ReportWire

Tag: Smartphones

  • Instagram to alert parents over teens’ suicide and self-harm searches – Tech Digest

    [ad_1]

    Share


    In a shift to its safety protocols, Instagram has announced it will begin proactively alerting parents if their teenagers repeatedly search for terms related to suicide and self-harm.

    The feature marks the first time that parent company Meta will notify parents about specific search behaviours, rather than simply blocking the content and providing resources to users.

    The move comes as Meta and other tech giants face what experts are calling their “Big Tobacco” moment. CEO Mark Zuckerberg recently testified in Los Angeles Superior Court regarding allegations that Instagram’s design fosters addiction and detrimental mental health effects in minors.

    By introducing these alerts, Meta aims to provide parents with “the resources they need to support their teen” during critical windows of distress.

    How the alerts will function

    The system is designed to trigger when a teenager enrolled in Instagram’s “Teen Accounts” repeatedly searches for phrases promoting self-harm or terms like “suicide” within a short period. Notifications will be delivered to parents via email, text, WhatsApp, or through the Instagram app itself.

    Meta acknowledged that the system might “err on the side of caution,” potentially sending alerts that do not indicate a genuine crisis. However, it maintains that notifying parents is the “right starting point.”

    The rollout will begin next week in the United Kingdom, United States, Australia, and Canada, with a global release planned for later this year. Meta also intends to expand these alerts to its AI chatbots, as more children turn to artificial intelligence for emotional support.

    Backlash from safety advocates

    Despite the intended safety benefits, the Molly Rose Foundation – a charity established following the death of 14-year-old Molly Russell – has heavily criticized the plan. Chief Executive Andy Burrows warned that “forced disclosures could do more harm than good,” noting that “flimsy notifications will leave parents panicked and ill-prepared” for the sensitive conversations that follow.

    Advocates argue that the burden of safety is being shifted onto parents rather than addressed at the source. The Molly Rose Foundation cited research suggesting that Instagram’s algorithms still actively recommend harmful content to vulnerable youths.

    Similarly, Ged Flynn of the charity Papyrus stated that parents “don’t want to be warned after their children search for harmful content; they don’t want it to be spoon-fed to them by unthinking algorithms.”

    As regulators in countries like Australia move toward total social media bans for under-16s, Meta’s latest tool represents a high-stakes attempt to prove that self-regulation can still protect young users in an increasingly digital world.


    For latest tech stories go to TechDigest.tv


    Discover more from Tech Digest

    Subscribe to get the latest posts sent to your email.

    [ad_2]

    Chris Price

    Source link

  • Samsung’s Galaxy S26 Phones Are Light On Hardware Upgrades, Heavy on AI

    [ad_1]

    Right on schedule: Samsung has just announced its latest flagship smartphones, the Galaxy S26 series, at its Galaxy Unpacked event in San Francisco.

    The Galaxy S26 series follows the same refresh pattern of past years: small tweaks to an established formula. That may make the new Galaxy S26, S26+, and S26 Ultra, which are available for preorder today, Feb. 25, and at retail starting on Mar. 11, sound a bit tame, but that’s just how these annual phone launches are now. That doesn’t mean there’s nothing to get excited about. Specifically, the Galaxy S26 Ultra has a new display feature called “Privacy Screen” that I want every other phone to copy.

    See Galaxy S26/S26+ at Samsung.com

    See Galaxy S26 Ultra at Samsung.com

    Goodbye titanium (on the S26 Ultra)

    The Galaxy S26 Ultra ditches titanium for aluminum. © Adriano Contreras / Gizmodo

    Let’s skip right to the most notable changes first. Just like Apple did with the iPhone 17 Pros, Samsung has ditched titanium for aluminum. Apple justified the metal frame downgrade as a way to improve the iPhone 17 Pro’s thermals, allowing heat to disperse more evenly across the phone’s backside with the aid of a new vapor chamber for better cooling, which in turn prevents performance throttling. In the S26 Ultra’s case, the aluminum means a lighter device at 214g versus the S25 Ultra’s 233g.

    I have not touched any of the Galaxy S26 phones in person—I couldn’t make it to Unpacked because of the blizzard that hit the U.S. Northeast just before the event—but my colleague, Adriano Contreras, who took all of the photos in this article, did, and he told me they definitely feel lighter, though no less solid in the hand.

    Samsung Galaxy S26 Series 3
    The Galaxy S26 and S26+ are largely the same phones as their S25 and S25+ predecessors. © Adriano Contreras / Gizmodo

    The regular S26 and 26+ both stick with aluminum frames. This time around, the S26 Ultra also has the same rounded corner radii as the other S26 models. Altogether, Samsung says the less boxy design on the S26 Ultra gives the whole S26 lineup a more unified design.

    Beyond other small tweaks like an updated camera island that resembles the one found on the Galaxy Z Fold 7 and S25 Edge, the S26 series is just another touchscreen slab. If you’re looking for a less traditional form factor, consider Samsung’s foldables like the Z Fold 7 or the Z Flip 7.

    A screen that’s more private in public

    Samsung Galaxy S26 Series 33
    © Adriano Contreras / Gizmodo

    The biggest selling point the S26 Ultra has going for it is its new “Privacy Display.” This is a pixel-level display technology that lets you darken the sides or top of the screen to prevent others from seeing your content. It’s sort of like one of those privacy screen protectors that you can apply on top of your phone’s screen, except it’s built into the S26 Ultra.

    The Privacy Display feature is also more than just a built-in privacy screen protector. It can also obscure notifications, passwords, PIN codes, and pattern unlocks to safeguard them from potential peepers. Again, I have not seen or tried the Privacy Display feature for myself, but Adriano tells me that it’s “impressive.” In his own words: “When I saw it only blur a text notification bubble up top, that’s when I said out loud, ‘sold!’”

    Samsung Galaxy S26 Series 31
    © Adriano Contreras / Gizmodo

    Sounds really neat. The only downside is that the Privacy Display feature is exclusive to the S26 Ultra; the S26 and S26+ do not have it.

    Faster performance, faster charging, and slightly improved cameras

    As I said, the S26 series is mostly a minor hardware refresh. Almost everything is the same compared to the S25 series. The S26 Ultra has the same 6.9-inch screen; the S26+ has the same 6.7-inch display; the S26 screen is slightly larger at 6.3 inches versus the S25’s 6.2 inches, though it retains the same previous resolution.

    All three S26 phones are powered by Qualcomm’s latest Snapdragon 8 Elite Gen 5 for Galaxy chip. This is a customized version of the regular Snapdragon 8 Elite Gen 5 chip that other phone makers have access to. Samsung says you can expect a CPU that’s up to 19% faster, a GPU that’s up to 24% faster, and an NPU (neural processing unit for AI and machine learning) that’s up to 39% faster. Combined with a redesigned vapor chamber that Samsung claims dissipates more heat, the phones should throttle less, too.

    Samsung Galaxy S26 Series 27
    © Adriano Contreras / Gizmodo

    The battery capacities for all three S26 phones are identical to their predecessors: 4,300mAh on the S26, 4,900 on the S26+, and 5,000mAh on the S26 Ultra. The only difference is in charging speeds on the S26 Ultra, which can now fast wire charge at up to 60W and fast wireless charge at up to 25W. The regular S26 supports fast wired charging at up to 25W; the S26+ at up to 45W. For fast wireless charging, the S26 supports up to 15W and the S26+ up to 20W. To my disappointment, none of the S26 phones have built-in magnetic wireless charging at all. Even Google added magnetic wireless charging (Pixelsnap) to its Pixel 10 series (except the new Pixel 10a). Samsung’s defense is that all of its official S26 cases come with built-in magnets and that adding them would have made the phones thicker. I still think that Samsung shouldn’t have cheaped out here, especially on the S26 Ultra.

    As for the cameras on the S26, S26+, and S26 Ultra—they’re basically the same as before, too. The S26 and S26+ have a triple-lens camera system made up of a 50-megapixel f/1.8 wide, a 12-megapixel f/2.2 ultrawide, and a 10-megapixel f/2.4 3x optical telephoto zoom. The S26 Ultra has a quad-lens camera system comprised of a 200-megapixel f/1.4 wide, 50-megapixel f/1.9 ultrawide, 10-megapixel f/2.4 3x optical telephoto zoom, and a 50-megapixel f/2.9 5x optical telephoto zoom (with 10x optical-quality zoom). Eagle-eyed tech nerds will notice that the apertures on all four of the S26 Ultra cameras are larger (smaller f-stop number). Samsung says the 200-megapixel shooter is 40% brighter and the 50-megapixel tele is 37% brighter, which means low-light shots should look a little better. The company is also highlighting improvements to its “Nightography” video recording.

    Samsung Galaxy S26 Series 30
    The S26 Ultra is the only model with an S Pen stylus. © Adriano Contreras / Gizmodo

    All of the S26 phones have a 12-megapixel f/2.2 selfie camera. Samsung says it’s made improvements to exposing skin tones. No square-shaped image sensor to let you hold the S26 phones in portrait mode to shoot horizontal selfies like you can with the Center Stage camera on the iPhone 17 series and iPhone Air.

    More Galaxy AI… everywhere

    Samsung Galaxy S26 Series 46
    The Now Nudge feature uses AI to offer task suggestions. © Adriano Contreras / Gizmodo

    I expected Samsung to add more Galaxy AI features, but I think it may have gone too far this time. Unlike previous years, when Samsung sprinkled a few new AI features into its phones to get users familiar with what’s possible with the technology, the S26 phones feel like they have too many Galaxy AI features—so many that it might be hard to remember them all.

    Samsung truly stuffed the S26 phones with AI everywhere. “Now Nudge” works like the Pixel 10’s “Magic Cue” feature, proactively looking at your data and suggesting tasks like adding event details to a calendar, setting reminders, or sharing images from a specific day if you mention it in a text message. The “Now Brief” hub can now surface more timely reminders and events, pulling from incoming notifications. An “Automated app action” feature can let you enter a prompt like “call me an Uber to Seoul Station,” and the AI will launch the app and tap through the various buttons, and then ask for your final payment confirmation. This is Samsung’s take on agentic computing, where an AI does everything for you; it’s also limited to Uber at launch.

    Samsung Galaxy S26 Series 50
    The Automated app action AI feature operating Uber on your behalf. © Adriano Contreras / Gizmodo

    AI can now sort your screenshots into eight categories (social media, coupons, boarding passes, events, locations, barcodes, QR codes, and chats) to make it easier to find stuff later. “Circle to Search” can now identify multiple pieces of clothing in images of an outfit, which…. Samsung says will make it easier to shop for those pieces.

    There’s an improved Photo Assist feature that lets you describe changes you want to make to a photo; it’s similar to the Pixel’s “Help me edit” feature that uses Gemini to make photo edits. A “Creative Studio” lets you use a prompt to create images for wallpapers and stickers—I admit, creating stickers seems kind of fun. “Document Scan” is a beefed-up document scanner with settings to automatically remove fingers, creases, or page folds, and then compile the scanned pages into a single PDF. The “Audio Eraser” feature that uses AI to erase background noise from videos now works in select third-party apps like YouTube and Instagram.

    Samsung Galaxy S26 Series 5
    The Creative Studio image generator can be used to create images, wallpapers, and stickers. © Adriano Contreras / Gizmodo

    Samsung is also including “Call Screening,” which uses Galaxy AI to answer calls from unknown numbers and then transcribe them, and “Scam Detection,” which uses AI to identify potential scam callers.

    And if you thought Bixby was dead—it’s not. It’s been rebooted as an “Intelligent Device Agent” that can better understand natural language when it comes to stuff like getting help with your device settings. Samsung also says it’s integrated Perplexity to aid with expanded prompts when you might need an answer for a prompt that requires wider knowledge from the internet.

    Altogether, it’s a lot of AI to take in. How useful any of these features will be will come down to the individual. Tech companies are telling us how useful AI this and that will be in automating time-consuming tasks, but on phones, I’ve yet to fully trust them. Even on the Pixel 10 Pro, which I’m still dailying, I still find myself ignoring most of the Gemini features.

    A $100 Price Hike for the S26 and S26+

    Samsung Galaxy S26 Series 22
    © Adriano Contreras / Gizmodo

    All three S26 phones will be available in four colors: Cobalt Violet, sky blue, black, and white. There will be two online-exclusive colors: Silver Shadow and Pink Gold.

    But the thing that likely won’t sit well with consumers is the $100 price hike for the Galaxy S26 and S26+, which now start at $899.99 and $1,099.99, respectively, for 12GB of RAM and 256GB of storage. The S26 Ultra starts at the same as $1,299.99 as the S25 Ultra did for the same 12GB of RAM and 256GB of storage.

    Samsung didn’t provide any specific reason for the price hike, but if I were to guess, it probably has to do with the RAM and storage shortage caused by AI data center hoarding, which has led to the skyrocketing of almost all consumer electronics that use the components. Or, maybe it’s tariffs. Whatever the reason for the price increase, it sucks.

    See Galaxy S26/S26+ at Samsung.com

    See Galaxy S26 Ultra at Samsung.com

     

    [ad_2]

    Raymond Wong

    Source link

  • Spyware can hijack your phone in seconds

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You already know malware is out there. You hear about phishing emails, fake apps and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.

    If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.

    This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on both iPhone and Android devices.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/picture alliance via Getty Images)

    What makes ZeroDayRAT spyware so dangerous?

    Many types of malware focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.

    Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:

    • A full stream of incoming notifications
    • A searchable inbox of text messages
    • Device model and operating system details
    • Battery level and lock status
    • Network activity and app usage

    In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.

    It can watch and listen in real time

    Here is where things get even more disturbing.

    ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:

    • Capture every keystroke with context
    • See which app you opened
    • Track how long you spent inside it
    • Record gestures and inputs
    • Access your microphone
    • Activate your front or rear camera
    • View your screen in real time

    Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.

    Your banking and crypto apps are targets too

    Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker’s wallet.

    Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.

    Why Apple and Google are tightening app rules

    There is a reason Apple strongly discourages installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.

    How to tell if ZeroDayRAT spyware is on your phone

    Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.

    Unusual battery drain

    Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.

    Phone overheating without heavy use

    If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.

    Strange data usage spikes

    Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.

    Unknown apps or configuration changes

    Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings. On Android, review installed apps and device administrator permissions.

    Unexpected login alerts

    If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.

    Microphone or camera indicators are activating randomly

    Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.

    If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.

    149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

    Person typing on their phone's keyboard.

    Security researchers warn ZeroDayRAT functions as a full mobile surveillance toolkit sold openly online. (Photographer: Angel Garcia/Bloomberg via Getty Images)

    How to remove ZeroDayRAT spyware from your phone

    If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.

    1) Disconnect immediately

    Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.

    2) Change your passwords from a different device

    Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (2FA) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.  Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    3) Run a trusted mobile security scan

    Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Remove suspicious apps and profiles

    On iPhone, check SettingsGeneralVPN & Device Management for unknown configuration profiles. Delete anything you do not recognize. On Android, review installed apps and remove anything unfamiliar. Also, check device administrator settings and revoke access from unknown apps.

    5) Back up essential data carefully

    If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.

    6) Perform a factory reset

    A full factory reset on your iPhone or Android is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.

    7) Monitor your financial accounts

    Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.

    When to replace the device

    In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.

    Ways to stay safe from ZeroDayRAT spyware

    The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.

    1) Avoid sideloading apps

    Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.

    2) Think before you tap and use strong antivirus protection

    Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Keep your phone updated

    Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.

    4) Review app permissions regularly

    Check which apps have access to your camera, microphone and location. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.

    5) Use strong authentication

    Turn on two-factor authentication (2FA) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.

    6) Use a data removal service to reduce your exposure

    Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering.  Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Do not bypass your phone’s built-in security protections

    Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.

    YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

    Woman typing on her smartphone.

    Experts say the spyware can activate a phone’s microphone and camera without a user’s knowledge. (Karl-Josef Hildenbrand/picture alliance via Getty Images)

    Kurt’s key takeaways

    ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day. Your phone holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.

    Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    Related Article

    Android malware hidden in fake antivirus app

    [ad_2]

    Source link

  • European smartphone market dips, but Apple and HONOR defy downturn – Tech Digest

    [ad_1]

    Share


    The European smartphone market faced another year of headwinds in 2025, according to the latest research from Omdia.

    Total shipments declined by 1% to 134.2 million units, closing out a disruptive year defined by subdued consumer demand and strict new EU regulations requiring USB-C connectivity and eco-design standards.

    While the overall market contracted, the landscape is increasingly being dominated by its largest players. The region’s five biggest vendors continued to gain combined market share, highlighting that scale is becoming the primary requirement for long-term success in Europe’s mature and highly competitive environment.


    Brands bucking the trend

    Despite the slight market dip, several manufacturers managed to achieve record-breaking performances. Apple was the standout among the major players, growing its shipments by 6% to 36.9 million units.

    This surge propelled Apple to a record-high 27% market share in Europe. Growth was fuelled by a strong iPhone refresh cycle and the introduction of the iPhone 16e, which successfully replaced older models discontinued due to new USB-C mandates.

    HONOR also celebrated a milestone, climbing into Europe’s top five for the first time. The brand grew 4% to 3.8 million units by leveraging its affordable X-series to build relevance with key retail partners. Meanwhile, market leader Samsung maintained its top spot with marginal growth to 46.6 million units, buoyed by the popularity of the Galaxy A56 – the top-selling smartphone model in Europe for 2025.

    The research also highlighted significant growth from smaller, “challenger” brands that have found success through heavy differentiation. Vivo, London-based Nothing, and the sustainability-focused Fairphone all reported high double-digit growth, proving that unique branding can still capture interest in a saturated market.

    Looking ahead to 2026, analysts warn that rising memory prices and supply chain uncertainties could create a challenging outlook. “Scaling a smartphone business within Europe can be very gradual and challenging,” noted Runar Bjorhovde, Senior Analyst at Omdia.

    He suggested that larger vendors with diverse price-band coverage will likely be the most resilient if the industry is hit by further price increases.


    For latest tech stories go to TechDigest.tv


    Discover more from Tech Digest

    Subscribe to get the latest posts sent to your email.

    [ad_2]

    Chris Price

    Source link

  • iPhone feature saved skiers from deadly avalanche—how you can turn it on

    [ad_1]

    An iPhone safety feature is drawing renewed attention after six skiers were rescued during California’s deadliest recorded avalanche, with survivors using satellite messaging to stay in contact with emergency responders when traditional cell service failed.

    The avalanche struck near Lake Tahoe, killing eight people and leaving one missing, while six others were located and rescued after hours in severe winter conditions.

    The skiers were able to communicate with authorities using Apple’s Emergency SOS via satellite feature when they found themselves outside cellular and Wi-Fi coverage.

    Remote Areas

    Apple introduced Emergency SOS via satellite with the iPhone 14 lineup. The feature is available on supported models running iOS 16.1 or later and is designed for use in remote areas where cellular signals are not accessible.

    The satellite tool, available on newer iPhone models, allows users to text emergency services directly when traditional networks are unavailable. As interest in the feature grows, Apple users have been discussing how it works—and whether it should remain free.

    In the Lake Tahoe rescue, communication between the stranded group and emergency personnel proved critical.

    Rescuers ultimately found the group roughly 11 hours after the avalanche began, according to reports from Inc.

    Nevada County Sheriff Shannan Moon described the strength of the slide, saying: “A two would bury a person. A three would bury a house and it’s right in the middle of those two.”

    ‘Life saving’

    Reddit contributors reacting to the story said the feature justified the cost of newer iPhones.

    “This is probably the best feature the iPhone has ever added, possibly only behind fall detection in Apple Watches,” a fan declared on Reddit.

    Another agreed that, “This is the kind of feature that justifies the premium. Most people will never need it, but for the ones who do, it’s literally life-saving.”

    Some critics, however, raised concerns about reports that the feature may not remain free indefinitely.

    “The only worry is that it’s still planned to be a paid feature… which I think is completely wrong,” one remarked.

    Apple advises users to first attempt calling 911 or local emergency services, even if their regular carrier shows no service.

    If the call fails, iPhones will display an option to use Emergency Text via Satellite. Users can tap “Report Emergency” and follow on-screen prompts while keeping the phone held naturally with a clear line of sight to the sky.

    Once connected, the iPhone shares critical information with responders, including the user’s location, elevation, Medical ID (if set up), emergency contacts, responses to an emergency questionnaire and the device’s battery level.

    Risks Posed

    Apple also recommends trying the built-in demo under Settings > Emergency SOS before traveling to remote areas. The demo does not contact emergency services, but walks users through the satellite connection process.

    Emergency SOS via satellite is not available in all countries and regions and works only on supported models.

    As extreme weather and backcountry travel continue to pose risks, the Lake Tahoe rescue has prompted renewed attention on how smartphones can function as a lifeline when traditional networks fail.

    Newsweek has reached out to Apple for comment via email.

    To read how Newsweek uses AI as a newsroom tool, click here.

    [ad_2]

    Source link

  • Clean up your social media feed and cut the noise

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Scrolling used to be relaxing. Now it often feels chaotic. That is not a coincidence. Nearly everything you see on social media is controlled by algorithms that track what you like, watch, click and ignore. Over time, those signals get muddy. One curiosity click can reshape your feed for weeks. The solution is not deleting your accounts. It is retraining the system.

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.  

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    Your social media experience starts the moment you tap an app, and every click helps shape what shows up next. (Jaap Arriens/NurPhoto via Getty Images)

    How social media algorithms decide what you see

    Algorithms pay attention to behavior, not intention. They track engagement patterns and repeat what keeps you scrolling. If your feed feels off, it usually means the algorithm learned the wrong lesson. Resetting your feed helps correct that.

    Note: This article is written desktop-first (PC or Mac). When a step is phone-only or significantly different on mobile, it is clearly labeled.

    How to clean up your Facebook Feed

    Primary device: PC or Mac. Phone differences noted.

    Use Content Preferences to retrain Facebook (PC or Mac)

    Facebook’s feed is built around people, pages and groups you follow, plus recommended content and ads.

    • Click your profile photo in the upper right
    • Select Settings and Privacy > Content Preferences

    From here, you can:

    • Add people and groups to Favorites
    • Snooze posts temporarily
    • Unfollow accounts without unfriending them
    • Reconnect with accounts you muted before

    These tools are easiest to manage on a desktop.

    Filter your Feed view (PC or Mac)

    • To bypass the main algorithmic feed:
    • Click Feeds in the left navigation
    • Choose to view only Favorites,  Friends, Groups, or Pages

    This shows content chronologically within those categories.

    Hide and flag posts as you scroll (PC, Mac and phone)

    On any post in your Facebook feed:

    • Click the three-dot menu in the upper right of the post
    • Choose Hide post, Snooze, or Unfollow, depending on what appears

    Hiding posts and snoozing or unfollowing accounts sends the same signal to the algorithm. Use these options often. Facebook responds more reliably to repeated negative feedback than occasional clicks.

    For suggested posts and reels, you may also see Not interested. Selecting it further trains the feed away from similar content.

    Cut down ads and sensitive topics (PC, Mac and phone)

    When ads appear:

    • Click the X to hide them
    • Or use the three-dot menu to hide or report

    For deeper control:

    • Go to Settings and Privacy > Settings
    • Open Account Center
    • Click Ad Preferences > Customize ads
    • Select See All next to Ad Topics
    • Click View and manage topics
    • Click the topic name
    • Choose See less
    • Repeat this for every topic you want to limit.

    To block specific words in comments:

    • Click your profile picture (top right on desktop)
    • Settings & privacy → Settings
    • In the left column, click Profile and Tagging
    • Under “Profile,” look for Hide comments containing certain words from your profile and click on the arrow next to it.
    • Choose a list of words, phrases or emojis you want to hide from your profile and type them in the box.
    • Click Save below it.
    Using a computer

    Using a computer gives you deeper control over social media settings that are harder to find on a phone. (Kurt “CyberGuy” Knutsson)

    How to clean up your Instagram feed

    Primary device: Phone only

    Instagram does not currently offer a reliable, universal option to reset its algorithm. Feed control on Instagram is manual and behavior-based. That means the app learns from what you hide, mute, unfollow and ignore.

    Tell Instagram what you do not want to see (phone)

    On posts that miss the mark:

    • Tap the three-dot menu
    • Select Not interested, Mute or Unfollow, depending on what appears

    Use this consistently. Instagram responds more to repeated signals than one-off actions.

    Fine-tune who appears in your feed (phone)

    Visit accounts directly and tap Following to manage how their content shows up.

    From here, you can:

    • Mute posts or stories
    • Add or remove Favorites
    • Restrict interactions
    • Unfollow the account

    These actions immediately influence future recommendations.

    Review account-level controls (phone)

    Open Settings and review:

    • Muted accounts
    • Blocked accounts
    • Close Friends

    Cleaning up these lists helps reduce clutter and repetitive content.

    When a new Instagram account makes sense

    If your feed still feels off after manual cleanup, starting fresh is the most effective reset.

    To do this:

    • Log out and create a new account
    • Follow only accounts you truly want to see
    • Avoid mass-following during setup

    Instagram’s algorithm is heavily influenced by early behavior, so a slow, intentional start matters.

    Some users may hear about an Instagram “reset” feature, but as of now, it is not consistently available across accounts.

    Fine-tune who you see (phone)

    Tap the three-dot menu on posts to unfollow or favorite accounts.

    From any profile, tap Following to:

    • Add Close Friend
    • Add Favorite
    • Mute posts or stories
    • Restrict interactions

    Unfollow

    Under Settings, review:

    • Muted accounts
    • Blocked accounts
    • Close Friends
    Instagram app on iPhone alongside other apps.

    Instagram’s feed is trained by what you hide, mute and unfollow, not by a single reset button. (iStock)

    How to reset your TikTok For You page

    Primary device: Phone only

    Train the feed gradually (phone)

    • Press and hold on a video
    • Tap Not Interested

    Consistency matters here.

    Remove past likes (phone)

    • Go to Profile
    • Tap the heart icon
    • Unlike videos that may be influencing recommendations

    Refresh the entire feed (phone only)

    • Tap Profile
    • Tap the three-line menu
    • Go to Settings and Privacy > Content Preferences
    • Tap Refresh Your For You Feed
    • Confirm

    This resets recommendations but keeps your following list.

    For a total reset, unfollow accounts manually or start fresh with a new account.

    An iPhone screen with the TikTok app.

    TikTok’s For You page reacts quickly when you mark videos as not interested or clean up past likes. (iStock)

    How to reset YouTube recommendations

    Primary device: PC recommended

    Clear or limit watch history (PC, Mac and phone)

    On mobile:

    • Tap You
    • Tap the gear icon 
    • Select Manage All History
    • Tap DELETE

    On desktop:

    • Click your profile photo
    • Select Your Data in YouTube
    • Open YouTube Watch History
    • Click Manage History
    • Click DELETE

    From here, you can:

    • Delete today
    • Delete custom range 
    • Delete all time 

    Remove past feed feedback

    Primary device: PC or Mac

    This setting is easiest to access on a computer.

    • Go to YouTube.com and make sure you are signed in
    • Click your profile photo in the upper right
    • Select Your Data in YouTube
    • Scroll to the section labeled YouTube Watch History and click the right arrow 
    • Click Manage your YouTube Watch History
    • Click Saving Your Watch History 

    On the history page:

    • Scroll down until you see YouTube Customize Your Feed Feedback
    • Click Delete to remove past feedback selections

    This removes videos you previously told YouTube you wanted to see more of.

    5 TECH TERMS EVERY SMARTPHONE USER SHOULD KNOW

    Continue training the feed (PC, Mac and phone)

    On individual YouTube videos:

    • Click or tap the three-dot menu next to the video
    • Select Not interested

    Repeat this on videos that miss the mark. YouTube relies heavily on repeated feedback signals. This option is not consistently available on the YouTube mobile app. Use a computer for the best results.

    Reset subscriptions (PC, Mac and phone)

    Subscriptions heavily shape recommendations. Unsubscribe from channels you no longer watch. Rebuild your list intentionally.

    The YouTube homepage

    YouTube recommendations are driven by watch history, search history and subscriptions you may have forgotten about. (Kurt “CyberGuy” Knutsson)

    How to reduce noise on X

    Primary device: PC preferred

    Adjust interests and ads (PC, Mac and phone)

    • Click your profile icon.
    • Go to Settings and Privacy
    • Click Privacy and Safety
    • Select Content You See
    • Open Interests

    Here, X lists topics it believes you are interested in.

    • Uncheck interests you no longer care about
    • There is no “unselect all” option
    • Changes must be made one by one

    This affects both recommended posts and ads.

    Adjust ad personalization settings (PC, Mac and phone)

    This is where “Ads Preferences” actually lives.

    • Click or tap your profile icon
    • Go to Settings and Privacy
    • Select Privacy and Safety
    • Scroll down and click Ads Preferences

    From here:

    • Turn off Personalized ads
    • Review Ad categories and disable what you can
    • Turn off Ads based on inferred identity, if shown

    X does not allow full ad removal, but these steps reduce targeting.

    Train the feed as you scroll (PC, Mac and phone)

    On posts or ads you do not want to see again:

    • Click or tap the three-dot menu
    • Choose Not interested, Block, or Mute, depending on what appears
    • Also:
    • Unfollow accounts that no longer add value
    • Block advertisers directly when possible

    Repeated feedback matters more than occasional actions.

    When starting a new X account makes sense

    X’s algorithm is less forgiving than most platforms. If your feed feels irreparable, the most effective reset is:

    • Creating a new account
    • Following only accounts you truly want
    • Avoiding mass follows early on

    Early behavior heavily shapes long-term recommendations. X offers fewer feed controls than most platforms, so changes may feel slower and less dramatic.

    Person holds a phone

    Small, consistent actions on your phone can gradually retrain algorithms and reduce daily feed fatigue. (Kurt “CyberGuy” Knutsson)

    How to clean up Threads

    Works on PC, Mac and phone

    Control what appears in For You

    • On the For You feed:
    • Click the three-dot menu
    • Mark posts as not interested, mute or block

    Use Hidden Words (PC and phone)

    • Open Settings
    • Go to Hidden Words
    • Add words, phrases or emojis separated by commas

    These filters apply across Threads and Instagram.

    How to make LinkedIn useful again

    Primary device: PC recommended

    Switch to recent posts (PC and Mac)

    • At the top of your feed, click Sort by: Top
    • Change it to Recent
    • To make it permanent:
    • Go to Me
    • Click Settings and Privacy 
    • Select Preferred Feed View
    • Choose Most recent posts
    • Click the left arrow to save

    Reduce ad targeting (PC and Mac)

    • Go to Settings and Privacy
    • Open Advertising Data
    • Select Interests and Traits
    • Turn off categories you do not want

    Aggressively train the feed (PC, Mac and phone)

    On unwanted posts:

    • Click the three-dot menu
    • Select Not relevant or Not interested 
    • Under My Network, review Followers and Following and unfollow accounts that add noise.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

    Kurt’s key takeaways

    Social media feels overwhelming when it runs on autopilot. A few minutes of cleanup can dramatically change what you see. Algorithms respond to clarity. The clearer your signals, the better your feed becomes. You do not need to quit social media to enjoy it again. You just need to take control.

    If your feed reflects your behavior, what does yours reveal about how you spend your attention right now? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Thousands of iPhone apps expose data inside Apple App Store

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple often promotes the App Store as a secure place to download apps. The company highlights strict reviews and a closed system as key protections for iPhone users. That reputation now faces serious questions.

    New research shows that thousands of iOS apps approved by Apple contain hidden security flaws. These flaws can expose user data, cloud storage and even payment systems. 

    The issue is not malware; it’s poor security practices baked directly into the app code.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK

    Cybernews researchers found that many iOS apps store sensitive secrets directly inside app files, where they can be easily extracted. (Kurt “CyberGuy” Knutsson)

    What researchers discovered inside iOS apps

    Security researchers at Cybernews, a cybersecurity research firm, analyzed the code of more than 156,000 iPhone apps. That represents about 8% of all apps available worldwide.

    Here is what they found:

    • Over 815,000 hidden secrets inside app code
    • An average of five secrets per app
    • 71% of apps leaked at least one secret

    These secrets include passwords, API keys and access tokens. Developers place them directly inside apps, where anyone can extract them. According to Cybernews researcher Aras Nazarovas, this makes attackers’ jobs much easier than most users realize.

    What are hardcoded secrets in simple terms?

    A hardcoded secret is sensitive information saved directly inside an app instead of being protected on a secure server. Think of it like writing your bank PIN on the back of your debit card. Once someone downloads the app, they can inspect its files and pull out those secrets. Attackers do not need special access or advanced hacking tools. Both the Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation warn developers not to do this. Yet it is happening at a massive scale.

    Cloud storage leaks exposed huge amounts of data

    One of the most serious problems involves cloud storage. More than 78,000 iOS apps contained direct links to cloud storage buckets. These buckets store files such as photos, documents, receipts and backups. In some cases, no password was required at all. Researchers found:

    • 836 storage buckets are fully open to the public
    • Over 76 billion exposed files
    • More than 406 terabytes of leaked data

    This data included user uploads, registration details, app logs and private records. Anyone who knew where to look could view or download it.

    APPLE PATCHES TWO ZERO-DAY FLAWS USED IN TARGETED ATTACKS

    A bar graph of top 20 leaked secrets in iOS apps

    This chart shows the most common types of hardcoded secrets found inside iOS apps, with Google-related keys appearing most often, according to Cybernews research. (Cybernews)

    Firebase databases were also left open

    Many iOS apps rely on Google Firebase to store user data. Cybernews found more than 51,000 Firebase database links hidden in app code. While some were protected, over 2,200 had no authentication. That exposed:

    • Nearly 20 million user records
    • Messages, profiles, and activity logs
    • Databases that are mostly hosted in the U.S.

    If a Firebase database is not locked down, attackers can browse user data like a public website.

    Payment and login systems were at risk too

    Some of the leaked secrets were far more dangerous than analytics or ads. Researchers discovered secret keys for:

    • Stripe, which handles payments and refunds
    • JWT authentication systems that control logins
    • Order management tools used by shopping apps

    A leaked Stripe secret key can allow attackers to issue refunds, move money or access billing details. Leaked login keys can let attackers impersonate users or take over accounts.

    AI and social apps were among the worst offenders

    Some of the apps with the largest leaks were related to artificial intelligence. According to VX Underground, security firm CovertLabs identified 198 iOS apps leaking user data. The worst known case was Chat & Ask AI by Codeway. Researchers say it exposed chat histories, phone numbers and email addresses tied to millions of users. Another app, YPT – Study Group, reportedly leaked messages, user IDs and access tokens. CovertLabs tracks these incidents in a restricted repository called Firehound. The full list of affected apps has not been publicly released, and researchers say the data is limited to prevent further exposure and to give developers time to fix security flaws.

    MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS

    Lines of code that could hold sensitive information

    This example shows how sensitive keys like Google API credentials and Stripe payment secrets can be stored directly inside an iOS app’s files, where they are easy to extract. (Cybernews)

    Why Apple’s App review can miss hidden security risks

    Apple reviews apps before they appear in the App Store. However, the review process does not scan app code for hidden secrets. If an app behaves normally during testing, it can pass review even if sensitive keys are buried inside its files. This creates a gap between Apple’s security claims and real-world risks. Removing leaked secrets is not simple for developers. They must revoke old keys, create new ones and rebuild parts of their apps. That can break features and delay updates. Even though Apple says most app updates are reviewed within 24 hours, some updates take weeks. During that time, vulnerable apps can remain available.

    CyberGuy contacted Apple for comment, but did not receive a response before publication.

    Ways to stay safe right now

    You cannot easily inspect an app for hidden secrets. Apple does not provide tools for that. Still, you can reduce your risk and limit exposure by being selective and cautious. These steps help reduce the risk if an app leaks data behind the scenes.

    1) Stick to established app developers

    Well-known developers tend to have stronger security teams and better update practices. Smaller or unknown apps may rush features to market and overlook security basics. Before downloading, check how long the developer has been active and how often the app is updated.

    2) Review and limit app permissions

    Many apps ask for more access than they need. Location, contacts, photos and microphone access all increase the risk of data leaks. Go into your iPhone settings and remove permissions that are not essential for the app to work.

    3) Delete apps you no longer use

    Unused apps still retain access to data you shared in the past. They may also store information on remote servers long after you stop opening them. If you have not used an app in months, remove it. Here’s how: Open Settings, tap General, select iPhone Storage, and scroll through the list of apps to see when each one was last used. Tap any app you no longer need and select Delete App to remove it and reduce ongoing data exposure.

    4) Be cautious with personal and financial details

    Avoid entering sensitive information unless it is absolutely necessary. This includes full names, addresses, payment details and private conversations. AI apps are especially risky if you share deeply personal content.

    5) Use a password manager for every account

    A password manager creates strong, unique passwords for each app and service. This prevents attackers from accessing multiple accounts if one app leaks data. Never reuse passwords tied to your email address.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    6) Change passwords tied to exposed apps

    If an app uses your email address for login, change that password immediately. Do this even if there is no confirmation of a breach. Attackers often test leaked credentials across other services.

    7) Consider using a data removal service

    Some leaked data ends up with data brokers that sell personal information online. A data removal service can help find and remove your details from these databases. This reduces the chance that exposed app data gets reused for scams or identity theft.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    8) Monitor your accounts for unusual activity

    Watch for unexpected emails, password reset notices, login alerts, or payment confirmations. These can signal that leaked data is already being abused. Act quickly if something looks off.

    9) Pause use of risky AI and chat apps

    If you use AI apps for private conversations, consider stopping until the developer confirms security fixes. Once data is exposed, it cannot be pulled back. Avoid sharing sensitive details with apps that store conversations remotely.

    Kurt’s key takeaways

    Apple’s App Store still offers important protections, but this research shows it is not foolproof. Many trusted iPhone apps quietly expose data due to basic security mistakes. Until app reviews improve, you need to stay alert and limit how much data you share.

    How many apps on your iPhone have access to information you would not want exposed? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Winter storms can knock out your tech fast: Prepare now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Weather forecasters are warning that a major winter storm is expected to impact large portions of the United States starting Friday. Forecasts call for snow, freezing rain and ice stretching from Texas and the Southern Plains through the Southeast, Mid-Atlantic and into the Northeast. This system is concerning because it combines ice accumulation, gusty winds and plunging temperatures. In many regions, especially across the South and parts of the Mid-Atlantic, infrastructure is not designed to handle prolonged ice events.

    That increases the risk of extended power outages and disrupted cell service. When the grid goes down, everyday tech becomes critical. Phones, alerts, vehicles and apps may be your only connection to updates and emergency help. Preparing now matters far more than reacting later.

     Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    RUSSIAN WINTER STRIKE LEAVES NEARLY 800K HOMES WITHOUT POWER AND HEAT IN UKRAINE’S DNIPRO REGION

    Ice storms can take down power lines fast, leaving homes without electricity and cell service for hours or even days.  (AP Photo/Charles Krupa)

    Why ice storms are especially disruptive

    Ice storms cause more damage than most people expect. Unlike snow, ice sticks to everything and adds significant weight. Ice builds up on trees and power lines, causing branches to snap and lines to fall. Utility crews often cannot begin repairs until conditions improve, which delays restoration. Forecasters at Fox Weather warn that freezing rain across the South and interior Southeast could be particularly damaging, while snow and wind farther north may slow emergency response. 

    Even if cell towers remain standing, networks often overload during severe weather. When thousands of people try to call at once, connections fail. Texts and alerts usually have a better chance of getting through. That is why you should assume you may be offline longer than expected.

    Immediate tech actions to take before the storm hits

    These steps are simple, but timing matters. Do them before the weather conditions worsen.

    Charge devices and prepare backup power

    • Charge all phones, laptops, tablets and battery packs
    • Fully charge wearable devices like smartwatches
    • Turn on Low Power Mode on phones now
    • Lower screen brightness to extend battery life, and check out these other tips to keep your phone battery charged longer
    • Make sure you have a reliable portable charger on hand, like those highlighted in our 5 best portable chargers for emergencies on Cyberguy.com.
    • For outages that could last days in this winter storm, a good generator can keep your home powered the longest and safest.
    • Reliable lighting matters during storms and blackouts. Invest in a high-output flashlight and hats with built-in lights that can be especially useful when visibility is poor.
    • Keep a battery-powered weather radio on hand so you can receive emergency updates even if power and cell service go out.

    A fully charged phone, smart power settings and a reliable portable charger can keep you connected early in an outage while longer-term home power solutions carry you through the days ahead.

    Woman in winter storm in Manhattan

    A woman walks with an umbrella in the rain in the Manhattan borough of New York, Feb. 5, 2014.  (REUTERS/Carlo Allegri)

    Plan for offline communication and limited cell service

    • Download offline maps for your area
    • Save emergency contacts locally on your device
    • Write down key phone numbers on paper
    • Plan to text instead of calling if networks are congested. Text messages use less bandwidth and often go through when calls fail.
    • Cold weather can also make phones harder to use. Touchscreen-compatible winter gloves let you stay connected without exposing your hands to the cold.

    Set up a family check-in plan before the storm

    • Agree on specific check-in times
    • Choose one out-of-area contact everyone can message
    • Avoid constant calling, which can overload networks

    Clear expectations reduce panic and unnecessary phone use.

    Make sure emergency alerts are enabled

    Emergency alerts can reach your phone even when apps and social media cannot. They are designed to cut through network congestion and deliver critical warnings.

    How to turn on emergency alerts on iPhone

    • Open Settings
    • Tap Notifications
    • Scroll to Government Alerts
    • Turn on Emergency Alerts
    • Enable Always Play Sound
    • Turn on Imminent Threat Alerts under Enhanced Safety Alerts

    US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN’T KEEP UP WITHOUT NEW INVESTMENT

    Ice storms add heavy weight to trees and power lines, causing widespread damage and outages that can overwhelm repair crews and communication networks for longer than expected.

    Ice storms add heavy weight to trees and power lines, causing widespread damage and outages that can overwhelm repair crews and communication networks for longer than expected. (AP/Craig Ruttle)

    How to turn on emergency alerts on Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Safety and emergency or Notifications
    • Select Wireless emergency alerts
    • Turn on Severe threats and Extreme threats
    • Enable Allow alerts and Alert sound

    On some phones, you may also see options for Public safety messages or Emergency alerts, which should be turned on. These alerts may include evacuation notices, shelter updates and severe weather warnings.

    Both iPhone and Android let you preview alert sounds and settings in these menus, so take a moment to test them now and make sure alerts are loud enough before severe weather hits.

    Know how to use Emergency SOS on your phone

    If you need help during a winter storm, Emergency SOS can contact emergency services even when you cannot unlock your phone or make a normal call. Set this up now. Do not wait until you are stressed, cold or without power.

    How to set up and use Emergency SOS on iPhone

    • Open Settings
    • Tap Emergency SOS
    • Turn on Call with Hold and Release or Call with 5 Button Presses
    • Scroll down and add emergency contacts

    To activate Emergency SOS during an emergency, press and hold the side button and a volume button, or quickly press the side button five times, depending on your settings.

    How to set up and use Emergency SOS on Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Safety and emergency or Privacy and safety
    • Select Emergency SOS
    • Turn on Use Emergency SOS 
    • Choose how SOS is triggered, such as Require to swipe to call
    • Add emergency contacts and medical information by clicking Emergency sharing settings 

    On many Android phones, pressing the power button five times will trigger Emergency SOS. Emergency SOS can call for help, share your location and alert emergency contacts when conditions are dangerous.

    If cell towers go down during this storm, features like Emergency SOS can still help you reach emergency services. Our guide explains in more detail how these lifesaving settings work.

    Apps you should have installed ahead of time

    The right apps can deliver critical updates when power is out, cell networks are strained and social media is unreliable. Install and set these up before the storm arrives.

    Weather and severe alert apps

    • Fox Weather app: A trusted option for real-time forecasts, winter storm alerts, radar tracking and location-based notifications. Make sure local alerts are turned on.
    • MyRadar Weather Radar: A highly rated radar app that shows storm movement in real time and sends push alerts when severe weather is approaching your area.
    • Storm Shield Severe Weather App: Delivers National Weather Service alerts based on your exact location, similar to NOAA weather radio warnings, with clear push notifications for winter storms and ice events.
    • NOAA Weather Radio apps (iPhone and Android): These apps stream official NOAA Weather Radio broadcasts, providing continuous updates, watches and warnings directly from the National Weather Service. Weather radio streams often remain available even during major outages.

    Using more than one weather app can give you redundancy if one service is delayed or overloaded.

    Utility and outage tracking apps

    • Your local power utility app: Most utilities offer apps that allow you to report outages, view outage maps and track restoration progress in real time.
    • FEMA App: Provides official weather alerts, disaster resources, shelter locations and safety guidance during severe weather events.

    These apps can confirm outages, provide restoration updates and reduce unnecessary calls to utilities when systems are overwhelmed.

    Do not overlook vehicle tech and preparedness

    Your vehicle may become a critical resource during extended outages.

    Prep your car before conditions worsen

    • Fill your gas tank early. A full tank allows you to run the engine briefly for heat or charging if needed.
    • Keep a phone charger in the car.
    • Store a fully charged portable power bank in the glove box or center console. This gives you emergency phone power if your car battery dies or you cannot run the engine.
    • Download weather and road condition alerts.
    • Also, consider buying a Snow brush and ice scraper, jumper cables, a set of 6 LED Road Flares Emergency Lights and a First Aid Trauma Pack with QuikCloth, so you are not caught off guard in an emergency.
    • There are also portable tech solutions designed to help you stay warm and powered during outages or roadside delays, including heated gear worth purchasing in advance.

    Storms also bring scams and fraud attempts

    Severe weather creates ideal conditions for scams. Power outages, delayed responses and anxiety make people more likely to trust messages that appear urgent or official.

    Fake utility and restoration scams

    Scammers often impersonate electric, gas or water utilities.

    • Texts or calls claiming your power will be restored faster if you pay
    • Messages warning service will be shut off unless you act immediately
    • Spoofed phone numbers that look like your local utility

    What to know: Utilities do not charge fees to restore power and do not demand payment by text, gift cards or apps.

    Emergency aid and disaster relief scams

    These scams spike right after storms hit.

    • Messages promising emergency funds, fuel vouchers or hotel assistance
    • Fake charity links claiming to help storm victims
    • Social media posts asking for donations using stolen images

    What to know: Legitimate aid is announced through official government or well-known nonprofit channels, not unsolicited messages.

    Fake delivery, fuel and repair service scams

    Storms disrupt normal services, which scammers exploit.

    • Links claiming fuel delivery is available in your area
    • Messages about delayed packages that require confirmation
    • Ads for emergency home repairs that ask for upfront payment

    What to know: Do not click links or pay deposits without verifying the company independently.

    Charging your devices and lining up backup power now can make the difference between staying informed during an outage and being cut off once the storm hits.

    Charging your devices and lining up backup power now can make the difference between staying informed during an outage and being cut off once the storm hits. (Kurt “CyberGuy” Knutsson)

    Account takeover and identity theft attempts

    Storm chaos makes it easier for attackers to slip through unnoticed.

    • Password reset emails pretending to be from banks or retailers
    • Login alerts asking you to “secure” your account immediately
    • Calls claiming suspicious activity that push you to share codes

    What to know: Never share one-time codes or login details, even if the message looks legitimate.

    How to protect yourself before and during the storm

    Taking a few precautions now can help you avoid costly mistakes when outages, delays, and scam messages start piling up.

    1) Slow down and verify every urgent message

    Scammers rely on panic. If a message pressures you to act fast, stop and verify it through a trusted source.

    2) Avoid clicking links in unsolicited messages and use strong antivirus software 

    Go directly to official websites or apps instead of tapping links in texts or emails. Keep your operating system up to date and use strong antivirus software to block malicious links and fake websites.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Lock down accounts before outages hit

    Enable two-factor authentication (2FA) on email, banking, and utility accounts so stolen passwords cannot be used alone.

    4) Reduce your exposure with a data removal service

    Many storm scams work because criminals already have your phone number, address or email. Using a data removal service to opt out of data broker sites can reduce how easily scammers target you during emergencies.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Never pay to restore power or receive aid

    Utilities and government agencies do not charge fees to restore service or release emergency assistance.

    When power and internet access are limited, it is harder to verify messages quickly. That makes preparation just as important as awareness. A little skepticism now can prevent financial loss and identity theft when help is hardest to reach.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Winter storms can turn small tech decisions into critical ones. Ice, power outages and overloaded cell networks can leave people cut off faster than expected, especially in regions not built for prolonged winter weather. Preparing your devices, alerts, vehicles and accounts ahead of time gives you more control when conditions worsen. It also reduces panic and limits your exposure to scams that thrive during emergencies. A little planning now can make a big difference when help is harder to reach.

    Have you taken steps to prepare your tech for this winter storm, or did this checklist highlight something you still need to do? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • ASUS will not release any new smartphones this year

    [ad_1]

    ASUS appears to be shifting its business operations away from smartphones. According to translations of recent quotes from Chairman Jonney Shih, the company does not plan to release new phone models in the future. The chairman did not confirm whether smartphones would be completely phased out, but he did acknowledge that possibility. Whatever direction ASUS takes, its existing phones will continue to receive software updates and warranty assistance. Shih suggested that its future plans may include a shift into AI-related projects such as robotics or smartglasses.

    Previous reports hinted that ASUS would not introduce any smartphones in 2026, but Shih’s recent comments indicate that the pause may stretch longer than a year. We’ve reached out to ASUS for additional comment and will update if the company shares any further information.

    ASUS had plenty of other updates emerging from CES at the start of the month unrelated to smartphones, such as dual-screen laptops and a pair of gaming smartglasses. So if it does decide to leave that product segment, there will still be other ASUS-branded gear on the market.

    [ad_2]

    Anna Washenko

    Source link

  • 5 simple tech tips to improve digital privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your privacy doesn’t require advanced tools or technical expertise. Some of the most effective protections are already built into your phone; you just need to know where to look.

    These five privacy tips show you exactly how to reduce tracking and limit data sharing on both iPhone and Android using the latest software.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    Smartphone users can boost privacy by adjusting built-in settings that limit tracking, location sharing and background data collection on iPhone and Android devices. (Neil Godwin/Future via Getty Images)

    1) Reduce app permissions

    Apps often request access to your camera, microphone, contacts, photos and location, even when it’s not necessary. Limiting these permissions reduces background data collection.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Select a permission type such as Microphone, Camera, Photos or Contacts
    • Toggle off access for apps that don’t need it

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Choose a permission category and set apps to Don’t allow or Allow only while using the app

    2) Turn off location access you don’t need

    Location tracking can reveal where you live, work, shop and travel.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services
    • Select an app and choose While Using the App or Never
    • Turn off Precise Location when exact coordinates aren’t needed

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Location
    • Tap App location permissions or App permissions 
    • Scroll through the list and tap the app you want to change
    • Select Allow only while using the app or Don’t allow

    3) Turn off photo sharing with apps

    Some apps request full access to your photo library, giving them visibility into every image and video you’ve taken.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Photos
    • Select an app and choose Selected Photos or None

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Tap Photos and videos 
    • Scroll through the list and tap the app you want to change
    • Set apps to Don’t allow, or Allow limited access

    5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY

    Woman holding her phone.

    Turning off unnecessary app permissions and tracking features helps protect sensitive information stored on your phone. (Sebastian Kahnert/picture alliance via Getty Images)

    4) Turn off app tracking

    App tracking allows advertisers to follow your activity across multiple apps.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security & privacy
    • Scroll down and tap More privacy settings
    • Tap Ads
    • Tap Delete advertising ID to remove the existing ID tied to your device
    • Tap Reset advertising ID to generate a new, blank ID

    This removes the identifier apps use to track you for targeted ads and replaces it with a fresh ID that isn’t linked to your previous activity.

    5) Turn off unnecessary background app activity

    Some apps continue running and collecting data even when you’re not actively using them.

    iPhone

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Turn it off entirely or disable it for individual apps

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Battery
    • Choose Restricted or turn off Allow background usage 

    Pro tip: Use a password manager

    A password manager reduces the need to store logins inside apps, which can limit unnecessary permissions and data collection.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Person selecting an item on their phone.

    Privacy experts say small changes to phone settings can go a long way in reducing digital surveillance and data exposure. (Karl-Josef Hildenbrand/Picture Alliance via Getty Images)

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Kurt’s key takeaways

    Protecting your privacy doesn’t have to be complicated. By reducing app permissions, limiting location access, controlling photo sharing, turning off app tracking and restricting background activity, you can significantly reduce how much personal data your phone shares. A few simple setting changes can go a long way in protecting your digital life.

    What privacy setting surprised you the most, or is there one you’re unsure about? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 5 tech terms that shape your online privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We’ll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. 

    Learning these concepts will help you limit data exposure and stay in control of who can see what.

    Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you!

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.    

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    1) App permissions

    What your apps are really allowed to see

    Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.

    Once granted, these permissions can allow apps to collect data in the background, sometimes even when you’re not actively using them. Over time, this can quietly expose sensitive personal information.

    Regularly reviewing and limiting app permissions in your phone’s settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library.

    iPhone steps (iOS 18 and later)

    To review permissions by category

    • Open Settings
    • Tap Privacy & Security
    • Select a category such as Location ServicesMicrophoneCameraPhotos or Contacts
    • Review each app listed
    • Change access to Never or While Using the App when available

    To review permissions by app

    • Open Settings
    • Scroll down and tap the app’s name
    • Toggle off any permissions the app does not truly need

    Extra privacy tip

    • For Photos, choose Limited Access instead of full library access when possible

    Many apps request more access than they need, quietly collecting data in the background. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review permissions by category

    • Open Settings
    • Tap Privacy
    • Tap Permission manager
    • Select a category such as LocationCameraMicrophone or Contacts
    • Review apps and change access to Don’t allow or Allow only while using the app

    To review permissions by app

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Permissions
    • Remove any permissions that aren’t essential

    Extra privacy tip

    • Disable Allow background usage for apps that don’t need constant access

    Why this matters

    • Apps can collect data even when you’re not using them
    • Location, microphone and photo access are the most sensitive
    • Fewer permissions mean less data exposure
    • You stay in control without breaking most apps

    Extra protection beyond settings:

    Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. 

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    2) Location services

    When your phone knows where you are, constantly

    Location services use GPS, Wi-Fi, Bluetooth, and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don’t actually need.

    Reducing location access limits, tracking and helps protect your daily routines.

    iPhone steps (iOS 18 and later)

    To review all location access

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services

    For each app

    • Tap an app name
    • Select Never or While Using the App
    • Turn Precise Location off unless required

    Recommended settings

    • Avoid Always unless the app truly needs background tracking
    • Use While Using the App for most apps
    • Disable Precise Location for weather, shopping and social apps

    System services (optional)

    • Scroll down and tap System Services
    • Turn off items you don’t need, such as Location-Based Ads and Location-Based Suggestions
    Person typing on cellphone

    Location tracking can reveal your routines and movements long after you close an app. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review location access

    • Open Settings
    • Tap Privacy
    • Tap Location

    For each app

    • Tap Location access for apps
    • Select an app
    • Choose Don’t allow or Allow only while using the app
    • Turn Use precise location off when available

    Recommended settings

    • Avoid Allow all the time
    • Use Allow only while using for navigation apps
    • Disable precise location for apps that don’t require accuracy 

    Why this matters

    • Location data reveals routines, habits and patterns
    • Many apps track location in the background by default
    • Limiting access reduces profiling and data sharing
    • You keep core features without constant tracking

    3) Two-factor authentication (2FA)

    Your second line of defense

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.

    Even if hackers steal your password through a data breach or phishing attack, 2FA can stop them from accessing your accounts. That’s why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.

    It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available.

    Extra security tip:
    Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    4) VPN (Virtual Private Network)

    Hiding your online activity

    A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.

    VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.

    While a VPN doesn’t make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Cross-app tracking

    How companies follow you across apps

    Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.

    On iPhone, this tracking is controlled by Apple’s App Tracking Transparency system.
    On Android, it relies on advertising IDs and ad personalization controls.

    Turning these off limits how easily companies can connect your behavior across apps. You’ll still see ads, but they won’t be tailored to your personal activity.

    iPhone steps (iOS 18 and later)

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn Allow Apps to Request to Track off

    Optional extra protection

    • Review the app list below and make sure no apps are allowed to track you
    • Apps already denied cannot track you across other apps or websites
    Woman holds a phone

    Two-factor authentication (2FA) adds a critical extra step that helps stop account takeovers. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Privacy
    • Tap Ads
    • Turn Delete advertising ID on
    • Tap Ad topics and turn them off
    • Tap Ad measurement and turn it off

    What this does

    • Removes your advertising ID
    • Stops apps from sharing ad behavior across other apps
    • Limits interest-based and cross-app ad profiling

    One more thing to know:
    Turning off cross-app tracking helps going forward, but it doesn’t remove data that’s already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.       

    Kurt’s key takeaways

    Online privacy doesn’t have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you’re comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking, can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we’ll keep breaking it all down so you can protect your digital life with confidence.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Confused by a tech term or want something explained? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    [ad_2]

    Source link

  • Don’t lock your family out: A digital legacy guide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    This is not a happy topic. But it’s essential advice whether you’re 30 or 90.

    If something happened to you tomorrow, could your family get into your digital life? I’m talking about your bank accounts, emails, crypto and a lifetime of memories stored on your phone or computer.

    Big Tech and other companies won’t hand over your data or passwords, even to a spouse, without a hassle, if at all.

    1. The 10-minute setup

    Start with a Legacy Contact. Think of someone you trust who gets access only after you’re gone. Who is that? Good.

    SECRET PHRASES TO GET YOU PAST AI BOT CUSTOMER SERVICE

    One day, you won’t be here anymore, but your tech will bel. Here’s how to plan for that. (iStock)

    · iPhone: Open Settings > tap [Your Name]. Tap Sign-In & Security > Legacy Contact. Go to Add Legacy Contact and follow the prompts.

    · Google: Search for Inactive Account Manager in your Google Account settings. Choose how long Google should wait before acting (e.g., three months). Add up to 10 people to be notified and choose which data (Photos, Drive, Gmail) they can download.

    Google apps, including YouTube, Google and Chrome

    Google has an “Inactive Account Manager” feature. (Chesnot/Getty Images)

    2. The master key problem

    Apple and Google don’t help with banking, insurance, investment or other sites or apps. You need a solid password manager like NordPass that offers emergency access features.

    1. Open your Password Manager and look for Emergency Access.

    2. Add a Digital Heir: Enter the email of a spouse or trusted child.

    3. Set the Safety Delay: Choose a wait period. Usually 7 days is the sweet spot.

    4. How it works: If your contact ever requests access, the app sends you an alert. If you’re fine, you hit Deny. But if you’re incapacitated and can’t respond within those seven days, the vault automatically unlocks for them.

    Pro tip: Your Emergency Contact only gets viewing privileges. They can’t delete or change anything in your vault.

    YOU’LL NEVER TRUST VIDEO AGAIN ONCE YOU SEE WHAT SORA 2 CAN DO

    Facebook app on phone

    Facebook and Instagram have after-death options for accounts. (Karly Domb Sadof, File/AP )

    3. Crypto and social media

    · Crypto: Without your seed phrases, that money is gone. Store them physically along with any instructions and receipts of you buying crypto with your estate paperwork. If you use a crypto hardware wallet, keep that in a fireproof safe.

    · Social media: On Facebook or Instagram, go to Settings > Memorialization. Choose to either have your account deleted or managed by a contact who can post a final tribute.

    Be sure someone knows the passcode to your phone. That’s important for 2FA codes, among other things.

    One more thing. If you found this guide helpful, be sure to get my free newsletter at GetKim.com to stay tech-savvy and secure every day!

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    · National radio: Airing on 500-plus stations across the US, find yours at komando.com or get the free podcast

    · Daily newsletter: Join 650,000 people who read the Current (free!) at komando.com

    · Watch: Kim’s YouTube channel at youtube.com/@kimkomando

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • How to send free digital invitations on iPhone

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Creating invitations should feel easy, not stressful. Apple’s Invites app makes it simple to create free digital invitations with built-in RSVP tools, even if your guests do not use iPhones.

    You can design the invite, track responses, and share photos after the event, all from your iPhone. Below is a clear step-by-step guide with exact instructions so you can get it right the first time.

    Oh, and if you want more options beyond Apple’s Invites app, we also cover the best invitation apps for both iPhone and Android.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW TO SHARE YOUR ESTIMATED ARRIVAL TIME ON IPHONE AND ANDROID

    Apple’s Invites app lets users create free digital invitations with built-in RSVP tools directly from an iPhone, making event planning faster and easier. (Katharina Kausche/picture alliance via Getty Images)

    Why Apple Invites makes event planning easier

    Apple Invites keeps everything in one place. You design the invite, manage RSVPs and share memories without switching apps. You can:

    • Create invitations for parties, meetings and family events
    • Let guests RSVP from any device
    • Share photos, playlists and links after the event

    Apple Invites system requirements

    Before you start, confirm these basics. You need:

    • An iPhone running iOS 18 or newer
    • An iCloud+ subscription to create invitations

    Guests can view and RSVP without an iCloud+ subscription. The steps in this article were tested on an iPhone 15 Pro Max running iOS 26.2.

    Download Apple Invites from the App Store

    First, install the Apple Invites app.

    • Open the App Store.
    • Search for Apple Invites.
    • Download the app named Apple Invites to avoid confusion.

    Open the Invites app after installation.

    How to create a free digital invitation with RSVP on iPhone

    You are now ready to build your invitation.

    Start a new invitation in Apple Invites

    • Open the Invites app.
    • If this is your first time, tap Create Invitation.

    If you have created invites before, tap the plus icon in the top corner.

    Add a background image to your invitation

    • Tap Add Background.
    • Choose one option:PhotosCameraPlayground using Apple Intelligence on supported modelsYou can also select Emoji, Photographic or Color backgrounds.
    • Photos
    • Camera
    • Playground using Apple Intelligence on supported models
    • You can also select Emoji, Photographic or Color backgrounds.

    Grant photo or camera access if prompted.

    Add event details like title, date and location

    Next, fill in the key information.

    • Tap Event Title and enter the name of your event.Choose from four available fonts.
    • Choose from four available fonts.
    • Tap Date and Time.Select a start and end time or mark the event as all day.
    • Select a start and end time or mark the event as all day.
    • Tap Location.Enable Location Services if prompted.
    • Enable Location Services if prompted.
    • Tap Add a Description to include event details or notes.

    If you add both a date and a location, the app automatically shows:

    • The weather forecast for that day
    • A Maps link with directions

    Add optional features like photos, links and playlists

    You can add several optional features to enhance your invitation.

    • Add a shared photo album so guests can view and upload photos by tapping Create Album
    • Add a website link, such as a gift registry, by tapping Add a Link
    • Add a shared Apple Music playlist guests can listen to and add songs to by tapping Add Playlist

    Add a Tile to bundle photos, playlists or links in one place by tapping Add Tile

    Preview and create your invitation

    Before sending, review everything.

    • Tap Preview.
    • Review how the invitation will look to guests.
    • Tap Next in the upper-right corner.
    • Wait a few seconds while the invite is created.

    NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS

    iPhone screen at a store.

    Apple Invites allows hosts to design invites, track guest responses and share photos without requiring guests to own an iPhone. (Nikolas Kokovlis/NurPhoto via Getty Images)

    How to send invitations and manage RSVPs on iPhone

    Once your invitation is live, you can share it in two different ways.

    Invite guests using a public link

    • Under Invite with Public Link, choose how you want to share the link:MessagesMailShare LinkCopy Link
    • Messages
    • Mail
    • Share Link
    • Copy Link
    • Toggle Approve Guests on if you want to review RSVPs before guests are added.
    • Leave Approve Guests off to allow anyone with the link to RSVP automatically.

    Guests who accept the invite will appear in your guest list.

    Invite guests individually

    • Scroll to Invite Individuals.
    • Tap Choose a Guest.
    • Then you’ll be prompted to access your contacts and click Continue.
    • Click Select Contacts
    • Select only the contacts you want to include for this invitation and click Continue 
    • Tap Allow Selected Contacts 
    • Select a contact to send a one-time invite link.
    • Then click Messages, Mail or Share Link

    This option sends a unique link to a single guest.

    Guests can RSVP even if they do not own an iPhone.

    How to send invitations and manage RSVPs on iPhone

    Once your invitation is live, you can share it in two different ways.

    Invite guests using a public link

    • Under Invite with Public Link, choose how you want to share the link:MessagesMailShare LinkCopy Link
    • Messages
    • Mail
    • Share Link
    • Copy Link
    • Toggle Approve Guests on if you want to review RSVPs before guests are added.
    • Leave Approve Guests off to allow anyone with the link to RSVP automatically.

    Guests who accept the invite will appear in your guest list.

    Invite guests individually

    • Scroll to Invite Individuals.
    • Tap Choose a Guest.
    • Then you’ll be prompted to access your contacts and click Continue.
    • Click Select Contacts
    • Select only the contacts you want to include for this invitation and click Continue 
    • Tap Allow Selected Contacts 
    • Select a contact to send a one-time invite link.
    • Then click Messages, Mail or Share Link

    This option sends a unique link to a single guest.

    Guests can RSVP even if they do not own an iPhone.

    Manage event settings and RSVP notifications

    You stay in control after sending.

    • Tap the Settings icon inside the invite.
    • Adjust guest permissions and RSVP options.
    • Enable notifications to receive alerts when guests respond.
    • Set plus one limits or block additional guests if needed.

    Your invitation appears on the app home screen under Upcoming.

    Edit an invite after sending it

    Plans change, and edits are allowed.

    • Open the invite from the Upcoming list.
    • Tap the More Button (three horizontal dots in the upper-right corner)
    • Click Edit to update details.
    • Changes sync automatically for guests.

    5 BEST APPS TO USE ON CHATGPT RIGHT NOW

    iPhones on a display at the store.

    With Apple Invites, users can manage event details, RSVPs and shared content all in one place using iOS 18 or newer. (Nikolas Kokovlis/NurPhoto via Getty Images)

    Pro tip: duplicate invitations for recurring events

    If you host a recurring event, such as a book club, save time.

    • Open an existing invitation.
    • Tap the More button. (three horizontal dots in the upper-right corner)
    • Select Duplicate.
    • Adjust the date, time or details as needed.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Apple Invites makes event planning feel simple again. You can create free digital invitations, send them in seconds and track RSVPs without chasing people down. Everything lives in one place, from guest lists to shared photos, which saves time and reduces stress. Best of all, guests do not need an iPhone to respond. That makes Apple Invites practical for real life, not just Apple users. Whether you are planning a birthday, a family dinner, or a casual meetup, this app helps you focus on the event rather than the logistics.

    Would you consider replacing paper invites or group texts with Apple Invites, or are you still planning events the old way? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Clicks debuts its own take on the BlackBerry smartphone, plus a $79 snap-on mobile keyboard | TechCrunch

    [ad_1]

    Clicks Technology, a company known for making physical keyboards for smartphones, is launching two new devices ahead of the Consumer Electronics Show in Las Vegas next week. In addition to a new, $79 slide-out keyboard for smart devices, the company is also unveiling its first smartphone: the Communicator, a smartphone with a physical keyboard, designed to be carried as your second device.

    Yes, it looks a lot like a BlackBerry. (Quick, someone tell Kim Kardashian, famous BlackBerry hoarder.)

    Image Credits:Clicks

    The $499 smartphone is described as being “purpose-built” for people who carry two phones — one for work and one for personal use. That is, the company believes its market will be people who do a lot of actual work on their devices — meaning messaging, emailing, working with documents, or other things where using a physical keyboard could be an advantage.

    While it offers a screen for viewing and responding to messages, the Communicator doesn’t provide access to addictive social media apps or games. Instead, the company partnered with the maker of an Android launcher, Niagara Launcher, to provide access to messaging apps and productivity tools like Gmail, Telegram, WhatsApp, and Slack.

    The phone’s standout feature is its Signal Light, a light-up button on the side of the device that can be customized with different colors and light patterns to indicate when you’ve received messages from certain people, groups, or apps. For instance, you could make messages from VIPs glow purple while chats from WhatsApp are green.

    Image Credits:Clicks

    You can press on this button, known as the Prompt Key, to dictate messages when you’re in a text field, or otherwise take a quick voice note, if not. The company is teasing the possibility of integrating AI applications with this button — like note takers, voice recordings, or AI agents — but nothing like that is yet available.

    Like Clicks’ other products, the Communicator features a tactile keyboard with ergonomic keys designed for faster typing. The keyboard is touch-sensitive, too, allowing users to scroll through messages, lists, and web pages without needing to use the touchscreen.

    Image Credits:Clicks

    The device also includes other old-school features, like a 3.5 mm headphone jack, physical SIM card tray (in addition to an eSIM), expandable microSD storage (up to 2TB), and a tactile switch for turning on or off airplane mode. This switch can also be configured to work with the Signal light or keyboard touch input, the company says.

    The back cover can be popped off so you can change the device’s style by swapping to a different color. The phone itself comes in Smoke, Clover (dark green), and Onyx.

    Image Credits:Clicks

    The device will be offered at $399 for early-bird customers who place a $199 deposit before February 27. Customers who pay the full early-bird price of $399 up front will receive two additional back covers. The phone is expected to ship sometime later this year.

    The phone’s full tech specs include:

    • Android 16 with 5 years of security updates
    • 131.5 mm tall; weighing 170 grams
    • Global 5G, 4G LTE, and 3G/2G support, unlocked
    • 4,000 mAh silicon-carbon battery
    • 256GB onboard storage plus expandable microSD
    • 50MP main camera with OIS and 24MP front camera
    • NFC with Google Pay, Bluetooth 5.4, Wi-Fi 6
    • USB-C and wireless charging
    • Interchangeable back covers in different colors to personalize the device
    Image Credits:Clicks

    Clicks CEO Adrian Li noted in an announcement that the company has shipped more than 100,000 of its earlier keyboards to customers in over 100 countries.

    “That response validated something we strongly believed: There’s growing demand for purpose-built products that help people communicate with confidence and take action. Clicks Communicator is a natural evolution of that idea,” he stated.

    Image Credits:Clicks

    The company’s other new product is a slide-out keyboard that can be attached to smartphones, tablets, or even used with smart TVs, to save you from the tedious on-screen typing with your remote control.

    The keyboard is powered by a built-in 2,150 mAh battery and attaches to phones via MagSafe or Qi2 magnetic connections. It can also be used with existing phone cases, the company claims. Multiple slider positions allow the keyboard to accommodate different phone sizes, and it can be attached when the phone is held in either portrait or landscape mode.

    Image Credits:Clicks

    When used with tablets, TVs, or other smart devices, like AR/VR headsets, the keyboard is used independently from the device it’s paired with.

    Similar to other Clicks keyboards, the Power Keyboard offers tactile buttons, and its settings can be customized using the Clicks mobile app for iOS and Android

    The Power Keyboard is priced at $79 for early-bird customers and will later retail for $109. Preorders start on January 2; the device should ship in the spring, the company says.

    [ad_2]

    Sarah Perez

    Source link

  • How to share your estimated arrival time on iPhone and Android

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Sharing your estimated time of arrival (ETA) lets others know when to expect you without constant check-ins. Apple Maps and Google Maps both include built-in tools that send live arrival updates while you drive. Once turned on, the updates run automatically. That means fewer distractions and safer trips.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free — when you join my CYBERGUY.COM newsletter.

    NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS

    Apple Maps and Google Maps let drivers share live ETAs, so contacts can track arrival times without constant texts or calls. (Photographer: David Paul Morris/Bloomberg via Getty Images)

    Why this feature makes everyday travel easier

    Sharing your ETA is quick and practical. It lets contacts know you are on your way and see your updated arrival time in real time. It also adds peace of mind during late nights, long routes or unfamiliar areas. Most importantly, you stay focused on moving safely instead of responding to messages.

    We tested these steps using an iPhone 15 Pro Max running iOS 26.2 and a Samsung Galaxy Android phone running Android 16. Make sure Apple Maps or Google Maps is installed and updated to the latest version.

    Enable Share ETA Permissions on iPhone

    Before starting navigation, confirm that Apple Maps has the correct permissions. Without these settings enabled, ETA sharing may never appear.

    • Open Settings.
    • Tap Privacy & Security.
    • Tap Location Services and make sure it is turned on.
    • In Location Services, tap Maps.
    • Set location access to While Using the App or Always.
    • Turn on Precise Location.
    • Return to Settings.
    • Scroll down and tap Apps
    • Click Maps.
    • Scroll down, and next to Share ETA, enable it.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    Woman typing on her phone.

    Sharing your ETA updates automatically as traffic changes, helping drivers stay focused on the road. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    How to Share ETA on iPhone Using Apple Maps

    Follow these steps to share your live ETA with a contact using Apple Maps. Note: ETA sharing only works after navigation begins. You also need Location Services enabled for Maps and Contacts.

    • Open Apple Maps on your iPhone.
    • Search for your destination and tap it.
    • Select your travel mode, then tap Go to start navigation.

    Once navigation starts, tap the route card at the bottom of the screen to expand it.

    • Scroll down and tap Share ETA.
    • Choose a recent contact or tap Contacts to search for someone.
    • Your contact will get a notification and can see your live ETA until you arrive or stop sharing.

    How to share ETA on Android using Google Maps

    Android users can share their ETA just as easily with Google Maps. You can share your live arrival time on any Android phone using Google Maps. The feature is built into the Google Maps app.

    Menu wording or placement may vary slightly depending on your device and Android version.

    • Open the Google Maps app on your Android phone.
    • Search for your destination and tap Directions.
    • Tap Start to begin navigation.
    • While navigation is active, swipe up from the bottom of the screen to open the trip menu.
    • Tap Share trip progress (on some devices, this may appear as Share your trip).
    • Choose a contact or share a link using text message or another app.

    Your contact can follow your live location and see updated arrival times until you reach your destination or stop sharing.

    Pro tip: If you don’t see “Share trip progress,” make sure navigation has already started.

    HOLIDAY TRAVEL PRIVACY RISKS AND HOW TO STAY SAFE

    Person using their iPhone.

    iPhone and Android users can send real-time arrival updates directly from Apple Maps or Google Maps. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    What happens after you share your ETA

    Once sharing is active, both apps handle updates automatically.

    • Arrival times adjust with traffic
    • Delays appear without manual messages
    • Sharing ends when you arrive

    You can stop sharing at any time from the navigation screen. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Sharing your ETA on iPhone or Android removes the pressure of keeping others informed while driving. Apple Maps and Google Maps do the work for you. It is a simple habit that improves safety of communication and peace of mind.

    Do you use ETA sharing when you drive, walk, or take transit, and has it changed how often people check in on you? Let us know by writing to us at Cyberguy.com. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free — when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Android Sound Notifications help you catch key alerts

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Staying aware of your surroundings matters. That includes hearing smoke alarms, appliance beeps or a knock at the door. Still, real life gets busy. You wear headphones. You get focused. Sounds slip by. That is where Android Sound Notifications help. This built-in accessibility feature listens for key sounds and sends an alert to your screen. Think of it as a gentle tap on the shoulder when something important happens.

    Although it was designed to help people who are hard of hearing, it is useful for anyone. If you work with noise-canceling headphones or often miss alerts at home, this feature can make a real difference.

    Now, if you use an iPhone, here’s how Apple’s Sound Recognition can alert you to alarms and other key sounds on your device. 

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Android Sound Notifications alert you when important sounds happen around you.  (Kurt “CyberGuy” Knutsson)

    CHROME ROLLS OUT AI PODCAST FEATURE ON ANDROID

    What Sound Notifications do on Android

    Sound Notifications use your phone’s microphone to listen for specific sounds nearby. When it detects one, it sends a visual alert. You will see a pop-up, feel a vibration and may even see the camera flash.

    By default, Android can detect sounds like:

    • Smoke alarms
    • Fire alarms
    • Sirens
    • Door knocks
    • Doorbells
    • Appliance beeps
    • A landline phone ringing
    • Running water
    • A baby crying
    • A dog barking

    That range makes the feature practical at home or at work. Even better, you control which sounds matter to you.

    Why this feature is worth using

    Here is the simple truth. You cannot hear everything all the time. Distractions happen. Headphones block sound. Focus takes over. Sound Notifications fill that gap. While you stay locked into a task, your phone keeps listening. When something important happens, you still get the message. As a result, you worry less about missing alarms or visitors. You gain awareness without extra effort.

    How to turn on Sound Notifications

    Getting started only takes a minute. Note: We tested these steps on a Samsung Galaxy S24 Ultra running the latest version of Android. Menu names and locations may differ slightly on other Android phones, depending on the manufacturer and software version.

    • Open the Settings app
    • Go to Accessibility
    • Tap Hearing enhancements
    • Select Sound Notifications
    • Turn the feature on
    Screens side-by-side displaying how to turn on Sound Notifications

    Turning on Sound Notifications only takes a few taps in Android’s Accessibility settings. (Kurt “CyberGuy” Knutsson)

    When you enable Sound Notifications for the first time, Android will ask how you want to start the feature. Choose the option that works best for you:

    • Tap the button in the quick settings panel
    • Tap the Accessibility button
    • Press the Side and Volume Up buttons
    • Press and hold the Volume Up and Volume Down buttons for three seconds

    After you select a shortcut, Click Ok.  Then, Sound Notifications will start listening in the background.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    If you do not see the option, install the Live Transcribe & Notifications app from the Play Store. You can enable Sound Notifications from there. Once active, your phone listens for selected sounds and alerts you when it detects one. 

    Choose which sounds trigger alerts

    Not every sound deserves your attention. Thankfully, Android lets you fine-tune alerts.

    Settings may vary depending on your Android phone’s manufacturer

    • Go back to Settings
    • Tap Accessibility
    • Click Hearing enhancements
    • Tap Sound Notifications
    • Click Open Sound Notifications. This opens the actual Sound Notifications control screen.
    • On the Sound Notifications screen, tap Settings or the gear icon in the top corner
    • Tap Sound types

    You will now see the full list of detectable sounds.

    • Toggle on the sounds you want alerts for, such as smoke alarms or doorbells
    • Toggle off sounds you do not want, like dog barking or appliance beeps, if they are not important to you
    Screens side-by-side displaying how to turn on Sound Notifications

    You can choose exactly which sounds trigger alerts, helping you avoid unnecessary interruptions. (Kurt “CyberGuy” Knutsson)

    Check the sound history log

    Sound Notifications keep a log of detected sounds. This helps if you were away from your phone and want to see what happened.

    You can also save sounds and name them. That makes it easier to tell the difference between your washer finishing and your microwave timer.

    The log adds context, which makes alerts more helpful.

    GOOGLE’S NEW CALL REASON FEATURE MARKS CALLS AS URGENT

    Teach your phone custom sounds

    Android does not stop at presets. You can train it to recognize sounds unique to your space.

    Maybe your garage door has a distinct tone. Maybe an appliance uses a nonstandard beep. You can record it once, and your phone will listen for it going forward. To add a custom sound:

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Tap the gear icon
    • Select Custom sounds
    • Tap Add sound
    • Hit Record

    Record a clear 20-second clip. The better the audio, the better detection works later.

    Customize how alerts appear

    By default, Sound Notifications use vibration and the camera flash. That visual cue is helpful for urgent alerts. However, not every sound needs that level of attention. You can adjust how alerts appear based on importance.

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Open the gear icon
    • Tap Ways to be notified
    • From there, choose which alerts vibrate, flash or stay subtle

    This flexibility keeps the feature working for your routine.

    Your privacy stays on your phone

    It is reasonable to question constant listening. Here is the key detail. Sound Notifications process audio locally on your device. Sounds never leave your phone. Nothing gets sent to Google. The only exception is if you choose to include audio with feedback. That design keeps the feature private and secure.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Android Sound Notifications quietly solve a real problem. They help you stay aware when your ears cannot. Setup is fast. Controls are flexible. Privacy stays intact. Once you turn it on, you may wonder how you lived without it.

    What important sound have you missed lately that your phone could have caught for you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Americans Won’t Ban Kids from Social Media. What Can We Do Instead?

    [ad_1]

    What seems most likely: the law will not be rigidly enforced, as teen-agers and social-media companies figure out ways to circumvent the ban, but the social norm established by the law and its robust popularity among politicians and voters will lead to a significant downturn in social-media use by minors nonetheless. Not every fourteen-year-old is going to draw a moustache on their photograph or get a fake I.D.—and the law should be easier to enforce among younger kids, which may mean that in five or so years it will be rare to find a fourteen- or fifteen-year-old in Australia who has ever posted anything on social media.

    This seems like a pretty good result—if you believe, as I do, that social media is obviously bad for children and adults alike. But it returns us to the question I posed at the start of this column, which has a particular relevance for Americans, who live in a country founded on the principle of free speech. The civil-libertarian argument against laws like the one that Australia has passed will probably win out in this country, if only because it happens to be aligned, in this case, with powerful domestic tech companies. That argument is simple, but bears repeating: we shouldn’t place arbitrary age limits on who gets to express themselves in the digital town square, and we shouldn’t require everyone who wants to express their opinions online to submit to an I.D. check. As a journalist, I’m also aware that, for many people, social media is a source of news. It may be a toxic and wildly imperfect alternative to legacy media, but I don’t think we should use government force to effectively reroute children to more traditional sources of information.

    In my column on this subject two years ago, I compared the attempt to restrict social-media use to adults to earlier efforts to do something similar with tobacco. The remarkably successful fight against youth smoking did rely, in part, on a shift in social norms; it also depended on a variety of legal restrictions, and heavy taxation—and I did not, at the time, see what equivalent measures might be taken with social media. Ultimately, I thought it might just come down to parents holding the line.

    I’m less pessimistic now. One of the recurring themes I discuss on “Time to Say Goodbye,” the podcast I host with the Atlantic’s Tyler Austin Harper, is what a good life looks like today. When politicians, especially liberal ones, discuss the society that they want to help bring into reality, what are the shared values that they imagine will hold people together? I’m not talking about kitchen-table issues, as important as they are, or even about tolerance and equality. What I have in mind is a vision of how Americans should live on a daily basis in a time when technology runs our lives. The Times columnist Ezra Klein addressed this recently in a piece about the “politics of attention” and the question of “human flourishing.” He concluded, “I don’t believe it will be possible for society to remain neutral on what it means to live our digital lives well.”

    I ultimately agree with Klein that we will not be neutral forever, even if our courts make an Australia-like ban nearly impossible. But I have come to believe that, in the not too distant future, the concerns of crusty civil libertarians such as myself will be pushed aside, and a new set of social norms will emerge, especially in the middle and upper classes. The signs of this quiet revolution waged on behalf of internet-addicted children are already all around us. School districts around the country are banning phones from the classroom. “The Anxious Generation,” by Jonathan Haidt, which directly informed the new law in Australia, has been on the Times best-seller list for eighty-five weeks, and has inspired little acts of tech rebellion by parents around the country.

    The nascent anti-smartphones movement in America is decidedly nonpartisan, for the most part, and this contributes to its potential and also to the vagueness of its outlines. It also has taken place almost entirely at the local and state level. More than thirty states in the country now have some form of cellphone ban in their schools, which should be applauded. I believe that teen-agers should have the right to post their opinions on social media, but I don’t think they need to do that in the middle of geometry class. If this means that First Amendment rights are further restricted in schools, that may be a compromise that free-speech absolutists have to accept.

    [ad_2]

    Jay Caspian Kang

    Source link

  • Australian politician calls country ‘guinea pig’ for censorship amid world-first social media ban

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A world-first social media ban took effect in Australia last week, restricting children younger than 16 from using platforms such as Instagram, Snapchat and TikTok.

    “Australia has become an international guinea pig for the people who want internet censorship,” said Hon. John Ruddick, a member of the New South Wales Legislative Council.

    More than 200,000 accounts were deactivated Wednesday after Australia’s Online Safety Amendment went into effect.

    “It’s massive,” he explained. “It’s the only thing the country’s talking about.”

    AUSTRALIA IMPLEMENTS FIRST-EVER YOUTH SOCIAL MEDIA BAN

    A 13-year-old boy displays a message on his mobile phone from social media platform Snapchat after his account was locked for age verification in Sydney on December 9, 2025.  (Photo by AFP via Getty Images)

    The 10 social media giants included in the ban are Facebook, Instagram, X, TikTok, Snapchat, Kick, Reddit, Threads, Twitch and YouTube. By law, they are required to locate and deactivate accounts of Australian users under the age of 16. 

    “I have heard that every playground around Australia for months has been talking about censorship coming,” Ruddick told Fox News Digital.

    Children and parents won’t be penalized for violating the ban, but social media companies face fines of up to $33 million if they don’t take “reasonable steps” to remove underage users.

    Many Aussie children, Ruddick said, are already finding ways to skirt the sweeping ban.

    “They’re getting around it through fake IDs, opening new apps — which you know are popping up — VPNs,” he explained. “Kids are tech-savvy… This is what we predicted would happen.”

    instagram australia social media ban

    A teenager gets a notification from Instagram after the account was locked for age verification in Sydney on December 9, 2025.  (Photo by AFP via Getty Images)

    Ruddick, alongside two Australian teenagers, is taking legal action over the ban, filing a constitutional challenge to Australia’s High Court. Equivalent to the U.S. Supreme Court, the court can overturn laws it deems unconstitutional.

    Ruddick told Fox News Digital he believes the social media ban violates young Australians’ right to political communication.

    “We’re saying that this is breaching young kids’ ability to engage in politics, and a lot of them will be voting within two years of turning the age of 16,” he explained.

    The Australian politician is the president of the Digital Freedom Project, a group launched to raise public awareness about the ban that he calls a “dangerous violation” of free speech.

    AUSTRALIA BEGINS ENFORCING SOCIAL MEDIA LAW BANNING CHILDREN UNDER 16 FROM MAJOR PLATFORMS

    A judgment on their constitutional challenge is expected in March or April 2026.

    australia's prime minister speaking on social media ban

    Australia’s Prime Minister Anthony Albanese speaks during an official function to mark the start of Australia’s social media reform at Kirrilbilli House in Sydney on Dec. 10, 2025.  (DAVID GRAY / AFP via Getty Images)

    Australian Prime Minister Anthony Albanese says the ban is about shielding children from the harmful effects of social media.

    Albanese said Wednesday that the nation is taking a leading role in challenging major tech platforms and demanding accountability for how social media impacts children’s well-being.

    “It’s a profound reform which will continue to reverberate around the world in coming months, to assist not just this generation, but generations to come,” Albanese said.

    The politician counters Albanese’s argument, saying the ban will create the “worst of both worlds,” with children turning to dangerous underground media platforms while parents let their guard down, assuming the ban is protecting them.

    AFTER AUSTRALIA PASSES SOCIAL MEDIA BAN, LAWMAKERS PROBED ON WHY CONGRESS HASN’T DONE MORE TO PROTECT KIDS

    us capitol building

    US lawmakers are being probed on whether a social media ban could come to America. (J. David Ake/Getty Images)

    Back in the U.S., lawmakers on both sides of the aisle are signaling an interest in tougher social media restrictions for young people following the Aussies’ one-of-a-kind ban.

    “I think we ought to look at what Australia’s doing, for example, requiring access to these social media platforms to not be available to anybody under the age of 16,” Sen. John Cornyn, R-Texas, said.

    “I think protecting children is an avenue that should be pursued,” Sen. Dick Durbin, D-Ill., said. “I won’t rule out some sort of limitation in sales or distribution or use of those devices… Parents and grandparents need a helping hand; this is getting out of hand.”

    australia social media teen ban

    Social media giants like Meta could face multi-million-dollar fines if they fail to ban underage Australian users. (Anna Barclay/Getty Images)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Ruddick warned that Australia’s ban is making “very prominent people” interested in a dangerous strategy of censorship.

    “I was assuming that the U.S. First Amendment was going to protect you from this,” the politician told Fox News Digital. “But this is why I think we’re a guinea pig. We’re having very prominent people all around the world coming out and supporting this ban.”

    “They’re going to try and say it’s a success, and then they’re going to say, ‘Oh, the rest of the world needs to do this.’ This is not about protecting kids. This is about internet censorship, which all governments crave,” he added.

    [ad_2]

    Source link

  • Google’s new Call Reason feature marks calls as urgent

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Sometimes you need someone to answer right away. Maybe you are locked out. Maybe those concert tickets are about to go on sale. Android users are about to get a helpful upgrade that gives their calls more context when time matters.

    Google is rolling out a beta feature called Call Reason in the Phone by Google app that lets you mark a call as urgent before you dial.

    When you use it, the person receiving your call sees the urgent label on their screen. If they miss it, the same note shows up in their call history. That quick hint can give your call priority without you needing to send a separate message.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    Call Reason lets you flag a call as urgent before you dial, giving your contacts a clear signal that your call needs quick attention. (Google)

    How the Call Reason feature works

    Call Reason appears inside the Phone by Google app on Android devices. The feature only works when both people use Google’s default calling app and the contact is saved in your phone. Many Android phones ship with Phone by Google preinstalled, especially Pixel models, while others like Samsung may use their own dialer instead. If your device does not use Phone by Google by default, you may not see the feature until you install or switch to the Google version. Once marked as urgent, your call displays a clear indicator that tells the other person the conversation should not wait.

    This simple tool helps friends and family answer faster. It also gives them a reminder if they miss the call. Since the note stays in the call log, it nudges them to call back sooner.

    Why this Call Reason feature on Android can help you

    Missed calls are common. Many people silence their phones while working or driving. Call Reason bridges that gap with a small but meaningful alert that adds context. You can give someone a heads-up that the call needs quick attention without creating extra steps or confusion.

    Right now, Call Reason only supports the urgent label. Google has hinted that more options could come later, like short custom messages or emoji-style indicators. That could add even more clarity when your call is tied to a specific topic.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    A Google phone call with the notify button highlighted

    Both people need to use the Phone by Google app for the urgent label to work, which helps your calls stand out when timing matters most.  (Google)

    How to check if you have ‘Phone by Google’ on your Android

    Not every Android phone shows ‘Phone by Google’ in its settings. Some manufacturers, especially Samsung, use their own Phone app. Here is a quick way to confirm if you have the Google version on your device.

    Check the Play Store

    Open Google Play Store

    Search for Phone by Google

    If you see Open or Update, it is installed

    If you see Install, your phone does not have it yet.

    If the Install button appears, you can download it with one tap.

    After installing the Google Phone app

    Once it is installed, your phone may prompt you to set it as your default calling app. If it does not, you can change it manually.

    Switch to Phone by Google as your default

    Once Phone by Google is installed, you need to make it your main calling app. Call Reason only works when Phone by Google is set as your default calling app. Installing it is not enough. You must switch your phone to use the Google dialer for the feature to appear. Here’s how to enable it by following these steps.

    On Pixel devices

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap Default apps

    Tap Phone app

    Select Phone by Google, which uses a blue icon with a white phone handset

    On Samsung Galaxy phones

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap the three dots

    Tap Choose default apps

    Tap Phone app

    Select Phone by Google if available. It uses a blue icon with a white phone handset, which looks different from Samsung’s green Phone icon

    Samsung may block or hide the Google Phone app on some carrier models. If you do not see it after installation, your device may not support switching. 

    How to use the Call Reason urgent label on Android

    Once you have Phone by Google set as your default calling app, using Call Reason is very simple. Both you and the person you are calling must use the Phone by Google app for the urgent label to appear.

    How to mark your call as urgent

    When you are ready to call someone:

    Open the Phone by Google app

    Go to your Contacts or Recents

    Tap the contact you want to call

    Before you press the call button, look for the Call Reason option on the screen

    Tap Urgent to attach the urgent label

    Then tap the call button to place your call

    The urgent badge is sent with your outgoing call so the person knows your call needs attention.

    What the other person sees

    When your call reaches them, they will see:

    Your name and number

    A bold “Urgent” label under your name on the incoming call screen

    If they miss the call:

    The urgent label appears in their call history

    They can tap your missed call to return it quickly

    No extra steps are needed on their end. They do not need to press anything special to receive an urgent call. Their only requirement is that they also use Phone by Google as their default calling app.

    What both people must have for it to work

    For the urgent label to show:

    Both people must use Phone by Google

    Both devices must support the Call Reason beta rollout

    The person must be saved in your Contacts

    If any of those pieces are missing, the option will not appear.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    A Google phone call with the notify and urgent buttons highlighted

    When someone receives an urgent call, the label appears on their screen and in their call history if they miss it, making it easier to call back fast. (Google)

    Tips for getting the most out of Call Reason

    Use the urgent label only for situations that need fast attention

    Keep your contacts list updated so the feature works as intended

    Encourage close friends or family to use the Phone by Google app for full compatibility

    Check your call history for urgent notes if you miss an important call  

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Call Reason feels like one of those small upgrades that can make everyday calling a little smoother. It gives your friends a quick sense of why you’re reaching out and helps cut through the guesswork when timing matters. As the feature expands, it could turn into an even more helpful way to share context before someone taps Accept.

    What situation in your life would make you use the urgent label first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Find a lost phone that is off or dead

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

    With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

    This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    You can still find your lost Apple device even when it’s dead. (Apple)

    Does Find My work when your iPhone is dead?

    Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

    You can check this location from any Apple device or a browser.

    Use Find My from another Apple device

    If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

    • Open the Find My app
    • Tap the Devices tab
    • Swipe up to see your full list of devices
    • Select your missing iPhone
    • View the location on the map
    • Tap Directions to navigate to it
    • Tap Play Sound if the phone is on and nearby
    Steps to enable Find My on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
    • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
    • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
    Steps to enable Find my on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    Find your iPhone from a web browser

    If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

    • Go to iCloud.com/find
    • Sign in with your Apple ID
    • Approve two-factor if needed
    A Find Devices sign in screen

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Select All Devices
    • Choose your missing iPhone
    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Use Play Sound if the device is on
    • Turn on Lost Mode to lock the phone

    Use this method when you have no Apple hardware nearby.

    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    Use the Help a Friend feature in Find My

    If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

    • Open Find My on your friend’s iPhone
    • Scroll to Help a Friend
    • Sign in with your Apple ID
    • View the last known location of your iPhone

    This tool bypasses two-factor prompts so you can get your location without any issues.

    Help a Friend feature on iPhone

    Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

    Can you find an iPhone without Find My

    If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

    Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

    Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

    Best iPhone settings to turn on before your device goes missing

    Before your iPhone ever goes missing, take a minute to set up these key protections.

    1) Turn on Find My iPhone

    This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

    2) Enable Send Last Location

    Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

    Your phone will save its final location before the battery dies.

    3) Turn on Find My network

    Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
    This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

    4) Keep two-factor authentication on

    Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
    This blocks anyone from accessing your Apple ID without approval.

    5) Use a strong passcode

    Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
    Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

    6) Add a recovery contact

    Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
    Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

    CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

    How to find an Android phone that is off or dead

    Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

    Find your Android from a browser

    Settings may vary depending on your Android phone’s manufacturer.

    • Go to android.com/find
    • Sign in with your Google account
    • Select your missing device
    • View the last known location on the map
    • Select Secure Device to lock it and display a callback message
    • Select Play Sound if the phone is on and nearby

    Find your Android from another phone

    Settings may vary depending on your Android phone’s manufacturer.

    • Download the Find My Device app on another Android
    • Sign in with your Google account
    • Tap your missing phone to view its last known location

    If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

    Best Android settings to turn on before your device goes missing

    Before your Android phone ever goes missing, take a minute to set up these key protections.

    Settings may vary depending on your Android phone’s manufacturer.

    1) Turn on Find My Device

    This lets you track your phone or lock it from any browser.
    Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
    (Names may vary by manufacturer.)

    2) Enable Location Services

    This improves accuracy and helps Google save your phone’s last known location.
    Go to Settings, tap Location and turn on Use Location.

    3) Turn on Google Location History

    This allows Google to show past locations even when your phone is off.
    Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

    4) Add a recovery phone number or email

    This helps you verify your identity and recover your account fast.
    Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

    5) Use a strong screen lock

    Choose a secure lock to keep your data safe.
    Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

    6) Turn on “Send last location” (If available)

    Some Android models save the phone’s last known location before the battery dies.
    Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

    What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link