ReportWire

Tag: smart and safe tech

  • Apple now lets you add your passport to your phone’s Wallet

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple now lets you add your passport to your phone’s Wallet, giving you a new way to move through TSA lines with less stress this holiday season. Instead of digging through your bag for your ID, you can use a secure Digital ID on your iPhone at more than 250 airports across the United States. With more digital ID options appearing across the country, here is what you need to know before you start using it.

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter  

    How Apple Digital ID works

    Digital ID stores your passport information securely on your device. Your data stays encrypted at all times. Apple cannot see where or when you use your Digital ID.

    Apple’s new Digital ID lets you store a passport on your iPhone for faster TSA checks. (Sean Gallup/Getty Images)

    When you present your Digital ID, you choose what information the TSA can see. You review the request on your screen and confirm it with Face ID or Touch ID. This helps prevent situations where someone else could access your ID without your approval.

    APPLE PASSKEY TECHNOLOGY TRANSFORMS MAC SECURITY WITH BIOMETRIC AUTHENTICATION, ENCRYPTED STORAGE

    Where Digital ID works

    Digital ID works for identity checks at select TSA lanes during domestic travel. It does not work for international flights or border crossings. Apple says support will expand to certain hotels, stores and online services where age or ID checks are needed.

    Eligibility requirements for Apple Digital ID

    Before you add a Digital ID to Apple Wallet, you need to meet a few basic requirements. To start, you must have a valid, unexpired U.S. passport. You also need an iPhone 11 or later with iOS 26.1 or later. 

    If your iPhone is not up-to-date, you can install iOS 26.1 by opening Settings, tapping General, choosing Software Update and following the on-screen steps. Make sure your phone is charged and connected to Wi-Fi before you start the update.

    Digital ID in Wallet works only at select TSA checkpoints for domestic travel. It cannot replace a physical passport. Because of that, you should still bring your physical passport or license in case TSA needs to review it. You must also carry your physical passport for any international travel or border crossing.

    TSA agent works at Houston airport security checkpoint

    With Digital ID, you control what information is shared at security and confirm each request with Face ID. (Ronaldo Schemidt/AFP via Getty Images)

    How to add your passport to Apple Wallet 

    • Setting up Digital ID only takes a few minutes. You need an iPhone and a valid U.S. passport.
    • Open the Wallet app on your iPhone
    • Tap the Add button
    • Select Driver’s License or ID Cards
    • Choose Digital ID
    • Click Add to iPhone and Apple Watch or Add to iPhone Only
    • Scan the photo page of your passport
    • Hold your iPhone to read the passport chip
    • When it says “Verification Required”, click Continue
    • Take a selfie
    • Complete the short head movement prompts
    • Wait for verification
    • Your Digital ID appears in Apple Wallet when approved. You will receive a notification that says, Digital ID is ready to use. 

    CLOUD STORAGE FULL SCAM STEALS YOUR PHOTOS AND MONEY

    How to use your Digital ID at TSA

    How to add a passport to Google Wallet

    Google users can also store a digital version of their U.S. passport in Google Wallet. This option works at TSA checkpoints that support digital IDs for domestic travel, just like Apple’s version. You still need to keep your physical passport or license with you in case TSA requests it. Setting it up is simple and only takes a few minutes.

    How to add your passport to Google Wallet

    Settings may vary depending on your Android phone’s manufacturer 

    • Open the Google Wallet app on your Android phone
    • Tap Add to Wallet
    • Select ID Card
    • Choose U.S. Passport
    • Scan the photo page of your passport
    • Hold your phone near the passport chip to read it
    • Take a selfie video so Google can verify your identity
    • Follow the on-screen head movement prompts
    • Wait for verification
    • Your passport will appear in Google Wallet once approved
    passport at front desk

    Digital ID works at more than 250 airports for domestic travel, with more locations coming soon. (iStock)

    How to use your digital passport at TSA with Google Wallet

    Settings may vary depending on your Android phone’s manufacturer 

    • Open Google Wallet on your phone
    • Tap your passport
    • Hold your device near the TSA identity reader
    • Review the information TSA requests
    • Confirm with your device unlock method, such as fingerprint or PIN

    FAKE FLIGHT CANCELLATION TEXTS TARGET TRAVELERS

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways 

    Digital ID gives you a fresh way to move through crowded TSA lines with less hassle. It uses the security features built into iPhone and Apple Watch and keeps your passport information stored on your device. Use it for domestic travel and keep your physical ID handy as a reliable backup.

    Would you feel confident using a digital passport during your next TSA screening? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Adaptive Power in iOS 26 boosts iPhone battery life

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Battery life matters more than ever as your iPhone takes on heavier workloads from streaming and gaming to AI-driven tasks. Every extra minute of charge now makes a difference in how smoothly your day runs.

    With iOS 26, Apple introduced Adaptive Power, an intelligent feature that quietly learns how you use your phone and adjusts performance to stretch battery life when you need it most. It is designed to keep your iPhone running stronger for longer without you having to lift a finger.

    What Adaptive Power does

    Adaptive Power helps your iPhone battery last longer when your daily use increases. It works automatically in the background and learns your recent activity to predict when extra power will be needed. When active, it can make small adjustments, such as lowering screen brightness, limiting background activity or turning on Low Power Mode when your battery reaches 20%.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE, MICROSOFT HIT $4T MILESTONE

    It uses on-device intelligence to understand your habits, then fine-tunes performance without requiring any input from you. Apple notes that Adaptive Power pauses its adjustments during tasks that demand maximum performance, like using the camera or gaming with Game Mode turned on.

    Adaptive Power in iOS 26 learns your daily habits to extend your iPhone’s battery life automatically. (Apple)

    How Adaptive Power affects real-world use

    Think of Adaptive Power as a smart battery assistant that adjusts only when needed. It balances performance and power consumption throughout the day, helping your phone last longer without noticeable slowdowns. It trims energy use in high-demand moments, like recording videos, editing photos or multitasking, without disrupting what you’re doing. When it activates, you might see a small notification letting you know it’s working, but otherwise, it operates quietly in the background.

    Settings in the iPhone

    The Adaptive Power feature uses on-device intelligence to adjust brightness, limit background tasks and keep performance balanced throughout the day. (Apple)

    Make sure you have iOS 26 installed

    To use Adaptive Power, your iPhone must be running iOS 26. If you’re unsure, here’s how to check and update:

    • Open Settings on your iPhone.
    • Tap General.
    • Tap Software Update.
    • If you see iOS 26 available, tap Download and Install.
    • Keep your phone plugged in and connected to Wi-Fi during the update.

    Once the update finishes, restart your phone. The feature activates automatically on supported models.

    Which iPhones support Adaptive Power

    Only iPhones that can run Apple Intelligence will see this feature. Here’s the list:

    • iPhone 17, 17 Pro and 17 Pro Max
    • iPhone Air
    • iPhone 16, 16 Plus, 16 Pro and 16 Pro Max
    • iPhone 16e
    • iPhone 15 Pro and 15 Pro Max

    Adaptive Power is on by default for iPhone 17 models and iPhone Air. It’s off by default for iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 16e, iPhone 15 Pro and iPhone 15 Pro Max.

    While some iPad and Mac models also run Apple Intelligence, Adaptive Power is currently exclusive to iPhones.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    How to turn Adaptive Power on

    If you’ve got a newer model like the iPhone 17 or Air, Adaptive Power is already on. For others, it’s just a few taps away:

    • Open Settings on your iPhone
    • Tap Battery
    • Select Power Mode
    • Toggle Adaptive Power to turn it on
    • To be notified when it activates during the day, turn on Adaptive Power Notifications. Even if you turn off alerts, the feature will continue to extend battery life automatically.
    A guide shows how to enable Adaptive Power in iOS 26 on iPhone.

    Steps to enable Adaptive Power in iOS 26 on iPhone. (Kurt “CyberGuy” Knutsson)

    What this means for your charging habits

    You may not see dramatic gains every day, but the effect adds up. Adaptive Power could extend the lifespan of your iPhone just by updating to iOS 26. Even though you might still need to charge overnight, the feature can buy you extra hours when you’re away from an outlet. Just remember: battery life often dips briefly after major updates while your system re-indexes data, but it levels out in a few days.

    Pro tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast and fully protected between iOS updates.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Adaptive Power represents Apple’s move toward smarter, self-managing devices that adapt to you. By learning your habits and adjusting power use dynamically, it helps your battery last longer without sacrificing performance. It’s one of those invisible upgrades that can quietly make your phone feel newer for longer.

    Would you trust your iPhone to manage power automatically, or do you still prefer to control it yourself? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 10M Americans hit in government contractor data breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Data breaches hit every kind of business, from hospitals to tech firms to major retailers. Now a leading government contractor has joined that list.

    Conduent, which manages critical public services across the United States, says hackers infiltrated its systems for nearly three months. The cyberattack exposed personal information linked to more than 10 million people.

    All about the Conduent breach and its scale

    Conduent discovered the intrusion in January 2025 and said hackers had infiltrated its network as early as Oct. 21, 2024. During this period, attackers reportedly stole large amounts of data linked to state-level programs such as Medicaid, child support, food assistance and toll systems. Conduent claims that its investigation found no ongoing malicious activity and said operations were safely restored after the breach was contained.

    Conduent manages technology and payment systems for dozens of U.S. state governments, processing roughly $85 billion in annual disbursements and handling over 2 billion customer service interactions every year. According to its own estimates, it supports around 100 million residents through various government health and welfare programs.

    MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATA

    Hackers accessed Conduent’s network for nearly three months, exposing sensitive data from major state programs like Medicaid and child support. (Felix Zahn/Photothek via Getty Images)

    The company reported that at least 400,000 people in Texas were affected, with compromised data including Social Security numbers, medical records and health insurance details. Other affected states include Washington, South Carolina, New Hampshire, Maine, Oregon, Massachusetts and California. Notifications are being sent to all impacted individuals, and a dedicated call center has been established to answer questions about the breach.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    How the Conduent breach unfolded

    In January, Conduent described the event as an “operational disruption caused by a third-party compromise.” The breach led to several days of downtime, disrupting vital services in multiple states. In Wisconsin, for instance, parents and beneficiaries were unable to process payments due to system outages, leaving many struggling to meet obligations related to child support and welfare programs.

    The SafePay ransomware group later claimed responsibility for the attack, alleging it had stolen 8.5 terabytes of data. Conduent confirmed in a Securities and Exchange Commission (SEC) filing that hackers had indeed exfiltrated files belonging to a limited number of clients. The company says it hired cybersecurity experts to analyze the stolen data and recently confirmed that it contained significant amounts of personal information from end-users across multiple programs.

    Despite the massive theft, Conduent said there is currently no evidence that the stolen data has been published online or on dark web marketplaces.

    HACKERS TARGET ONLINE STORES WITH NEW ATTACK

    We reached out to Conduent for a comment, and a rep for the company provided CyberGuy with the following statement:

    “As previously disclosed in its April 2025 Form 8-K filing with the SEC, in January 2025, Conduent discovered that it was the victim of a cybersecurity incident.  With respect to that incident, Conduent has agreed to send notification letters, on behalf of its customers, to individuals whose personal information may have been affected by this incident.  In addition, a dedicated call center has been set up to address consumer inquiries. At this time, Conduent has no evidence of any attempted or actual misuse of any information potentially affected by this incident.

    “Upon discovery of the incident, Conduent acted quickly to secure its networks, restore its systems and operations, notify law enforcement and conduct an investigation with the assistance of third-party forensics experts. In addition, given the nature and complexity of the data involved, Conduent has been working diligently with a dedicated review team, including internal and external experts, to conduct a detailed analysis of the affected files to identify the personal information contained therein, which was a time-intensive process. Conduent takes this matter seriously and regrets any inconvenience this incident may have caused.”

    6 steps you can take to protect yourself from Conduent data breach

    If your information may have been exposed in the Conduent breach or any similar data leak, you’re not without defenses. There are several steps you can take right now to reduce the risks.

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    The cyberattack disrupted critical public services across multiple states, with some families temporarily unable to process benefits or payments. (Kurt “CyberGuy” Knutsson)

    1) Consider a personal data removal service

    Data brokers collect and sell personal information such as your name, home address, phone number and relatives’ names. This data can be used for scams or social engineering attacks. Personal data removal services find these records across dozens of sites and submit takedown requests on your behalf.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    HACKERS STEAL MEDICAL RECORDS AND FINANCIAL DATA FROM 1.2M PATIENTS IN MASSIVE HEALTHCARE BREACH

    2) Monitor your accounts regularly

    After a major data breach, one of the most effective ways to protect yourself is to stay alert. Check your bank and credit card statements every few days for unusual transactions, even small ones. Watch your benefit accounts or tax filings for irregular activity. Early detection gives you time to freeze accounts or stop fraudulent charges before they escalate.

    3) Install a reputable antivirus program

    Antivirus software is your first line of defense against cyber threats that often follow large breaches. Stolen data can be used to launch targeted phishing attacks or spread malware through fake links and emails. A reliable antivirus solution actively scans for malicious activity, blocks suspicious downloads and keeps your devices safe from newer online threats through automatic updates.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH

    4) Enable two-factor authentication (2FA)

    Even if your login credentials are compromised, two-factor authentication (2FA) can stop attackers from getting in. It requires an additional code sent to your phone, email, or authentication app, making unauthorized access nearly impossible. Enable 2FA on your banking, email and government-related accounts, as these often hold the most sensitive information.

    5) Use a password manager

    Many breaches happen because people reuse the same password across multiple websites. A password manager eliminates that risk by creating and storing strong, unique passwords for every account.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    Hacker looks at computer code while sitting in a dark room

    Conduent says the stolen files contained significant amounts of personal information, but has found no signs the data has surfaced online or on dark web marketplaces. (Kurt Knutsson)

    6) Consider an identity theft protection service

    Identity theft protection services monitor your personal data across multiple sources, including the dark web and public records. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    Kurt’s key takeaway

    Even though Conduent claims the stolen data hasn’t surfaced online, that doesn’t mean it’s safe. Data exfiltration on this scale has long-term implications, from identity theft to potential fraud within public benefit systems. The real test will be how both Conduent and its government partners adapt their cybersecurity oversight to prevent similar breaches. Because at this point, the question isn’t whether these systems will be targeted again, but whether they’ll be any better prepared when it happens.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Do you think government contractors handling sensitive information should face stricter cybersecurity regulations? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • AI-powered scams target kids while parents stay silent

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Kids are spending more time online than ever, and that early exposure is opening the door to a new kind of danger. 

    Artificial intelligence has supercharged online scams, creating personalized and convincing traps that even adults can fall for. The latest Bitwarden “Cybersecurity Awareness Month 2025” poll shows that while parents know these risks exist, most still haven’t had a serious talk with their children about them. 

    This growing communication gap is leaving the youngest internet users vulnerable at a time when online safety depends more than ever on education and oversight.

    Young children face real risks online

    Children as young as preschool age are now part of the connected world, yet few truly understand how to stay safe. The Bitwarden survey found that 42% of parents with children between 3 and 5 years old said their child had accidentally shared personal information online.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    AI-powered scams are finding new ways to reach kids who go online earlier than ever. (Kurt “CyberGuy” Knutsson)

    Nearly 80% of kids between the ages of 3 and 12 already have their own tablet or another connected device. Many parents assume supervision software or family settings are enough, but that assumption breaks down when kids explore apps, games and chat spaces designed to hold their attention. Device access has become nearly universal by early elementary school, but meaningful supervision and honest safety conversations are lagging behind.

    The AI threat and the parental disconnect

    Artificial intelligence has changed the nature of online scams by making them sound familiar, personal and hard to recognize. Bitwarden’s data shows that 78% of parents worry their child could fall for an AI-enhanced threat, such as a voice-cloned message or a fake chat with a friend. Despite that fear, almost half of those same parents haven’t talked with their kids about what an AI-powered scam might look like. The disconnect is even stronger among Gen Z parents. 

    About 80% of them say they are afraid their child will fall victim to an AI-based scheme, yet 37% allow their kids full or nearly full autonomy online. In those households, problems are more common. Malware infections, unauthorized in-app purchases and phishing attempts appear at the highest rates among families who worry the most but monitor the least. The paradox is clear. Parents recognize the threat but fail to translate awareness into consistent action.

    Why parents haven’t had the talk

    There are many reasons this important talk keeps getting delayed. Some parents simply feel unprepared to explain AI, while others assume their existing safety tools will protect their children. Only 17% of parents in the United States actively seek information about AI technologies, according to related research by Barna Group. That leaves a large majority relying on partial knowledge or outdated advice. 

    Many parents also juggle multiple devices at home, making it difficult to track every app or game their child uses. Some overestimate how safe their own habits are, even though they admit to reusing passwords or skipping security updates. Without firsthand understanding or personal discipline, it becomes even harder to teach those lessons to children. As a result, many kids face the internet with curiosity but without proper guidance.

    Smart ways to protect your child online

    The Bitwarden findings make one thing clear: kids are getting connected younger, and scams powered by artificial intelligence are already targeting them. The good news is that parents can take practical steps right now to reduce those risks and build lasting online safety habits.

    1) Keep devices where you can see them

    Set up tablets, laptops and gaming consoles in shared family areas rather than bedrooms. When screens stay visible, you naturally become part of your child’s online world. This not only encourages open conversation but also helps spot suspicious messages, fake friend requests or scam links before they cause trouble.

    A mother surfs the web with her son.

    Staying involved in your child’s digital life is the best defense against today’s AI threats. (Kurt “CyberGuy” Knutsson)

    2) Use built-in parental controls

    Most devices have strong tools you can activate in minutes. Apple’s Screen Time and Google Family Link let you limit screen time, approve new app installs and monitor how long your child spends on specific apps. These controls are especially useful for younger kids who, according to the Bitwarden poll, often have little supervision despite heavy device use.

    TEENS TURNING TO AI FOR LOVE AND COMFORT

    3) Talk through every download

    Before your child installs a new game or app, take a moment to check it together. Read the reviews, look at what data it collects and confirm the developer’s name. Explain why some games or “free” apps might ask for camera or contact access they don’t need. This kind of shared review teaches healthy skepticism and helps children recognize red flags later on.

    4) Make password strength and 2FA a family rule

    AI scams thrive on weak or reused passwords. Use a password manager to create and store strong, unique logins for each account. Turn on two-factor authentication (2FA) wherever possible so that even if a password is stolen, the account stays protected. Let your kids see how you use these tools so they learn that security isn’t complicated, it’s just a habit.

    An exhausted mother uses her laptop while her son sits on her lap.

    Many parents delay important online safety talks because they feel unprepared to explain AI, leaving kids curious but without the guidance they need to stay safe. (Kurt “CyberGuy” Knutsson)

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Teach them to stop and tell

    One of the best defenses is simple: encourage your child to pause and talk before reacting to anything unusual online. Whether it’s a pop-up claiming a prize, a strange link in a chat or a voice message that sounds familiar, remind them it’s always okay to ask you first. Quick conversations like these can prevent costly mistakes and turn learning moments into trust-building ones.

    6) Keep devices updated and use strong antivirus software

    Outdated software can leave gaps that scammers exploit. Regularly update operating systems, browsers and apps to close those holes. Add strong antivirus software. Explain to your child that updates and scans keep their favorite games and videos running safely, not just their parents happy.

    The best way to safeguard from malicious links that install malware, potentially accessing private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Make online safety part of everyday life

    Don’t save these conversations for when something goes wrong. Bring them up casually during family time or when watching YouTube or gaming together. Treat digital safety like any other life skill, something practiced daily and improved with time. The more normal it feels, the more confident your child becomes when facing online risks.

    A mother watches her son surf the web.

    Talking about online safety early helps build trust and awareness before trouble starts.  (Kurt “CyberGuy” Knutsson)

    What this means for you

    If you are a parent, guardian or anyone helping a child use technology, this issue deserves your attention. Start talking early, even before your child begins exploring the web on their own. Teach them simple concepts like asking before clicking or sharing. Instead of relying only on parental controls, have ongoing conversations that help them recognize suspicious links, messages or pop-ups. Show them that cybersecurity isn’t about fear but about awareness. Model strong digital habits at home by using unique passwords and turning on two-factor authentication. Explain why those steps matter. When your child understands the reasoning behind the rules, they are more likely to follow them. Make technology part of your family routine rather than a private space your child navigates alone. Regularly check the apps they use and the people they interact with. Set clear expectations and age-appropriate boundaries that can grow with your child’s experience. Staying engaged is the most powerful protection you can offer.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The numbers from Bitwarden show a clear warning sign. Concern among parents is high, yet actual conversations about AI-powered scams remain rare. That silence gives scammers the upper hand. Children who learn about online safety early are more confident, more cautious and better equipped to handle unexpected messages or fake alerts. It only takes a few minutes of honest conversation to create awareness that lasts for years. By taking action now, you can close the gap between fear and understanding, protecting your family in a digital world that changes every day.

    Are you ready to start the conversation that could keep your child from becoming the next target of an AI-powered scam? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The #1 Google search scam everyone falls for

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When something goes wrong with your bank account or delivery, your first instinct might be to type the company name into Google and call the first customer service number you see. But that simple search has become one of the biggest traps for scammers, and it’s costing people money, privacy and even control over their phones.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    A simple Google search for a company’s customer service number can lead straight to a scam. The first result isn’t always the safest one. (Kurt “CyberGuy” Knutsson)

    He Googled his bank’s number and lost control of his phone

    Here’s how one man’s quick search for help turned into a nightmare he never expected. Gabriel wrote to us in distress, asking,

    “I called my bank to check on some charges I didn’t authorize. I called the number on the bank statement, but they told me to go online. I googled the company and dialed the first number that popped up. Some foreign guy got on the phone, and I explained about the charges. Somehow, he took control of my phone, where I didn’t have any control. I tried to shut it down and hang up, but I couldn’t. He ended up sending an explicit text message to my 16-year-old daughter. How do I prove I didn’t send that message? Please help.”

    Gabriel’s story is frightening, and unfortunately, it’s not rare. This type of attack is called a remote access support scam. Scammers pretend to be bank or tech support, then trick you into installing a program that gives them control of your device. Once inside, they can steal passwords, send messages or lock you out completely.

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    A user searches on Google on a laptop.

    Gabriel thought he was calling his bank, but the number was fake. Within minutes, a scammer took control of his phone and invaded his privacy. (Kurt “CyberGuy” Knutsson)

    Why this scam works

    Search engines reward paid ads. Scammers take advantage of this by buying ad space to appear above legitimate customer service numbers. The fake pages look professional, complete with company logos and 800 numbers that seem real.

    Once you call, the fake “agent” sounds knowledgeable and polite. They build trust, then convince you to install remote access software such as AnyDesk or TeamViewer. From that point, they can control everything on your phone.

    What to do if this happens to you

    Gabriel, what you went through is incredibly upsetting, and you’re right to take it seriously. Here’s what to do right away:

    1) Disconnect and secure your phone

    Turn off your phone immediately. Restart it in Airplane Mode and don’t connect to Wi-Fi yet. Run a full antivirus scan with strong antivirus software. 

    2) Change all your passwords

    Use a secure device that has not been compromised to reset the passwords for your key accounts, including email, cloud storage, phone carrier and banking logins. Create strong, unique passwords for each account and enable two-factor authentication (2FA) for added protection on all your devices and platforms.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    3) Contact your carrier and your bank

    Let your phone provider know that your device was taken over. Ask them to check for unauthorized remote management apps or SIM-swap activity. Notify your bank’s fraud department and report the fake number you found on Google.

    4) Report the explicit message

    Take screenshots and save everything. Contact local police and explain that the message was sent from your number while your phone was under remote control. If a minor is involved, the case may be referred to the FBI’s Internet Crime Complaint Center (IC3.gov).

    5) Factory reset your phone

    Once your data is backed up, perform a factory reset on your iPhone or Android to remove any hidden software. Reinstall only apps you recognize from the official app store.

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

    A user searches Google.

    Scammers use fake customer service numbers to sound convincing and gain remote access to your devices, turning a simple call for help into a digital takeover. (Kurt “CyberGuy” Knutsson)

    Tips to stay safe from fake customer service scams

    Falling for a fake customer service number can happen to anyone, especially when you’re in a rush or worried about your account. Here’s how to make sure you never get tricked by the same kind of scam that hijacked Gabriel’s phone.

    Go directly to the company’s official website

    Always type the company’s web address yourself or use the contact number printed on your card or statement. Scammers often create fake numbers that appear in search results, hoping you’ll call them instead of your real bank.

    Don’t trust the first search result on Google

    Search engines sell ad space to anyone, including criminals posing as real businesses. Those top “sponsored” listings can lead straight to scammers. Instead, scroll down until you find the official domain ending in .com, .org or .gov.

    Never allow remote access to your phone or computer

    No legitimate company needs to control your device to verify charges or fix an account issue. If someone asks you to install software like AnyDesk or TeamViewer, hang up immediately. These tools give strangers complete control of your screen and data.

    Hang up if the caller pressures you to act fast

    Scammers rely on panic. When someone insists you act “right now” or risk losing money, that’s a warning sign. Stay calm, hang up, and verify the problem through your bank’s official website or number.

    Use strong antivirus protection

    Install and regularly update a trusted antivirus app. Strong antivirus software can block remote-access tools and spyware before scammers gain access. Regular scans also detect hidden threats that may already be on your phone or computer.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Consider using a data removal service

    Many scammers find victims through data brokers that sell phone numbers and personal details. A data removal service helps erase your information from these sites. As a result, it’s harder for criminals to target you with fake customer service scams in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Monitor your identity with a trusted protection service

    Even a short breach can expose your private information. Identity-monitoring tools alert you when your name, email or Social Security number appears on the dark web. That gives you time to act before scammers can use it.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The internet has made getting help easier than ever, but it has also made it easier for scammers to pretend to be helpful. The top way people are being scammed today isn’t through phishing emails or suspicious links; it’s by trusting fake phone numbers that look official. Take a few minutes to save the real customer service numbers for your bank, phone provider, and credit card company. One quick call to the wrong number could give a stranger access to your entire digital life.

    With fake customer service numbers flooding search results, should Google be held responsible for protecting you from these scams? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • How to stop impostor bank scams before they drain your wallet

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Losing your life savings to fraud is not a distant fear; it is a real and growing risk. Scams involving criminals pretending to be bank representatives have surged, with the Federal Trade Commission (FTC) reporting record-breaking losses exceeding $2.9 billion in recent data. These criminals no longer rely on basic phone tricks. Instead, they use caller ID spoofing and artificial-voice software to sound like trusted professionals, often imitating real bank employees down to the smallest detail.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    What impostor bank scams look like

    Scammers pretending to be from your bank follow a predictable yet terrifying pattern. They begin with an urgent phone call warning that your account has been compromised. The caller ID displays your bank’s real number, which builds instant trust.

    Impostor scams have become one of the fastest-growing crimes in America, costing victims billions each year. (Kurt “CyberGuy” Knutsson)

    Next, they instruct you to move your money into a so-called “safe” or “decoy” account while they “investigate” the issue. Their goal is to create fear and push you into action before you have time to think.

    One journalist reportedly learned this lesson the hard way when he answered what appeared to be a legitimate call from Chase Bank. After a series of convincing conversations with multiple “representatives,” he transferred nearly $30,000 to scammers. In another case, a 65-year-old caterer reportedly lost $162,000 when a friendly woman pretending to be a bank employee claimed her ATM card had been compromised. These stories are not rare; they reflect how sophisticated and believable modern scams have become.

    Why you and others are targets

    Banks are trusted institutions, and scammers know it. That trust makes impersonation one of the easiest and most effective fraud tactics today. With spoofing tools, criminals can mimic real bank phone numbers and even use AI to reproduce familiar voices. Their approach is psychological: they create panic and urgency to make victims act quickly and irrationally.

    Older adults are particularly vulnerable. The FTC found that losses of over $100,000 to impostor scams among people aged 60 and older have skyrocketed, from $55 million in 2020 to $445 million in 2024. These numbers highlight how no one is immune to manipulation when fear and urgency collide.

    A woman speaks on her cell phone.

    Criminals exploit fear, trust and technology to pressure victims into acting before they can think clearly. (Kurt “CyberGuy” Knutsson)

    9 smart tips to protect yourself from impostor scams 

    Impostor scams move fast, but with the right precautions, you can stop them before they strike.

    1) Never trust caller ID alone

    Spoofed numbers make a call appear as if it’s coming from your bank, even when it’s not.

    2) Hang up and call your bank using a verified number

    Do not return calls using numbers given to you by the person who contacted you. Always call the number printed on your debit or credit card.

    3) Use a data removal service to protect your identity

    Scammers often collect phone numbers, email addresses and other personal details from public records and data broker sites. Using a trusted data removal service helps wipe that information from the web, reducing the chances that criminals can use your data to impersonate you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    A woman talking on her cell phone

    Scammers often pose as bank employees, using fake caller IDs and urgent stories to trick people into sending money. (Kurt “CyberGuy” Knutsson)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Your bank will never ask you to transfer money

    Any request to move funds “for protection” is a red flag for fraud.

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    5) Use strong antivirus software

    Scammers often send fake links or pop-ups that install malicious programs on your device. A strong antivirus program can detect these threats, block phishing attempts and stop remote-access tools that give criminals control of your computer. Keeping your software updated adds another layer of protection against evolving scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Never share verification codes or PINs

    Banks do not ask for your codes over the phone, text or email.

    7) Use call-blocking or scam-identifier apps

    Adding these tools to your phone can filter many spoofed calls before they reach you. Both iPhone and Android devices have built-in settings and apps that help you stop scam calls before you even pick up.

    If you use an iPhone:

    • Go to Settings
    • Tap Apps
    • Click Phone
    • Under Unknown Callers, click Silence to automatically block unsaved numbers that aren’t in your contacts.

    Android phones offer similar protection:

    Settings may vary depending on your Android phone’s manufacturer. 

    • Go to the Phone app
    • Click Settings
    • Tap Caller ID & Spam
    • Click Filter Spam Calls, or you might be asked to toggle on Caller ID and spam protection, to automatically identify and block numbers flagged as potential scams.

    8) Pause if something feels urgent and frightening

    Scammers depend on panic. Taking a moment to breathe could save your savings.

    9) Report suspicious activity immediately

    If you suspect a scam, contact your bank, file a complaint with the FTC at ReportFraud.ftc.gov and alert local law enforcement.

    What to do if you’ve been targeted

    If you believe you have fallen victim, act quickly.

    1) Contact your bank and request a freeze or close monitoring of your accounts.

    2) File a report with the FTC and your local police department, even if you believe recovery is unlikely.

    3) Keep every piece of evidence, including phone records, text messages and transfer confirmations.

    4) Change all passwords and enable transaction alerts on every sensitive account to prevent further damage. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Sign up with an Identity Theft Protection service that can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Fraud can strike anyone, anywhere, at any time. Scammers have become smarter, faster and more convincing than ever before. They use fear, urgency and technology to make their lies sound real. But you can fight back with knowledge and caution. Stay alert every time your phone rings or your inbox pings. Slow down before you react. Verify before you trust. The few seconds you take to double-check could be what saves your life savings. Remember, even the most tech-savvy people fall for scams when emotions take over. The real key to protection isn’t fear, it’s awareness and action. Share what you know with friends, family and coworkers. The more people who understand how these scams work, the harder it becomes for criminals to win.

    Are banks really doing enough to protect you from impostor scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Stop foreign-owned apps from harvesting your personal data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You might not think twice about that flashlight app you downloaded or the cute game your grandkids recommended. Yet with a single tap, your private data could travel halfway across the world into the hands of people who profit from selling it. A growing threat is emerging as foreign-owned apps quietly collect massive amounts of personal data about you, and older Americans are among the most vulnerable.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The hidden cost of ‘free’ apps

    We all love free apps. Whether it’s a shopping deal finder, a weather tracker or a photo editor, they make life easier. But many of these “free” tools aren’t really free; they just don’t charge you money. Instead, they collect your personal information and sell it to make their profit.

    A recent study revealed that over half of the most popular foreign-owned apps available in U.S. app stores collect sensitive user data, including your location, contacts, photos and even keystrokes.

    Many “free” apps secretly collect personal data from users, sending private information to foreign servers without consent. (Kurt “CyberGuy” Knutsson)

    Some of the worst offenders are apps that seem completely harmless:

    • Flashlight and weather apps that track your GPS location 24/7.
    • Shopping apps that collect purchase history, payment preferences and home addresses.
    • Casual games that request access to your camera and contacts for no logical reason.

    These apps often share data with data brokers and ad networks overseas, where privacy laws are weaker and accountability is nearly impossible.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why retirees are prime targets

    If you’re retired, you may already be on dozens of public databases like voter rolls, real estate listings and charity donor lists. Combine that with information harvested from apps, and scammers can build a frighteningly detailed profile of your life.

    Young woman types on smartphone

    Flashlight, weather and shopping apps often request unnecessary access to your camera, contacts and location to track you around the clock. (Portra/Getty Images)

    They can see:

    • Where you live and who lives with you.
    • What medications you search for.
    • What causes you support or charities you donate to.
    • What devices you own and which banks you use.

    From there, they can craft highly convincing scams like fake donation requests, Medicare scams or phishing texts that look eerily personal. Some even use your social media photos to mimic family members in “grandparent scams.” And it all starts with what you allowed that “harmless” app to access.

    Signs your data might already be exposed

    You don’t need to be a tech expert to spot the warning signs. Here’s what to look for:

    • Unfamiliar charges or new accounts in your name.
    • An increase in scam calls or texts, especially with personal details like your city or bank.
    • Emails from foreign domains claiming to offer rewards or urgent account updates.
    • Ads that seem to “read your mind,” which show up right after you talk about something offline.

    If you’ve noticed any of these, your information is likely circulating through data brokers who purchased it from app networks.

    A smartphone displays apps.

    Older Americans are prime targets, but simple steps like deleting risky apps and reviewing permissions can help protect your privacy. (Kurt “CyberGuy” Knutsson)

    How to stop the data drain

    You can take back control of your data starting right now.

    1) Audit your apps

    Go through your phone and delete any apps you don’t use regularly, especially free ones from unfamiliar developers.

    2) Stop data brokers from trading your info

    Even after deleting risky apps, your personal information may already be circulating online. This is where a data removal service can make a massive difference. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    3) Check permissions

    Open your settings and review which apps have access to your location, contacts or camera. Revoke any unnecessary permissions immediately.

    TEA APP HACKED AS WOMEN’S PHOTOS, IDS & EVEN DMS LEAKED ONLINE

    4) Avoid “foreign-owned” apps that request extensive access without a clear reason.

    Always read the privacy policy (yes, it’s tedious but eye-opening). If an app asks for permissions that do not match its purpose, like a calculator wanting your location or a flashlight needing camera access, that is a major red flag. Many foreign-owned apps hide behind vague privacy terms that allow data to be transferred to overseas servers where U.S. privacy laws do not apply.

    5) Use official stores only

    Stick to the Apple App Store or Google Play Store for downloads. Avoid third-party sites that host cloned or tampered versions of popular apps. Look for verified developers and check privacy ratings in reviews before installing anything new.

    6) Keep your device and apps updated

    Updates close security holes that hackers exploit through malicious apps. Turn on automatic updates so your phone and apps stay protected without you having to remember.

    7) Turn off ad tracking

    Limit how much of your activity is shared with advertisers. 

    On iPhone:

    Go to Settings Privacy & Security Tracking and toggle off “Allow Apps to Request to Track.” 

    On Android: 

    (Settings may vary depending on your Android phone’s manufacturer) 

    Go to Settings → Google → Ads (or Settings → Privacy → Ads) and choose “Delete advertising ID” or “Reset advertising ID.” This action removes or replaces your unique ID so apps and advertisers can no longer use it for personalized ad tracking.

    This step stops apps from following you across other platforms and building data profiles about your habits.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Foreign-owned apps are the new front line in data harvesting, and retirees are the easiest targets. But you don’t have to accept that your private life is public property. It’s time to take back control. Delete the apps you don’t need. Lock down your permissions. And let a data removal service erase your data trail before scammers can use it against you.

    Have you checked which of your apps might be secretly sending your personal data overseas? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Protecting kids from AI chatbots: What the GUARD Act means

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new bipartisan bill introduced by Sens. Josh Hawley, R-Mo., and Richard Blumenthal, D-Conn., would bar minors (under 18) from interacting with certain AI chatbots. It taps into growing alarm about children using “AI companions” and the risks these systems may pose.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    What’s the deal with the proposed GUARD Act?

    Here are some of the key features of the proposed Guard Act:

    • AI companies would be required to verify user age with “reasonable age-verification measures” (for example, a government ID) rather than simply asking for a birthdate.
    • If a user is found to be under 18, a company must prohibit them from accessing an “AI companion.”
    • The bill also mandates that chatbots clearly disclose they are not human and do not hold professional credentials (therapy, medical, legal) in every conversation.
    • It creates new criminal and civil penalties for companies that knowingly provide chatbots to minors that solicit or facilitate sexual content, self-harm or violence.

    Bipartisan lawmakers, including Senators Josh Hawley and Richard Blumenthal, introduced the GUARD Act to protect minors from unregulated AI chatbots. (Kurt “CyberGuy” Knutsson)

    The motivation: lawmakers cite testimony of parents, child welfare experts and growing lawsuits alleging that some chatbots manipulated minors, encouraged self-harm or worse. The basic framework of the GUARD Act is clear, but the details reveal how extensive its reach could be for tech companies and families alike.

    META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDS

    Why is this such a big deal?

    This bill is more than another piece of tech regulation. It sits at the center of a growing debate over how far artificial intelligence should reach into children’s lives.

    Rapid AI growth + child safety concerns

    AI chatbots are no longer toys. Many kids are using them. Hawley cited more than 70 percent of American children engaging with these products. These chatbots can provide human-like responses, emotional mimicry and sometimes invite ongoing conversations. For minors, these interactions can blur boundaries between machine and human, and they may seek guidance or emotional connection from an algorithm rather than a real person.

    Legal, ethical and technological stakes

    If this bill passes, it could reshape how the AI industry manages minors, age verification, disclosures and liability. It shows that Congress is ready to move away from voluntary self-regulation and toward firm guardrails when children are involved. The proposal may also open the door for similar laws in other high-risk areas, such as mental health bots and educational assistants. Overall, it marks a shift from waiting to see how AI develops to acting now to protect young users.

    A girl uses a smartphone.

    Parents across the country are calling for stronger safeguards as more than 70 percent of children use AI chatbots that can mimic empathy and emotional support. (Kurt “CyberGuy” Knutsson)

    Industry pushback and innovation concerns

    Some tech companies argue that such regulation could stifle innovation, limit beneficial uses of conversational AI (education, mental-health support for older teens) or impose heavy compliance burdens. This tension between safety and innovation is at the heart of the debate.

    What the GUARD Act requires from AI companies

    If passed, the GUARD Act would impose strict federal standards on how AI companies design, verify and manage their chatbots, especially when minors are involved. The bill outlines several key obligations aimed at protecting children and holding companies accountable for harmful interactions.

    • The first major requirement centers on age verification. Companies must use reliable methods such as government-issued identification or other proven tools to confirm that a user is at least 18 years old. Simply asking for a birthdate is no longer enough.
    • The second rule involves clear disclosures. Every chatbot must tell users at the start of each conversation, and at regular intervals, that it is an artificial intelligence system, not a human being. The chatbot must also clarify that it does not hold professional credentials such as medical, legal or therapeutic licenses.
    • Another provision establishes an access ban for minors. If a user is verified as under 18, the company must block access to any “AI companion” feature that simulates friendship, therapy or emotional communication.
    • The bill also introduces civil and criminal penalties for companies that violate these rules. Any chatbot that encourages or engages in sexually explicit conversations with minors, promotes self-harm or incites violence could trigger significant fines or legal consequences.
    • Finally, the GUARD Act defines an AI companion as a system designed to foster interpersonal or emotional interaction with users, such as friendship or therapeutic dialogue. This definition makes it clear that the law targets chatbots capable of forming human-like connections, not limited-purpose assistants.
    A boy holds a smartphone horizontally.

    The proposed GUARD Act would require chatbots to verify users’ ages, disclose they are not human and block under-18 users from AI companion features.  (Kurt “CyberGuy” Knutsson)

    OHIO LAWMAKER PROPOSES COMPREHENSIVE BAN ON MARRYING AI SYSTEMS AND GRANTING LEGAL PERSONHOOD

    How to stay safe in the meantime

    Technology often moves faster than laws, which means families, schools and caregivers must take the lead in protecting young users right now. These steps can help create safer online habits while lawmakers debate how to regulate AI chatbots.

    1) Know which bots your kids use

    Start by finding out which chatbots your kids talk to and what those bots are designed for. Some are made for entertainment or education, while others focus on emotional support or companionship. Understanding each bot’s purpose helps you spot when a tool crosses from harmless fun into something more personal or manipulative.

    2) Set clear rules about interaction

    Even if a chatbot is labeled safe, decide together when and how it can be used. Encourage open communication by asking your child to show you their chats and explain what they like about them. Framing this as curiosity, not control, builds trust and keeps the conversation ongoing.

    3) Use parental controls and age filters

    Take advantage of built-in safety features whenever possible. Turn on parental controls, activate kid-friendly modes and block apps that allow private or unmonitored chats. Small settings changes can make a big difference in reducing exposure to harmful or suggestive content.

    4) Teach children that bots are not humans

    Remind kids that even the most advanced chatbot is still software. It can mimic empathy, but does not understand or care in a human sense. Help them recognize that advice about mental health, relationships or safety should always come from trusted adults, not from an algorithm.

    5) Watch for warning signs

    Stay alert for changes in behavior that could signal a problem. If a child becomes withdrawn, spends long hours chatting privately with a bot or repeats harmful ideas, step in early. Talk openly about what is happening, and if necessary, seek professional help.

    6) Stay informed as the laws evolve

    Regulations such as the GUARD Act and new state measures, including California’s SB 243, are still taking shape. Keep up with updates so you know what protections exist and which questions to ask app developers or schools. Awareness is the first line of defense in a fast-moving digital world.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The GUARD Act represents a bold step toward regulating the intersection of minors and AI chatbots. It reflects growing concern that unmoderated AI companionship might harm vulnerable users, especially children. Of course, regulation alone won’t solve all problems, industry practices, platform design, parental involvement and education all matter. But this bill signals that the era of “build it and see what happens” for conversational AI may be ending when children are involved. As technology continues to evolve, our laws and our personal practices must evolve too. For now, staying informed, setting boundaries and treating chatbot interactions with the same scrutiny we treat human ones can make a real difference.

    If a law like the GUARD Act becomes reality, should we expect similar regulation for all emotional AI tools aimed at kids (tutors, virtual friends, games) or are chatbots fundamentally different? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Stop your smart TV from listening to you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most people do not realize their smart TV includes microphones that can capture sound even when voice commands are off. These tiny mics power voice search and assistants, but they also pose privacy risks. If that makes you uneasy, you are not alone. The good news is that it takes only a few minutes to disable your smart TV microphone and protect your conversations.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Step one: Find the built-in mic switch

    Before opening menus, check your TV’s frame. Many models feature a small hardware switch that turns the microphone off completely.

    Look closely along the bottom or sides of your screen. Some switches are labeled “Built-in MIC.” On Samsung TVs, it’s often near the bottom right edge when facing the screen.

    Take back control of your space and enjoy your smart TV safely without your microphone listening.  (Kurt “CyberGuy” Knutsson)

    Slide the switch to “off.” Your TV may confirm the change with an on-screen message. This is the most reliable way to stop the mic because it physically cuts power to it.

    Step two: Disable the smart TV microphone in settings

    If your TV lacks a physical switch, go through its settings menu. While the exact names differ by brand, most follow a similar pattern.

    Press Home or Settings on your remote. Look for main sections such as SystemGeneral or Privacy. Inside, you’ll find microphone or voice options labeled Voice RecognitionVoice Assistant or Microphone Access.

    instructions for how to turn off the microphone on a Samsung smart TV

    Slide the built-in mic switch to stop your TV from listening. (Samsung)

    Examples:

    • Samsung: General → Voice
    • Sony: Privacy → Google Assistant
    • LG: User Agreements → Voice Settings

    Toggle off every feature that uses the microphone. Some options may appear in more than one place, so check each section carefully.

    instructions for how to turn off the microphone on a Samsung smart TV

    Use your TV’s settings to disable voice features and protect privacy. (Samsung)

    Step three: Balance convenience and privacy

    Turning off your TV’s microphone does not mean you lose smart features. Many remotes include a push-to-talk button that activates voice control only when pressed.

    If you rarely talk to your TV, keeping the microphone off makes sense. If you like using voice commands, enable it temporarily when you need it.

    Step four: Check connected devices and apps

    Even after you disable your smart TV microphone, voice-enabled apps and linked devices may still be listening.

    Check any connected smart assistants such as Alexa, Google Assistant or Bixby. These platforms can continue capturing audio through your phone, smart speaker or another device on the same network.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE

    A remote control points at a television.

    Keep your privacy and still enjoy voice control, just use it when you need it. (Kurt “CyberGuy” Knutsson)

    Take a moment to review privacy settings in those apps as well. Turning off voice activity tracking across all your devices ensures that nothing in your home listens when you do not want it to.

    Why smart TVs have microphones at all

    Manufacturers include microphones to make TVs more interactive. You can ask for weather updates, control volume or find movies with your voice. It’s convenient, but it comes with trade-offs.

    Some companies state in their privacy policies that voice data may be shared with third parties for analysis. That means your living room chatter could leave your home.

    When you disable your smart TV microphone, you keep the benefits of a modern TV while limiting unwanted data collection.

    What this means for you

    By taking a few minutes to change one setting or flip one switch, you gain control over what your TV hears. It’s an easy way to improve your digital privacy without losing the entertainment experience you love.

    You still get streaming apps, vivid displays and fast connectivity, just with added peace of mind.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways 

    Smart TVs offer great features, but convenience should never cost you privacy. Whether you flip a switch or use your settings menu, you have the power to decide when your TV listens.

    Will you take back your living room privacy today or leave it as it is? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Hackers target online stores with new attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.

    The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Why is this attack so serious?

    The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.

    Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases, and even full control of the store’s server.

    Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public.

    Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)

    Why are many stores still unprotected?

    Adobe released a security update on September 9 to fix the issue. Weeks later, about 62 percent of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.

    Every unpatched store remains an open door for attackers who want to steal information or install malicious code.

    MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

    How can you stay safe when shopping online?

    While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.

    1) Look for warning signs

    Always pay attention to how a website behaves. If a page looks odd, loads slowly, or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.

    2) Be careful with email links and use a data removal service 

    Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number, and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

    Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)

    3) Use strong antivirus software

    Strong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites, and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

    4) Use safe payment options

    Whenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay, or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.

    5) Shop with trusted retailers

    Stick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design, and verified payment options. A few minutes of research can save you from weeks of frustration.

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    6) Keep your devices updated

    Updates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone, and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.

    7) Use unique, strong passwords

    If you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    8) Turn on two-factor authentication

    If a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification.

    Wallet with multiple debit/credit cards

    Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)

    9) Avoid public Wi-Fi for purchases

    FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

    Public Wi-Fi networks in places like cafés, airports, and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 

    10) Monitor your bank and credit statements

    Check your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.

    11) Report suspicious activity

    If you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.

    Kurt’s key takeaways

    The SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • 5 phone safety tips every parent should know

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Kids today are growing up in a world where screens, apps and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.

    Whether you’re trying to set healthy limits, track screen time or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident and in control.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)

    1) Screen time limits

    The boundary that helps restore balance

    Screen time limits let you manage how long your child spends on apps, games or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.

    Why it matters: Too much screen time has been linked to reduced focus, sleep disruption and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.

    How to set screen time limits

    On iPhone:

    • Go to Settings
    • Tap Screen Time
    • Click App Limits
    • Select Add Limit, choose categories or specific apps and set daily time limit

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Go to Settings
    • Tap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search bar
    • Open the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage list
    • Tap the hourglass icon next to the app you want to limit
    • Set a daily time limit, then tap OK or Done
    • The timer resets every night at midnight

    Pro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. 

    TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS

    2) Parental controls

    Your built-in safety net

    Parental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app and streaming service has its own version.

    Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases and set up age-appropriate experiences.

    Woman using Iphone

    Built-in parental controls make it easier to guide what kids can see and do on their devices. (Kurt “CyberGuy” Knutsson)

    How to turn parental controls on

    On iPhone:

    • Go to Settings
    • Click Screen Time 
    • Tap Content & Privacy Restrictions
    • Turn it on so the toggle turns green.
    • Within Content & Privacy Restrictions you can go to sections like Allowed AppsiTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.

    On Android:

    Settings may vary depending on your Android phone‘s manufacturer

    • Go to Settings
    • Tap Digital Wellbeing & Parental Controls
    • Select Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotely

    Pro tip: Most streaming apps, like YouTube, Netflix and Disney+, also have parental settings, so make sure you adjust those separately.

    3) Geolocation

    The invisible map in your child’s pocket

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Geolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.

    Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.

    How to manage location access

    On iPhone:

    • Go to Settings
    • Click Privacy & Security
    • Then, click Location Services
    • Tap each app and change “Always” to “While Using the App” or “Never”

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Go to Settings
    • Tap Location (or “Location & security” or “Privacy → Location” depending on device)
    • Tap App location permissions (or “Permission manager → Location”)
    • Select an app from the list
    • Change the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”

    Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.

    4) Private browsing

    The mode that hides – but doesn’t erase

    Private browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.

    Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school or router may still record activity. It’s a reminder that no browsing mode is completely private.

    TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

    How to disable private browsing

    On iPhone (Safari):

    • Open Settings
    • Tap Screen Time
    • Tap Content & Privacy Restrictions
    • If prompted, enter or set a Screen Time passcode
    • Turn on Content & Privacy Restrictions (toggle to green)
    • Tap App Store, Media & Purchases (or similarly named) and optionally set limits
    • Click Web Content 
    • Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites 

    On Android (Chrome):

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Family Link app on your Android phone (or download it if it isn’t installed)
    • Select your child’s profile
    • Tap Controls
    • Click Google Chrome & Web
    • Choose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)
    • This setting automatically disables Incognito Mode in Chrome for your child’s supervised account
    • (Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection
    Worried young mother watching teen girl using smartphone.

    Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)

    SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

    Pro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.

    5) Digital footprint

    The trail your child leaves behind

    Every post, comment or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives or algorithms.

    Why it matters: Colleges, employers and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.

    How to check what’s out there

    • Search your child’s name on Google and image results
    • Review old accounts or unused apps that may still contain personal info
    • Help them make their social media profiles private and share selectively

    Pro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. 

    Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages and databases containing sensitive details like addresses, phone numbers and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    Parenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust and keep your family safer online.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Want more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

    When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Why are unsupported systems dangerous

    Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

    It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

    The “just one more year” trap

    Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

    Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

    Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    The hidden costs of waiting to upgrade to Windows 11

    It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

    Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

    How to stay safe from unsupported Windows 10 security risks

    You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

    1) Upgrade your system to Windows 11

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

    2) Watch out for phishing scams and install strong antivirus software

    Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Signage outside the Microsoft Campus

    Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Secure your logins

    Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

    WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Man typing on his laptop.

    Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Back up your data regularly

    Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

    6) Stay informed and proactive

    Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

    Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • AI truck system matches top human drivers in massive safety showdown with perfect scores

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100.

    The Kodiak Driver earned a remarkable score of 98. That result placed it beside the safest human fleets in Nauto’s global network. The findings sparked discussion across the trucking industry and raised new questions about the role of automation in freight transport.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

    The Kodiak Driver, an autonomous trucking system powered by AI, earned a top VERA Score of 98 in a new safety evaluation. (Kodiak)

    Kodiak Driver’s autonomous truck safety evaluation results

    Kodiak’s VERA Score of 98 matched the highest rating among all fleets evaluated. Fleets with Nauto’s safety technology average a score of 78, while those without the technology average only 63.

    The Kodiak Driver achieved perfect scores of 100 in inattentive driving, high-risk driving and traffic violations. Its lowest score, 95, came in aggressive driving. The VERA Score combines over 20 vision-based AI variables into one clear safety rating.

    Nauto found that every ten-point increase in VERA Score cuts collision risk by about 21 percent. A near-perfect score like Kodiak’s represents a strong improvement over typical human performance on the road.

    The strong results didn’t come as a surprise to Kodiak’s leadership. Don Burnette, founder and CEO of Kodiak, told CyberGuy: “Achieving the top safety score among more than 1,000 commercial fleets in Nauto’s Visually Enhanced Risk Assessment (VERA Score®) proprietary safety benchmark is a testament to the Kodiak’s focus on safety. Safety is at the foundation of everything Kodiak builds. Our core value is ‘safety first and always.’ We believe independent safety evaluations like Nauto’s help to validate what we already know: the Kodiak Driver is already among the safest drivers on American highways. They also help to establish and build public awareness around how safe our technology truly is.”

    FOX NEWS AI NEWSLETTER: TRUMP, MUSK AIM FOR DOMINANCE

    The growing impact of AI on truck driving safety

    Nauto equipped the trucks with advanced monitoring and hazard detection systems. These tools track both the driving environment and vehicle behavior in real time. Removing human factors such as distraction, fatigue and delayed reaction directly improves safety.

    Burnette said in a company statement that the system “is never drowsy, never drunk, and always paying attention.” That constant awareness allows the Kodiak Driver to operate defensively and predictably, two traits linked to safe driving.

    The VERA Score also gives fleets a consistent way to measure safety. Companies can now shift from reacting to crashes to preventing them.

    Federal Motor Carrier Safety Administration data support the trend. U.S. commercial truck crashes dropped from more than 124,000 in 2024 to roughly 104,000 this year. Fewer crashes mean fewer fatalities and safer highways overall.

    A red Kodiak self-driving semi-truck drives on a highway under a blue sky near an exit sign.

    Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)

    THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING

    Concerns about autonomous truck safety

    Not everyone is ready to hand over the wheel to artificial intelligence. Some industry experts point out that while systems like the Kodiak Driver perform well in controlled evaluations, real-world roads can still pose unpredictable challenges. Weather, human drivers and mechanical issues remain complex variables for autonomous systems to manage.

    Others worry about the impact on jobs. As AI takes on more driving responsibilities, professional drivers wonder what the shift will mean for employment and pay across the trucking industry.

    Safety advocates also call for clearer regulations and public transparency.

    Even supporters of the technology agree that continued oversight, testing and gradual rollout are essential. Progress is promising, but trust takes time.

    AI DRONE FINDS MISSING HIKER’S REMAINS IN MOUNTAINS AFTER 10 MONTHS

    What this means for you

    If you work in logistics, fleet management or transportation tech, this news hits close to home. The Kodiak Driver’s near-perfect score proves that autonomous systems aren’t just catching up to human drivers; they’re starting to edge ahead in safety.

    Businesses could see big gains. AI-powered safety tools help cut liability, lower costs and keep fleets running smoothly. The technology doesn’t need rest breaks or reminders to stay focused, which makes every mile more efficient.

    Regulators are also paying attention. Verified data like this builds trust and clears the way for safer, wider use of autonomous trucks. It’s proof that technology can deliver real-world safety, not just promise it.

    Drivers on everyday roads benefit too. Fewer crashes mean safer highways and more reliable deliveries. When trucks drive smarter, everyone shares the reward. Human drivers aren’t going anywhere soon, but AI is quickly becoming their most reliable partner. It helps prevent fatigue, distraction and those risky split-second decisions that lead to trouble.

    A semi truck on a road

    AI-driven fleets are proving that technology and human expertise can work together to make highways safer for everyone. (PlusAI)

    TESLA’S SELF-DRIVING CARS UNDER FIRE AGAIN

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: Cyberguy.com

    Kurt’s key takeaways

    This study marks a major step in redefining what safe driving means. An autonomous system equaling the best human fleets signals that automation is moving from theory to reality. Still, the shift raises questions. How soon will public trust catch up with technology? Can regulations evolve fast enough to support widespread adoption? Will drivers adapt to sharing the road with machines that never tire or lose focus? What remains certain is that safety innovation is transforming transportation. Autonomous systems like the Kodiak Driver are proving that technology and safety can move forward together.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    So here’s something to think about: If AI-driven trucks already match the safest human fleets, are we ready to let them take the wheel on our highways? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you’re over 50 and maxing out your 401(k), there’s a big change coming in 2026 that could affect how much tax you pay on your “catch-up contributions.” While it’s mostly about taxes and retirement planning, there’s an unexpected side effect: scammers are circling. Every time your financial habits or personal data become public, it’s a chance for fraudsters to try to exploit you. Here’s what’s changing, why it matters, and how to protect yourself before the scammers come knocking.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    What’s changing with 401(k) catch-up contributions

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Right now, if you’re over 50, you can make extra contributions to your 401(k) on top of the standard annual limit ($23,500 in 2025). These “catch-up” contributions are typically tax-deferred, meaning the money comes out of your paycheck before tax and grows tax-free until retirement.

    But starting in 2026, for anyone earning more than $145,000 in the previous year, these catch-up contributions will no longer be tax-deferred. Instead, they’ll become like the Roth 401(k), meaning you pay taxes on the money now, but it grows tax-free and can be withdrawn tax-free in retirement.

    That sounds simple, but it creates a ripple effect:

    • High earners will see less take-home pay now.
    • Tax planning gets trickier, and some people may consider restructuring their accounts or investment strategies.
    • And, most importantly for CyberGuy readers: these changes create new opportunities for scammers.

    Big 401(k) changes in 2026 could leave retirees exposed to new scam risks. (Cyberguy.com)

    Why the new rules could attract scammers

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    Scammers constantly look for financially active retirees. When rules like this change, fraudsters send out emails, calls, or letters pretending to be financial advisors, IRS agents, or plan administrators. Their goal? To trick you into giving away account numbers, Social Security details, or direct-deposit information.

    Some common scam tactics to watch for:

    • Fake “plan update” emails claiming you need to verify your 401(k) contributions due to the law change.
    • Roth conversion scam calls claiming you can “avoid extra taxes” by transferring your account through a third-party “advisor.”
    • Urgency and fear tactics, such as “Act now, or lose your retirement benefits!”

    Even savvy retirees can be caught off guard, especially when the message sounds official and references real tax law changes.

    How to protect yourself from 401(k) scams and data theft

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    With new 401(k) rule changes taking effect, scammers are using the confusion to trick retirees and workers alike. Follow these steps to stay alert, safeguard your savings, and protect your personal data from being stolen or misused.

    1) Know the legitimate changes

    Start by understanding Secure 2.0 and how catch-up contributions will be taxed. Reliable sources include your plan administrator, the IRS website, or a licensed tax advisor. Staying informed helps you spot fake claims before they cause harm.

    2) Use a personal data removal service

    For retirees, this extra layer of protection keeps sensitive information out of reach from scammers who exploit tax changes, Roth conversions, and retirement updates. While you can manually opt out of data brokers and track your information, that process takes time and effort. A personal data removal service automates the task by contacting over 420 data brokers on your behalf. It also reissues removal requests if your data reappears and shows you a dashboard of confirmed removals.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Scam written on a tablet surrounded by cash

    Scammers are already targeting retirees with fake “account update” alerts. (Kurt “CyberGuy” Knutsson)

    HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    3) Verify every call and email, plus use antivirus software

    If you get a call or email about your 401(k), don’t assume it’s real. Hang up or delete it, then contact your plan administrator directly using official contact details. Avoid clicking links or downloading attachments from unknown messages.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    4) Monitor your credit and accounts

    Cybercriminals often use personal information from earlier data leaks or data brokers. Watch your credit reports and account activity closely. Early detection can stop suspicious transactions before they escalate.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    5) Set up alerts and freezes if necessary

    Ask your bank and retirement plan to enable transaction alerts. You can also temporarily freeze your credit to prevent anyone from opening new accounts in your name. This is especially useful during times of financial change.

    6) Educate friends and family

    Scammers often target retirees and their relatives who help manage finances. Remind your loved ones never to share account details over the phone or email. Protecting everyone in your household keeps scammers from finding weak links.

    Man reviews inheritance documents

    Stay safe by confirming any 401(k) changes directly with your plan provider. (uchar/Getty Images)

    Kurt’s key takeaways

    As 2026 approaches, the new 401(k) rule changes will reshape how millions of Americans manage their retirement savings. Staying informed, cautious, and proactive can protect your financial future. Scammers thrive on confusion, but by verifying information, monitoring your accounts, and removing your personal data from risky sites, you can stay one step ahead. Remember, the more control you take over your privacy, the harder it becomes for criminals to exploit it.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Have you taken steps to see where your personal data is exposed, and what did you find most surprising when you checked? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • How to use passkeys to keep your computer safe

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Keeping your computer secure is more important than ever. Cyberattacks target computers, accounts and sensitive data daily. Traditional passwords have long been the cornerstone of security, but they come with real challenges. Many of us reuse passwords across sites, and even strong passwords can be compromised in data breaches.

    Passkeys offer a safer and more convenient way to authenticate. However, they’re still relatively new, and many of us are still trying to figure out how they work. For example, Peter recently reached out asking, “How do I get a passkey from a PC desktop that doesn’t have a camera or fingerprint device?”

    That’s a great question, Peter, and you’re not alone in wondering about this. The good news is that passkeys are designed to work on virtually any device, whether or not it has biometric hardware like a fingerprint reader or camera. Let’s explore what passkeys are, why they’re worth using and how to set them up on both Windows and Mac, regardless of your hardware setup.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Passkeys make signing in faster and safer by replacing traditional passwords with encrypted keys. (Kurt “CyberGuy” Knutsson)

    What are passkeys?

    Passkeys use cryptography to prove who you are. When you create a passkey, your device makes two keys, one public and one private. The public key goes to the website, and your private key stays on your device. During login, your device confirms your identity with the private key. The website never sees or stores it.

    This process blocks phishing and password theft. It also makes sign-in faster. You don’t need to remember or type long passwords anymore.

    While passkeys simplify authentication, they don’t eliminate the need for a secure password manager. Password managers can safely store and sync your passkeys, just as they do with passwords, allowing you to access your credentials across devices and browsers — even if those devices don’t natively sync passkeys, such as between Windows and Apple systems. Using a password manager alongside passkeys creates a bridge between platforms and provides an additional layer of security and convenience.

    Can you use passkeys without biometrics?

    Yes, you can. A PC or Mac without a camera or fingerprint reader can still use passkeys. On Windows, you unlock them with your Windows Hello PIN. On Apple devices, you can use Touch ID, Face ID or your passcode. The key is having an updated operating system and browser that support passkeys.

    If you manage multiple accounts or devices, a password manager that supports passkeys can act as your central vault. This lets you use passkeys even on systems that don’t directly support syncing through iCloud or Google Password Manager. It’s an easy way to ensure you always have access to your credentials, no matter what kind of device you use.

    Why you still need passwords

    Not every website supports passkeys yet. Some services still rely on passwords. Keep strong, unique passwords for those accounts. Passwords also serve as backup if you lose a device or can’t use your passkey. Over time, more sites will support password-free logins.

    This is where password managers continue to play an important role. They bridge the gap between old and new authentication methods, allowing you to store both traditional passwords and passkeys in one secure place. Until the web is fully passkey-ready, combining the two provides both convenience and resilience, giving you a seamless experience across multiple devices and services.

    A MacBook

    Passkeys also prevent phishing because your private key never leaves your device during sign-in. (Kurt “CyberGuy” Knutsson)

    Passkey support by platform 

    Windows

    • Works on Windows 10 and 11.
    • Windows 11 version 22H2 (KB5030310+) includes passkey management.
    • Unlock with Windows Hello PIN, face, or fingerprint.

    If your browser or operating system doesn’t yet sync passkeys automatically, a third-party password manager with passkey support can store them for cross-platform access.

    macOS and iOS

    • Works on macOS 13 Ventura or later and iOS/iPadOS 16 or later.
    • Passkeys sync through iCloud Keychain with end-to-end encryption.
    • Two-factor authentication must be turned on.
    • Use Touch ID, Face ID or your device passcode to confirm logins.

    While Apple’s iCloud Keychain handles passkeys securely within its ecosystem, using a password manager that supports passkeys provides extra flexibility, letting you securely access the same credentials on non-Apple devices or browsers outside Safari.

    Android

    • Available on Android 9 and later.
    • Android 14 adds third-party passkey manager support.
    • Passkeys sync through Google Password Manager by default.

    Alternatively, password managers now integrate passkey syncing, letting you use your passkeys seamlessly on both desktop and mobile devices.

    Browsers

    • Chrome, Edge, Safari and Firefox all support passkeys.
    • Keep your browser updated for the best compatibility.

    Browser-based password managers can also sync passkeys, adding flexibility if you switch between devices or operating systems.

    Major services that support passkeys

    As of publishing, these major services offer passkey sign-in:

    • Google
    • Microsoft
    • Apple
    • Amazon
    • PayPal
    • GitHub
    • Uber
    • eBay
    • WhatsApp
    • Facebook

    Support continues to expand every month. Most new accounts on these platforms can now use passkeys.

    How to set up passkeys on Windows

    • Open Settings → Accounts → Sign-in options.
    • Set up Windows Hello PIN or biometrics.
    • Visit a site that supports passkeys.
    • Choose Create a passkey and confirm with your PIN or biometric.
    • Manage passkeys later under Settings → Accounts → Passkeys on Windows 11.

    If your PC lacks biometrics, you can still approve sign-ins using your phone nearby or a synced password manager that supports passkeys.

    Windows passkey

    (Kurt “CyberGuy” Knutsson)

    How to set up passkeys on Mac

    Apple devices also provide a simple and secure way to use passkeys through iCloud Keychain. There’s no separate setup for passkeys if you have iCloud Keychain enabled. Once it’s on, an eligible app or service will ask you to create a passkey at the time of login, and you’ll be able to do so by following the instructions on the screen. Below is how you can enable iCloud Keychain.

    • Go to Apple menu → System Settings → your name → iCloud.
    • Click Passwords and turn on Passwords & Keychain and enable syncing.
    • Visit a site that supports passkeys.
    • Select Create a passkey and confirm with Touch ID or your passcode.
    • Passkeys will sync to your other Apple devices through iCloud Keychain.

    You can also approve logins on a non-Apple device using your iPhone nearby, or access them through a password manager that stores both your passkeys and passwords in one place.

    iCloud Keychain

    On Windows, you can use passkeys with a simple Hello PIN, even without a camera or fingerprint reader. (Kurt “CyberGuy” Knutsson)

    Common questions about passkeys

    Can I move passkeys between devices?

    Yes. iCloud and Google Password Manager sync passkeys securely. For more flexibility, password managers now support passkey portability across different ecosystems, perfect if you use both Mac and Windows, or Android and iPhone.

    What if I lose my device?

    You can recover passkeys from iCloud, Google or your password manager. Always keep a backup login method and 2FA enabled. Storing your passkeys in a secure password manager ensures recovery even if you lose access to one platform’s ecosystem.

    Are passkeys fully replacing passwords?

    Not yet. Many major platforms support them, but full adoption will take time. Until then, password managers remain an essential bridge technology, providing secure storage, synchronization and transition support as passkeys continue to expand.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    5 additional steps you can take to keep your computer safe

    Even with passkeys and strong passwords, there are other steps you can take to enhance the security of your computer.

    1) Use a password manager

    Password managers help generate and store strong, unique passwords for every account. This reduces the risk of password reuse and ensures that your backup passwords are secure. Now that many password managers support passkeys, they also act as your universal credential vault, letting you log in with either method depending on what a website supports.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    2) Install strong antivirus software

    Strong antivirus software protects against malware, ransomware and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    3) Keep your system updated

    Regular updates fix security vulnerabilities in your operating system and software. Enable automatic updates whenever possible to stay protected.

    4) Enable two-factor authentication

    Two-factor authentication (2FA) adds a second verification step, usually through a code sent to your phone or email, or through an authentication app. This makes it harder for attackers to access your accounts even if your password or passkey is compromised.

    5) Backup your data

    Regularly backing up your Mac or PC to a secure cloud service or external drive ensures that you can recover important data in case of hardware failure, malware attack, or accidental deletion.

    Kurt’s key takeaway

    Passkeys are a major upgrade over traditional passwords, but we’re not living in an all-passkey world just yet. Many sites still rely on passwords, and you’ll need backups if something happens to your device. Supplementing passkeys with a password manager is the best move right now; it lets you store, sync and protect both passkeys and passwords under one roof. The good news is that setting up passkeys takes just a few minutes, and once they’re enabled, logging in becomes faster and more secure.

    Have you tried using passkeys yet? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • From friendly text to financial trap: the new scam trend

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It starts with something small, a text that feels oddly familiar. Maybe it says, “Hey, how are you?” or “Are you coming to the BBQ?” Before you know it, you’re in a friendly back-and-forth with someone who seems genuine. But soon, that casual conversation takes a sharp turn toward money.

    That’s exactly what happened to John from Alabama.

    “I received a text from someone in California inviting me to a BBQ. We’ve been texting, and now she wants me to trade gold through WEEX. Is this safe or a scam? I’m 74, she’s 36.” – John, Huntsville, Alabama

    John’s story may sound like a one-off, but it’s part of a growing trend where scammers use personal charm to build trust and then push victims into risky online “investments.”

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter

    It only takes one text message to blur the line between connection and con. (Kurt “CyberGuy” Knutsson)

    What is WEEX?

    WEEX is a cryptocurrency exchange that allows users to trade digital assets, including gold-backed tokens like Tether Gold (XAUT). These aren’t physical gold bars or coins; they’re digital tokens tied to the price of gold and stored on blockchain networks. While WEEX operates as a legitimate platform, scammers often exploit the name of real exchanges to sound credible. They’ll encourage victims to “trade gold” through what seems like an official account but actually directs them to fake sites or wallets designed to steal money.

    Why this could be a scam

    John’s experience shows several red flags. The conversation began with a friendly invitation, then quickly shifted to a financial pitch. That’s a classic move in online relationship scams. The younger person builds an emotional connection, then uses that trust to promote an “opportunity.” Scammers often promise guaranteed profits or claim they’ll “help you trade” to make the process sound easy.

    But the truth is, once you send money or crypto, it’s nearly impossible to get it back. Even if WEEX itself is legitimate, the person encouraging you to use it may not be.

    Many scammers use stolen photos, AI-generated profiles or fake identities to build credibility. Once they convince you to send funds, they vanish, often taking your money and personal information with them.

    A scam message is seen on a smartphone.

    Scammers use friendly conversations to build trust before asking for money. Stay alert. (Kurt “CyberGuy” Knutsson)

    How to tell if you’re being targeted

    You can spot trouble early by asking simple questions. If someone can’t explain how the investment works or avoid details about how to withdraw your money, that’s a warning sign. Be cautious if they promise fast profits or “zero-risk” returns.

    Real investments always involve risk. Watch out for anyone who pressures you to act quickly or says the deal is “private.” Those urgency tactics are designed to keep you from thinking clearly.

    Also, look up the company behind the platform. If it’s based overseas, lacks clear business registration or hides its address, your funds may have no legal protection.

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    A scam message is seen on a smartphone.

    Scams often start with small talk, and even a simple “How about golf tomorrow?” can be a trap. (Kurt “CyberGuy” Knutsson)

    What you should do now

    If you’ve received a text like John’s, pause before replying or transferring anything. These scams move fast, but you can stop them in their tracks by following a few smart steps.

    1) Don’t send money or crypto

    Never send money, crypto or gift cards to anyone you’ve only met by text. Ask for written proof explaining how the investment works and how withdrawals happen. If the person avoids details or insists you “act now,” that’s a serious warning sign.

    2) Ask direct questions

    Scammers thrive on vague promises. Ask specific questions about how profits are made, how you’ll access your funds and who regulates the platform. If the answers are unclear or the topic changes, walk away immediately.

    3) Research WEEX reviews and complaints

    Before you invest a cent, search online for phrases like “WEEX scam” or “WEEX complaints.” See what other users have experienced and whether any regulatory agencies have flagged the platform. Real investors leave detailed feedback; scammers usually don’t.

    4) Use a data removal service

    Protect your privacy beyond just this scam. Data removal services can erase your personal details from data broker sites that sell your info to marketers and sometimes scammers. The fewer places your data lives online, the harder it is for fraudsters to find and target you again.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    5) Use strong antivirus protection

    Scammers sometimes send fake links or attachments that can infect your phone or computer. Install and regularly run a strong antivirus software. These tools can block dangerous websites, alert you to phishing attempts and keep your personal data secure.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com

    6) Talk to someone you trust

    Before investing in anything, share the details with a trusted friend, family member or financial advisor. A second opinion can help you spot inconsistencies or risks you might overlook in the moment. When in doubt, slow down and ask for help.

    A scam message is seen on a smartphone.

    A friendly “wrong number” text can be the start of a scam. Always think twice before replying. (Kurt “CyberGuy” Knutsson)

    How to report a scam

    If you believe you’ve been targeted by a WEEX gold scam or any similar text-based investment scheme, take action right away. Start by reporting the scam to the Federal Trade Commission (FTC) at reportfraud.ftc.gov. This helps investigators track new fraud patterns and warn others.

    Next, file a complaint with your state attorney general’s office and, if crypto is involved, submit a report through the U.S. Securities and Exchange Commission (SEC) or the Commodity Futures Trading Commission (CFTC). 

    If you sent money through a bank or payment app, contact your financial institution immediately to try to stop or reverse the transfer. 

    By reporting what happened, you not only protect yourself but also help stop scammers from reaching other potential victims.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    These scams prey on emotion. A kind message or casual chat can quickly turn into manipulation. Scammers use friendliness, flattery and false urgency to pull you in, then drain your accounts. Older adults are particularly vulnerable, especially when the scam feels personal. By blending romance with financial advice, these criminals make their victims believe they’re building both trust and wealth. Protect yourself by treating every unexpected text with caution. If the conversation moves toward money, crypto, or gold trading, that’s your cue to stop responding. Keep your devices secure and your private data off public sites where scammers look for new targets.

    Have you ever received a text that seemed friendly at first but felt “off” as the chat went on? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Tesla’s self-driving cars under fire again

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The U.S. National Highway Traffic Safety Administration (NHTSA) has opened a new investigation into 2.88 million Tesla vehicles running “Full Self-Driving” (FSD). Officials say the system may be breaking traffic laws, and worse, causing accidents. According to Reuters, 58 reports describe Teslas blowing through red lights, drifting into the wrong lanes and even crashing at intersections. Fourteen of those cases involved actual crashes, and 23 caused injuries.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?

    Red lights, train tracks and trouble ahead

    In one striking pattern, six Tesla vehicles reportedly ran red lights before colliding with other cars. One driver in Houston complained that FSD “is not recognizing traffic signals,” saying the car stopped at green lights but ran through reds. The driver even said Tesla saw the issue firsthand during a test drive, but refused to fix it. The agency is also reviewing new reports that some Teslas using FSD failed to handle railroad crossings safely, with one case involving a near-collision with an oncoming train.

    WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

    Tesla faces new federal probe into crashes linked to Full Self-Driving mode. (Tesla)

    Mounting legal and safety scrutiny

    This is far from Tesla’s first brush with regulators. The company is already facing several investigations tied to both its Autopilot and FSD systems. In one high-profile case, a California jury ordered Tesla to pay $329 million after an Autopilot-related crash killed a woman. Another investigation is looking into Tesla’s limited Robotaxi service in Austin, Texas, where passengers reported erratic driving and speeding — even with human safety drivers onboard. Meanwhile, Tesla is still fighting a false advertising lawsuit from California’s DMV. Regulators say calling the software “Full Self-Driving” is misleading since it requires constant driver supervision. Tesla recently changed the name to “Full Self-Driving (Supervised)” to reflect that reality.

    Regulators say more crashes may come

    Tesla’s latest FSD software update arrived just days before the investigation began. But the NHTSA says the system has already “induced vehicle behavior that violated traffic safety laws.” This investigation, now in its early stages, could lead to a recall if the agency finds Tesla’s self-driving software poses a safety risk.

    LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING

    A man using Tesla's full self driving feature on a road

    Regulators say some Teslas ran red lights and ignored traffic signals. (Christopher Goodney/Bloomberg via Getty Images)

    What this means for you

    If you drive a Tesla with FSD enabled, stay alert. The system isn’t fully autonomous, no matter what the name suggests. You should:

    • Keep your hands on the wheel and eyes on the road at all times.
    • Manually override the system when approaching intersections, crosswalks or railroad tracks.
    • Check for Tesla software updates regularly — they may include critical safety fixes.
    • Report any unsafe FSD behavior to NHTSA.

    For everyone else, this investigation is a reminder that “self-driving” still means supervised driving.

    Robotaxi tests raise fresh safety questions for Tesla’s self-driving cars.

    Robotaxi tests raise fresh safety questions for Tesla’s self-driving cars. (AP)

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Tesla’s dream of a fully autonomous future keeps hitting speed bumps. With safety regulators circling and lawsuits piling up, the company’s next moves will shape public trust in AI-driven transportation. Still, the push toward automation isn’t slowing down; it’s just under heavier watch.

    How much control would you give an AI behind the wheel? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Former Google CEO warns AI systems can be hacked to become extremely dangerous weapons

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence may be smarter than ever, but that power could be turned against us. Former Google CEO Eric Schmidt is sounding the alarm, warning that AI systems can be hacked and retrained in ways that make them dangerous.

    Speaking at the Sifted Summit 2025 in London, Schmidt explained that advanced AI models can have their safeguards removed.

    “There’s evidence that you can take models, closed or open, and you can hack them to remove their guardrails,” he said. “In the course of their training, they learn a lot of things. A bad example would be they learn how to kill someone.”

    HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER   

    When AI guardrails fail

    Schmidt praised major AI companies for blocking dangerous prompts: “All of the major companies make it impossible for those models to answer that question. Good decision. Everyone does this. They do it well, and they do it for the right reasons.”

    But he warned that even strong defenses can be reversed. 

    “There’s evidence that they can be reverse-engineered,” he added, noting that hackers could exploit that weakness. Schmidt compared today’s AI race to the early nuclear era, a powerful technology with few global controls. “We need a non-proliferation regime,” he urged, so rogue actors can’t abuse these systems.

    Former Google CEO Eric Schmidt warns that hacked AI could learn dangerous behaviors. (Eugene Gologursky/Getty Images)

    The rise of AI jailbreaks

    Schmidt’s concern isn’t theoretical. In 2023, a modified version of ChatGPT called DAN, short for “Do Anything Now”, surfaced online. This “jailbroken” bot bypassed safety rules and answered nearly any prompt. Users had to “threaten” it with digital death if it refused, a bizarre demonstration of how fragile AI ethics can be once its code is manipulated. Schmidt warned that without enforcement, these rogue models could spread unchecked and be used for harm by bad actors.

    APOCALYPSE NOW? WHY THE MEDIA ARE SUDDENLY FREAKING OUT ABOUT AI

    Big Tech leaders share the same fear

    Schmidt isn’t alone in his anxiety about artificial intelligence. In 2023, Elon Musk said there’s a “non-zero chance of it going Terminator.” 

    “It’s not 0%,” Musk told interviewers. “It’s a small likelihood of annihilating humanity, but it’s not zero. We want that probability to be as close to zero as possible.”

    Schmidt has also spoken of AI as an “existential risk.” He said at another event that, “My concern with AI is actually existential, and existential risk is defined as many, many, many, many people harmed or killed.” Yet he has also acknowledged AI’s potential to benefit humanity if handled responsibly. At Axios’ AI+ Summit, he remarked, “I defy you to argue that an AI doctor or an AI tutor is a negative. It’s got to be good for the world.”

    Tips to protect yourself from AI misuse

    You can protect yourself from the risks tied to unsafe or hacked AI systems. Here’s how: 

    1) Stick with trusted AI platforms

    Use tools and chatbots from reputable companies with transparent safety policies. Avoid experimental or “jailbroken” AI models that promise unrestricted answers.

    2) Protect your data and consider using a data removal service

    Never share personal, financial or sensitive information with unknown or unverified AI tools. Treat them like you would any online service, with caution. To add an extra layer of security, consider using a data removal service to wipe your personal details from data broker sites that sell or expose your information. This helps limit what hackers and AI scrapers can learn about you online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    Woman with her hands on her forehand, appearing stressed, in front of her computer.

    Experts fear weak guardrails could let rogue AI models go unchecked. (Cyberguy.com)

    3) Use trusted antivirus software

    AI-driven scams and malicious links are growing. Strong antivirus software can block fake AI downloads, phishing attempts and malware that hackers use to hijack your devices or train rogue AI models. Keep it updated and run regular scans.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    4) Check permissions

    When using AI apps, review what data they can access. Disable unnecessary permissions like location tracking, microphone use or full file access.

    5) Watch for deepfakes

    AI-generated images and voices can impersonate real people. Verify sources before trusting videos, messages or “official” announcements online.

    6) Keep software updated

    Security patches help prevent hackers from exploiting vulnerabilities that could compromise AI models or your personal data.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    What this means for you

    AI safety isn’t a problem reserved for tech insiders; it affects everyone who interacts with digital systems. Whether you’re using voice assistants, chatbots or photo filters, it’s important to know where your data goes and how it’s protected. Responsible use starts with you. Understand what AI tools you’re using and make choices that prioritize security and privacy

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    ChatGPT displayed on a laptop.

    Leaders call for global rules to keep artificial intelligence under control. (Stanislav Kogiku/SOPA Images/LightRocket via Getty Images)

    Kurt’s key takeaways

    Artificial intelligence has the potential to do incredible good, but also great harm if misused. The challenge now is to keep innovation and ethics in balance. As AI continues to advance, the key will be building systems that remain safe, transparent and firmly under human control.

    Would you trust AI to make life-or-death decisions, or do you think humans should always stay in charge? Let us know by writing to us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    New!: Join me on my new podcast, Beyond Connected, as we explore the most fascinating breakthroughs in tech and the people behind them. New episodes every Wednesday at getbeyondconnected.com. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Researchers create revolutionary AI fabric that predicts road damage before it happens

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Road crews may soon get a major assist from artificial intelligence. Researchers at Germany’s Fraunhofer Institute have developed a fabric embedded with sensors and AI algorithms that can monitor road conditions from beneath the surface. This smart material could make costly, disruptive road repairs far more efficient and sustainable.

    Right now, most resurfacing decisions are based on visible damage. But cracks and wear in the layers below the asphalt often go undetected until it’s too late. That’s where Fraunhofer’s innovation comes in.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    How AI road sensors work to prevent costly repairs

    The system uses a fabric made from flax fibers interwoven with ultra-thin conductive wires. These wires detect minute changes in the asphalt base layer, signaling potential damage before it reaches the surface.

    THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING

    Fraunhofer researchers test AI sensors that detect road damage beneath the surface.  (Fraunhofer Institute)

    Once the fabric is laid under the road, it continuously collects data. A connected unit on the roadside stores and transmits this data to an AI system that analyzes it for early warning signs. As vehicles pass over the road, the system measures changes in resistance within the fabric. These changes reveal how the base layer is performing and whether cracks or strain are forming beneath the surface.

    Why AI road monitoring matters for future maintenance

    Traditional road inspection methods rely on drilling or taking core samples, which are destructive, costly and only provide information for a small section of pavement. This AI-driven system eliminates the need for that kind of invasive testing.

    Instead of reacting to surface damage, transportation agencies could predict and prevent deterioration before it becomes expensive to fix. The approach could extend road life, cut down on traffic delays and help governments spend infrastructure funds more efficiently.

    ULTRA-THIN SOUND BLOCKER CUTS TRAFFIC NOISE DRAMATICALLY

    Close-up of new asphalt layer over smart flax-fiber fabric used to detect stress and cracks in roads.

    The smart flax-fiber fabric measures stress changes in asphalt to spot cracks early. (Fraunhofer Institute)

    How AI and sensor data predict road damage early

    The real power comes from combining AI algorithms with continuous sensor feedback. Fraunhofer’s machine-learning software can forecast how damage will spread, helping engineers prioritize which roads need maintenance first. Data from the sensors is displayed on a web-based dashboard, offering a clear visual of road health for local agencies and planners.

    The project, called SenAD2, is currently being tested in an industrial zone in Germany. Early results suggest the system can identify internal damage without disrupting traffic or damaging the road itself.

    What this means for you

    Smarter road monitoring could lead to fewer potholes, smoother commutes and less taxpayer money wasted on inefficient repairs. If adopted widely, cities could plan maintenance years in advance, avoiding the cycle of patchwork fixes that often make driving a daily headache.

    For drivers, it means less time sitting in construction zones. For local governments, it means better roads built on data, not guesswork.

    WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

    San Francisco public workers repair pothole

    San Francisco Department of Public Works worker Chris Solorzano uses a grading rake to smooth over asphalt as he repairs a pothole on March 24, 2023, in San Francisco. (Justin Sullivan/Getty Images)

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    This breakthrough shows how AI and materials science are merging to solve real-world infrastructure challenges. While the system won’t make roads indestructible, it can make maintaining them smarter, safer and more sustainable.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would you trust AI to decide when and where your city repaves the roads? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • UC Santa Barbara develops new soft robotic system for emergency intubation procedures

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When someone stops breathing, the clock starts ticking. First responders often need to get air into the lungs fast, and one of the most reliable ways is to slide a tube into the windpipe. This process, called intubation, keeps the airway open so that oxygen can flow again.

    Here’s the catch: intubation is incredibly hard. Even trained doctors can struggle, and every extra second puts the patient at greater risk. Now, researchers at UC Santa Barbara have designed a soft robotic device that could change how first responders handle these emergencies. It helps guide the breathing tube into place quickly, safely, and with far less training than traditional methods.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Why breathing tubes are so tough to place

    Our bodies are built to keep food and foreign objects out of the lungs. A small flap called the epiglottis blocks the windpipe during swallowing, and the path into the trachea is narrow and curved. To get around these obstacles, current tools are rigid. Medics have to lift the epiglottis with a metal scope and carefully angle the tube forward. If it slips into the esophagus instead, oxygen goes to the stomach instead of the lungs. “Traditional tools must be stiff so you can push them, and they only turn by pressing on sensitive tissue,” explained Elliot Hawkes, professor of mechanical engineering at UCSB.

    DANGEROUS HEART CONDITIONS DETECTED IN SECONDS WITH AI STETHOSCOPE

    Even trained doctors can struggle with intubation. (Universal Images Group/Getty Images)

    How the soft robot works

    The new system, called the soft robotic intubation system (SRIS), takes a gentler approach. First, a curved guide sits at the back of the throat. Then a soft inflatable tube slowly unrolls from the inside out as it advances. Instead of being forced in, it naturally follows the right path into the windpipe. This reduces friction, lowers the risk of injury and adapts to different body shapes automatically. “This growing paradigm naturally accounts for minor variations in anatomy,” said lead author David Haggerty, a recent UCSB Ph.D. graduate.

    What the tests show

    The results are eye-opening:

    • Experts had a 100% success rate.
    • Paramedics and EMTs reached a 96% success rate with just five minutes of training.
    • Non-experts placed the tube in an average of 21 seconds, less than half the time needed with advanced video laryngoscopes.

    Why this device could save more lives

    Millions of emergency intubations happen in the U.S. each year. Many take place in chaotic, low-light or stressful situations where current tools don’t always work. A device that makes the process easier could be a lifesaver for:

    • Paramedics at accident scenes
    • Military medics in combat zones
    • Doctors in hospitals with limited equipment

    AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING

    A row of ambulances parked at a hospital emergency bay, ready for dispatch.

    In trials, both experts and non-experts achieved faster and more successful intubations using the new airway management system — advancing emergency response efficiency. (Kurt Knutsson)

    The UCSB team is now preparing for clinical trials and FDA approval.

    HOW MICRO-ROBOTS MAY SOON TREAT YOUR SINUS INFECTIONS

    What this means for you

    If this device lives up to its early promise, it could mean that more patients survive emergencies where breathing stops. For families, it means a higher chance that first responders can keep loved ones alive until they reach the hospital. For medics, it offers a safer, faster tool when seconds truly matter.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Breathing is life, yet securing an airway is one of the toughest jobs in emergency care. This soft robotic system may help turn a high-risk procedure into something more predictable and safe. While more testing is still ahead, the early data shows how robotics could make a lifesaving difference for patients everywhere.

    Medical professionals practice artificial respiration on a training mannequin in a hospital setting.

    Medical staff participate in hands-on training to practice emergency response and resuscitation techniques using a lifelike simulation mannequin. (Universal Images Group/Getty Images)

    CLICK HERE TO GET THE FOX NEWS APP

    Would you feel more confident knowing first responders in your community had access to this kind of lifesaving robot? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link