stationed there.

    An Israeli official, speaking to Israeli broadcaster Channel 12, said President Trump gave the green light for the operation.

    But Netanyahu issued a statement on Tuesday saying “today’s action against the top terrorist chieftains of Hamas was a wholly independent Israeli operation. Israel initiated it, Israel conducted it, and Israel takes full responsibility,” the statement said.

    [ad_2]

    Nabih Bulos

    Source link

  • How to protect your privacy at hotels

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You don’t have to be a celebrity to want hotel privacy. Many guests, like Carol from Wisconsin, wonder if hidden cameras or security lapses could affect their next trip.

    The good news: most hotels value guest privacy because it’s central to their business. Still, being aware and taking a few smart steps can give you extra peace of mind during your stay.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

    The bottom line on hotel privacy: Risk is low, but awareness helps

    Hotels do not place cameras in guest rooms. Surveillance usually exists only in public spaces like lobbies, elevators or hallways. Even so, it’s worth learning how to check your surroundings and spot potential issues before settling in.

    Hotels stress guest privacy, yet a quick room sweep can ease concerns. (D.A. Varela/Miami Herald/Tribune News Service via Getty Images)

    How to do a hotel room sweep for hidden cameras

    Start by inspecting your room:

    • Shine your phone’s flashlight in dark corners. Camera lenses reflect light.
    • Check common hiding spots: smoke detectors, alarm clocks, USB chargers, lamps and picture frames.
    • Try the fingernail mirror test: touch your fingernail to a mirror. If the reflection meets your nail without a gap, it could be two-way glass.
    • Listen for faint buzzing or clicks that might come from disguised devices.

    Use your smartphone to detect hidden devices in hotels

    Your smartphone can help uncover suspicious devices.

    • Open your camera app to spot infrared lights. Many hidden cameras emit IR that shows up on screens.
    • Use scanning apps like Fing to check the Wi-Fi network for unusual device names like “IP Camera.” Remember: not all devices will appear.

    High-tech tools for finding hidden cameras in hotels

    For longer trips or high-security situations, dedicated devices add reassurance:

    • IR lens detectors locate hidden camera reflections.
    • RF (radio-frequency) scanners pick up wireless signals from covert devices.

    These gadgets complement a manual sweep; they don’t replace it.

    Hidden camera detector apps for iPhone and Android

    If you’re worried about hidden cameras during a hotel stay, several iOS and Android apps claim to help, though their accuracy and costs vary.

    iOS

    • Hidden Camera Detector – Peek (Kupertino Labs)Has a clean interface and a high user rating. But some users say it only scans the Wi‑Fi network and may prompt a subscription to see results.
    • Spy Camera Scanner (AI APPS SRL)Promises IR signal detection and Bluetooth scanning. Simple, but again, the full functionality is gated behind a subscription.

    Android

    • Hidden Camera Detector (FutureApps)Uses your phone’s magnetic sensor to alert you near electronics and also scans for infrared light. But reviews suggest the free version can feel gimmicky, especially for magnetic detection.
    • Camera Detector: Hidden Spy (AppVillage Global)Offers a combo of Wi‑Fi scanning, magnetic sensor detection and metal detection, plus tips on common hiding spots. Visible complaints include relentless ads and paywalls.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    Side view of a hotel room.

    Simple steps like locking doors and covering peepholes boost hotel security. (Martin Berry/UCG/Universal Images Group via Getty Images)

    What to do if you find a hidden camera in your hotel

    • Do not remove or tamper with the device.
    • Document with photos.
    • Notify hotel management immediately. Platforms like Airbnb and Vrbo ban undisclosed cameras.
    • For serious concerns, contact law enforcement before contacting the property owner.

    Smart security habits for every stage of your stay

    From check-in to check-out, taking a few simple precautions can help protect your privacy and keep you in control.

    1) Before you arrive

    Call ahead and ask:

    • 24/7 security: Confirm whether the hotel has round-the-clock protection.
    • Guest floor access: Ask if elevators and hallways are restricted to key holders.

    2) While you check in

    • Incognito listing: Request to be listed as “incognito” or use an alias.
    • Visitor control: Let staff know you are not expecting visitors.

    3) While in your room

    • Do Not Disturb: Ask the operator to block outside calls to your room line.
    • Mobile phone: Use your cell phone instead of the in-room phone.
    • Door security: Lock your door and use deadbolts or extra latches.
    • Window privacy: Close curtains and cover the peephole with tape or a sticker.
    • Sensitive transactions: Avoid banking or entering private logins on public Wi-Fi whenever possible.
    • VPN protection: Use a VPN when on hotel Wi-Fi to encrypt your connection and keep browsing private.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Pro Tip: Install strong antivirus protection on all your devices before your trip. Use it to block malware, phishing attempts and other threats that often spread through hotel Wi-Fi.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) When away from your room

    • Secure extra keycards: Keep any spares locked in the room safe to prevent misuse.
    • Rely on hotel safes when needed: Electronic safes are generally secure, but you can also log valuables with staff for an extra layer of protection.
    • Use built-in anti-theft tools for devices: Features like Find My iPhone or Find My Device (Android/Windows) help you locate or remotely wipe phones, laptops and tablets if they’re stolen.

    Try additional anti-theft apps: Tools such as iAlertU for MacBooks and PreyProject.com for Android and Windows laptops can add extra protection. Some even send you a photo if someone tampers with your device.

    5 DIRTIEST SPOTS IN HOTEL ROOMS: WHAT EXPERTS SAY TO DO AT CHECK-IN

    View of the hotel room from the entrance.

    Smartphones can reveal infrared signals from hidden spy devices. (Photo by: Martin Berry/UCG/Universal Images Group via Getty Images)

    Kurt’s key takeaways

    Your privacy matters, whether you’re staying one night or a full week. Most hotels respect guests, but technology has made it easier for bad actors to abuse trust. With these tips, apps and gadgets, you can stay in control and protect yourself.

    Would you feel safer if hotels were required to disclose their guest privacy and security practices before you book? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Get faster Wi-Fi with these simple home fixes

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We all know the frustration of slow or unreliable Wi-Fi. Whether it’s buffering during a favorite show or lagging video calls, it feels like you spend more time trying to fix the problem than actually enjoying the internet. But with a few easy settings changes, your Wi-Fi can work harder and give you the smooth connection you deserve. These tips don’t require any special apps or subscriptions, just tweak some settings and let your Wi-Fi do the heavy lifting.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKS

    1) Place your router in the right spot for better coverage

    Positioning your router in a central, open location ensures the best signal distribution.

    Why it helps: Placing your router in a central area and off the floor prevents walls or furniture from blocking the signal. This gives your entire home a better connection.

    Get the most out of your internet service by learning the settings that keep your Wi-Fi strong and secure. (Sina Schuldt/picture alliance via Getty Images)

    2) Restart your router regularly to refresh the signal

    Sometimes, the quickest fix is simply restarting your router.

    Why it helps: Turning your router off for 30 seconds and back on helps clear out temporary issues and refreshes the connection. It’s a simple fix that can solve slow Wi-Fi or connectivity problems.

    3) Keep your router updated for optimal performance

    Updating your router’s software ensures you get the latest speed and security improvements.

    Why it helps: Router manufacturers often release updates that fix bugs and improve performance. Make sure your router’s firmware is always up-to-date to get the most reliable connection.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    4) Limit the number of devices on your network

    Fewer devices connected to your Wi-Fi means more bandwidth for the devices that matter most.

    Why it helps: Each device connected to your network uses bandwidth. If multiple devices are hogging the connection (like smart TVs or game consoles), it can slow things down. Disconnect any unused devices to keep your Wi-Fi fast.

    Wires connected to a router.

    From placing your router in the right spot to upgrading your hardware, these proven fixes can keep your internet running smoothly. (Wolf von Dewitz/picture alliance via Getty Images)

    5) Change your Wi-Fi channel or band

    If your neighbors are on the same Wi-Fi channel, switching to a less crowded one can help.

    Why it helps: Choosing a clearer channel or using the 5 GHz band instead of 2.4 GHz reduces interference and boosts your connection.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    6) Use a Wi-Fi extender or mesh system

    Dead zones in your home can make even fast internet feel slow.

    Why it helps: A Wi-Fi extender or mesh network expands your coverage so every corner of your home gets a strong signal.

    See my top mesh networking winners at Cyberguy.com (search “Mesh Networking” or “extender”)

    Router on a table.

    Slow Wi-Fi doesn’t have to be a reality. Learn how simple setting changes can dramatically improve your connection. (Photo by Future Publishing via Getty Images)

    7) Secure your network

    Protecting your network keeps others from slowing it down.

    Why it helps: Using strong passwords and WPA3 or WPA2 encryption prevents freeloaders from connecting and using your bandwidth. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    8) Reduce interference from electronics

    Some electronics can weaken your Wi-Fi signal.

    Why it helps: Keeping your router away from microwaves, cordless phones and Bluetooth hubs prevents interference that can slow your connection.

    9) Turn off background apps and updates

    Your devices may run apps or updates in the background that eat up bandwidth.

    Why it helps: Streaming updates, cloud backups or large downloads can slow your Wi-Fi for everyone. Pausing them during peak times frees up bandwidth for the things you actually want to do.

    10) Upgrade your router for faster speeds

    Old routers can slow you down. Upgrading to a newer model can provide a significant speed boost.

    Why it helps: Newer routers support faster speeds and more devices, which is essential if your home has multiple users streaming, working or gaming at the same time. The FBI recently alerted that hackers are actively targeting outdated routers, so make sure yours is updated and secure.

    For my best router picks, check out Cyberguy.com.

    6 ways to protect your Wi-Fi router from hackers

    Keeping your home network secure is essential to prevent unauthorized access and potential data breaches. Follow these steps to safeguard your Wi-Fi router:

    1) Change default passwords

    Most routers come with default passwords that hackers can easily find online. To secure your router, change both the admin password (used to access settings) and the Wi-Fi network password. Use a strong password with at least 12 characters, combining uppercase and lowercase letters, numbers and symbols. Avoid simple options like “password123” or personal details such as your name or birth date.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Rename your network (SSID)

    The default network name, or SSID, often includes the router’s brand or model, making it easier for hackers to identify vulnerabilities. Rename your network to something unique that doesn’t reveal personal information. Avoid using names, addresses or other identifiers. Instead, opt for a neutral or creative name that’s easy for you to recognize but hard for others to associate with you.

    3) Keep your router’s firmware updated

    Router manufacturers release firmware updates to patch security flaws and enhance performance. Check your router’s admin panel regularly for updates or enable automatic updates, if supported. Keeping your firmware up to date ensures you’re protected against the latest threats. If your router is too old to receive updates, it might be time to upgrade to a newer, more secure model.

    4) Monitor network activity regularly

    Unauthorized devices on your network can slow it down and expose you to risks. Log into your router’s admin settings to view all connected devices. If you see anything suspicious, disconnect it and immediately change your Wi-Fi password. You can also enable MAC address filtering to control which devices can access your network or disable features like WPS (Wi-Fi Protected Setup) that may leave you vulnerable.

    5) Enable network encryption

    Use the strongest encryption protocol available for your router, preferably WPA3 or at least WPA2. Encryption scrambles the data transmitted over your network, making it much harder for hackers to intercept and decipher your information.

    6) Regularly reboot your router

    Schedule routine reboots to clear the system memory and refresh all connections, which may disrupt potential malware.

    7) Use a Virtual Private Network (VPN)

    A VPN encrypts your internet traffic, making it much harder for hackers to intercept your data. This protection works anywhere, whether you’re at home, in a coffee shop or on public Wi-Fi. Choose a reputable VPN provider with a no-logs policy and strong encryption standards to keep your information private. 

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Pro tip: Use strong antivirus software

    To further protect your devices from malware and other threats, consider using reputable antivirus software. Antivirus programs can detect and remove malicious software, provide real-time protection and alert you to potential threats. Keeping your devices secure helps ensure your entire network remains safe from cyberattacks.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. 

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    With just a few small tweaks, you can turn your Wi-Fi from frustrating to fast. Start with the easiest changes, then work your way to bigger upgrades. Every adjustment adds up, making your internet smoother and more reliable. Keep these tips in mind, and you’ll spend more time enjoying your connection and less time fixing it.

    Got a tip you’d like to share, or what other everyday tech challenges would you like help solving?  Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The New Math of Quantum Cryptography

    [ad_1]

    The original version of this story appeared in Quanta Magazine.

    Hard problems are usually not a welcome sight. But cryptographers love them. That’s because certain hard math problems underpin the security of modern encryption. Any clever trick for solving them will doom most forms of cryptography.

    Several years ago, researchers found a radically new approach to encryption that lacks this potential weak spot. The approach exploits the peculiar features of quantum physics. But unlike earlier quantum encryption schemes, which only work for a few special tasks, the new approach can accomplish a much wider range of tasks. And it could work even if all the problems at the heart of ordinary “classical” cryptography turn out to be easily solvable.

    But this striking discovery relied on unrealistic assumptions. The result was “more of a proof of concept,” said Fermi Ma, a cryptography researcher at the Simons Institute for the Theory of Computing in Berkeley, California. “It is not a statement about the real world.”

    Now, a new paper by two cryptographers has laid out a path to quantum cryptography without those outlandish assumptions. “This paper is saying that if certain other conjectures are true, then quantum cryptography must exist,” Ma said.

    Castle in the Sky

    You can think of modern cryptography as a tower with three essential parts. The first part is the bedrock deep beneath the tower, which is made of hard mathematical problems. The tower itself is the second part—there you can find specific cryptographic protocols that let you send private messages, sign digital documents, cast secret ballots, and more.

    In between, securing those day-to-day applications to mathematical bedrock, is a foundation made of building blocks called one-way functions. They’re responsible for the asymmetry inherent in any encryption scheme. “It’s one-way because you can encrypt messages, but you can’t decrypt them,” said Mark Zhandry, a cryptographer at NTT Research.

    In the 1980s, researchers proved that cryptography built atop one-way functions would ensure security for many different tasks. But decades later, they still aren’t certain that the bedrock is strong enough to support it. The trouble is that the bedrock is made of special hard problems—technically known as NP problems—whose defining feature is that it’s easy to check whether any candidate solution is correct. (For example, breaking a number into its prime factors is an NP problem: hard to do for large numbers, but easy to check.)

    Many of these problems seem intrinsically difficult, but computer scientists haven’t been able to prove it. If someone discovers an ingenious algorithm for rapidly solving the hardest NP problems, the bedrock will crumble, and the whole tower will collapse.

    Unfortunately, you can’t simply move your tower elsewhere. The tower’s foundation—one-way functions—can only sit on a bedrock of NP problems.

    To build a tower on harder problems, cryptographers would need a new foundation that isn’t made of one-way functions. That seemed impossible until just a few years ago, when researchers realized that quantum physics could help.

    [ad_2]

    Ben Brubaker

    Source link

  • Why Taylor Swift Skipped Travis Kelce’s First Game Of The NFL Season! – Perez Hilton

    [ad_1]

    Travis Kelce’s first game of the NFL season went down in front of thousands of fans in Brazil on Friday, but who wasn’t in the stands cheering him on? His new fiancée, Taylor Swift!

    Sources claimed this week the pop star would make the long journey to watch the Kansas City Chiefs take on the Los Angeles Chargers. She possibly was even skipping the VMAs to support Travis! However, Tay actually didn’t show up! Wow! Although shocking and disappointing to many Swifties who hoped to catch a glimpse of her during the game, she had a good reason for missing it!

    According to Dailymail.com on Friday night, between the cost and security risk, it just wasn’t practical for the Evermore singer to travel all that way for only a couple of hours! An insider explained:

    “The travel and the cost and most importantly the security, which goes along with the aforementioned travel and cost are all the reasons Taylor didn’t go to the game to see Travis play. She would have wanted her security team there a few days ahead to make sure everything was OK. So, with all of that combined, it would have been a tremendous cost for only a few hours to be in the city.”

    Related: Taylor Swift & Travis Kelce ‘Bring Out the Best In Each Other,’ Say Friends!

    It makes sense! She doesn’t even normally attend games outside of Arrowhead Stadium. Fans also know that Taylor has dealt with some really scary situations in the past, including a foiled terror plot, and she is now more than ever overly cautious! She wants to keep not only herself safe but others, so it sounds like she wasn’t going to risk it for one abroad game!

    Just because she wasn’t in the stands doesn’t mean she didn’t watch it, though! The source went on to say that “she is enjoying watching the game on her own time.” Oh boy, that means she saw that slap to the helmet Travis took — and the Chiefs’ loss! Yikes!

    And don’t worry, fans! Taylor will be at future games! The source continued:

    “This isn’t a tour stop or anything, or the Super Bowl. It is week one and she will be at enough games this season, especially in Kansas City where her security team is familiar with the stadium, she can be with her crew and then stay at Travis’s house before and afterward. It ended up being the smart thing to do, it was easier not to move mountains to watch one game.”

    The “smart thing,” yes! But the Chiefs really needed their good luck charm for that game! Oof!

    Reactions, Perezcious readers? Are you excited to see Taylor at games this season? Let us know in the comments!

    [Image via MEGA/WENN]

    [ad_2]

    Perez Hilton

    Source link

  • Columbia University data breach hits 870,000 people

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Columbia University recently confirmed a major cyberattack that compromised personal, financial and health-related information tied to students, applicants and employees. The victims include current and former students, employees and applicants. Notifications to affected individuals began Aug. 7 and are continuing on a rolling basis.

    Columbia, one of the oldest Ivy League universities, discovered the breach after a network outage in June. According to Columbia, the disruption was caused by an unauthorized party that accessed its systems and stole sensitive data. Investigators are still assessing the full scope of the theft.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    Students on the campus of Columbia University April 14, 2025, in New York City. (Charly Triballeau/AFP via Getty Images)

    What information was stolen?

    According to a breach notification filed with the Maine Attorney General’s office, nearly 869,000 individuals were affected by the Columbia breach. This number includes students, employees, applicants and, in some cases, family members. Media outlets also reported that the threat actor claimed to have stolen approximately 460 gigabytes of data from Columbia’s systems.

    Columbia confirmed that the stolen information relates to admissions, enrollment and financial aid records, as well as certain employee data. The categories of exposed information include:

    • Names, dates of birth and Social Security numbers
    • Contact details and demographic information
    • Academic history and financial aid records
    • Insurance details and certain health information

    Columbia emphasized that patient records from Columbia University Irving Medical Center were not affected. Still, the breadth of stolen data poses serious risks of identity theft and fraud.

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    Columbia University campus

    Columbia University campus (Luiz C. Ribeiro for New York Daily News/Tribune News Service via Getty Images)

    Columbia University response

    Columbia has reported the incident to law enforcement and is working with cybersecurity experts. The university said it has strengthened its systems with new safeguards and enhanced protocols to prevent future incidents.

    Starting Aug. 7, Columbia began mailing letters to those affected, offering two years of complimentary credit monitoring, fraud consultation and identity theft restoration services.

    When contacted, Columbia referred CyberGuy to its official community updates, published June 24 and Aug. 5.

    While the university says there is no evidence that the stolen data has been misused so far, the risk remains high. Criminals often wait months before exploiting stolen data.

    NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK

    A computer with binary code

    Columbia University says a June network outage is to blame for the breach. (Silas Stein/picture alliance via Getty Images)

    Steps to protect yourself after the Columbia University breach

    If you are among those affected or simply want to safeguard your data, take these steps today:

    1) Monitor your credit reports

    Check your credit reports regularly through AnnualCreditReport.com. Look for accounts you did not open or changes you did not authorize. 

    2) Use a personal data removal service

    Since Columbia confirmed that stolen files may include names, addresses and demographic details, consider using a personal data removal service. These services help scrub your information from data brokers and people search sites, making it harder for criminals to exploit exposed details. This step reduces the chance that stolen Columbia records are linked to your broader online identity.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    3) Set up fraud alerts and freezes

    Placing a fraud alert makes it harder for identity thieves to open accounts in your name. A credit freeze offers even stronger protection by blocking new credit applications.

    4) Use strong and unique passwords

    Create long, complex passwords for each account. A password manager can help generate and securely store them.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Enable two-factor authentication

    Turn on two-factor authentication (2FA) wherever possible. This extra layer of security helps protect your accounts even if a password is stolen.

    6) Watch for phishing attempts and use strong antivirus software

    Scammers may try to exploit fear around the breach with fake emails or texts. Verify any message before clicking links or sharing personal information.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech 

    7) Consider identity theft protection services

    Beyond the free credit monitoring Columbia offers, additional paid services can help track your data across the dark web and provide extra safeguards.

    Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The Columbia University breach shows how even trusted institutions are vulnerable to cyberattacks. Because the investigation is ongoing and notifications will continue through the fall, individuals should remain on high alert. With so much personal, financial and health information exposed, staying alert long after the headlines fade is critical.

    What more should universities and large institutions be required to do to safeguard the personal data of the people who trust them? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • LAPD ends protection of former Vice President Kamala Harris amid criticism over diverting cops, sources say

    [ad_1]

    The Los Angeles Police Department on Saturday discontinued its protection for former Vice President Kamala Harris after heavy criticism within its own ranks that officers were being diverted from crime suppression, sources told The Times.

    LAPD Metropolitan Division officers had been assisting the California Highway Patrol in protecting Harris and were visible until Saturday morning outside her Brentwood home.

    Both California police agencies scrambled this week to protect Harris after President Trump, her rival in November’s election, revoked Harris’s Secret Service protection last week. Thursday. President Biden had extended that protection for Harris beyond the six months after leaving office that vice presidents traditionally get.

    Los Angeles Mayor Karen Bass had directed the LAPD to provide the security team to assist the CHP in the short term. According to sources, those Metro officers had to be drawn away from crime suppression work in the San Fernando Valley this week.

    The department is “assisting the California Highway Patrol in providing protective services for former Vice President Kamala Harris until an alternate plan is established,” said Jennifer Forkish, L.A. police communications director, on Thursday. “This temporary coordinated effort is in place to ensure that there is no lapse in security.”

    The CHP has not indicated how the LAPD’s move would alter its arrangement with the former vice president nor said how long it will continue.

    A dozen or more LAPD officers began working a detail to protect Harris after Trump revoked her Secret Service protection as of Monday. Sources not authorized to discuss the details of the plan said the city would fund the security but that the arrangement was expected to be brief, with Harris hiring her own security in the near future.

    A security detail was seen outside Harris’ Brentwood home by a Fox 11 helicopter as the station broke the story of the use of L.A. police earlier this week.

    The Los Angeles Police Protective League, the union that represents rank-and-file LAPD officers, criticized the move.

    “Pulling police officers from protecting everyday Angelenos to protect a failed presidential candidate who also happens to be a multi-millionaire… and who can easily afford to pay for her own security, is nuts,” its board of directors said.

    The statement continued, “Mayor Karen Bass should tell Governor Newsom that if he wants to curry favor with Ms. Harris and her donor base, then he should open up his own wallet because LA taxpayers should not be footing the bill for this ridiculousness.”

    Newsom, who was required to sign off on CHP protection, has not confirmed the arrangement to The Times, but a spokesperson for Newsom added: “The safety of our public officials should never be subject to erratic, vindictive political impulse.”

    Bass, in a statement last week, commented on Trump scrapping the security detail for Harris, saying: “This is another act of revenge following a long list of political retaliation in the form of firings, the revoking of security clearances, and more. This puts the former Vice President in danger and I look forward to working with the governor to make sure Vice President Harris is safe in Los Angeles.”

    Deploying LAPD officers to protect Harris was a source of controversy within the department in years past.

    During L.A. Police Chief Charlie Beck’s tenure, when Harris was a U.S. senator, plainclothes officers served as security and traveled with her from January 2017 to July 2018. Beck said at the time through a spokesman that the protection was granted based on a threat assessment.

    Beck’s successor, Michel Moore, ended the protection in July 2018 after he said a new evaluation determined it was no longer needed. The decision came as The Times filed a lawsuit seeking records from then-Mayor Eric Garcetti detailing the costs of security related to his own extensive travel. Garcetti said he was unaware of the police protection until Moore ended it.

    Former vice presidents usually get Secret Service protection for six months after leaving office, while former presidents are given protection for life. But before his term ended, then-President Biden signed an order to extend Harris’ protection to July 2026. Aides to Harris had asked Biden for the extension. Without it, her security detail would have ended last month, according to sources.

    The curtailing of Secret Service protection comes as Harris is going to begin a book tour next month for her memoir, titled “107 Days.” The tour has 15 stops, which include visits to London and Toronto. The book title references the short length of her presidential campaign.

    Harris, the first Black woman to serve as vice president, was the subject of an elevated threat level — particularly when she became the Democratic presidential contender last year. The Associated Press reports, however, a recent threat intelligence assessment by the Secret Service conducted on those it protects, such as Harris, found no red flags or credible evidence of a threat to the former vice president.

    [ad_2]

    Richard Winton

    Source link

  • Delivery giant’s data breach exposes 40,000 personal records

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Thousands of people have had their sensitive personal information exposed in a data breach at U.S. delivery company OnTrac. The breach occurred between April 13 and April 15, 2025, and impacted over 40,000 individuals across the country.

    OnTrac operates 64 facilities in 31 states and runs four major sorting centers nationwide. The company, acquired by LaserShip in 2021, has annual revenues of roughly $1.5 billion.

    The breach notification letters confirm that attackers accessed sensitive data that can fuel identity theft and fraud.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    OnTrac data breach puts tens of thousands at risk of identity theft, exposing personal information including Social Security numbers. (Kurt “CyberGuy” Knutsson)

    OnTrac data breach exposes sensitive information

    According to documents filed with the Maine Attorney General, cybercriminals may have gained access to:

    • Names and dates of birth
    • Social Security numbers (SSNs)
    • Driver’s license or state IDs
    • Medical information
    • Health insurance information

    Unlike stolen credit cards, medical data and SSNs cannot simply be replaced. That makes this breach especially dangerous.

    Why the OnTrac breach puts your identity at risk

    Exposed SSNs and IDs create serious risks of identity theft. Criminals could open fraudulent bank accounts, file false tax returns or take over benefits.

    The exposure of medical records adds another layer of risk. Stolen health data is valuable on the dark web, where it can be used for extortion, fraudulent insurance claims or illegal prescription drug purchases.

    Fox News Digital reached out to OnTrac for comment but did not immediately hear back.

    NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK

    Hacker typing on a keyboard.

    Cybercriminals steal Social Security and medical data in an OnTrac hack, exposing users’ data. (Annette Riedl/picture alliance via Getty Images)

    How to protect yourself after the OnTrac data breach

    If you received an OnTrac breach notification letter, or even if you simply want to be proactive, here are key steps you can take to reduce your risk of identity theft and fraud.

    1) Enroll in free credit monitoring

    OnTrac is offering 12 months of complimentary credit monitoring and identity protection. Use the activation code included in your breach letter to set up your coverage. These services can alert you if new accounts are opened in your name or if suspicious activity appears on your credit file. Even if you weren’t directly affected, consider signing up for a trusted identity protection service, since hackers often recycle stolen data across multiple breaches.

    Identity theft companies can monitor personal information – like your Social Security Number (SSN), phone number and email address – and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    2) Freeze your credit

    Place a free credit freeze with all three major credit bureaus: Equifax, Experian and TransUnion. This blocks criminals from opening new credit lines using your information. A freeze doesn’t affect your current accounts, and you can temporarily lift it when applying for legitimate credit.

    3) Use a personal data removal service

    Your breached data may already be circulating on shady broker sites. Personal data removal services can help scrub your information from these databases, reducing the risk that criminals will resell or reuse your details. While no service can guarantee 100% protection, this step can shrink your digital footprint significantly.

    They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Watch for phishing attempts and use antivirus software

    After breaches like OnTrac’s, scammers often send fake emails, texts or calls pretending to be your bank, insurer or even OnTrac itself. Do not click on links or open attachments from unknown senders. Instead, contact the company directly using a verified phone number or website. Use strong antivirus software to add an extra layer of defense.

    The best way to safeguard yourself from malicious links that install malware, which potentially accesses your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    5) Monitor your medical benefits

    Stolen personal data can also be used for medical identity theft. Regularly check your health insurance Explanation of Benefits (EOB) statements for claims you don’t recognize. Report suspicious charges to your insurer right away – unfamiliar claims could mean someone is trying to use your benefits.

    6) Enable multi-factor authentication (MFA)

    For any online account that supports it, especially banking, insurance, and email, turn on multi-factor authentication. MFA makes it much harder for criminals to break in, even if they have your password.

    7) Set up account alerts

    Most banks and credit card issuers let you receive real-time text or email alerts for purchases, withdrawals and logins. These alerts can help you spot unauthorized activity quickly, giving you a better chance of stopping fraud before it escalates.

    MEDICARE DATA BREACH EXPOSES 100,000 AMERICANS’ INFO

    Hacker typing code.

    Over 40,000 Americans were exposed in a massive OnTrac security breach that leaked sensitive medical and financial records. (Jakub Porzycki/NurPhoto via Getty Images)

    Kurt’s key takeaways

    The OnTrac data breach is a harsh reminder that sensitive information can slip into the wrong hands in just days, yet the effects can last for years. While you cannot undo what happened, you can take practical steps right now to lower your risk. Freezing your credit, turning on alerts and keeping an eye on medical and financial accounts give you back some control. By staying alert and using the tools available, you can make it much harder for criminals to misuse your personal details. A little effort today can save you from big headaches tomorrow.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think companies should face tougher penalties when they fail to protect sensitive personal and medical data? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • ICE Has Spyware Now

    [ad_1]

    The Biden administration considered spyware used to hack phones controversial enough that it was tightly restricted for US government use in an executive order signed in March 2024. In Trump’s no-holds-barred effort to empower his deportation force—already by far the most well-funded law enforcement agency in the US government—that’s about to change, and the result could be a powerful new form of domestic surveillance.

    Multiple tech and security companies—including Cloudflare, Palo Alto Networks, Spycloud, and Zscaler—have confirmed customer information was stolen in a hack that originally targeted a chatbot system belonging to sales and revenue generation company Salesloft. The sprawling data theft started in August, but in recent days more companies have revealed they had customer information stolen.

    Toward the end of August, Salesloft first confirmed it had discovered a “security issue” in its Drift application, an AI chatbot system that allows companies to track potential customers who engage with the chatbot. The company said the security issue is linked to Drift’s integration with Salesforce. Between August 8 and August 18, hackers used compromised OAuth tokens associated with Drift to steal data from accounts.

    Google’s security researchers revealed the breach at the end of August. “The actor systematically exported large volumes of data from numerous corporate Salesforce instances,” Google wrote in a blog post, pointing out that the hackers were looking for passwords and other credentials contained in the data. More than 700 companies may have been impacted, with Google later saying it had seen Drift’s email integration being abused.

    On August 28, Salesloft paused its Salesforce-Salesloft integration as it investigated the security issues; then on September 2 it said, “Drift will be temporarily taken offline in the very near future” so it can “build additional resiliency and security in the system.” It’s likely more companies impacted by the attack will notify customers in the coming days.

    Obtaining intelligence on the internal workings of the Kim regime that has ruled North Korea for three generations has long presented a serious challenge for US intelligence agencies. This week, The New York Times revealed in a bombshell account of a highly classified incident how far the US military went in one effort to spy on the regime. In 2019, SEAL Team 6 was sent to carry out an amphibious mission to plant an electronic surveillance device on North Korean soil—only to fail and kill a boatful of North Koreans in the process. According to the Times’ account, the Navy SEALs got as far as swimming onto the shores of the country in mini-subs deployed from a nuclear submarine. But due to a lack of reconnaissance and the difficulty of surveilling the area, the special forces operators were confused by the appearance of a boat in the water, shot everyone aboard, and aborted their mission. The North Koreans in the boat, it turned out, were likely unwitting civilians diving for shellfish. The Trump administration, the Times reports, never informed leaders of congressional committees that oversee military and intelligence activities.

    Phishing remains one of the oldest and most reliable ways for hackers to gain initial access to a target network. One study suggests a reason why: Training employees to detect and resist phishing attempts is surprisingly tough. In a study of 20,000 employees at the health care provider UC San Diego Health, simulated phishing attempts designed to train staff resulted in only a 1.7 percent decrease in the staff’s failure rate compared to staff who received no training at all. That’s likely because staff simply ignored or barely registered the training, the study found: In 75 percent of cases, the staff member who opened the training link spent less than a minute on the page. Staff who completed a training Q&A, by contrast, were 19 percent less likely to fail on subsequent phishing tests—still hardly a very reassuring level of protection. The lesson? Find ways to detect phishing that don’t require the victim to spot the fraud. As is often noted in the cybersecurity industry, humans are the weakest link in most organizations’ security—and they appear stubbornly determined to stay that way.

    Online piracy is still big business—last year, people made more than 216 billion visits to piracy sites streaming movies, TV, and sports. This week, however, the largest illegal sports streaming platform, Streameast, was shut down following an investigation by anti-piracy industry group the Alliance for Creativity and Entertainment and authorities in Egypt. Before the takedown, Streameast operated a network of 80 domains that saw more than 1.6 billion visits per year. The piracy network streamed soccer games from England’s Premier League and other matches across Europe, plus NFL, NBA, NHL, and MLB matches. According to the The Athletic, two men in Egypt were allegedly arrested over copyright infringement charges, and authorities found links to a shell company allegedly used to launder around $6.2 million in advertising revenue over the past 15 years.

    [ad_2]

    Matt Burgess, Andy Greenberg, Lily Hay Newman

    Source link

  • Notorious people search site returns after massive breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Over a year ago, National Public Data (NPD) made headlines for one of the largest breaches in history. The people search site exposed the personal information of 3 billion individuals. After disappearing from the internet, the site has returned under new ownership, sparking fresh concerns about privacy.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Who owns National Public Data now?

    NPD has relaunched under Perfect Privacy LLC, a company that sounds protective but is not affiliated with the VPN service of the same name. Despite the new name behind the scenes, the business model has not changed. The site still allows anyone to look up personal data about friends, relatives or strangers with just a name.

    MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATA

    Although NPD includes disclaimers about the Fair Credit Reporting Act (FCRA), nothing prevents users from misusing this data when making decisions about employment, housing or credit.

    National Public Data, a people search site, exposed the personal information of 3 billion individuals in one of the largest breaches ever. (NPD)

    Accuracy issues and data sources

    According to NPD, the data comes from public records, property ownership databases, social media and government agencies. The company claims to verify and filter this information to ensure it is accurate and up to date. However, users may find that profiles still contain mistakes.

    A quick test search revealed a mix of outdated and accurate information. The site struggled with hyphenated names but pulled up correct details in other cases.

    We reached out to NPD for a comment but did not hear back before our deadline.

    A woman types on a laptop on a wooden table.

    A woman searches for herself online. (Kurt “CyberGuy” Knutsson)

    How to remove your information from NPD

    If you prefer not to have your information available on NPD’s site, you can request removal directly:

    • Search your name on nationalpublicdata.com.
    • Open your profile and copy its URL.
    • Visit nationalpublicdata.com/optout.html.
    • Paste the URL into the “Your Profile Link” field.
    • Enter your email address to confirm deletion.

    Keep in mind that each profile needs its own request and confirmation email. After you submit, check back in a few days to make sure your data is actually gone.

    Pro tip: Use an alias or disposable email address for these requests. This makes it easier to track confirmations and keeps your main inbox clear.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com.

    The opt-out page of the National Public Data site

    NPD offers an opt-out function for users who prefer not to have their information available on the site. (NPD)

    Why NPD is only part of the problem

    Removing your information from National Public Data is only the beginning. Dozens of other people search sites may still display your personal details. Many of these platforms pull from the same public databases, which means your address, phone number or relatives’ names can keep reappearing.

    The return of NPD shows how quickly data can resurface online. A breach may fade from the headlines, but the exposed information rarely disappears. To protect your privacy, you need a broader plan.

    1) Regularly check for your data

    Start by searching for your name on people search engines several times a year. Look beyond NPD. Sites like Whitepages, Spokeo and Radaris often host similar data. Regular checks help you spot new profiles before they spread further.

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    2) Use a personal data removal service

    A removal service can save time by scanning hundreds of databases at once. These services request opt-outs on your behalf and track new listings. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    3) Monitor your accounts closely and use strong antivirus software

    Protecting your privacy goes beyond deleting profiles. Keep an eye on your bank statements, credit reports and online accounts. Criminals can use exposed data for phishing attempts, fake loan applications or identity theft. Monitoring activity gives you an early warning if something looks suspicious.

    The best way to safeguard yourself from malicious links that install malware, which could potentially access your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    4) Set up alerts for your identity

    Many banks and credit monitoring services let you create alerts for suspicious activity. You can also set up free fraud alerts with the credit bureaus. These warnings tell lenders to take extra steps to verify your identity before issuing new credit.

    Identity theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.

    5) Remove data at the source

    People search sites often pull records from government databases. Review your local county’s property, court or voter registration records. Some jurisdictions allow you to request redactions or limit what is shown online.

    6) Lock down your social media

    Since NPD and similar sites scrape from social media, tighten your privacy settings. Limit what strangers can see on Facebook, LinkedIn and other platforms. The less public information you share, the less these databases can collect.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The return of National Public Data is a reminder that your personal information can resurface at any time. Even if you remove yourself from one site, dozens more may still hold your details. That is why protecting your privacy requires more than a quick opt-out. With regular checks, credit freezes and stronger account monitoring, you can reduce your risk and stay one step ahead.

    Do you think stronger laws should be in place to stop companies from collecting and selling personal data, or is it up to individuals to protect themselves? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • These are the Password Managers You Should Use Instead of Your Browser

    [ad_1]

    Setting up and migrating to Dashlane from another password manager is simple, and you’ll use a secret key to encrypt your passwords, much like BitWarden’s setup process. In practice, Dashlane is very similar to the others on this list. Dashlane offers a 30-day free trial, so you can test it out before committing.

    After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge.


    Best for Bundled Services

    Photograph: Nordpass

    You might know Nord better for its VPN service, but the company also offers a password manager, NordPass, and a pretty nice online storage system, NordLocker. A part of the appeal of NordPass comes in bundling it with the company’s other services for some compelling deals. As a password manager, NordPass offers everything you need. It uses a zero-knowledge setup in which all data is encrypted on your device before it’s uploaded to the company’s servers. Unlike most services here, NordPass uses XChaCha20 for encryption. It would require a deep dive into cryptography to get into the differences, but the short story is that it’s just as secure and maybe slightly faster than the AES-256 encryption used by other services.

    There’s a personal information storage feature to keep your address, phone number, and other personal data safe and secure, but easy to access. NordPass also offers an emergency access feature, which allows you to grant another NordPass user emergency access to your vault. It works just like the same feature in 1Password, allowing trusted friends or family to access your account if you cannot.

    Other nice features include support for two-factor authentication to sign in to your account, as well as security tools to evaluate the strength of your passwords and alert you if any of your data is compromised. Note that NordPass Premium is theoretically $3 a month, but there are always sales that bring that much lower.

    The downside, and my one gripe about all Nord services, is that there is no monthly plan. As noted above, the best deal comes in combining NordPass, NordVPN, and NordLocker for a bundled deal. A free version of NordPass is available, but it’s restricted to only a single device.

    After signing up, download the app for Android and iOS, and grab the browser extensions for Firefox, Chrome, and Edge.


    Best DIY Options (Self-Hosted)

    Want to retain more control over your data in the cloud? Sync your password vault yourself. The services below do not store any of your data on their servers. This means attackers have nothing to target. Instead of storing your passwords, these services use a local vault to store your data, and then you can sync that vault using a file-syncing service like Dropbox, NextCloud, or Edward Snowden’s recommended service, SpiderOak. There are two services to keep track of in this scenario, making it a little more complex. But if you’re already using a file-syncing file service, this can be a good option.

    You can also properly host your own vault with network-attached storage or a local server.

    Screenshot of Enpass password manager app on desktop

    Courtesy of Enpass

    Enpass does not store any data on its servers. Syncing is handled through third-party services. Enpass doesn’t do the syncing, but it does offer apps on every platform. That means once you have syncing set up, it works just like any other service. And you don’t have to worry about Enpass being hacked, because your data isn’t on its servers. Enpass supports syncing through Dropbox, Google Drive, OneDrive, iCloud, Box, Nextcloud, or any service using WebDAV. Alas, SpiderOak is not currently supported. You can also synchronize your data over a local WLAN or Wi-Fi network.

    All of the features you expect in a password manager are here, including auto-generating passwords, breach-monitoring, biometric login (for devices that support it), auto-filling passwords, and options to store other types of data, like credit cards and identification data. There’s also a password audit feature to highlight any weak or duplicate passwords in your vault. One extra I particularly like is the ability to tag passwords for easier searching. Enpass also makes setting up the syncing through the service of your choice very easy. Enpass added support for passkeys, too.

    [ad_2]

    Scott Gilbertson, Jacob Roach

    Source link