ReportWire

Tag: smart and safe tech

  • Waymo’s cheaper robotaxi tech could help expand rides fast

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you live in cities like San Francisco, Phoenix, Los Angeles, Austin or Atlanta, you may have already seen or even taken a ride in a driverless Waymo operating without a human behind the wheel. In newer markets like Miami, service is rolling out, while other cities, including Dallas, Houston, San Antonio and Orlando, are part of Waymo’s expansion plans.

    For everyone else, not so much. At least not yet. For most of us, that still feels like something happening somewhere else, not something that pulls up when you request a ride.

    However, that could start to change very soon. Waymo just unveiled its sixth-generation Waymo Driver hardware, and the headline is simple: it costs less and fits into more vehicles. That combination could help driverless rides reach a lot more cities, faster than you and I might expect.

    THE ROBOTAXI PRICE WAR HAS STARTED. HERE’S EVERYTHING YOU NEED TO KNOW.

    Waymo’s new sixth-generation hardware will first roll out in the Zeekr-built Ojai minivan before expanding to more vehicles and cities. (Waymo)

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter     

    Why Waymo’s cheaper robotaxi hardware changes the game

    Until recently, if you spotted a Waymo on the road, it was usually a Jaguar I-Pace. Nice car. Not exactly built for a massive robotaxi rollout. The sixth-generation system changes that. The first vehicle to carry the new hardware is the Zeekr-built Ojai electric minivan. Zeekr is owned by Geely. Waymo employees in Los Angeles and San Francisco will begin fully autonomous rides in it soon, with public access expected to follow. In these new deployments, Waymo says the vehicles will operate without safety drivers behind the wheel. After that, the hardware will also power versions of the Hyundai Ioniq 5.

    Here is where this really matters. When Waymo can install the same system across multiple vehicle types and produce it at a lower cost, expansion becomes much easier. The company says it plans to move into 20 additional cities this year and is ramping up its Metro Phoenix facility to build tens of thousands of Driver kits annually.

    Waymo says it has shifted more processing power into its own custom silicon chips, allowing it to use fewer cameras while improving performance and reducing overall system cost. More vehicles and lower costs mean one thing: a better chance that driverless rides show up in your city sooner rather than later.

    How the Waymo Driver actually sees the road

    If you have never been in a robotaxi, this is the part you are probably wondering about. The sixth-generation Waymo Driver uses 16 high-resolution 17 megapixel cameras, short-range lidar, radar and external audio receivers. Waymo says the updated cameras offer improved dynamic range compared to the previous 29-camera setup. That helps the vehicle perform better at night and in bright glare.

    Short-range lidar delivers centimeter-level accuracy to detect pedestrians, cyclists, and other road users. Radar adds another layer of awareness. Waymo says its upgraded imaging radar can track distance, speed and object size even in rain or snow, giving the system more time to react. External audio receivers can detect sirens or trains by sound.

    Unlike Tesla, which has emphasized camera-based systems, Waymo relies on multiple overlapping technologies. If one sensor struggles, another can support it. There is also a cleaning system for key sensors. Snow, dirt, or road spray should not easily block visibility.

    Waymo says this version is designed to operate in more extreme weather, including heavy winter conditions, which could open the door to colder U.S. cities that were previously harder to support.

    Waymo’s new sixth-generation interior

    The Waymo Driver blends high-resolution cameras, lidar and radar to create a 360-degree view of the road, even at night or in bad weather. (Waymo)

    Why you probably haven’t seen a Waymo robotaxi yet

    Right now, Waymo has about 1,500 vehicles on the road. That sounds like a lot until you compare it to the millions of cars in the U.S. The company wants to grow that number to around 3,500 this year and eventually into the tens of thousands. Still, service is limited to certain parts of certain cities. If you do not live in one of those areas, you are simply not going to see one.

    That is why this new hardware matters. When the system costs less and fits into more vehicles, Waymo can put more cars on the road in more places. This is not about adding flashy features or cool upgrades. It is about getting from a small footprint to something that feels normal in everyday life.

    What about safety and past incidents?

    Whenever driverless cars expand, safety questions come right with them. Waymo says its system is built with multiple layers of redundancy. The sixth-generation Driver combines cameras, lidar, radar and audio detection so the vehicle is not relying on a single sensor. That layered setup is designed to reduce risk if one system has trouble. The company says this latest system builds on nearly 200 million fully autonomous miles driven across more than 10 major cities, including dense urban cores and freeways.

    Even so, incidents have happened. Earlier this year, a Waymo vehicle was involved in an accident that injured a child, which raised fresh concerns about how autonomous vehicles respond in complex real-world situations. Regulators continue to monitor autonomous vehicle performance closely, especially in states like California, where reporting requirements are strict.

    WAYMO UNDER FEDERAL INVESTIGATION AFTER CHILD STRUCK

    Waymo has also released data suggesting its vehicles experience fewer injury-causing crashes per mile compared to human drivers in similar areas. Supporters argue that reducing human error could improve road safety over time. Critics say expanding too quickly could introduce new risks.

    Both things can be true. The technology is advancing, but public trust will depend on transparency, accountability and long-term safety performance.

    What this means to you

    If Waymo expands into your city, you may soon open a rideshare app and see a new option. No driver. No conversation. Just a vehicle that navigates using software and sensors.

    More vehicles could mean shorter wait times in busy areas. Increased competition may also affect pricing in the rideshare market. At the same time, comfort levels vary. Many riders may hesitate before stepping into a car with an empty front seat. This shift is about more than technology. It changes how people commute, travel and move around urban areas.

    Take my quiz: How safe is your online security?

    Waymo’s new sixth-generation interior

    With lower costs and broader vehicle compatibility, Waymo hopes to put many more driverless cars on real city streets soon. (Waymo)

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com       

    Kurt’s key takeaways

    Waymo’s sixth-generation Driver is really about one thing: getting more driverless cars on the road, in more cities, at a lower cost. When the hardware becomes cheaper and easier to install in different vehicles, expansion gets easier. That does not automatically mean everyone will be comfortable hopping in. For many people, sitting in a car with no driver might still feel a bit scary. The technology is moving forward whether we are ready or not. The bigger question is simple: will we feel confident enough to get in?

    If you had to choose today, would you book the driverless ride or wait for a human behind the wheel? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • How to safely view your bank and retirement accounts online

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Logging into your bank, retirement or investment accounts is now part of everyday life. Still, for many people, it comes with a knot in the stomach. You hear about hacks, scams and stolen identities and wonder if simply checking your balance could open the door to trouble. That concern landed in our inbox from Mary.

    “How do I protect my bank accounts, 401K and non-retirement accounts when I view them online?”

    — Mary in Baltimore, Ohio

    Mary’s question is a good one, because protecting your money online is not about one magic setting. It comes down to smart habits layered together.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

    Securing your device with updates and antivirus software is the first step in protecting your financial accounts online. (REUTERS/Andrew Kelly)

    Secure your device before logging into financial accounts

    Everything begins with the device in your hands. If it isn’t secure, even the strongest password can be exposed. These essentials help lock things down before you ever sign in.

    Start with these device security basics:

    • Keep your phone, tablet and computer fully updated with the latest operating system and browser versions
    • Use strong, always-on antivirus protection to block malware and phishing attempts. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
    • Avoid public Wi-Fi when accessing financial accounts, or use a trusted VPN if you have no other option.  For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Protect your bank and investment account logins

    Your login details are the front door to your money. Strengthening them reduces the chance that anyone else can get inside.

    Strengthen your account logins by:

    • Using strong, unique passwords for every financial account
    • Avoiding saved passwords on shared or older devices
    • Relying on a password manager to create and store credentials securely. Our No. 1 pick, includes a built-in breach scanner that alerts you if your information appears in known leaks. If you find a match, change any reused passwords immediately and secure those accounts with new, unique credentials.
    • Checking whether your email or passwords have appeared in known data breaches and updating reused passwords immediately. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
    • Turning on two-factor authentication (2FA) wherever it’s available

    Avoid common online banking scams when logging in

    Even well-secured accounts can be compromised through careless access. How you log in matters.

    Reduce your risk when accessing financial accounts:

    • Typing website addresses yourself or using saved bookmarks
    • Avoiding login links sent by email or text, even if they look official
    • Checking for “https” and the lock icon before entering credentials
    • Logging out completely after every session, especially on mobile devices

    Add extra layers of protection to financial accounts

    Person typing on their laptop.

    Strong, unique passwords and two-factor authentication help stop criminals even if one login is exposed. (Photo by Neil Godwin/Future via Getty Images)

    DON’T LET AI PHANTOM HACKERS DRAIN YOUR BANK ACCOUNT

    Think of these as early warning systems. They help catch problems quickly, before real damage is done.

    Enable financial account alerts and safeguards:

    • Setting up alerts for logins, withdrawals, password changes and new payees
    • Requiring extra confirmation for large or unusual transactions
    • Freezing your credit with the major credit bureaus to block new accounts opened in your name. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    Protect your identity beyond your bank accounts

    Your financial accounts are only part of the picture. Identity protection helps stop problems before they ever reach your bank.

    Go beyond basic banking security:

    • Monitoring for identity theft involving your Social Security number, phone number and email
    • Using an identity protection service that alerts you if your data appears on the dark web or is used fraudulently. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com
    • Removing your personal information from data broker websites that buy and sell consumer data. A data removal service reduces risk before identity theft happens. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Review bank and credit statements for early warning signs

    Review your bank, credit card and investment statements regularly, even when nothing looks suspicious. Small red flags often appear long before major losses.

    Everyday security habits that prevent financial scams

    Many successful scams rely on pressure and trust, not advanced technology. Good habits close those gaps.

    Practice smart daily security habits:

    • Never allow anyone to log into your accounts remotely, even if they claim to be from your bank
    • Avoid storing photos of IDs, Social Security cards, or account numbers on your phone or email
    • Stop immediately if something feels off, and contact the institution directly using a verified phone number
    Logging in the right way, by typing web addresses yourself and avoiding suspicious links, reduces phishing risks.  

    Logging in the right way, by typing web addresses yourself and avoiding suspicious links, reduces phishing risks.   (Martin Bertrand / Hans Lucas / AFP via Getty Images)

    Kurt’s key takeaways

    Checking your bank or retirement accounts online should feel routine, not risky. With updated devices, strong logins, careful access and smart habits, you can keep control of your money without giving up convenience. Security is not about fear. It is about staying one step ahead.

    Have you ever clicked a financial alert and wondered afterward if it was real or a scam? Let us know your thoughts by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Humanoid robots are getting smaller, safer and closer

    [ad_1]

    NEWYou can now listen to Fox News articles!

    For decades, humanoid robots have lived behind safety cages in factories or deep inside research labs. Fauna Robotics, a New York-based robotics startup, says that era is ending. 

    The company has introduced Sprout, a compact humanoid robot designed from the ground up to operate around people. Instead of adapting an industrial robot for public spaces, Fauna built Sprout specifically for homes, schools, offices, retail spaces and entertainment venues.

    “Sprout is a humanoid platform designed from first principles to operate around people,” the company said. “This is a new category of robot built for the spaces where we live, work, and play.” That philosophy drives nearly every design choice behind Sprout.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO

    Sprout is designed to operate safely around people, even in shared spaces like homes and classrooms where close interaction matters. (Fauna Robotics)

    Why Fauna believes humanoid robots belong beyond factories

    Fauna Robotics’ founders started with a simple idea. If robots are going to become part of daily life, they must move naturally around humans and earn trust through safety and reliability. Most humanoid robots today focus on industrial efficiency or controlled research environments. Fauna is targeting a different reality. Service industries now make up the majority of the global workforce. At the same time, labor shortages continue to grow in healthcare, education, hospitality and eldercare. Sprout is designed to explore how humanoid robots could support those spaces without creating new safety risks or operational headaches.

    HUMANOID ROBOT MAKES ARCHITECTURAL HISTORY BY DESIGNING A BUILDING

    A robot walking through a living room

    The robot uses onboard sensing and navigation to move confidently through indoor spaces without needing safety cages or fixed paths. (Fauna Robotics)

    Sprout is a safety-first humanoid robot built for people

    Standing about 3.5 feet tall, Sprout fits naturally into human spaces instead of towering over them. At roughly 50 pounds, it carries less kinetic energy during movement or contact, which makes close interaction safer by design. Lightweight materials and a soft-touch exterior further reduce risk. The design avoids sharp edges and limits pinch points, allowing the robot to operate near people without safety cages. Quiet motors and smooth movement also reduce noise and help Sprout feel less intimidating in shared spaces.

    Rather than complex multi-fingered hands, Sprout uses simple one-degree-of-freedom grippers. This approach lowers weight and improves durability while still supporting practical tasks like object fetching, hand-offs, and basic shared-space interaction. Flexible arms and legs allow the robot to walk, kneel, and crawl. Sprout can also fall and recover without damaging sensitive components. In everyday environments, where conditions are rarely perfect, that resilience matters.

    Under the hood, Sprout uses a highly articulated body with 29 degrees of freedom to support smooth movement and expressive gestures. Onboard NVIDIA compute provides the processing power needed for perception, navigation, and human-robot interaction without relying on external systems. A battery that supports several hours of active use makes Sprout practical for research, development, and real-world testing in shared human spaces.

    Built for natural human-robot interaction

    Sprout’s expressive face helps it communicate in a way people can quickly understand. Simple facial cues show what the robot is doing and how it is feeling, so you do not need technical knowledge to follow along. The robot can walk, kneel, crawl, and recover from falls, which helps it move naturally in everyday spaces. Because its motors are quiet, and its movements are smooth, Sprout feels less startling and more predictable when it is nearby. Behind the scenes, Sprout supports teleoperation, mapping and navigation. These tools give developers the building blocks to create interactions that feel intuitive and human, not stiff or mechanical.

    ELON MUSK TEASES A FUTURE RUN BY ROBOTS

    A closeup of a robot hand

    Instead of complex hands, Sprout uses simple, durable grippers that prioritize safety while still handling everyday tasks like hand-offs and object pickup. (Fauna Robotics)

    A modular software platform for rapid development

    Sprout runs on a modular software system that is built to grow over time. Developers get stable controls along with tools for deployment, monitoring, and data collection, so they can focus on building new ideas instead of managing the robot itself. As new abilities improve, Fauna can add them through software updates rather than redesigning the hardware. This keeps costs down and helps Sprout stay useful longer as technology evolves. Fauna also kept sensing simple. Sprout uses head-mounted RGB-D sensors instead of wrist cameras, which reduces complexity and maintenance. At the same time, it still gives the robot a strong perception for moving and working safely in shared spaces.

    Who Sprout is designed for

    Fauna positions Sprout as a developer-first humanoid platform rather than a finished consumer product. It is designed for developers who want to build and test applications on accessible hardware with full SDK access and built-in movement, perception, navigation, and expression. At the same time, enterprises can use Sprout to create next-generation AI applications that operate safely in places like retail, hospitality, and offices. Researchers can also use the platform to study locomotion, manipulation, autonomy, and human-robot interaction without building a robot from scratch. Together, these uses point to real-world deployments across retail and hospitality, consumer and home settings, research and education, and entertainment experiences.

    What this means for you

    Even if you never plan to build a robot, Sprout signals a shift in how robotics companies think about everyday life. Humanoid robots are no longer being designed only for factories and labs. Companies like Fauna are betting that the future of robotics depends on safety, trust, and natural interaction in human spaces. If successful, platforms like Sprout could lead to robots that assist in classrooms, support hospitality staff, help researchers move faster and create interactive experiences that feel less robotic and more human.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Sprout is not trying to replace workers or flood homes with machines overnight. Instead, Fauna is laying the groundwork for a future where humanoid robots earn their place through careful design and responsible deployment. By prioritizing safety, simplicity, and developer collaboration, Sprout represents a quieter but potentially more meaningful step forward in humanoid robotics. The real test will be how developers and researchers use the platform and whether people feel comfortable sharing space with robots like Sprout.

    Would you trust a humanoid robot to work beside you in a school, hotel, or office if it were designed for safety first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Flying car now on sale for $190,000

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A future with flying cars no longer lives just in concept videos. It now lives in Palo Alto, and if you have about $200,000 plus patience, you can reserve one today. The company behind that future vehicle is Pivotal, a California company that has quietly spent more than a decade turning a radical idea into a real aircraft. Its latest creation, called Helix, is now open for reservations, and delivery could be less than a year away. Yes, this is an actual flying car you can buy.

    Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    How Pivotal turned a secret flying car into a real product

    THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF

    The Helix flying car cruises at about 62 mph and operates in unregulated airspace under FAA Part 103 rules. (Pivotal)

    Pivotal’s story started in 2009, when founder Marcus Leng began developing an electric aircraft that could take off vertically without gasoline. In 2011, Leng became the first person to fly the real thing. He called it BlackFly and worked on it quietly for years. By 2014, the company relocated to the Bay Area. In 2018, it finally stepped out of stealth and revealed BlackFly to the public. That second-generation design became the foundation for Helix, the aircraft Pivotal now offers for sale. Leadership shifted in 2022 when Ken Karklin took over as CEO. Under his watch, the company moved from experimental flights to customer reservations and structured training.

    What the Pivotal Helix flying car actually is

    Helix is a single-seat, electric vertical takeoff and landing aircraft, often called an eVTOL. Unlike helicopters, it has fixed wings, while traditional airplanes need a runway to get airborne. Instead, Helix takes off and lands vertically and runs entirely on electricity. As a result, it falls under the FAA’s Part 103 ultralight category, the same regulatory class as a hang glider. That distinction matters because it means you do not need a pilot’s license to fly it.

    At about 355 pounds empty, Helix is designed to fly below 200 feet in unregulated airspace. It cruises at roughly 62 mph and offers around 30 minutes of flight time per charge. Meanwhile, charging takes about 75 minutes using a 240-volt outlet.

    How much the Helix flying car costs to own

    Helix starts at $190,000. Buyers can also add a transport trailer for $21,000 and a charger for $1,100. To reserve one, customers place a $50,000 deposit. According to Karklin, buyers who reserve today could receive their aircraft in nine to 12 months. Pivotal says it has already received more than a year’s worth of reservations.

    Pivotal says it does not publicly share exact sales figures, but the company says interest remains strong. “While Pivotal doesn’t share specific order numbers, we have a healthy backlog of orders, and customers who place a deposit today can expect delivery within 9-12 months.”

    How long it takes to learn to fly the Helix

    Training takes place at Pivotal’s Palo Alto headquarters and at the Monterey Bay Academy Airport. The process includes passing the FAA knowledge test, completing ground school and learning how to control, maintain, transport and assemble the aircraft. Most customers complete training in under two weeks. More than 50 people have already been trained to fly Pivotal aircraft. Some are customers. Others are employees.

    Why Pivotal says the Helix flying car is built for safety

    Helix was designed with simplicity in mind. It has only 18 moving parts and relies heavily on redundancy to prevent system failures. The aircraft has been independently evaluated by the Light Aircraft Manufacturers Association. Pivotal’s quality management system is also certified by SAE International, which sets global aviation safety standards. Noise is another concern people often raise. During takeoff and landing, Helix sounds roughly like a couple of leaf blowers. Once airborne, people on the ground may not hear it at all.

    Pivotal says years of real-world flight data across its fleet continue to shape how the aircraft performs. “Across our fleet, and including privately owned BlackFly aircraft, Pivotal eVTOLs have completed over 9000 flights to date — of those 2500+ have had a pilot onboard.” That history, the company says, comes without safety incidents. “We have a flawless flight record and a flawless safety record.” The company also points to what it has learned from connected aircraft systems. “We learn so much from these cloud-connected aircraft.” According to Pivotal, that data has had a direct impact on the Helix design. “Most importantly, we have been able to enhance the experience, make flying simpler, safer and more enjoyable as we move into production.”

    Who is already flying Pivotal’s flying cars today

    A small group of early-access customers already owns and flies BlackFly aircraft, the predecessor to Helix. One of them is Tim Lum, a Washington state resident who bought his aircraft in 2023. Since then, Lum has completed about 1,200 flights in more than 100 locations across the U.S.

    Despite not being an FAA-certified pilot, he regularly takes off and lands on private land with permission and uses small private airports. In addition, Lum tows the aircraft coast to coast and shares it with trained family members and friends. For him, flying is deeply personal. According to Lum, being in the air helps clear his mind and opens doors in ways money cannot.

    To understand what it feels like to fly Helix for the first time, we asked Pivotal what new pilots say after their initial flights

    “First-time pilots – especially those without any aviation background – often talk about the unforgettable joy of their initial flight,” a Pivotal spokesperson told CyberGuy. “The huge smiles on every face say it all.” They say that excitement comes from more than simply being airborne. “They describe the thrill of being up in the air, feeling truly one with the aircraft, and seeing the world from an entirely new perspective.” The company says many first-time pilots are also surprised by how the aircraft feels in flight. “Many are surprised by how freeing it feels to fly, particularly because sitting at the center of gravity creates a sensation unlike traditional airplanes – more balanced, more immersive and incredibly intuitive.”

    Not everyone is sold on flying cars

    As with any new aircraft technology, concerns remain. Aviation groups have raised questions about crowded airspace and how communities will respond as more vehicles take to the sky. Pivotal says it approaches this differently than air taxi companies. While others focus on urban shuttles, Helix is built for single-person recreation, short-hop travel and specialized missions.

    NEW PERSONAL EVTOL PROMISES PERSONAL FLIGHT UNDER $40K

    Noise and airspace concerns often come up when people hear about personal eVTOL aircraft. Pivotal says those concerns are central to how it designs and operates its vehicles. “At Pivotal, we design light eVTOL aircraft for the real world – where people live, work and play- and that includes addressing community and regulatory concerns around airspace use and noise.” The company says trust matters as much as technology. “Earning public trust is essential to making electric aviation part of everyday life, and noise is a key factor.”

    Pivotal flying car being put in a unit near the beach by a woman.

    Helix breaks down for transport and fits into a trailer, allowing owners to tow it and fly in different locations across the country. (Pivotal)

    Pivotal says direct engagement helps address those concerns. “We engage directly with communities through events and demonstrations across the country, giving stakeholders the opportunity to experience the aircraft firsthand.” The company also points to independent testing. “Our aircraft are quiet by design. Independent NASA testing shows the Pivotal BlackFly produces approximately 70 dBA of flyover noise at 100 feet, a level aligned with how sound is perceived by the human ear.”

    Federal rules also limit where ultralight aircraft can operate. “Under FAA Part 103 regulations, ultralight aircraft are allowed to operate in uncontrolled airspace, including public and private land – close to 90% of the country.” Still, Pivotal notes that there are clear boundaries. “However, ultralight aircraft are not permitted to fly over congested areas, further reducing any concerns around noise.”

    How Pivotal plans to use Helix beyond personal flying

    Pivotal plans to operate across three business segments: personal ownership, public safety and defense. In 2023, the company leased eight aircraft to an innovation arm of the U.S. Air Force and defense technology firm MTSI. That testing helped inform the latest version of Helix. Karklin believes recreational flying and short-distance travel should not be dismissed. He argues that those use cases may drive adoption faster than large urban systems.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

    Kurt’s key takeaways

    Flying cars still sound wild when you say it out loud, yet Helix shows this idea has moved well past hype and headlines. This is a real aircraft, flown by real people, with real rules and real limitations. For most people, Helix will remain something to watch rather than buy. The price alone puts it out of reach. Even so, its existence matters. It shows that personal flight no longer belongs only to licensed pilots, airfields and aviation clubs. Pivotal took a slow and deliberate path to get here. That patience may be why Helix feels less like a stunt and more like a glimpse of what comes next. Just as electric cars reshaped expectations before becoming mainstream, personal eVTOL aircraft are starting at the top and working their way down. The question now is not whether flying cars are possible. It is how comfortable we become sharing the sky when they are no longer rare.

    Helix flying above water.

    Designed for recreation and short-hop travel, Helix offers a new way to experience flight without a pilot’s license. (Pivotal)

    Would you trust yourself in a single-seat flying car, or does the sky still feel like a line we should not cross? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Major US shipping platform left customer data wide open to hackers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cargo theft is no longer just about stolen trucks and forged paperwork. Over the past year, security researchers have been warning that hackers are increasingly targeting the technology behind global shipping, quietly manipulating systems that move goods worth millions of dollars. 

    In some cases, organized crime groups use hacked logistics platforms to redirect shipments, allowing criminals to steal goods without ever setting foot in a warehouse. One recent case involving a critical U.S. shipping technology provider shows just how exposed parts of the supply chain have been, and for how long.

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter     

    A key shipping platform was left wide open

    CRIME RINGS, HACKERS JOIN FORCES TO HIJACK TRUCKS NATIONWIDE, FUELING MAJOR HOLIDAY SHIPPING SECURITY FEARS

    Digital shipping platforms now control how goods move worldwide, making cybersecurity failures a direct risk to the global supply chain. (John Keeble/Getty Images)

    The company at the center of this incident is Bluspark Global, a New York-based firm whose Bluvoyix platform is used by hundreds of companies to manage and track freight moving around the world. While Bluspark isn’t a household name, its software supports a large slice of global shipping, including major retailers, grocery chains and manufacturers.

    For months, Bluspark’s systems reportedly contained basic security flaws that effectively left its shipping platform exposed to anyone on the internet. According to the company, five vulnerabilities were eventually fixed, including the use of plaintext passwords and the ability to remotely access and interact with the Bluvoyix platform. These flaws could have given attackers access to decades of shipment records and customer data.

    Bluspark says those issues are now resolved. But the timeline leading up to the fixes raises serious concerns about how long the platform was vulnerable and how difficult it was to alert the company in the first place.

    How a researcher uncovered the flaws

    Security researcher Eaton Zveare discovered the vulnerabilities in October while examining the website of a Bluspark customer. What started as a routine look at a contact form quickly escalated. By viewing the website’s source code, Zveare noticed that messages sent through the form passed through Bluspark’s servers using an application programming interface, or API.

    From there, things unraveled fast. The API’s documentation was publicly accessible and included a built-in feature that allowed anyone to test commands. Despite claiming authentication was required, the API returned sensitive data without any login at all. Zveare was able to retrieve large amounts of user account information, including employee and customer usernames and passwords stored in plaintext.

    Worse, the API allowed the creation of new administrator-level accounts without proper checks. That meant an attacker could grant themselves full access to Bluvoyix and view shipment data going back to 2007. Even security tokens designed to limit access could be bypassed entirely.

    Why it took weeks to fix critical shipping security flaws

    One of the most troubling parts of this story isn’t just the vulnerabilities themselves, but how hard it was to get them fixed. Zveare spent weeks trying to contact Bluspark after discovering the flaws, sending emails, voicemails, and even LinkedIn messages, without success.

    With no clear vulnerability disclosure process in place, Zveare eventually turned to Maritime Hacking Village, which helps researchers notify companies in the shipping and maritime industries. When that failed, he contacted the press as a last resort.

    Only after that did the company respond, through its legal counsel. Bluspark later confirmed it had patched the flaws and said it plans to introduce a formal vulnerability disclosure program. The company has not said whether it found evidence that attackers exploited the bugs to manipulate shipments, stating only that there was no indication of customer impact. It also declined to share details about its security practices or any third-party audits.

    10 ways you can stay safe when cyberattacks hit supply chains

    Hackers can break into a shipping or logistics platform without you ever realizing your data was involved. These steps help you reduce risk when attacks like this happen.

    1) Watch for delivery-related scams and fake shipping notices

    After supply chain breaches, criminals often send phishing emails or texts pretending to be shipping companies, retailers, or delivery services. If a message pressures you to click a link or “confirm” shipment details, slow down. Go directly to the retailer’s website instead of trusting the message.

    2) Use a password manager to protect your accounts

    If attackers gain access to customer databases, they often try the same login details on shopping, email, and banking accounts. A password manager ensures every account has a unique password, so one breach doesn’t give attackers the keys to everything else.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    3) Reduce your exposed personal data online

    Young woman types on smartphone

    Security researchers found exposed APIs that allowed access to sensitive shipping data without proper authentication. (Portra/Getty Images)

    Criminals often combine data from one breach with information scraped from data broker sites. Personal data removal services can help reduce how much of your information is publicly available, making it harder for criminals to target you with convincing scams.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Run strong antivirus software on your devices

    Strong antivirus software can block malicious links, fake shipping pages, and malware-laced attachments that often follow high-profile breaches. Keeping real-time protection enabled adds an important layer when criminals try to exploit confusion.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    HUGE DATA LEAK EXPOSES 14 MILLION CUSTOMER SHIPPING RECORDS

    5) Enable two-factor authentication wherever possible

    Two-factor authentication (2FA) makes it much harder for attackers to take over accounts, even if they have your password. Prioritize email, shopping accounts, cloud storage and any service that stores payment or delivery information.

    6) Review your account activity and delivery history

    Check your online shopping accounts for unfamiliar orders, address changes, or saved payment methods you don’t recognize. Catching changes early can prevent fraud from escalating.

    7) Consider identity theft protection

    Identity theft protection services can alert you to suspicious credit activity and help you recover if attackers access your name, address or other personal details. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    8) Place a free credit freeze to stop new fraud

    If your name, email, or address was exposed, consider placing a credit freeze with the major credit bureaus. A freeze prevents criminals from opening new accounts in your name, even if they obtain additional personal data later. It’s free, easy to lift temporarily, and one of the most effective steps you can take after a breach. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    9) Lock down your shipping and retailer accounts

    Review the security settings on major shopping and delivery accounts, including retailers, grocery services and shipping providers. Pay close attention to saved delivery addresses, default shipping locations and linked payment methods. Attackers sometimes add their own address quietly and wait before making a move.

    10) Businesses should review third-party logistics access

    If you run a business that relies on shipping or logistics platforms, incidents like this are a reminder to review vendor access controls. Limit administrative permissions, rotate API keys regularly, and confirm vendors have a clear vulnerability disclosure process. Supply chain security depends on more than just your own systems.

    Someone typing on a computer in a dark room.

    Hackers increasingly target logistics technology, manipulating systems to redirect shipments without physical theft.  (Thomas Trutschel/Photothek via Getty Images)

    Kurt’s key takeaway

    Shipping platforms sit at the intersection of physical goods and digital systems, making them attractive targets for cybercriminals. When basic protections like authentication and password encryption are missing, the consequences can spill into the real world, from stolen cargo to supply chain disruption. The incident also highlights how many companies still lack clear, public ways for researchers to report vulnerabilities responsibly.

    Do you think companies that quietly power global supply chains are doing enough to protect themselves from cyber threats?  Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • YouTube lets parents limit or block Shorts for teens

    [ad_1]

    NEWYou can now listen to Fox News articles!

    YouTube is rolling out new parental controls designed to give families more say over how much time teens spend scrolling through Shorts. 

    Parents can now set daily time limits or block Shorts entirely, depending on what works best for their household. The update comes as concerns grow around endless scrolling and its impact on teens. 

    YouTube says these tools are meant to support healthier viewing habits while still allowing young users to enjoy the platform in a more balanced way.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Why YouTube is focusing on Shorts

    Parents can now set a daily time limit for YouTube Shorts, including an option to block Shorts entirely.  (AP Photo/Lai Seng Sin, File)

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    Short-form video has become one of the most addictive parts of social media, especially for teens. The constant scroll can make it hard to stop watching, even when kids are supposed to be studying or winding down for bed. YouTube says the new controls respond to feedback from parents, advocates, and lawmakers who want stronger safeguards for young users. The goal is to give families flexibility instead of forcing an all-or-nothing approach.

    What parents can now control on YouTube

    If you supervise a teen’s Google account, you can now:

    • Set a daily time limit for YouTube Shorts
    • Block Shorts entirely by setting the limit to zero minutes
    • Turn on bedtime reminders
    • Enable take-a-break alerts
    • Manage supervised teen accounts across multiple devices

    YouTube also says it is adjusting how content is recommended to teens, placing more emphasis on videos tied to curiosity, life skills, inspiration, and credible information that supports well-being.

    How parents limit or block YouTube Shorts for teens

    Before you start, make sure:

    • Your teen is using a supervised Google account
    • You have access to Google Family Link
    • Your teen is signed into YouTube on their device with that supervised account

    Step-by-step instructions

    • Open the Google Family Link app on your phone or tablet (iPhone or Android).
    • Tap your teen’s profile.
    • Tap Controls, then select YouTube.If YouTube does not appear, confirm the account is set up as supervised.
    • If YouTube does not appear, confirm the account is set up as supervised.
    • Tap Screen time or Shorts settings.
    • Find the option labeled Shorts daily limit.
    • Choose how much time your teen can scroll Shorts each day:Set a time limit to allow limited scrollingSet the limit to zero minutes to block Shorts entirely
    • Set a time limit to allow limited scrolling
    • Set the limit to zero minutes to block Shorts entirely
    • In the same section, turn on:Take a break remindersBedtime reminders
    • Take a break reminders
    • Bedtime reminders
    • Confirm your changes.

    The new limits apply immediately.

    OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN

    Children Use Smartphones in Hallway

    YouTube’s supervised account settings let parents choose age-appropriate content and manage how teens experience the platform. (StockPlanets/Getty Images)

    What happens when your teen reaches the Shorts limit

    Once the daily limit is reached:

    • The Shorts feed locks
    • A message explains that the daily limit has been reached
    • Shorts unlock automatically the next day

    Regular, long-form YouTube videos remain available unless you restrict them separately through screen-time controls.

    Important things parents should know

    • Teens cannot change or bypass Shorts limits on their own
    • Limits apply across all devices signed into the supervised account
    • Shorts controls are separate from overall YouTube screen-time limits
    • Blocking Shorts does not block standard YouTube videos

    Other parental tools worth checking

    Beyond Shorts, parents can also:

    • Turn off autoplay
    • Review watch and search history
    • Adjust content recommendations
    • Pause YouTube during homework or sleep hours

    These options are managed through Google Family Link, with guidance and account setup available in YouTube’s Family Center.

    What this means to you

    If you are a parent or guardian, these controls give you more practical ways to manage screen time without banning YouTube entirely. You can limit Shorts during school nights, allow more time on long trips, or block them when focus matters most. Instead of relying on willpower alone, families now have built-in tools that help reinforce healthy habits.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Short-form video is not going away, but the way teens interact with it can change. YouTube’s new parental controls show a shift toward giving families more flexibility and clearer boundaries. Used alongside conversations about online habits, these tools can make a real difference. Oh, and be sure to check out my new “Beyond Connected” podcast on YouTube.

    Child using a device on a couch.

    YouTube says these new parental controls are designed to reduce endless scrolling and support healthier viewing habits for teens. (Kurt “CyberGuy” Knutsson)

    How much control do you think parents should have over teens’ screen time, and where should the line be drawn? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Tiny autonomous robots can now swim on their own

    [ad_1]

    NEWYou can now listen to Fox News articles!

    For decades, microscopic robots lived mostly in our imagination. Movies like “Fantastic Voyage” convinced us that tiny machines would one day cruise through the human body, fixing problems from the inside. In reality, that future stayed frustratingly out of reach. 

    The reason was not a lack of ambition. It was physics. 

    Now, a breakthrough from researchers at the University of Pennsylvania and the University of Michigan has changed the equation. The teams have built the smallest fully programmable autonomous robots ever created, and they can swim.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    A new way to swim without moving parts

    Seen on a fingertip, this tiny swimming robot is smaller than a grain of salt yet fully autonomous. (Kurt “CyberGuy” Knutsson)

    ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO

    The robots measure about 200 by 300 by 50 micrometers. That is smaller than a grain of salt and close to the size of a single-celled organism. They do not have legs or propellers. Instead, they use electrokinetics. Each robot generates a small electrical field that pulls charged ions in the surrounding fluid. Those ions drag water molecules with them, effectively creating a flowing river around the robot. The result is motion without moving parts. That makes the robots extremely durable and surprisingly easy to handle, even with delicate lab tools.

    A brain powered by almost nothing

    Each robot runs on tiny solar cells that generate just 75 nanowatts of power. That is more than 100,000 times less than a smartwatch. To make this work, engineers redesigned everything. They built ultra-low voltage circuits and created a custom instruction set that compresses complex behavior into just a few hundred bits of memory. Despite the limits, each robot can sense its environment, store data and decide how to move next.

    How these robots communicate with a dance

    The robots cannot carry antennas, so the team borrowed a trick from nature. Each robot performs a tiny wiggle pattern to report information like temperature. The motion follows a precise encoding scheme that researchers can decode by watching through a microscope. The idea closely mirrors how bees communicate through movement. Programming works the other way. Researchers flash light signals that the robots read as instructions. A built-in passcode prevents random light from interfering with their memory.

    What these tiny robots can do today

    In current tests, the robots demonstrate thermotaxis. They sense heat and autonomously swim toward warmer areas. That behavior hints at future uses like tracking inflammation, locating disease markers or delivering drugs with extreme precision. Light can already power robots near the skin. For deeper environments, the researchers are exploring ultrasound as a future energy source.

    PRIVATE AUTONOMOUS PODS COULD REDEFINE RIDE-SHARING

    Close-up of a researcher's hands adjusting a modern microscope in a lab setting.

    Tiny robots move by creating electric fields that pull surrounding fluid, allowing them to swim without propellers or moving parts. (iStock)

    Cheap enough to use by the thousands

    Because these robots are made with standard semiconductor manufacturing, they can be produced in large numbers. More than 100 robots fit on a single chip, and manufacturing yields already exceed 50%. In mass production, the estimated cost could drop below one cent per robot. At that price, disposable robot swarms become realistic rather than theoretical.

    What this means to you

    This technology is not about flashy gadgets. It is about scale. Robots this small could one day monitor health at the cellular level, build materials from the bottom up or explore environments too delicate for larger machines. While medical use is still years away, this breakthrough shows that true autonomy at the microscale is finally possible.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    For nearly 50 years, microscopic robots felt like a promise science could never quite keep. This research, published in Science Robotics, changes that narrative. By embracing the strange physics of the microscale instead of fighting it, engineers unlocked an entirely new class of machines. This is only the first chapter, but it is a big one. Once sensing, movement and decision-making fit into something almost invisible, the future of robotics looks very different.

    If tiny robots could swim through your body one day, would you trust them to monitor your health or deliver treatment? Let us know by writing to us at Cyberguy.com.

    Microscope in front of screens with brain scans.

    Light-based commands trigger precise movements as microscopic robots receive instructions, change direction and move independently. (iStock)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • 5 myths about identity theft that put your data at risk

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn’t even realize were public: old addresses, family connections, phone numbers and shopping habits. 

    All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it’s a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they’re “careful enough.” 

    Let’s break them down.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.   

    Myth #1: ‘I wasn’t in a data breach, so I’m safe’

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    Identity theft often starts quietly, with bits of personal information collected and shared long before a scam ever happens. (Kira Hofmann/picture alliance via Getty Images)

    Reality: You don’t need to be in a breach to have your data exposed.

    Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you’ve never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you.

    Actionable tips:

    • Don’t assume “no breach” means “no risk”
    • Avoid oversharing details on social media
    • Remove your personal data from data broker sites so it can’t be reused

    Myth #2: ‘Scammers don’t have enough info to impersonate me’

    Reality: They usually have more than enough.

    Scammers don’t need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:

    This is why scams often feel unsettlingly personal.

    Actionable tips:

    • Be suspicious of messages that reference personal details
    • Don’t confirm information just because the sender “knows” something about you
    • Reduce what’s available by removing your data from broker databases

    Myth #3: ‘Retirees aren’t targeted because they’re cautious’

    Reality: Retirees are one of the most targeted groups.

    Why? Because scammers assume:

    • Stable income from pensions or benefits
    • More savings
    • Greater trust in official-looking messages
    • Less familiarity with newer scam tactics

    Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate “Tax Resolution Oversight Department” that tries to steal your money.

    Actionable tips:

    • Never act on urgent requests involving benefits or finances
    • Verify messages by contacting organizations directly
    • Encourage family discussions about scams and warning signs
    • Remove publicly available data that helps scammers profile retirees
    Person typing on computer

    Data brokers build detailed profiles using public records, apps, purchases and loyalty programs, even if you have never been hacked. (Kurt “CyberGuy” Knutsson)

    Myth #4: ‘Credit monitoring will stop identity theft’

    Reality: Credit monitoring only tells you after something has gone wrong.

    It doesn’t stop scammers from:

    • Targeting you
    • Attempting account takeovers
    • Using your information in phishing or social engineering scams

    Think of credit monitoring like a smoke alarm-helpful, but it doesn’t prevent the fire.

    Actionable tips:

    • Use credit monitoring as a backup, not your main defense
    • Lock down accounts with strong passwords and two-factor authentication
    • Reduce exposure by removing your data before it’s misused

    Myth #5: “There’s nothing I can do about data brokers”

    Reality: You can take control, but doing it manually is time-consuming and frustrating.

    Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That’s why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn’t quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    Why identity theft often starts long before you notice

    Identity theft rarely begins with a dramatic moment.

    It usually starts with:

    • Data collected quietly over the years
    • Profiles that grow more detailed with time
    • Information being sold and resold without your knowledge

    By the time fraud shows up on a credit report, the damage has often already been done.

    What you can do during Identity Theft Awareness Week

    If there’s one takeaway this week, it’s this: reducing your exposed data lowers your risk.

    1) Be skeptical of unexpected messages

    Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.

    2) Verify requests on your own

    If a message claims there’s a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message.

    3) Reduce your digital footprint with a data removal service 

    Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Turn on two-factor authentication

    Enable two-factor authentication (2FA) wherever it’s available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.

    5) Strengthen your account security

    Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Person on their smartphone.

    Scammers use this background data to sound legitimate, personalize their messages and pressure victims into acting fast. (Matt Cardy/Getty Images)

    6) Use identity theft protection software

    Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Help family members stay protected

    Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.

    Kurt’s key takeaways

    Identity theft isn’t about being careless; it’s about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won’t just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.

    Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Private autonomous pods could redefine ride-sharing

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Crowded cabins and forced small talk have long defined ride-sharing. A California startup wants to flip that idea on its head. 

    Pliyt believes the future of ride-sharing means sharing the ride as little as possible. Instead of one shared cabin, its autonomous vehicle concept divides the interior into four fully independent pods. Each one acts like a private room on wheels. 

    The goal is simple. Get you from point A to point B without invading your personal space.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    How Pliyt’s autonomous pods work

    One-way glass and independent controls keep each rider anonymous, even when the vehicle is shared. (Pliyt)

    Pliyt’s vehicle is designed from the inside out. Each passenger rides inside a self-contained capsule that prioritizes privacy, comfort and control. The company says the idea resonated strongly when the prototype debuted at CES earlier this month. Here is what sets the concept apart:

    BLUE-CITY RIDERS HIT WITH PRICIEST UBER FARES AS LA, NYC COSTS SOAR PAST COMPARABLE METROS, DATA SHOWS

    • Four fully enclosed passenger pods
    • One-way glass that lets you see out while blocking outside views
    • Independent lighting, sound and privacy controls
    • Personalized entertainment for gaming, streaming or screencasting
    • A retractable workstation with a large display and a side table

    You decide how social or private your ride feels. Traveling with a companion? The divider between pods can be lowered so you can share the space by choice. 

    “We believe rider choice and personal space will be foundational to the future of shared autonomous mobility,” the company told CyberGuy. “As vehicles become autonomous, differentiation will shift from driving to experience. Giving riders control over privacy, comfort, and interaction, rather than forcing a one-size-fits-all shared cabin, will be critical for trust and adoption, especially in dense urban environments. Shared mobility doesn’t have to mean shared personal space, and we see that as a key evolution of the category.”

    Is Pliyt fully autonomous?

    Yes. Pliyt vehicles are designed to operate without human drivers. However, the company does not plan to build its own autonomous driving system. Instead, Pliyt intends to partner with established autonomy providers once development progresses.

    “Our current plan is to launch an initial service in San Francisco around 2028, beginning with controlled, geo-fenced deployments and expanding gradually as autonomy, infrastructure, and regulatory frameworks mature,” a spokesperson for Pliyt told CyberGuy. “Our focus today is on building the right vehicle architecture, partnerships, and user experience to support that rollout responsibly.”

    4 people sitting in individual pods in a car.

    Pliyt’s concept vehicle replaces a shared cabin with four fully enclosed pods designed for personal space and comfort. (Pliyt)

    Privacy-first design sets Pliyt apart

    Privacy sits at the center of Pliyt’s design philosophy. Every pod is built for in-ride anonymity even during shared trips. Fellow passengers cannot see you, and you cannot see them unless you choose to. This approach stands out in a world where many mobility platforms depend on data collection and shared environments. Pliyt positions privacy as foundational rather than optional. The company says no personal identities are visible during rides. The experience aims to feel calm, intentional and free from observation.

    CAN AUTONOMOUS TRUCKS REALLY MAKE HIGHWAYS SAFER?

    Comfort without the awkwardness

    Pliyt also leans heavily into comfort. Seats feature what the company calls zero-gravity positioning. You will not float like an astronaut, but the posture is designed to reduce pressure and fatigue. Large windows offer panoramic city views while still maintaining privacy. Personal lighting and climate controls help tailor the ride to your preferences. If relaxing is not your goal, productivity comes built in. The retractable workstation allows you to work, review documents or create content while moving through the city.

    PLIYT autonomous vehicle at CES in Las Vegas

    A view of autonomous vehicle PLIYT at the CES (Consumer Electronic Show) 2026, the world’s largest annual consumer technology trade on Jan. 6, 2026 at the Las Vegas Convention Center in Las Vegas.  (Tayfun Coskun/Anadolu via Getty Images)

    How Pliyt compares to other autonomous vehicles

    Autonomous pods are not entirely new. Companies like Zoox and Waymo already operate self-driving vehicles with unique interiors. Waymo’s Zeekr RT, for example, focuses on spacious seating and rider comfort. Pliyt’s difference lies in isolation by design. Instead of rethinking a shared cabin, it breaks the vehicle into four private spaces. The result feels closer to a personal lounge than a ride-share.

    What this means for you

    If this concept becomes reality, ride-sharing could feel very different. No forced conversations. No shared armrests. No feeling watched. For commuters, it could mean working quietly on the way to the office. For travelers, it could mean relaxing without distractions. For introverts, it could mean finally enjoying shared mobility on their own terms. It also raises bigger questions about how future cities balance efficiency with dignity and personal space.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Two car passengers talk to each other.

    The interior divider can be lowered, allowing passengers to share space with a companion while keeping control over privacy. (Pliyt)

    Kurt’s key takeaways

    Pliyt is not promising faster rides or cheaper fares. It is promising something more subtle. A calmer, more respectful way to move through cities. Whether the concept scales will depend on partnerships, regulation and public adoption. Still, the idea challenges long-standing assumptions about what ride-sharing has to feel like. If autonomous vehicles are coming either way, designs like this suggest they do not have to feel crowded or impersonal.

    Would you choose a shared ride that feels completely private, or does part of you still want the human element along the way? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • FCC cracks down on robocall reporting violations

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you are tired of scam calls slipping through the cracks, federal regulators just took a meaningful step. The Federal Communications Commission finalized new penalties aimed at telecom companies that submit false, inaccurate or late information to a key anti-robocall system. The changes go into effect Feb. 5. They strengthen oversight of the Robocall Mitigation Database, which plays a central role in tracking spoofed calls and holding providers accountable.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    What changed and why it matters

    Under the new rules, voice service providers must recertify every year that their filings in the Robocall Mitigation Database are accurate and current. The FCC will now back that requirement with real financial consequences.

    The FCC is cracking down on robocalls by tightening rules that govern how telecom providers verify and report call traffic. (iStock)

    FCC SCRUBS OWN REFERENCE TO ‘INDEPENDENT’ AGENCY FROM WEBSITE AFTER DEM’S TESTY EXCHANGE WITH CHAIRMAN

    Here is what the commission approved:

    • $10,000 fines for submitting false or inaccurate information
    • $1,000 fines for each database entry not updated within 10 business days
    • Annual recertification of all provider filings
    • The FCC also adopted a $100 filing fee for initial Robocall Mitigation Database submissions and for required annual recertifications.
    • Two-factor authentication to protect database access
    • A $100 application fee for initial filings and annual recertifications

    The FCC also made clear that these violations are considered ongoing until corrected, meaning fines can accrue on a daily basis rather than being treated as one-time penalties.

    According to the FCC, many past submissions failed basic standards. Some lacked accurate contact details. Others included robocall mitigation plans that did not describe any real mitigation practices at all.

    How the Robocall Mitigation Database works

    The Robocall Mitigation Database requires providers to verify and certify the identities of callers that use their networks. Regulators and law enforcement rely on it to trace spoofed calls and illegal robocall campaigns. That task is harder than it sounds. America’s telecom system is vast and fragmented. Calls often pass through multiple networks owned by major carriers like Verizon and AT&T, as well as smaller regional providers and VoIP services. When calls hop between networks, verification can be missed or ignored. For years, the FCC did not closely verify or enforce the accuracy of these filings. That gap raised serious concerns.

    Under the updated rules, providers that fail to recertify or correct deficient filings can be referred to enforcement and removed from the database, which can prevent other carriers from carrying their calls at all.

    Why inaccurate robocall data hurts consumers

    When robocall filings are wrong or outdated, scam calls are more likely to reach your phone. Providers may treat a call as trusted even when it should raise red flags. That gives robocallers more time to operate and makes it harder for regulators to shut them down quickly. The FCC says stronger penalties and tighter oversight are meant to close that gap before consumers pay the price.

    Person typing on cellphone

    New FCC penalties target inaccurate robocall filings that have allowed scam calls to slip through carrier networks.   (Kurt “CyberGuy” Knutsson)

    Pushback and pressure on the FCC

    When the FCC proposed penalties, it asked whether violations should be treated as minor paperwork mistakes or as serious misrepresentations. Telecom trade groups pushed back. They argued that fines should not apply unless providers first get a chance to fix errors or unless the FCC proves the filings were willfully inaccurate. 

    State attorneys general and the robocall monitoring platform ZipDX urged a tougher stance. They warned that false filings undermine every effort to stop illegal robocalls. The FCC ultimately chose a middle path. It rejected treating violations as harmless paperwork errors. At the same time, it stopped short of imposing the maximum penalties allowed by law.

    What this means to you

    For everyday consumers, this move matters more than it may seem. Accurate robocall reporting makes it easier to trace scam calls, shut down bad actors and prevent spoofed numbers from reaching your phone. Stronger penalties give telecoms a reason to take these filings seriously instead of treating them as routine compliance chores. 

    11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

    The FCC also set a firm annual deadline. Providers must recertify their robocall mitigation filings each year by March 1, creating a predictable enforcement checkpoint. While this will not end robocalls overnight, it tightens a weak link that scammers have exploited for years.

    Simple steps you can take right now to reduce robocalls

    Even with tougher FCC enforcement, scam calls will not disappear overnight. Here are a few smart steps you can take today to reduce your risk.

    • Do not answer unknown calls. If it is important, a legitimate caller will leave a voicemail.
    • Never press buttons or say yes to robocall prompts. That confirms your number is active and can trigger more scam calls.
    • Report scam calls to your carrier. Most major carriers let you report robocalls directly through their call log or app.
    • Register your number with the National Do Not Call Registry at donotcall.gov/. It will not stop scammers, but it can reduce legitimate telemarketing calls.
    • Block repeat offenders. If the same number keeps calling, block it so your phone stops ringing altogether.
    • Be cautious with callback numbers. Scammers often spoof local area codes to look familiar.

    The FCC says accurate robocall reporting by telecoms helps carriers identify and shut down scam traffic faster, but consumer habits still matter.

    Pro tip: remove your personal data at the source

    Robocalls do not come out of nowhere. Many start with your personal information being sold or shared by data brokers. These companies collect phone numbers, addresses, emails and even family details from public records, apps, purchases and online activity. Scammers and shady marketers buy that data to build call lists. Removing your data from data broker sites can reduce the number of robocalls you receive over time. You can try to do this manually by finding individual data broker websites and submitting removal requests one by one. The process is time-consuming and often needs to be repeated.

    Some people choose to use a data removal service to automate this process and continuously monitor for re-posting. That can help limit how often your phone number circulates among marketers and scammers. Less exposed data means fewer opportunities for robocallers to target you. Cutting off robocalls often starts long before your phone rings.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

    A man talking on his iPhone in the car

    By strengthening oversight and accountability, the FCC aims to shut down illegal robocalls before they ever reach your phone. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaways

    Robocalls thrive when accountability breaks down. By adding meaningful fines, stronger security, annual recertification and filing fees, the FCC is signaling that accuracy is no longer optional. Because penalties can continue to build until problems are fixed, telecoms now face real consequences for ignoring or delaying corrections. This rule forces providers to own their role in stopping illegal calls instead of passing the blame along the network chain. Real progress will depend on enforcement, but this is one of the clearest signs yet that regulators are closing gaps scammers rely on.

    Do you think stricter penalties will finally push telecoms to take robocall prevention seriously, or will scammers just find the next loophole? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Malicious Mac extensions steal crypto wallets and passwords

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Mac users often assume they’re safer than everyone else, especially when they stick to official app stores and trusted tools.

    That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don’t just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Once active, GlassWorm targets passwords, crypto wallets, and even your macOS Keychain without obvious warning signs. (Cyberguy.com)

    How malicious Mac extensions slipped into trusted stores

    Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you’re not familiar with code editors, they’re tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.

    FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

    At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.

    Even though this campaign is described as targeting developers, you don’t need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.

    What GlassWorm does once it’s on your Mac

    Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn’t stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.

    Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn’t fully working yet, but the functionality is already in place.

    To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.

    Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.

    7 steps you can take to stay safe from malicious Mac extensions

    Malicious extensions don’t look dangerous. That’s what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.

    1) Only install extensions you actually need

    Every extension you install increases risk. If you’re not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.

    2) Verify the publisher before installing anything

    Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.

    Man typing on MacBook

    These malicious extensions looked like helpful tools but quietly ran hidden code once installed. (Cyberguy.com)

    3) Use a password manager

    A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can’t reuse it elsewhere.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY

    4) Run strong antivirus software on your Mac

    Modern macOS malware doesn’t always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Consider a personal data removal service

    When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Turn on two-factor authentication (2FA)

    Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.

    7) Keep macOS and your apps fully updated

    Security updates close gaps that malware relies on. Turn on automatic updates so you’re protected even if you miss the headlines or forget to check manually.

    A Mac computer on a table

    Mac users often trust official app stores, but that trust is exactly what attackers are counting on. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaway

    GlassWorm shows that malware doesn’t always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what’s installed could save you from losing passwords, crypto or access to important accounts.

    When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • CES 2026 showstoppers: 10 gadgets you have to see

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Every January, the Consumer Electronics Show, better known as CES, takes over Las Vegas. It’s where tech companies show off what they’re building next, from products that are almost ready to buy to ideas that feel pulled from the future.

    CES 2026 was packed with moments that made people stop and stare. Some of the tech felt practical. Some of it felt a bit wild. However, these 10 showstoppers were the ones everyone kept talking about on the show floor.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    1) LG Wallpaper TV

    LG pushed TV design to the edge of invisibility once again at CES 2026. The latest Wallpaper TV, officially called the LG OLED evo W6, is just 9mm thin and sits completely flush against the wall. From the side, it looks more like glass than a television.

    This version feels far more practical than earlier Wallpaper models. All inputs live in a separate Zero Connect Box, which wirelessly sends visually lossless 4K video and audio to the screen from up to 30 feet away. That keeps cables out of sight and gives you more freedom when placing the TV.

    THIS EV HAS A FACE, AND IT TALKS BACK WITH AI

    The LG CLOiD robot and the LG OLED evo AI Wallpaper TV are displayed onstage during an LG Electronics news conference at CES 2026, an annual consumer electronics trade show, in Las Vegas, Jan. 5, 2026. (REUTERS/Steve Marcus)

    Picture quality also takes a major step forward. LG’s new Hyper Radiant Color Technology boosts brightness, improves color accuracy and deepens blacks while cutting screen reflections. With Brightness Booster Ultra, the Wallpaper TV reaches up to 3.9 times the brightness of conventional OLEDs and stays easy to watch even in bright rooms.

    Powering it all is LG’s new Alpha 11 AI Processor Gen3. Its upgraded Dual AI Engine preserves natural detail while reducing noise, avoiding the overly sharp look that plagues some high-end TVs. Gamers also get plenty to like, including 4K at up to 165Hz, ultra-fast response times and support for NVIDIA G-SYNC and AMD FreeSync Premium.

    Availability: Expected later in 2026 through select retailers.

    2) Dreame Cyber X Stair-Climbing Robot Vacuum

    Dreame showed plenty of power at CES 2026, but the real jaw-dropper was the Cyber X concept. This robot vacuum uses a four-legged base that lets it climb stairs on its own, turning multi-level cleaning into something that finally feels automated.

    The design looks unusual at first, almost like a robot pet. Once it starts moving, though, the idea clicks. A built-in water tank reduces trips back to the dock, which should help extend cleaning sessions and preserve battery life.

    Dreame’s Cyber X four-legged design in black

    Dreame’s Cyber X concept uses a four-legged design to climb stairs on its own, hinting at a new era of autonomous home robots. (Dreame)

    It’s still a concept, but Cyber X feels like a glimpse at where home robots are headed. Less rolling around. More real autonomy.

    Availability: Concept product.

    3) SwitchBot AI MindClip

    SwitchBot joined the growing AI wearable trend with the MindClip, a tiny device designed to act like a second brain. It clips on easily, weighs just 18 grams and stays out of the way while quietly doing its job.

    MindClip can record conversations and meetings, summarize calls and create AI-powered notes. It also supports more than 100 languages, making it useful for work, travel or multilingual households. Like similar devices, it lets you listen back to recordings and read transcriptions later.

    Where MindClip aims to stand out is in memory. SwitchBot says users will be able to search past recordings and track down important details it captured earlier, turning everyday conversations into a searchable archive. That could be especially helpful for busy professionals and students who juggle calls, classes and meetings.

    The tiny MindClip clipped on a woman's blue sweater.

    The tiny MindClip clips on discreetly while recording, transcribing and organizing conversations using AI. (SwitchBot)

    Details are still limited, and no pricing has been announced. SwitchBot has hinted that many key features will require a subscription, which puts it in line with competing AI wearables.

    Availability: Not yet available. Pricing and preorder details have not been released.

    4) LG CLOiD Home Robot

    LG didn’t just show off a concept robot at CES. It showed a glimpse of what a true AI-powered home might look like.

    At LG Electronics’ booth at CES 2026, the company unveiled LG CLOiD, a home robot designed to handle real household chores as part of its “Zero Labor Home” vision. This isn’t just a rolling assistant. CLOiD can fold laundry, help in the kitchen and move safely around furniture.

    The robot uses a stable, wheeled base inspired by robot vacuums, paired with a tilting torso and two articulated arms. Each arm has human-like movement and individual fingers, allowing CLOiD to grip, lift and place objects with surprising precision. In demos, it retrieved items from the fridge, loaded an oven and folded clothes after a laundry cycle.

    CLOiD’s head acts as a mobile AI home hub, using cameras, sensors and voice-based AI to understand routines and control LG’s ThinQ-connected appliances. It still feels futuristic and a little unsettling, but the technology behind it is hard to ignore. If LG can make it practical and affordable, CLOiD could mark a real step toward AI doing the housework for us.

    Availability: Concept and research-stage technology. Not planned for consumer sale at this time.

    5) Glyde Smart Hair Clippers

    Glyde is trying to solve one of the most frustrating parts of grooming: cutting your own hair without messing it up.

    The company introduced AI-powered smart hair clippers designed to guide the cut for you. You wear a simple headband that marks where a fade should start, choose a style in the app and let the clippers do the rest. Built-in sensors track your speed, angle and movement in real time, automatically adjusting the blade to keep cuts even and fades smooth.

    This is very much a trust exercise. You’re letting software guide sharp blades near your head, and that won’t be for everyone. But for people who skip the barber, hate appointments or just want a quick cleanup at home, the idea makes sense.

    Glyde’s system is built to be “mistake-proof.” Move too fast, and the blade retracts. Tilt it the wrong way, and it trims less. Popular styles like buzz cuts, crew cuts and side parts are baked into the app, with step-by-step guidance that adapts as you cut.

    It’s a one-time investment meant to replace repeat barber visits. If it works as promised, Glyde could turn haircuts into a 10-minute task you do on your own schedule.

    Availability: Limited early access or direct sales may come later in 2026.

    6) LEGO Smart Bricks

    LEGO is adding a digital twist to its classic bricks, and surprisingly, it works. At CES, LEGO introduced LEGO Smart Play, a new line built around “Smart Bricks” that look like regular LEGO pieces but hide sensors, LEDs and speakers inside. The bricks can detect movement, distance and interaction, lighting up, changing color and producing sound effects in real time as kids play.

    The launch leans heavily into Star Wars, including sets with Luke Skywalker, Darth Vader, an X-Wing and a TIE fighter. In one demo, a Luke minifigure produced its own lightsaber sounds. In another, bricks made swooshing and crashing noises when attached to vehicles, while figures reacted when they were “hit.” It felt playful, immersive and instantly understandable.

    LEGO Smart Bricks at CES 2026

    A LEGO piece with a smart brick attached is displayed during a LEGO news conference ahead of the CES tech show Monday, Jan. 5, 2026, in Las Vegas. (AP Photo/Abbie Parr)

    Smart Tags snap into the bricks to control different behaviors, and a quick shake wakes everything up. Pricing starts around $70 and climbs to about $160, with Star Wars sets arriving in March. LEGO hasn’t shared details on battery life yet, but the goal is clear: add interactivity without pushing kids toward screens.

    This feels like LEGO doing tech the right way. You still build with your hands, imagine the story and snap bricks together. The technology simply brings the play to life.

    Availability: Launching March 2026. Expected to be sold through LEGO and major retailers.

    7) Autoliv Foldable Steering Wheel

    This might look like a small change, but it could completely reshape future car interiors.

    Autoliv unveiled the world’s first foldable steering wheel designed for Level 4 autonomous vehicles. When the car switches into self-driving mode, the steering wheel retracts smoothly into the dashboard, opening up the cabin and giving occupants more space to relax, work or just stretch out.

    What makes this impressive is that safety isn’t sacrificed. Autoliv built an adaptive airbag system that changes with the driving mode. When you’re driving manually, the airbag lives in the steering wheel as usual. Once the wheel folds away in autonomous mode, a separate airbag in the instrument panel takes over, keeping protection intact at all times.

    It’s a smart, practical solution to a problem automakers are already facing. If cars don’t always need a steering wheel, why should it always be in the way? Autoliv’s design shows how autonomy isn’t just about software, it’s about rethinking the entire cabin experience.

    Availability: Automotive supplier technology for future vehicles. 

    8) TDM Neo Hybrid Headphones

    These might be the most interesting headphones at CES for one simple reason: they refuse to stay just headphones.

    Tomorrow Doesn’t Matter, better known as TDM, unveiled Neo, a premium on-ear 2-in-1 hybrid headphone that physically twists into a compact Bluetooth speaker. No docking. No accessories. Just a quick rotation, and your personal audio turns into shared sound. Amazing, right?

    The concept might sound a bit gimmicky, but the execution feels solid. The hinge mechanism is sturdy, the transformation is intuitive, and the idea makes a lot of sense in real life. You can listen privately on a train, then flip Neo into speaker mode the moment you meet up with friends.

    TDM describes this as going from “solo to social,” and that’s exactly the appeal. It blurs the line between headphones and portable speakers in a way we haven’t really seen before. For travelers, outdoor users, or anyone who hates carrying multiple audio devices, Neo could be a genuinely very useful hybrid device.

    Availability: TDM will be launching Neo on Kickstarter later this month and will begin shipping in July.

    9) Jackery Solar Mars Bot

    Jackery made waves at CES with the Solar Mars Bot, a mobile solar generator that can move, track sunlight and recharge itself without constant setup.

    The Solar Mars Bot uses AI-enhanced computer vision to navigate on its own, follow its user and reposition throughout the day to capture the strongest available sunlight. Instead of manually adjusting panels or relocating gear, the system handles those decisions automatically. When not in use, its solar panels fold and retract, which helps make storage and transport more practical.

    What sets this system apart is how it blends mobility with energy storage. Unlike fixed solar installations that stay in one place or portable generators that must be carried and recharged by hand, the Solar Mars Bot actively manages its own power intake. It tracks the sun, recharges itself using solar energy and delivers power where it is needed.

    That makes it especially useful for extended power outages, off-grid living, emergency backup and outdoor adventures where access to electricity can change throughout the day. The Solar Mars Bot shows how portable power can become more intelligent, adaptable and hands-off when conditions are unpredictable.

    Availability: Prototype showcased at CES.  

    10) Timeli Personal Safety Device

    Timeli grabbed a lot of attention at CES 2026 with a simple, immediate approach to personal safety. By combining a flashlight, HD video recording, a loud alarm, GPS tracking and live emergency dispatch into one handheld device, it earned a CES 2026 Innovation Awards Honoree and plenty of interest on the show floor.

    Instead of opening an app or tapping through menus, Timeli relies on muscle memory. A quick press turns on a powerful flashlight and starts recording video. If a situation escalates, pressing and holding the SOS button triggers a full safety sequence. The alarm sounds, live video begins streaming, GPS coordinates lock in and two-way communication connects directly to emergency dispatch over cellular service.

    That live connection matters. Timeli works with RapidSOS to give dispatchers real-time video and location data. This added clarity helps responders understand what is happening faster and send the right help sooner. Studies show video verified emergencies can cut response times dramatically, while also reducing false alarms.

    Timeli works even without a phone. Built-in cellular, GPS, Wi-Fi and Bluetooth allow it to operate on its own or alongside the companion app for iOS and Android. Users can adjust video quality, light brightness and alarm volume to match their needs. Cloud video storage and alerts add another layer of reassurance.

    WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANT

    The design stays practical. Timeli is about the size and weight of a smartphone, so it fits easily in a pocket, purse or backpack. Battery life supports long standby time, extended daily use and several hours of active protection. It even doubles as a power bank, while reserving enough charge to stay ready for emergencies.

    Availability: Priced at $249 for preorder through timeli.com. Timeli includes a year of professional monitoring before transitioning to a monthly subscription.

    Honorable mentions: CES 2026 products worth checking out 

    These products also stood out on the CES 2026 show floor, highlighting smart design choices and meaningful innovation that point to the future of consumer tech.

    ASUS Zenbook Duo (2026)

     ASUS reimagined portable productivity with the 2026 Zenbook Duo. This laptop snaps two 14-inch 3K ASUS Lumina OLED touchscreens together into a single mobile workstation you can carry with one hand.

    The dual-screen setup lets you keep a main project open on one display while chats, calls or reference material live on the other. That alone cuts down on constant app switching. The OLED panels deliver rich color, deep blacks, smooth motion and built-in eye care that makes long sessions easier on your eyes.

    ASUS also upgraded what you hear. A new six-speaker system replaces the previous two-speaker design, creating fuller, more immersive audio for movies, music, and calls. Everything is wrapped in a Ceraluminum ceramic finish that resists fingerprints and scratches while feeling premium in hand.

    Availability: Expected early 2026. Pricing has not been announced.

    SpotOn GPS Fence Nova Edition

    SpotOn focused on precision and reliability with the launch of the SpotOn GPS Fence Nova Edition. This is a GPS dog fence system designed to create virtual fences anywhere, from small yards to massive rural properties, with no subscription required.

    What sets Nova apart is its advanced antenna and receiver system. SpotOn uses a dual-band, dual-feed active antenna paired with a dual-band receiver that reduces GPS drift by up to 40% and delivers accuracy up to eight times better than competing systems. In third-party testing, it achieved 100% reliable containment.

    Owners can create unlimited fences by walking boundaries, drawing them in the app, or placing GPS fenceposts automatically. The collar also includes intelligent audio cues, optional static correction, custom voice commands, LED prompts and sizing that grows with your dog. If a dog ever leaves the fence, tracking tools are available through the app or SpotOn support.

    Availability: Available in the US and Canada for $999. 

    Lenovo Legion Go Powered by SteamOS

    Lenovo took handheld gaming seriously with the Legion Go powered by SteamOS. This is the most powerful Legion handheld to ship natively with SteamOS, blending desktop-class performance with console-like simplicity.

    It features an 8.8-inch PureSight OLED display and can be configured with up to an AMD Ryzen Z2 Extreme processor, up to 32GB of LPDDR5X memory, and up to 2TB of PCIe SSD storage with expansion via microSD. SteamOS is tuned for gamepad controls and quick access, with features like fast suspend and resume, cloud saves, Steam Chat and built-in game recording.

    The result feels less like a mini PC and more like a true console you can carry. You get instant access to your Steam library without juggling operating systems or launchers.

    Availability: On sale June 2026. Starting price is $1,199.

    SanDisk Optimus GX 7100M NVMe SSD

    SanDisk introduced a new internal drive brand at CES, and the Optimus GX 7100M is its first standout. Built for handheld gaming consoles and thin and light laptops, this PCIe 4.0 NVMe SSD delivers speeds up to 7,250 MB per second.

    The drive is available in capacities up to 2TB, giving gamers faster load times, more room for large libraries and smoother performance on the go. It is designed for devices that support an M.2 2230 slot, including popular handheld consoles and compact laptops.

    This launch also marks the debut of the SanDisk Optimus name, which will replace the company’s internal SSD lineup for gamers, creators and professionals moving forward.

    Availability: Expected early spring 2026. Pricing will be announced closer to release.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    CES 2026 made one thing clear. Tech companies are taking bigger swings than ever. Some of these products feel close to becoming part of everyday life. Others may stay experimental for years. That’s what makes CES so fascinating. It gives us an early look at where technology could be headed and sparks conversations about what we actually want in our homes, cars and daily routines.

    Which CES 2026 showstopper impressed you the most? Why? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Hackers abuse Google Cloud to send trusted phishing emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals have found a clever new way to get phishing emails straight into inboxes.

    Instead of spoofing brands, they are abusing real cloud tools that people already trust. Security researchers say attackers recently hijacked a legitimate email feature inside Google Cloud

    The result was thousands of phishing messages that looked and felt like normal Google notifications. Many slipped past spam filters with ease.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – when you join my CYBERGUY.COM newsletter.

    How this Google Cloud phishing attack worked

    At the center of the campaign was Google Cloud Application Integration. This service allows businesses to send automated email notifications from workflows they build. Attackers exploited the Send Email task inside that system. Because the messages came from a real Google address, they appeared authentic to both users and security tools. 

    According to Check Point, a global cybersecurity firm that tracks and analyzes large-scale threat campaigns, the emails were sent from a legitimate Google-owned address and closely matched Google’s notification style. Fonts, wording, and layout all looked familiar. Over a two-week period in December 2025, attackers sent more than 9,000 phishing emails targeting roughly 3,200 organizations across the U.S., Europe, Canada, Asia Pacific, and Latin America.

    Attackers used trusted Google Cloud infrastructure to route victims through multiple redirects before revealing the scam. (Thomas Fuller/SOPA Images/LightRocket via Getty Images)

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    Why Google phishing emails were so convincing

    The messages looked like routine workplace alerts. Some claimed you had received a voicemail. Others said you were granted access to a shared document, like a Q4 file. That sense of normalcy lowered suspicion. Many people are used to seeing these exact messages every day. Even more concerning, the emails bypassed common protections like SPF and DMARC because they were sent through Google-owned infrastructure. To email systems, nothing looked fake.

    What happens after you click

    The attack did not stop at the email. Once a victim clicked the link, they were sent to a page hosted on storage.cloud.google.com. That added another layer of trust. From there, the link redirected again to googleusercontent.com. Next came a fake CAPTCHA or image check. This step blocked automated security scanners while letting real users continue. After passing that screen, victims landed on a fake Microsoft login page hosted on a non-Microsoft domain. Any credentials entered there were captured by the attackers.

    Who was targeted in the Google Cloud phishing attack

    Check Point says the campaign focused heavily on industries that rely on automated alerts and shared documents. That included manufacturing, technology, finance, professional services, and retail. Other sectors like healthcare, education, government, energy, travel and media were also targeted. These environments see constant permission requests and file-sharing notices, which made the lures feel routine.

    “We have blocked several phishing campaigns involving the misuse of an email notification feature within Google Cloud Application Integration,” a Google spokesperson told Cyberguy. “Importantly, this activity stemmed from the abuse of a workflow automation tool, not a compromise of Google’s infrastructure. While we have implemented protections to defend users against this specific attack, we encourage continued caution as malicious actors frequently attempt to spoof trusted brands. We are taking additional steps to prevent further misuse.”

    The incident demonstrates how attackers can weaponize legitimate cloud automation tools without resorting to traditional spoofing.

    Ways to stay safe from trusted-looking phishing emails

    Phishing emails are getting harder to spot, especially when attackers abuse real cloud platforms like Google Cloud. These steps help reduce risk when emails look familiar and legitimate.

    1) Slow down before acting on alerts

    Attackers rely on urgency. Messages about voicemails, shared files or permission changes are designed to make you click fast. Pause before taking action. Ask yourself whether you were actually expecting that alert. If not, verify it another way.

    2) Inspect links before you click

    Always hover over links to preview the destination domain. In this campaign, links jumped across multiple trusted-looking Google domains before landing on a fake login page. If the final destination does not match the service asking you to sign in, close the page immediately.

    3) Treat file access and permission emails with caution

    Shared document alerts are a favorite lure because they feel routine at work. If an email claims you were granted access to a file you do not recognize, do not click directly from the message. Instead, open your browser and sign in to Google Drive or OneDrive manually to check for new files.

    Microsoft computer on table.

    The final step led users to a fake Microsoft login page, where entered credentials were silently stolen. (Stack Social)

    4) Use a password manager to catch fake login pages

    Password managers can be a strong last line of defense. They will not autofill credentials on fake Microsoft or Google login pages hosted on non-official domains. If your password manager refuses to fill in a login, that is a red flag worth paying attention to.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

    5) Run strong antivirus software with phishing protection

    Modern antivirus tools do more than scan files. Many now detect malicious links, fake CAPTCHA pages, and credential harvesting sites in real time. Strong antivirus software can block phishing pages even after a click, which matters in multi-stage attacks like this one.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Reduce your exposure with a data removal service

    Phishing campaigns often succeed because attackers already know your email, employer or role. That information is commonly pulled from data broker sites. A data removal service helps remove your personal information from these databases, making it harder for attackers to craft convincing, targeted emails.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Enable two-factor authentication (2FA) everywhere

    Even if attackers steal your password, two-factor authentication (2FA) can stop them from accessing your account. Use app-based authentication or hardware keys when possible, especially for work email, cloud storage, and Microsoft accounts.

    8) Report suspicious emails immediately

    If something feels off, report it. Flag suspicious Google or Microsoft alerts to your IT or security team so they can warn others. Early reporting can stop a phishing campaign before it spreads further inside an organization.

    Is it safe to unsubscribe from spam you didn’t sign up for?

    Google phishing emails looked like routine workplace alerts. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaways

    This campaign highlights a growing shift in phishing tactics. Attackers no longer need to fake brands when they can abuse trusted cloud services directly. As automation becomes more common, security awareness matters more than ever. Even familiar emails deserve a second look, especially when they push urgency or ask for credentials.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    If a phishing email comes from a real Google address, how confident are you that you would spot it before clicking? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Apple patches two zero-day flaws used in targeted attacks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple has released emergency security updates to fix two zero-day vulnerabilities that attackers actively exploited in highly targeted attacks. 

    The company described the activity as an “extremely sophisticated attack” aimed at specific individuals. Although Apple did not identify the attackers or victims, the limited scope strongly suggests spyware-style operations rather than widespread cybercrime.

    Both flaws affect WebKit, the browser engine behind Safari and all browsers on iOS. As a result, the risk is significant. In some cases, simply visiting a malicious webpage may be enough to trigger an attack.

    Below, we break down what these vulnerabilities mean and explain how you can better protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Apple released emergency updates after confirming two zero-day WebKit flaws were actively exploited in targeted attacks. (Reuters/Thomas Peter/File Photo)

    NEW IPHONE SCAM TRICKS OWNERS INTO GIVING PHONES AWAY

    What Apple says about the zero-day vulnerabilities

    The two vulnerabilities are tracked as CVE-2025-43529 and CVE-2025-14174, and Apple confirmed that both were exploited in the same real-world attacks. According to Apple’s security bulletin, the flaws were abused on versions of iOS released before iOS 26, and the attacks were limited to “specific targeted individuals.”

    CVE-2025-43529 is a WebKit use-after-free vulnerability that can lead to arbitrary code execution when a device processes maliciously crafted web content. To put it simply, it allows attackers to run their own code on a device by tricking the browser into mishandling memory. Apple credited Google’s Threat Analysis Group with discovering this flaw, which is often a strong indicator of nation-state or commercial spyware activity.

    The second flaw, CVE-2025-14174, is also a WebKit issue, this time involving memory corruption. While Apple describes the impact as memory corruption rather than direct code execution, these types of bugs are often chained together with other vulnerabilities to fully compromise a device. Apple says this issue was discovered jointly by Apple and Google’s Threat Analysis Group.

    In both cases, Apple acknowledged that it was aware of reports confirming active exploitation in the wild. That language is important because Apple typically reserves it for situations where attacks have already occurred, not just theoretical risks. The company says it addressed the bugs through improved memory management and better validation checks, without sharing deeper technical details that could help attackers replicate the exploits.

    Devices affected and signs of coordinated disclosure

    Apple has released patches across its supported operating systems, including the latest versions of iOS, iPadOS, macOS, Safari, watchOS, tvOS and visionOS.

    According to Apple’s advisory, affected devices include iPhone 11 and newer models, multiple generations of iPad Pro, iPad Air from the third generation onward, the eighth-generation iPad and newer and the iPad mini starting with the fifth generation. This covers the vast majority of iPhones and iPads still in active use today.

    Apple has patched the flaws across its entire ecosystem. Fixes are available in iOS 26.2 and iPadOS 26.2, iOS 18.7.3 and iPadOS 18.7.3, macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2 and Safari 26.2. Because Apple requires all iOS browsers to use WebKit under the hood, the same underlying issue also affected Chrome on iOS.

    6 steps you can take to protect yourself from such vulnerabilities

    Here are six practical steps you can take to stay safe, especially in light of highly targeted zero-day attacks like this.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    Safari and Chrome app

    Because WebKit powers Safari and all iOS browsers, even a malicious webpage may be enough to put unpatched devices at risk. (Jakub Porzycki/NurPhoto via Getty Images)

    1) Install updates as soon as they drop

    This sounds obvious, but it matters more than anything else. Zero-day attacks rely on people running outdated software. If Apple ships an emergency update, install it the same day if you can. Delaying updates is often the only window attackers need. If you tend to forget about updates, let your devices handle them for you. Enable automatic updates for iOS, iPadOS, macOS and Safari. That way, you are protected even if you miss the news or are traveling.

    2) Be careful with links, even from people you know

    Most WebKit exploits start with malicious web content. Avoid tapping on random links sent over SMS, WhatsApp, Telegram or email unless you are expecting them. If something feels off, open the site later by typing the address yourself.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    3) Use a lockdown-style browsing setup

    If you are a journalist, an activist or someone who deals with sensitive information, consider reducing your attack surface. Use Safari only, avoid unnecessary browser extensions, and limit how often you open links inside messaging apps.

    4) Turn on Lockdown Mode if you feel at risk

    Apple’s Lockdown Mode is designed specifically for targeted attacks. It restricts certain web technologies, blocks most message attachments, and limits attack vectors commonly used by spyware. It is not for everyone, but it exists for situations like this.

    5) Reduce your exposed personal data

    Targeted attacks often start with profiling. The more personal data about you that is floating around online, the easier it is to pick you as a target. Removing data from broker sites and tightening social media privacy settings can lower your visibility.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    An overhead view of an Apple store

    Apple urges users to install the latest updates, especially those who may face higher-risk, targeted threats. (Cheng Xin/Getty Images)

    6) Pay attention to unusual device behavior

    Unexpected crashes, overheating, sudden battery drain or Safari closing on its own can sometimes be warning signs. These do not automatically mean your device is compromised. However, if something feels consistently wrong, updating immediately and resetting the device is a smart move.

    Kurt’s key takeaway

    Apple has not shared details about who was targeted or how the attacks were delivered. However, the pattern fits closely with past spyware campaigns that focused on journalists, activists, political figures and others of interest to surveillance operators. With these patches, Apple has now fixed seven zero-day vulnerabilities that were exploited in the wild in 2025 alone. That includes flaws disclosed earlier this year and a backported fix in September for older devices.

    Have you installed the latest iOS or iPadOS update yet, or are you still putting it off? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • New iPhone scam tricks owners into giving phones away

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Getting a brand-new iPhone should be a moment you enjoy. You open the box. You power it on. Everything feels secure. Unfortunately, scammers know that moment too. 

    Over the past few weeks, we’ve heard from a number of people who received unexpected phone calls shortly after activating a new iPhone. The callers claimed to be from a major carrier. They said a shipping mistake was made. They insisted the phone needed to be returned right away. One message stood out because it shows exactly how convincing and aggressive this scam can be.

    “Somebody called me (the call said it was from Spectrum) and told me they sent the wrong iPhone and needed to replace it. I was to rip off the label on the box, tape it up and set it on my porch steps. FedEx was going to pick it up and they’d put a label on it. And just for my trouble, he’d send me a $100 gift card! However, the guy was just too anxious. He called me again at 7 am to make sure I would follow his instructions. Right after that, I picked up my box on the steps and called Spectrum, who confirmed it was a scam. There are no such things as refurbished i17 phones because they’re brand new. I called the guy back, said a few choice words and hung up on him. Since then, they have called at least twice for the same thing. Spectrum should be warning its customers!”

    — Kris L, Columbus, Montana

    That second early morning call was the giveaway. Pressure is the scammer’s favorite tool.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

    Scammers often strike right after a new iPhone purchase, using urgency and fake carrier calls to catch you off guard before you have time to verify. (Kurt “CyberGuy” Knutsson)

    How the new iPhone replacement scam works

    This scam relies on timing and pressure. First, criminals focus on people who recently bought a new iPhone. That information often comes from data-broker sites, leaked purchase data or marketing lists sold online. Next, scammers spoof a carrier phone number. As a result, the call appears legitimate. They sound confident and informed because they already know the device model you ordered.

    Once the call begins, the story moves quickly. The scammer claims a shipping mistake occurred. Then they insist the phone must be returned right away. To reinforce urgency, they say a courier is already scheduled. If you follow the instructions, you hand over a brand-new iPhone. At that point, the device is gone. The scammer either resells it or strips it for parts. By the time you realize something is wrong, recovery is unlikely.

    Why this scam feels so believable

    This scam copies real customer service processes. Carriers do ship replacement phones. FedEx does handle returns. Gift cards are often used as apologies. Scammers blend those facts together and add urgency. They count on you acting before you verify. They also rely on one risky assumption, that a phone call that looks real must be real.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    iphone

    By spoofing trusted phone numbers and knowing details about your device, criminals make these calls feel real enough to push you into acting fast. (Kurt “CyberGuy” Knutsson)

    Red flags that give this scam away

    Once you know what to watch for, the warning signs are clear.

    • Unsolicited calls about returns you did not request

    • Pressure to act fast

    • Instructions to leave a phone outside

    • Promises of gift cards for cooperation

    • Follow-up calls to rush you

    Legitimate carriers do not handle returns this way.

    THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

    Woman on her phone while sitting down.

    Once a phone is handed over, it is usually resold or stripped for parts, leaving victims with no device and little chance of recovery. (Kurt “CyberGuy” Knutsson)

    Ways to stay safe from iPhone return scams

    Protecting yourself starts with slowing things down. Scammers rely on speed and confusion. You win by pausing and verifying.

    1) Never return a device based on a phone call alone

    Hang up and contact the carrier using the number on your bill or the official website. If the issue is real, they will confirm it.

    2) Do not leave electronics outside for pickup

    Legitimate returns use tracked shipping labels tied to your account. Carriers do not ask you to leave phones on porches or doorsteps.

    3) Be skeptical of urgency

    Scammers rush you on purpose. Pressure shuts down careful thinking. Any demand for immediate action should raise concern.

    4) Use a data removal service

    Scammers often know what phone you bought because your personal data is widely available online. Data removal services help reduce your exposure by removing your information from data broker sites that criminals rely on. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Install strong antivirus software

    Strong antivirus software adds another layer of protection. Many antivirus tools help block scam calls, warn about phishing links and alert you to suspicious activity before damage is done.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android, & iOS devices at Cyberguy.com.

    6) Save messages and call details

    Keep voicemails, phone numbers and timestamps. This information helps carriers warn other customers and spot repeat scams.

    7) Share this scam with others

    Criminals reuse the same script again and again. A quick warning to friends or family could stop the next victim.

    Kurt’s key takeaways

    Scams aimed at new iPhone owners are getting more targeted and more aggressive. Criminals are timing their calls carefully and copying real carrier language. The simplest defense still works best. Verify before you act. If a call pressures you to rush or hand over a device, pause and contact the company directly. That one step can save you hundreds of dollars and a major headache.

    If a carrier called you tomorrow claiming a mistake with your new phone, would you verify first or would urgency take over? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Password manager fined after major data breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Any data breach affecting 1.6 million people is serious. It draws even more attention when it involves a company trusted to guard passwords. That is exactly what happened to LastPass.

    The U.K. Information Commissioner’s Office has fined LastPass about $1.6 million for security failures tied to its 2022 breach. Regulators say those failures allowed a hacker to access a backup database and put users at risk.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    CHECK IF YOUR PASSWORDS WERE STOLEN IN HUGE LEAK

    Why the LastPass breach still matters

    LastPass is one of the most widely used password managers in the world. It serves more than 20 million individual users and around 100,000 businesses. That popularity also makes it an attractive target for cybercriminals.

    The U.K. Information Commissioner’s Office fined LastPass for security failures tied to its 2022 breach. (LaylaBird/Getty Images)

    In 2022, LastPass confirmed that an unauthorized party accessed parts of its customer information through a third-party cloud storage service. While the incident initially raised alarms, the long-term impact has taken time to fully surface.

    The ICO now says the breach affected about 1.6 million U.K. users alone. That scope played a major role in the size of the fine.

    What regulators say went wrong

    According to the ICO, LastPass failed to put strong enough technical and security controls in place. Those gaps made it possible for attackers to reach a backup database that should have been better protected.

    The regulator added that LastPass promises to help people improve security, but failed to meet that expectation. As a result, users were left exposed even if their passwords were not directly cracked.

    Were passwords exposed or decrypted?

    There is still no evidence that attackers decrypted customer passwords. That point matters.

    Despite the breach, security experts continue to recommend password managers for most people. Storing unique, strong passwords in an encrypted vault is still far safer than reusing weak passwords across accounts.

    As one expert noted, modern breaches often succeed after identity access rather than password cracking alone. Once attackers get a foothold, the damage can spread quickly.

    Illustration of password login on laptop

    Although attackers accessed a backup database, there is no evidence that customer passwords were decrypted. (Kurt “CyberGuy” Knutsson)

    Why the LastPass fine is a wake-up call for cybersecurity

    The ICO called the LastPass fine a turning point. It reinforces the idea that security is about governance, staff training and supplier risk as much as software.

    Users have a right to expect that companies handling sensitive data take every reasonable step to protect it.

    Breaches may be inevitable, but weak safeguards are not.

    LastPass on the UK data breach

    We reached out to LastPass for comment on the UK fine, and a spokesperson provided CyberGuy with the following statement: 

    “We have been cooperating with the UK ICO since we first reported this incident to them back in 2022. While we are disappointed with the outcome, we are pleased to see that the ICO’s decision has recognized many of the efforts we have already taken to further strengthen our platform and enhance our data security measures. Our focus remains on delivering the best possible service to the 100,000 businesses and millions of individual consumers who continue to rely on LastPass.”

    MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS

    How to protect yourself after a password manager breach

    Breaches like this are a reminder that security requires layers. No single tool can protect everything on its own.

    1) Use a strong password manager correctly

    Keep using a reputable password manager. Set a long, unique master password and enable two-factor authentication. Avoid reusing your master password anywhere else.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Rotate sensitive passwords

    Change passwords for financial accounts, email accounts and work logins. Focus on services that could cause real damage if compromised.

    3) Lock down your email

    Your email account is the key to password resets. Use a strong password, two-factor authentication and recovery options you control. 

    4) Reduce your exposed personal data

    Data brokers collect and sell personal information that criminals use for targeting. A data removal service can help reduce what is publicly available about you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Woman Types on Laptop Computer

    The fine sends a warning to the entire cybersecurity industry. Companies that handle sensitive data must protect it with strong safeguards and oversight. (REUTERS/Andrew Kelly)

    5) Watch for phishing attempts and use strong antivirus software 

    After major breaches, scammers follow. Be cautious of emails claiming urgent account problems or asking for verification details. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Keep devices updated

    Install updates for your operating system, browser and security tools. Many attacks rely on known vulnerabilities that updates already fix.

    Kurt’s key takeaways

    The fine against LastPass is about more than one company. It highlights how much trust we place in tools that manage our digital lives. Password managers remain a smart security choice. Still, this case shows why you should stay alert even when using trusted brands. Strong settings, regular reviews and layered protection matter more than ever. In the end, security works best when companies and we share the responsibility. Tools help, but habits and awareness finish the job.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Do you believe companies are doing enough to protect user data, or should regulators step in more often? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Smart home hacking fears: What’s real and what’s hype

    [ad_1]

    NEWYou can now listen to Fox News articles!

    News of more than 120,000 Korean home cameras being hacked recently can shake your confidence in connected devices. Stories like that make you picture cybercriminals breaking into homes with high-tech gadgets and spying on families through smart cams. That reaction is natural. But most of these headlines leave out important context that can help you breathe a little easier.

    First, smart home hacking is rare. Most incidents stem from weak passwords or from someone you already know, rather than from a stranger with advanced tools. Today’s smart home brands push out updates to block intrusion attempts, including patches for new AI-related vulnerabilities that often make headlines.

    Let’s break down what actually puts a smart home at risk and what you can do to stay safe.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    SMART HOME DEVICE MAKER EXPOSES 2.7 BILLION RECORDS IN HUGE DATA BREACH

    Smart home hacking headlines can look scary, but most threats come from weak passwords rather than targeted attacks. (Kurt “CyberGuy” Knutsson)

    Why criminals are not circling your house with hacking gear

    Many people imagine cybercriminals driving around neighborhoods with scanners that look for vulnerable devices. In reality, Wi-Fi ranges and technical limits make that nearly impossible. Even high-profile hacks of casinos and large companies do not translate to criminals trying to breach residential smart locks for petty theft.

    Burglars still choose low-tech methods. They look for unlocked doors or easy entry points. They avoid complicated hacking tools because the payoff is too small to justify the work.

    So how do smart homes get hacked? Here are the real attack paths and how they work.

    Common ways smart homes get attacked

    Smart homes face a handful of digital threats, but most come from broad automated attacks rather than someone targeting your house.

    1) Automated online attacks

    Bots constantly scan the internet for weak passwords and outdated logins. These brute force attacks throw billions of guesses at connected accounts. When one works, the device becomes part of a botnet used for future attacks. That doesn’t mean someone is targeting your home on purpose. Bots search for anything they can breach. A strong password stops them.

    2) Phishing attempts

    Some phishing emails impersonate smart home brands. Clicking a fake link or sharing login details can open the door for criminals to reach your network. Even a general phishing attack can expose your Wi-Fi info and lead to broader access.

    3) Data breaches from IoT companies

    Hackers often go after company servers, not individual homes. These breaches may expose account details or stored camera footage kept in the cloud. Criminals may sell that data to others who might try to use it. It rarely leads to direct smart home hacking, but it still puts your accounts at risk.

    4) Attacks on device communications

    Early IoT devices had vulnerabilities that allowed criminals to intercept the data they sent and received. (IoT stands for Internet of Things and includes everyday connected gadgets like smart plugs, smart thermostats or Wi-Fi cameras.) Modern products now use stronger encryption, making these attacks extremely rare in the real world.

    5) Bluetooth malware

    Bluetooth issues still pop up from time to time, but most modern smart home devices use stronger security than older models. When a new flaw is discovered, companies usually release fast patches, which is why it’s important to keep your apps and gadgets updated. Today, these Bluetooth risks rarely lead to real smart home problems.

    ADT HACKED: IS YOUR HOME SECURITY SYSTEM REALLY SECURE?

    Who actually tries to hack smart homes

    When hacking happens, it usually involves someone with some level of access already. In many cases, no technical hack occurs at all.

    Amazon Echo Show on kitchen counter

    Simple steps like stronger Wi-Fi security and regular updates go a long way toward protecting connected devices. ( Al Drago/Bloomberg via Getty Images)

    A relation or acquaintance

    Exes, former roommates or relatives often know login info. They may try to spy or cause trouble. Update all passwords if you suspect this.

    Untrustworthy employees

    There have been cases where employees at security companies snooped through camera feeds. This isn’t remote hacking. It’s a misuse of internal access.

    Data thieves

    They steal account lists and login details to sell. Others may buy those lists and try to log in using exposed credentials.

    Blackmail scammers

    Some send fake messages claiming they hacked your cameras and threaten you. Most of these scams rely on lies because they have no access at all.

    Foreign governments

    Some banned foreign manufacturers pose surveillance risks. The FCC maintains a list of companies that cannot sell security tech in the U.S. Always check that list before buying unfamiliar brands.

    Smart home devices that can raise concerns

    Some everyday gadgets create small but real entry points for trouble, especially when their settings or security features get overlooked.

    Smart fridges

    They often arrive with default passwords that owners forget to change. Older models may use outdated IoT protocols with weaker protections. Many do not get frequent security updates.

    Wi-Fi baby monitors

    Wi-Fi offers convenience but also adds risk. Weak routers and poor passwords can allow strangers to access a feed. Closed network monitors avoid Wi-Fi risks but still face basic signal interception attempts.

    Smart bulbs

    During setup, some bulbs broadcast an open temporary network. If a criminal joins at the exact right moment, they could reach the rest of your devices. These cases are rare but possible in theory.

    Smart speakers

    Voice ordering can be exploited by curious kids or guests. Set a purchase PIN so no one can order items with simple voice commands.

    Steps to stay safe in your smart home

    Strong habits and a few simple tools can block the most common threats that target connected homes.

    1) Use strong passwords

    Choose long, complex passwords for your Wi-Fi router and smart home apps. A password manager makes this simple. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    2) Turn on two-factor authentication

    Brands like Ring and Blink already use it. Add two-factor authentication (2FA) to every account that supports it.

    3) Use a reputable data removal service

    Removing your personal details from data broker sites helps prevent criminals from using leaked or scraped information to access your accounts or identify your home.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Add strong antivirus software on phones and computers

    Strong antivirus protection blocks malware that could expose login details or give criminals a path into the devices that manage your smart home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    A gray Amazon Echo device on a dark wooden table

    Choosing brands with clear privacy practices and local storage options helps keep your home and data in your control. (CyberGuy.com)

    5) Choose brands with strong encryption

    Pick smart home products from companies that explain how they protect your data and use modern encryption to lock down your footage and account details. Look for brands that publish clear security policies, offer regular updates and show how they keep your information private.

    6) Store sensitive footage locally

    Pick security cameras that let you save video directly to an SD card or a home hub, rather than uploading it to the cloud. This keeps your recordings under your control (and helps protect them if a company server is breached). Many cameras from trusted lines support local storage, so you do not have to rely on a company server.

    7) Keep devices updated

    Install firmware updates quickly. Enable automatic updates when possible. Replace older gadgets that no longer receive patches.

    8) Secure your Wi-Fi

    Your router is the front door to your smart home, so lock it down with a few simple tweaks. Use WPA3 encryption if your router supports it, rename the default network, and install firmware updates to patch security holes. For a full step-by-step guide on tightening your home network, check out our instructions in “How to set up a home network like a pro.”

    Kurt’s key takeaways

    Smart homes feel intimidating when scary headlines surface. But when you look at real-world data, you see far fewer risks than the stories suggest. Most attacks rely on weak passwords, poor router settings or old devices. With the right habits, your smart home can stay both convenient and secure.

    What smart home risk concerns you most, and what part of your setup makes you nervous? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Android Emergency Live Video gives 911 eyes on the scene

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Holiday travel and winter storms create risky moments for drivers and families. Stress rises fast during emergencies, and describing the scene to 911 can feel overwhelming. 

    Now, a new Android feature closes that gap by providing live visual information that helps responders act with speed and accuracy.

    If you use an iPhone, Apple offers a similar tool through its Emergency SOS Live Video feature. 

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

    Android Emergency Live Video gives 911 a secure live view of the scene, so responders understand what is happening right away. (Cyberguy.com)

    What Android Emergency Live Video does

    Google is rolling out Android Emergency Live Video to give dispatchers a secure view of the scene during an active call or text. A dispatcher can request a live video stream through your phone when it is safe for you to share it. With a single tap, you can stream real-time video that helps responders understand what is happening.

    This can help during car accidents, medical emergencies or fast-moving hazards such as wildfire conditions. Live video can also help dispatchers guide you through steps that save lives, such as CPR, until responders arrive.

    APPLE NOW LETS YOU ADD YOUR PASSPORT TO YOUR PHONE’S WALLET

    How the Android Emergency Live Video feature works

    Android designed this tool to work with no setup. When you call or text 911, the dispatcher reviews the situation. If they decide video would help, they will send a request to your phone. You see a clear prompt that lets you choose whether to start the secure stream. The feature uses encryption and gives you full control. You can stop sharing at any moment.

    The feature works on Android phones running Android 8 or newer with Google Play services. It is rolling out across the U.S. and select regions in Germany and Mexico. Google plans to expand coverage with more public safety partners.

    How to use Emergency Live Video on Android

    You cannot turn this feature on in advance. It appears only during an active 911 call or text.

    1) Call or text 911 on your Android phone. The dispatcher reviews your situation.

    2) Watch for a request on your screen. If the dispatcher decides live video will help, they send a prompt to your device.

    3) Tap the notification that appears. You will see a clear message asking if you want to share live video.

    4) Choose Share video to start streaming. This opens your camera and begins a secure live feed.

    5) Tap Stop sharing at any time. You stay in control the entire time and can end the video at any time.

    android microsoft

    With one tap, you can choose to share real-time video during a 911 call or text, which gives dispatchers the clarity they need to guide you. (CyberGuy.com)

    Why Emergency Live Video on Android matters now

    Emergencies create confusion. Sharing details verbally takes time and can lead to miscommunication. Video removes guesswork. Responders gain clarity in seconds, which can speed up help and improve outcomes. This tool builds on Android’s safety features, including Satellite SOS, Fall Detection and Car Crash Detection.

    NEW ANDROID ATTACK TRICKS YOU INTO GIVING DANGEROUS PERMISSIONS

    Alastair Breeze, a Software Engineer for Android, tells CyberGuy that the team built this feature with one goal in mind. “Providing people peace of mind is at the core of Android’s safety mission. Android Emergency Live Video gives you the ability to securely share real-time video to provide dispatchers the critical eyes-on-scene context they need to assist in emergencies.”

    What this means to you

    If you carry an Android phone, this feature adds another layer of protection during moments that demand quick action. You stay in control of when the video is shared. You also get a simple way to show the situation when describing it feels impossible. Faster clarity can lead to faster help, which can shape how an emergency ends.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com. 

    Santa Rosa County Emergency Communication Center

    The feature works on Android phones running Android 8 or newer and helps responders act faster during emergencies when seconds matter. (Tony Giberson/tgiberson@pnj.com / USA TODAY)

    Kurt’s key takeaways

    Android Emergency Live Video brings real-time awareness to moments when every second matters. It gives responders a clear view, so they can guide you through urgent steps if necessary. Most of all, it adds peace of mind during situations no one plans for.

    Would you feel comfortable sharing live video during an emergency if it helped responders reach you faster? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Fully implantable brain chip aims to restore real speech

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A U.S. neurotechnology startup called Paradromics is gaining momentum in the fast-growing field of brain-computer interfaces. The FDA has approved its first human trial built to test whether its fully implantable device can restore speech for people with paralysis. This milestone gives the Austin company a strong position in a competitive space, shaping the future of neural technology.

    Paradromics received Investigational Device Exemption status for the Connect-One Early Feasibility Study using its Connexus BCI. It is the first approved study to explore speech restoration with a fully implantable system. The research team wants to evaluate safety and see how well the device converts neural activity into text or a synthesized voice.

    Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    BRAIN IMPLANT TURNS THOUGHTS INTO DIGITAL COMMANDS

    How the brain implant works

    The implant uses hundreds of tiny electrodes to capture detailed signals from the motor cortex where the brain forms sounds and shapes words. (Paradromics)

    Paradromics developed a fully implantable speech-focused brain device called the Connexus BCI. The company designed it to capture detailed neural signals that support real-time communication for people who cannot speak. This system uses high-resolution electrodes and an implanted wireless setup to record activity from individual neurons involved in forming speech.

    The Connexus BCI has a titanium body with more than 400 platinum-iridium electrodes placed just below the brain’s surface. Each electrode is thinner than a human hair. These electrodes record neural firing patterns in the motor cortex, where the brain controls the lips, tongue and larynx.

    Surgeons place the implant under the skin and connect it with a thin cable to a wireless transceiver in the chest. That transceiver sends data through a secure optical link to a second transceiver worn on the body. The external unit powers the system with inductive charging similar to wireless phone chargers.

    The collected signals then move to a compact computer that runs advanced language models. It analyzes the neural activity and converts it into text or into a synthetic voice based on the user’s past recordings.

    Inside the Paradromics BCI human trial

    The trial begins with two participants. Each person will receive one 7.5-millimeter-wide electrode array placed 1.5 millimeters into the part of the motor cortex that controls the lips, tongue and larynx. During training sessions, the volunteers will imagine speaking sentences while the device learns the neural signatures of each sound.

    This is the first BCI trial that formally targets real-time synthetic voice generation. The study will also test whether the system can detect imagined hand movements and translate those signals into cursor control.

    If early results meet expectations, the trial could expand to ten people. Some participants may receive two implants to capture a richer set of signals.

    HOW A TINY RETINAL IMPLANT IS HELPING PEOPLE REGAIN THEIR SIGHT

    Cyberguy reached out to Paradromics for comment and received the following statement:

    A man with ALS uses a brain-computer interface to operate an iPad.

    Researchers are testing whether Paradromics’ fully implantable brain device can turn neural activity into real-time speech for people with paralysis. (Synchron)

    “Communication is a fundamental human need. For people with severe motor impairment, the inability to express themselves with family and friends or request basic needs makes living difficult. The FDA approved clinical study for the Connexus Brain-Computer Interface is the first step toward a future where commercially available neurotech can restore the ability to naturally speak and seamlessly use a computer.

    The fully implanted Connexus BCI is designed to record brain signals from individual neurons, capturing the massive amounts of data required for high performance applications like speech restoration and complex mouse and keyboard hand actions. Built from proven medical-grade materials, Connexus BCI is engineered for daily long-term use, backed by more than three years of stable pre-clinical recordings.

    How Paradromics compares to other BCI companies

    Paradromics joins Synchron and Neuralink at the front of the implanted BCI race. Synchron uses a stent-like device placed in a blood vessel to record broad neural patterns. Neuralink uses flexible threads with many recording sites to capture high-bandwidth signals from individual neurons.

    Paradromics sits in the middle of these two approaches by using a fully implantable system that still captures single-neuron detail. Researchers believe this design may offer long-term stability for everyday communication.

    What this means for you

    This breakthrough could make a major difference for people who have lost their ability to speak after ALS, stroke or spinal cord injury. A system that converts thought into speech could help them talk in real time and regain independence. It may also allow hands-free computer control, which can improve daily living.

    If the trial succeeds, the tech could change how assistive communication devices work and speed up patient access to advanced tools.

    Hand holding brain implant.

    During the trial, volunteers imagine speaking while advanced AI models learn their neural patterns and convert those signals into text or a synthetic voice. (Paradromics)

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    BRAIN IMPLANT FOR EPILEPSY TESTED IN 20-MINUTE SURGERY

    Kurt’s key takeaways

    Paradromics is taking a careful but bold path toward practical BCI communication. The first stage is small but meaningful. It sets the foundation for devices that may restore speech with natural flow and faster response times. As more trials move forward, this field could shift from experimental to everyday use faster than many expect.

    Would you trust a fully implanted brain device if it meant restoring communication for someone you care about? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • DoorDash breach exposes contact info for customers and workers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    DoorDash confirmed a data breach that exposed personal details for a mix of customers, delivery workers and merchants. The stolen information included names, email addresses, phone numbers and physical addresses. The company said it has no evidence of fraud tied to the breach so far, but the event still raises concerns for anyone who uses the service.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DoorDash says an employee fell for a social engineering scam that let an unauthorized party access basic contact information. (DoorDash)

    How the DoorDash breach happened

    The company traced the incident back to a social engineering attack. An employee fell for a lure that gave hackers access to DoorDash systems. Once the company spotted the breach, it shut down access, launched an investigation and notified law enforcement. DoorDash also directly notified users where required.

    DoorDash driver

    The company confirmed the incident exposed names, email addresses, phone numbers and physical addresses for some people in its system. (DoorDash)

    Who was affected by the DoorDash breach

    DoorDash said the breach impacted a mix of users across its platform. That includes customers, delivery workers and merchants. CyberGuy reached out to DoorDash and a representative provided the following statement to us:

    “DoorDash recently identified and shut down a cybersecurity incident in which an unauthorized third party gained access to and took basic contact information for some users whose data is maintained by DoorDash. No sensitive information, such as Social Security numbers or other government-issued identification numbers, driver’s license information, or bank or payment card information, was accessed. The information accessed varied by individual and was limited to names, phone numbers, email addresses, and physical addresses. We have deployed enhanced security measures, implemented additional employee training, and engaged an external cybersecurity firm to support our ongoing investigation. For more information, please visit our Help Center.”

    LOOKING FOR A CHEAP CHEESEBURGER? 10 AMERICAN CITIES THAT DELIVER THE BEST MEAL DEALS

    If you received an alert from the company, take steps to protect your information. If you use the app but did not get a notice, you should still follow the safety tips below because exposed contact information can lead to scams long after a breach.

    DoorDash delivery person

    DoorDash says no sensitive information was accessed and investigators found no signs of fraud or identity theft tied to the breach. (DoorDash)

    How to protect yourself after the DoorDash breach

    Even though payment data stayed protected, exposed contact details can still open the door to scams. You can lower your risk with a few smart steps that keep your information safer online.

    1) Watch for phishing attempts

    Scammers move fast after a breach. They often send fake alerts that look like real DoorDash messages. These emails or texts may claim you need to verify your account or update your payment details. Delete any message that asks for personal information or urges you to click a link. When in doubt, go straight to the official app instead of trusting a message.

    2) Use a data removal service

    Data brokers collect and resell personal details that scammers often exploit. A data removal service works to pull your information off those sites. This limits your exposure and makes it harder for criminals to target you. It is one of the easiest long-term steps you can take to protect your privacy.

    IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    3) Use strong passwords and a password manager

    Stronger passwords give you better protection. Create unique passwords for every account so one breach cannot unlock your digital life. A password manager makes this easier by generating secure passwords and storing them safely. It also autofills them, so you spend less time typing.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    4) Turn on multi-factor authentication

    Multi-factor authentication (MFA) adds a simple barrier that blocks most break-in attempts. When you turn it on, you confirm each login with a code or app prompt. This keeps your account safe even if someone learns your password. Most major apps let you enable this setting in the Security section.

    5) Use strong antivirus protection

    Strong antivirus software shields you from malicious links and downloads. It scans files in real time and warns you when something looks dangerous. This gives you an extra layer of defense against phishing attempts that try to install malware.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    6) Review your account activity

    It helps to check your DoorDash account for anything unusual. Look at your order history, saved addresses and payment methods. If something looks off, update your password and contact DoorDash support right away. Quick action can stop a small issue from turning into a bigger problem. 

    Kurt’s key takeaways

    A breach like this reminds us how quickly cybercriminals can exploit a single mistake. DoorDash moved fast to cut off access and confirm the damage, but exposed contact information can still create risks. Staying alert and using basic security habits can help you avoid trouble.

    CLICK HERE TO GET THE FOX NEWS APP

    What concerns you most about companies holding your personal information, and how would you like them to handle incidents like this? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link