ReportWire

Tag: Software

  • A supercomputer chip going to space could change life on Earth

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A computer chip so powerful that it fuels today’s artificial intelligence is about to leave Earth. NVIDIA’s H100 GPU, used to train advanced AI models, will soon travel aboard a Starcloud satellite.

    Starcloud, a startup based in Redmond, Washington, wants to see if the world can move data centers into orbit. These centers power nearly everything online, from streaming to AI tools. Shifting them into space could help reduce pollution, save resources and speed up computing for everyone.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    LIVING IN GIANT MOON GLASS SPHERES COULD BE OUR FUTURE

    Starcloud aims to build the first orbital data centers, cutting emissions and speeding up global computing. (Dean Mouhtaropoulos/Getty Images)

    Why space data centers matter for the future

    Every time you send a message, store a file in the cloud or use AI, large computers on Earth handle the work. These data centers use massive amounts of electricity and water to stay cool. They also release heat, noise and greenhouse gases that affect local communities.

    Space offers a different environment. Solar energy is abundant, and cooling happens naturally in the cold vacuum. “The only environmental cost is the launch,” said Starcloud CEO Philip Johnston. “After that, we could save ten times the carbon emissions compared with running data centers on Earth.”

    For a world searching for greener technology, that goal matters.

    How the NVIDIA GPU will work in orbit

    The Starcloud-1 satellite, about the size of a small refrigerator, will carry NVIDIA’s H100 GPU. It is nearly one hundred times more powerful than any chip ever sent into orbit.

    Once in space, the GPU will process huge amounts of satellite data. It will study images of Earth to identify wildfires, track crops and monitor weather. Normally, satellites send this data back to Earth for processing, which can cause long delays. Doing the analysis in orbit allows faster results and better decisions on the ground.

    The mission will also test Google’s Gemma language model in orbit. It will be the first time a large AI model operates in space.

    THE NEW ARMS RACE IS FOR COMPUTE — AND AMERICA CAN’T AFFORD TO FALL BEHIND

    By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient.

    By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient. (Dean Mouhtaropoulos/Getty Images)

    Starcloud plans to build space data centers

    Starcloud hopes this is only the beginning. The company plans to build larger data centers in space powered by sunlight and cooled by the natural chill of orbit. Future systems will include the next generation of NVIDIA GPUs called Blackwell, which promise even higher performance.

    Starcloud’s long-term goal is to create a five-gigawatt orbital data center about 2.5 miles wide (around 13,000 feet across). It could handle massive AI workloads while cutting costs and carbon emissions. As launch prices continue to fall, building data centers beyond Earth could soon become practical.

    Johnston believes that by the 2030s, many new data centers will operate in orbit instead of on land.

    What this space mission means for you

    If this works, the technology that powers your apps, games and AI tools might soon be running in space. This change could make cloud services faster, more efficient and less harmful to the planet.

    Space-based data centers could also speed up disaster response, improve weather forecasts and save millions of gallons of water every year. The idea shows that innovation and sustainability can grow together.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    RAPID RISE OF AI PUTS NEW URGENCY ON CONGRESS TO UNLEASH AMERICAN ENERGY

    NVIDIA logo.

    NVIDIA’s powerful H100 GPU is heading to space aboard Starcloud-1 to test AI data processing in orbit. (Kent Nishimura/Bloomberg via Getty Images)

    Kurt’s key takeaways

    Sending an NVIDIA GPU into orbit shows how quickly technology is changing. The mission combines curiosity, innovation and a genuine push to make computing cleaner and faster. As space becomes more reachable, the idea of data centers floating above Earth feels less like fiction and more like something that could actually happen. Each of these missions could teach us a little more about how to build a sustainable digital future.

    How do you feel about the idea of data centers operating in space? Is it exciting, risky or both?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
     

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

    When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Why are unsupported systems dangerous

    Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

    It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

    The “just one more year” trap

    Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

    Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

    Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    The hidden costs of waiting to upgrade to Windows 11

    It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

    Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

    How to stay safe from unsupported Windows 10 security risks

    You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

    1) Upgrade your system to Windows 11

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

    2) Watch out for phishing scams and install strong antivirus software

    Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Signage outside the Microsoft Campus

    Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Secure your logins

    Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

    WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Man typing on his laptop.

    Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Back up your data regularly

    Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

    6) Stay informed and proactive

    Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

    Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • How to use passkeys to keep your computer safe

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Keeping your computer secure is more important than ever. Cyberattacks target computers, accounts and sensitive data daily. Traditional passwords have long been the cornerstone of security, but they come with real challenges. Many of us reuse passwords across sites, and even strong passwords can be compromised in data breaches.

    Passkeys offer a safer and more convenient way to authenticate. However, they’re still relatively new, and many of us are still trying to figure out how they work. For example, Peter recently reached out asking, “How do I get a passkey from a PC desktop that doesn’t have a camera or fingerprint device?”

    That’s a great question, Peter, and you’re not alone in wondering about this. The good news is that passkeys are designed to work on virtually any device, whether or not it has biometric hardware like a fingerprint reader or camera. Let’s explore what passkeys are, why they’re worth using and how to set them up on both Windows and Mac, regardless of your hardware setup.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Passkeys make signing in faster and safer by replacing traditional passwords with encrypted keys. (Kurt “CyberGuy” Knutsson)

    What are passkeys?

    Passkeys use cryptography to prove who you are. When you create a passkey, your device makes two keys, one public and one private. The public key goes to the website, and your private key stays on your device. During login, your device confirms your identity with the private key. The website never sees or stores it.

    This process blocks phishing and password theft. It also makes sign-in faster. You don’t need to remember or type long passwords anymore.

    While passkeys simplify authentication, they don’t eliminate the need for a secure password manager. Password managers can safely store and sync your passkeys, just as they do with passwords, allowing you to access your credentials across devices and browsers — even if those devices don’t natively sync passkeys, such as between Windows and Apple systems. Using a password manager alongside passkeys creates a bridge between platforms and provides an additional layer of security and convenience.

    Can you use passkeys without biometrics?

    Yes, you can. A PC or Mac without a camera or fingerprint reader can still use passkeys. On Windows, you unlock them with your Windows Hello PIN. On Apple devices, you can use Touch ID, Face ID or your passcode. The key is having an updated operating system and browser that support passkeys.

    If you manage multiple accounts or devices, a password manager that supports passkeys can act as your central vault. This lets you use passkeys even on systems that don’t directly support syncing through iCloud or Google Password Manager. It’s an easy way to ensure you always have access to your credentials, no matter what kind of device you use.

    Why you still need passwords

    Not every website supports passkeys yet. Some services still rely on passwords. Keep strong, unique passwords for those accounts. Passwords also serve as backup if you lose a device or can’t use your passkey. Over time, more sites will support password-free logins.

    This is where password managers continue to play an important role. They bridge the gap between old and new authentication methods, allowing you to store both traditional passwords and passkeys in one secure place. Until the web is fully passkey-ready, combining the two provides both convenience and resilience, giving you a seamless experience across multiple devices and services.

    A MacBook

    Passkeys also prevent phishing because your private key never leaves your device during sign-in. (Kurt “CyberGuy” Knutsson)

    Passkey support by platform 

    Windows

    • Works on Windows 10 and 11.
    • Windows 11 version 22H2 (KB5030310+) includes passkey management.
    • Unlock with Windows Hello PIN, face, or fingerprint.

    If your browser or operating system doesn’t yet sync passkeys automatically, a third-party password manager with passkey support can store them for cross-platform access.

    macOS and iOS

    • Works on macOS 13 Ventura or later and iOS/iPadOS 16 or later.
    • Passkeys sync through iCloud Keychain with end-to-end encryption.
    • Two-factor authentication must be turned on.
    • Use Touch ID, Face ID or your device passcode to confirm logins.

    While Apple’s iCloud Keychain handles passkeys securely within its ecosystem, using a password manager that supports passkeys provides extra flexibility, letting you securely access the same credentials on non-Apple devices or browsers outside Safari.

    Android

    • Available on Android 9 and later.
    • Android 14 adds third-party passkey manager support.
    • Passkeys sync through Google Password Manager by default.

    Alternatively, password managers now integrate passkey syncing, letting you use your passkeys seamlessly on both desktop and mobile devices.

    Browsers

    • Chrome, Edge, Safari and Firefox all support passkeys.
    • Keep your browser updated for the best compatibility.

    Browser-based password managers can also sync passkeys, adding flexibility if you switch between devices or operating systems.

    Major services that support passkeys

    As of publishing, these major services offer passkey sign-in:

    • Google
    • Microsoft
    • Apple
    • Amazon
    • PayPal
    • GitHub
    • Uber
    • eBay
    • WhatsApp
    • Facebook

    Support continues to expand every month. Most new accounts on these platforms can now use passkeys.

    How to set up passkeys on Windows

    • Open Settings → Accounts → Sign-in options.
    • Set up Windows Hello PIN or biometrics.
    • Visit a site that supports passkeys.
    • Choose Create a passkey and confirm with your PIN or biometric.
    • Manage passkeys later under Settings → Accounts → Passkeys on Windows 11.

    If your PC lacks biometrics, you can still approve sign-ins using your phone nearby or a synced password manager that supports passkeys.

    Windows passkey

    (Kurt “CyberGuy” Knutsson)

    How to set up passkeys on Mac

    Apple devices also provide a simple and secure way to use passkeys through iCloud Keychain. There’s no separate setup for passkeys if you have iCloud Keychain enabled. Once it’s on, an eligible app or service will ask you to create a passkey at the time of login, and you’ll be able to do so by following the instructions on the screen. Below is how you can enable iCloud Keychain.

    • Go to Apple menu → System Settings → your name → iCloud.
    • Click Passwords and turn on Passwords & Keychain and enable syncing.
    • Visit a site that supports passkeys.
    • Select Create a passkey and confirm with Touch ID or your passcode.
    • Passkeys will sync to your other Apple devices through iCloud Keychain.

    You can also approve logins on a non-Apple device using your iPhone nearby, or access them through a password manager that stores both your passkeys and passwords in one place.

    iCloud Keychain

    On Windows, you can use passkeys with a simple Hello PIN, even without a camera or fingerprint reader. (Kurt “CyberGuy” Knutsson)

    Common questions about passkeys

    Can I move passkeys between devices?

    Yes. iCloud and Google Password Manager sync passkeys securely. For more flexibility, password managers now support passkey portability across different ecosystems, perfect if you use both Mac and Windows, or Android and iPhone.

    What if I lose my device?

    You can recover passkeys from iCloud, Google or your password manager. Always keep a backup login method and 2FA enabled. Storing your passkeys in a secure password manager ensures recovery even if you lose access to one platform’s ecosystem.

    Are passkeys fully replacing passwords?

    Not yet. Many major platforms support them, but full adoption will take time. Until then, password managers remain an essential bridge technology, providing secure storage, synchronization and transition support as passkeys continue to expand.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    5 additional steps you can take to keep your computer safe

    Even with passkeys and strong passwords, there are other steps you can take to enhance the security of your computer.

    1) Use a password manager

    Password managers help generate and store strong, unique passwords for every account. This reduces the risk of password reuse and ensures that your backup passwords are secure. Now that many password managers support passkeys, they also act as your universal credential vault, letting you log in with either method depending on what a website supports.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    2) Install strong antivirus software

    Strong antivirus software protects against malware, ransomware and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    3) Keep your system updated

    Regular updates fix security vulnerabilities in your operating system and software. Enable automatic updates whenever possible to stay protected.

    4) Enable two-factor authentication

    Two-factor authentication (2FA) adds a second verification step, usually through a code sent to your phone or email, or through an authentication app. This makes it harder for attackers to access your accounts even if your password or passkey is compromised.

    5) Backup your data

    Regularly backing up your Mac or PC to a secure cloud service or external drive ensures that you can recover important data in case of hardware failure, malware attack, or accidental deletion.

    Kurt’s key takeaway

    Passkeys are a major upgrade over traditional passwords, but we’re not living in an all-passkey world just yet. Many sites still rely on passwords, and you’ll need backups if something happens to your device. Supplementing passkeys with a password manager is the best move right now; it lets you store, sync and protect both passkeys and passwords under one roof. The good news is that setting up passkeys takes just a few minutes, and once they’re enabled, logging in becomes faster and more secure.

    Have you tried using passkeys yet? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Beware fake credit card account restriction scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It started with an urgent subject line: “Resolve Unusual Activity on Your American Express Account Now.” That is how one scam email tried to trick me into clicking a fake link that claimed to “verify account activity.” It looked official with logos, customer support tone and even a partial account number. But it was a phishing attempt, a common tactic used to steal personal and financial information.

    Let’s look at what made this message suspicious and how you can protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW TO SPOT AND STOP AI PHISHING SCAMS

    How the phishing email scam works

    Phishing emails copy trusted companies to create panic and urgency. The goal is simple: get you to click. In this case, the email claimed my American Express account was “temporarily restricted” until I verified my identity.

    A fake American Express email tried to steal personal data using urgent, fear-based language. (Kurt “CyberGuy” Knutsson)

    A closer look revealed several red flags:

    • The sender’s email was not from an official American Express domain.
    • The “Click Here” button linked to a strange website.
    • The message used fear-based language about account suspension.

    Each of these clues points to a fake email designed to steal login details or credit card numbers.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Instructions on where to click.

    Learn to spot red flags like strange email addresses and fake “verify account” requests. (Kurt “CyberGuy” Knutsson)

    What to do if you receive a phishing email

    If an email looks suspicious:

    • Do not click any links.
    • Check the sender’s address. Real companies use verified domains, not random ones.
    • Go directly to the company website by typing the URL into your browser.
    • Report the email. American Express asks customers to forward phishing messages to spoof@americanexpress.com.
    • Delete the email right away.

    These steps can protect you from identity theft and financial fraud.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    Person typing on their laptop.

    Strong passwords, 2FA and data removal services help defend against digital scams. (Neil Godwin/Future via Getty Images)

    10 tips to protect yourself from phishing emails

    Phishing scams that mimic real companies like American Express can slip into your inbox looking almost legitimate. The best way to stay safe is to create strong digital habits that protect your information and your peace of mind. Here are the top ways to defend yourself against phishing threats and financial fraud.

    1) Turn on two-factor authentication for financial accounts

    Adding two-factor authentication (2FA) creates an extra layer of protection. Even if a scammer gets your password through a fake American Express email, they cannot access your account without your verification code. Most banks and credit card companies offer this free feature in their security settings. Enable it today and make your login stronger.

    2) Consider using a data removal service

    Data removal services help clean up your personal information from data broker websites that collect and sell your details to advertisers, marketers and even scammers. Reducing your digital footprint limits the amount of information that phishing attackers can use to make fake emails look convincing. In the case of fake American Express messages, less personal data online means fewer details criminals can use to target you directly.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    3) Keep your browser and security software updated

    Outdated browsers and antivirus programs leave gaps that scammers can exploit. Regular updates close those gaps and strengthen your defense against phishing links and malicious downloads. Set your software to update automatically so you are always protected when opening emails or clicking links.

    4) Review account statements and transactions regularly

    Make it a habit to log into your credit card accounts directly from the official website, not from email links. Scan your statements for unfamiliar transactions. Early detection helps you report fraud fast and recover funds before more damage is done.

    5) Pause and verify before you click anything

    Phishing emails thrive on urgency. Before clicking, take a deep breath and ask yourself: Does this message feel pressured or suspicious? Instead of clicking “verify now,” open a new browser tab and visit the official credit card website to check your account. This one simple pause can stop a scam in its tracks.

    6) Use strong antivirus software

    Good antivirus software not only blocks viruses but also warns you when a site or email is unsafe. Choose a program that includes phishing detection, real-time web protection and email scanning. These tools can automatically block fraudulent look-alike emails before you even open them.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Use an identity monitoring service

    Identity monitoring services keep watch over the dark web and alert you if your personal information, such as your email address, password, or credit card number, appears in stolen data. If scammers gain access to this information, they often use it to create realistic phishing attempts, like the fake American Express “account restricted” email. Early detection through identity monitoring allows you to take action, such as changing passwords, freezing credit, or alerting your bank before real damage occurs.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    8) Learn to recognize official communications

    Legitimate companies like American Express will never ask for full account numbers, passwords, or security codes by email. Familiarize yourself with how real messages from your bank look and sound. If something feels off, forward the message to the company’s official fraud department and delete it immediately.

    9) Back up your important data securely

    If a phishing attack installs malware on your computer, it can lock or delete files. Keep secure backups on an external drive or a trusted cloud service. That way, even if scammers target your system, you will not lose access to your information.

    10) Trust your instincts

    If an email feels wrong, it probably is. Your intuition is one of your strongest defenses against scams. Combine it with these habits to stay ahead of cybercriminals and keep your personal and financial information safe. 

    Kurt’s key takeaways

    Phishing scams are becoming more advanced, but your awareness is your best defense. When you know how to spot fake emails and stay calm under pressure, you protect both your money and your peace of mind. So next time you get an “urgent” message about your account, ask yourself: Would your bank really contact you this way?

    Have you ever received a suspicious email like this? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • These 5 tech stocks could let you play earnings season like a pro

    [ad_1]

    These 5 tech stocks could let you play earnings season like a pro

    [ad_2]

    Source link

  • Browser Password Managers Are Great, and a Terrible Idea

    [ad_1]

    By default, Google manages your encryption key, but it allows you to set up on-device encryption, which functions similarly to a zero-knowledge architecture. Your passwords are encrypted before being saved on your device, and you manage the key. Regardless of how the encryption works, Google uses AES, which is still the gold standard for security among password managers.

    It was trivial to decrypt Chrome passwords previously, requiring little more than a Python script and knowledge of where the files are stored. But even there, Google has pushed the security bar up. App-bound encryption has invalidated those methods, and cracking passwords is far more involved than it used to be. Further, Google has integrated with Windows Hello. If you choose, you can have Windows Hello protect your passwords each time you log in by asking for your PIN or biometric authentication.

    Other browsers aren’t as secure. Firefox, for instance, makes it clear that, although passwords saved in Firefox are encrypted, “someone with access to your computer user profile can still see or use them.” Brave works in a similar way, though I suspect most people using Brave are using a third-party password manager (and probably a VPN) already.

    Regardless, storing your passwords in even a less secure browser like Firefox is leaps and bounds better than not using a password manager at all. And the browsers at the forefront of market share, Chrome and Safari, have vastly improved their security practices over the past few years. The problem isn’t encryption—it’s putting all your eggs in one basket.

    Let’s Talk OpSec

    OpSec, or operational security, is normally a term used when talking about sensitive data in government or private organizations, but you can look at your own security through an OpSec lens. If you were an attacker and wanted to swipe someone’s passwords, how would you go about it? I know where I’d look first.

    Even with better security measures, the goal of a browser-based password manager is to get people using password managers. That has to be balanced against how easy the password manager is to use. In a blog post announcing changes to Google’s authentication methods from Google I/O this year, the company mentions reducing “friction” seven times, while “encryption” isn’t mentioned at all. That’s not a bad thing, but it’s a testament to how these tools are designed.

    You don’t need to pick out words from a blog post to see this focus. Google gives you the option to turn on Windows Hello or biometric authentication with the Google Password Manager. Each time you want to fill in a password, you’ll need to authenticate. That’s undoubtedly more secure than not authenticating each time, but the setting is turned off by default. It creates friction.

    [ad_2]

    Jacob Roach

    Source link

  • OpenAI’s Atlas Wants to Be the Web’s Tour Guide. I’m Not Convinced It Needs One

    [ad_1]

    The oddest, and most memorable, interaction I had with ChatGPT Atlas occurred as I scrolled around on Bluesky and asked it to highlight any trends it saw. (ChatGPT listed “political anxiety” and “everyday absurdism” as two of the trends on my timeline.) I was curious what would happen if I opened my Bluesky DMs, which amounted to just a few old messages from friends. So I asked the bot what it would see if I opened that more private page.

    “Opening your DMs won’t expose anything to me—I’ll simply stop ‘seeing’ the page until you go back to a public view (like your feed, profile, or a post),” read part of ChatGPT’s answer.

    Knowing that my Bluesky DMs don’t have anything sensitive, I gave it a whirl. Even though the bot said it wouldn’t “see the message list, conversation text, or sender info,” that wasn’t the case.

    I opened a DM inviting me to an event, then asked the bot a follow-up question asking about the message and what the invitation was about. I received a response from ChatGPT that included facts culled from the conversation, along with details about the sender. What gives? I asked the bot to explain itself, just to see whether it would backtrack the privacy claims it made earlier in the chat.

    “I do not have access to your private messages or account data unless you explicitly paste or show that text to me in the chat,” read ChatGPT’s response. “What you just did—asking ‘what was this an invite to?’—temporarily surfaced part of the message context so I could answer your question. But I don’t have any background or visibility into your inbox beyond what you actively bring into our conversation.”

    The first answer the Ask ChatGPT sidebar spit out is a potential example of an AI “hallucination,” aka error, that’s common during interactions with generative AI tools. The second is more aligned with how the tool actually works.

    While some users may appreciate having a chatbot always pulled up on the side of their screen, ready to surface related facts or summarize details, it felt like an unreliable tour guide to me. One who was overly confident in its bland responses and taking up too much space.

    I’ll keep testing Atlas as my main browser for the next few weeks, but for now, I’m leaving that sidebar closed. I prefer the fullscreen version of the internet.

    [ad_2]

    Reece Rogers

    Source link

  • One Tech Tip: Keeping up with your Halloween trick-or-treaters with these tricks

    [ad_1]

    NEW YORK — NEW YORK (AP) — For little ghosts, witches, KPop Demon Hunters and superheroes, Halloween is one of the most exciting nights of the year. But it’s also one of the busiest for parents as they try to keep track of their trick-or-treaters, give out candy and watch over their homes.

    Fortunately, there are some tech tricks out there that can help families stay safe this Halloween, and have a little more fun too.

    If your children are outfitted with Apple or Google-branded smart phones or watches or tracking tags, you can use the Find My or Family Link apps to keep tabs on them as they embark on their candy journeys. But don’t think of these apps as basic. Because branded peripherals — like Apple Air Tags or Pixel smartwatches — are built to be used with Apple and Google platforms, their tracking platforms can be more reliable than some third-party services.

    One trick I discovered last Halloween is that I can set up a geofence with Find My. This gave my kids a little more freedom to navigate a set trick-or-treating area while I struggled to keep up with them. If anyone broke from the pack and left the designated area, I would get a notification. Here’s how to set it up:

    Go to the Find My app on your iPhone. Scroll and tap on the name of the person or device you want to be notified about. Below notifications, tap “Add,” then “Notify me.” Continue through the menu options until you get to a location option. Choose “New Location” and you will be given the option to set a location radius. Then you will be asked how often you wish to be notified if the tracked individual leaves the area.

    Next is a critical step if you wish to set a recurring notification. Unless it’s an air tag, your child must give a one-time authorization to the request. They will receive an alert asking for approval when they arrive at or leave the location you chose for the first time.

    Google users have a similar geofencing option. First, you need to set up a new Family Location in the Family Link app. Then select your child in the main menu of the app and tap Family Locations, add the place you just created and select how often you’d like to be notified when they enter or exit the area.

    If you have a smart doorbell installed on your front door, you can have a little extra fun with visiting trick-or-treaters by adding spooky messages and specialized chimes.

    For Ring doorbell users, head to your app and go to Menu-Devices. Select your doorbell. Then tap Smart Responses-Quick Replies-Quick Reply Message. You may need to toggle on Quick Replies if you hadn’t before, but you will see a list of Halloween-themed replies. Ours is set to “I’ll be right there to eat… I mean greet you!”

    For those with Eufy Doorbells, navigate to your app and select your doorbell. A Voice Response list should include selectable Halloween-themed effects and chimes. You can also take advantage of a message recording function in more recent doorbell models to create your own, hopefully scary, response.

    Nest and Google home users should be able to use their app to select a Halloween setting under Doorbell Themes (Google was updating Nest in October so your menu may be different from mine).

    One unrelated tip for smart doorbell users, you may want to lower your motion sensitivity just for Halloween. If your device isn’t hardwired, the extra motion from trick-or-treaters could drain your doorbell’s batteries quickly (as I discovered). You can also avoid a flood of notifications if you do so.

    Smart phones have flashlights, sure, but they’re not the brightest nor are they the best option if you’re carrying jackets, candy baskets, water bottles or costume parts. Instead, give yourself or your children more portable lumens so they can see (and be seen) easily in the dark.

    There are plenty of options for all budget ranges, but I’m partial to lights that you can clip onto jackets or costumes to keep your hands free.

    [ad_2]

    Source link

  • Chess grandmaster Daniel Naroditsky is remembered as a leader in the game’s online surge

    [ad_1]

    Daniel Naroditsky, a 29-year-old standard-bearer in the world of competitive speed chess that flourished in the COVID-19 pandemic, died over the weekend and leaves behind a legacy as one of the greats of the game who helped usher in its digital era.

    The American grandmaster won several championships and amassed hundreds of thousands of subscribers on YouTube, Twitch and other platforms, where he would livestream matches and explain strategy in real time. But he also struggled with the cyberspace he helped build.

    High-speed games became wildly popular online during the pandemic, creating a chess community that was soon rife with cheating allegations as players gained access to sophisticated computer programs that could give them an unfair advantage.

    Naroditsky’s untimely death has shined a spotlight on the dark underbelly of the game that fellow pros say brought undue hostility upon the chess star in his final months.

    Naroditsky had been accused of cheating, and the allegations, never proven, had taken a toll. Ukrainian grandmaster Oleksandr Bortnyk, a competitor and friend of Naroditsky, was concerned and went to check on him Sunday. He and a friend found Naroditsky, known to many as Danya, unresponsive on a couch in his North Carolina home, Bortnyk recounted during an emotional livestream Monday.

    The cause of death has not been made public.

    “Danya was not only a brilliant grandmaster, but also a tireless ambassador for chess, and above all — a kind, compassionate and truly good person,” said Arkady Dvorkovich, president of the International Chess Federation.

    The unsubstantiated claims of cheating came from from Russian grandmaster and former World Chess Champion Vladimir Kramnik, whom Naroditsky had called one of the “heroes” he looked up to as a kid.

    Naroditsky had denied the claims as he excelled at blitz and bullet chess, where players have mere minutes to finish intense matches.

    “Ever since the Kramnik stuff, I feel like if I start doing well, people assume the worst of intentions,” Naroditsky said Saturday in the last livestream he filmed before his death. “The issue is just the lingering effect of it.”

    He ruminated about his legacy and hoped other top players would trust that he played with integrity.

    Chess pros from around the world have since praised Naroditsky as an honorable player who used his online platform to make chess more accessible. His family said in a statement that they hope he will be remembered for the joy and inspiration he brought people.

    Meanwhile, grandmasters have slammed Kramnik on social media for how he treated Naroditsky. American grandmaster Hikaru Nakamura went on an expletive-laden rant on his latest livestream, and Indian grandmaster Nihal Sarin accused the Russian pro of trying to destroy Naroditsky’s life in a post on X.

    Kramnik continued to post about Naroditsky on the day his death was announced, calling it a tragedy and speculating about the cause.

    Naroditsky became a grandmaster, the highest title in chess aside from World Chess Champion, at the age of 18. He was consistently ranked in the top 200 worldwide for traditional chess and was a top 25 blitz player, winning the U.S. National Blitz Championship in August. He spent much of his time training young players.

    “Daniel was an incredible teacher and explainer of chess and concepts and ideas,” said Daniel Weissbarth, a renowned chess instructor and the co-owner of Silver Knights Chess Academy in Virginia.

    Many pros this week called for an end to the constant finger-pointing that seemed to follow players like Naroditsky who thrived in fast-paced play.

    Kenneth Regan, a chess international master and computer science professor at the University at Buffalo, said the opportunity to cheat has exploded as the cerebral sport has shifted online. There are ways to police the game online, but Regan said they are intrusive.

    “The rate of cheating online is 100 to 200 times higher than the rate over the board,” Regan said. “From my point of view, there are five to 10 cases per year over the board.”

    The popular internet chess server Chess.com shut down Kramnik’s blog on the site in 2023, saying he had used it to spread baseless cheating allegations about “many dozens of players.” At the time, the platform warned of “Kramnik’s escalating attacks” against some of the most respected members of the chess community and some promising young talents.

    The speedy style of play popularized in chess’ digital arena is somewhat reliant on the honor system.

    Top talents analyze the board so quickly and move with such precision that cheating allegations have become common. Bullet chess is so fast, Regan said, that it’s essentially “playing chess entirely with your gut.”

    Last week, Naroditsky posted a video in his popular Speedrun series on YouTube, telling viewers he was “back, better than ever” after a short “creative break.” His videos, in which he gave tips and discussed strategy, were great tools for chess players of various abilities, said Benjamin Balas, a psychology professor at North Dakota State.

    “He would tell you ‘This is the kind of mistake you’re going to see at this level,’ and he would make mistakes, too, and talk to you how to manage them,” Balas said.

    Nakamura and five-time World Chess Champion Magnus Carlsen are also using social media to take chess to a wider audience, increasing its popularity around the world.

    “People, they see Daniel or other streamers and they start to play online chess,” said John Hartmann, editor of Chess Life magazine. “The streaming personalities, they lead people into the chess world.”

    Carlsen credited Naroditsky for his work in the streaming space, saying he was “such a resource to the chess community.”

    [ad_2]

    Source link

  • One Tech Tip: How to Prepare for Outages That Impact Our Online Lives, From Banking to Chatting Apps

    [ad_1]

    NEW YORK (AP) — A major Amazon Web Services outage disrupted scores of online platforms on Monday — leaving people around the world unable to access some banks, chatting apps, online food ordering and more.

    History shows these kinds of system outages can be short-lived, and are often minor inconveniences — such as placing a lunch order in person or waiting a few hours for a gaming platform to come back online — than long-term problems, but recovery can be a bumpy road. And for people trying to move money, communicate with loved ones or work using impacted services, disruptions are especially stressful.

    Consumers may not realize how many platforms they use rely on the same back-end technology. AWS is one of only a handful of major cloud service providers that businesses, governments, universities and other organizations rely on. Monday’s outage is an important reminder of that — and experts stress it’s important to diversify our online lives where we can, or even have some “old school” alternatives to turn to as a backup plan.

    “Don’t put all your eggs in one digital basket,” said Lee McKnight, an associate professor at Syracuse University’s School of Information Studies, noting these kinds of outages aren’t going away anytime soon.

    So what, if anything, can you do to prepare for disruptions? Here are a few tips.


    Keep your money in more than one place

    During Monday’s AWS disruptions, users on outage tracker Downdetector reported problems with platforms like Venmo and online broker Robinhood. Banks such as Halifax and Lloyds also said some of their services were temporarily affected, although some customers continued to report lingering issues.

    Even if short-lived, outages that impact online banking and other financial services can be among the most stressful, particularly if a consumer is waiting on a paycheck, trying to pay rent, checking on investment funds or making purchases. While much of your stress will depend on the scope and length of disruptions, experts say a good rule of thumb is to park your money in multiple places.

    “I’m a big fan of holding multiple accounts that can give us access, to some degree, of funds at any given time,” said Mark Hamrick, senior economic analyst at Bankrate. This underlines the importance of having an emergency savings account, he explains, or other accounts separate from something like day-to-day checking account, for example.

    Keeping some cash in a safe place is also a good idea, he adds — and emergency preparedness agencies similarly recommend having physical money on hand in case of a natural disaster or power failures. Still, it’s important to keep hoarding in moderation.

    “We shouldn’t go overboard, because we can lose cash — it can be stolen or misplaced,” Hamrick said. And in terms of prudent financial practices overall, he explains, you also don’t want to have lots of money “stored under a mattress” if it could instead be earning interest in a bank.

    Depending on the scope of the outage, some other options could still be available.

    If digital banking apps are offline, for example, consumers may still be able to visit a branch in person, or call a representative over the phone — although wait times during widespread disruptions are often longer. And if the disruptions are tied to a third-party cloud services provider, as seen with AWS on Monday, it’s not always something a bank or other impacted business can fix on its own.


    Have backup communication channels

    Monday’s AWS outage also impacted some communications platforms, including social media site Snapchat and messaging app Signal.

    In our ever-digitized world, people have become all the more reliant on online channels to call or chat with loved ones, communicate in the workplace and more. And while it can be easy to become accustomed to certain apps or platforms, experts note that outages serve as an important reminder to have backup plans in place.

    That could take the form of simply making sure you can reach those who you speak to regularly across different apps, again depending on the scope of disruption. If broader internet and cloud services that smartphones rely on are impacted, you may need to turn to more traditional phone calls and SMS text messages.

    SMS texting relies on “an older telecom infrastructure,” McKnight explains. For that reason, he notes that it’s important to have contacts for SMS texting up to date, “and not just the fancier and more fun services that we use day to day” in case of an emergency.

    Meanwhile, there can also be outages that specifically impact phone services. For non-cloud service outages in the past, impacted carriers have suggested users try Wi-Fi calling on both iPhones and Android devices.


    Save your work across multiple platforms — and monitor service updates

    Overall, McKnight suggests “building out your own personal, multi-cloud strategy.”

    For online work or projects, that could look like storing documents across multiple platforms — such as Google Drive, Dropbox and iCloud, McKnight explains. It’s important to recognize potential security risks and make sure all of your accounts are secure, he adds, but “having some diversity in how you store information” could also reduce headaches when and if certain services are disrupted.

    Many businesses may also have their own workarounds or contingency plans in case the technology they use goes offline. While a wider recovery from Monday’s outage is still largely reliant on Amazon’s wider mitigation efforts, individual platforms’ social media or online status pages may have updates or details about alternative operations.

    You can also check outage trackers like Downdetector to see if others are experiencing similar problems.

    Even after recovery, experts also suggest checking payments, online orders and messages you may have sent during or close to the outage — in case something didn’t go through.

    Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.

    Copyright 2025 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

    Photos You Should See – Oct. 2025

    [ad_2]

    Associated Press

    Source link

  • How to Protect Yourself Against Getting Locked Out of Your Cloud Accounts

    [ad_1]

    If you’re sensitive to tech disasters, you might want to look away now: A recent Reddit thread tells the story of an unfortunate user who found 30 years of photos and work locked away and inaccessible in Microsoft OneDrive.

    The individual made use of their cloud storage account to consolidate files from various hard drives, which had to be discarded due to a move. The plan was to then move the files back from OneDrive to new hard drives, but before the user was able to do this, their account was locked by Microsoft—without any reason given.

    It’s still not clear why the account was locked or why Microsoft has so far ignored the user’s appeals to restore access, but it’s a warning to the rest of us—and a reminder to put a few basic protections and precautions in place.

    Keep Multiple Backups

    It used to be a truth universally acknowledged that data wasn’t properly backed up until it was backed up twice, in two separate locations. You can copy your important files to an external hard drive, but if it’s in the same room as your laptop, then theft, fire, or flood can wipe out both copies at the same time.

    Today, having two backups of everything—so three copies in total—might seem excessive, as cloud storage services so rarely go down. We’ve all become used to the idea that the data we’ve logged with Microsoft, Google, Apple, or other providers is always going to be available, so we don’t need to worry about it.

    Apps will often push you to delete local copies of your files.

    Photograph: David Nield

    [ad_2]

    David Nield

    Source link

  • Microsoft sounds alarm as hackers turn Teams platform into ‘real-world dangers’ for users

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft is sounding the alarm, and this time, the warning hits home for everyday users. Hackers are now turning Microsoft Teams security threats into real-world dangers that go far beyond corporate networks. Using Teams, cybercriminals gather intel, pose as trusted contacts, trick people into sharing private data and even spread malware that can steal passwords or lock up personal files. 

    What was once a simple video chat and collaboration tool has become a high-value target for cybercriminals and even state-backed hackers. Whether you use Teams for work, school or staying in touch, the risks are real and growing. We’ll break down how attackers abuse Teams, what Microsoft recommends and the simple steps you can take to protect yourself at home or on the job.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    How hackers use Teams to attack

    Hackers exploit Microsoft Teams at every stage of an attack, using it to spy, impersonate, spread malware and even control compromised systems, and consumers are now in their sights, too.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Hackers are finding new ways to weaponize Microsoft Teams, turning everyday chats into dangerous entry points. (David Becker/Getty Images)

    Reconnaissance via Teams

    Attackers start by probing Teams environments to find weak spots. They look for users with open settings, public profiles or external meeting links. Microsoft warns that “anonymous participants, guests and external access users” can give hackers a way in. If your Privacy Mode is off, they can see when you’re online, send unwanted chats, or try to join meetings outside your group, even if you’re just using a free account.

    Persona building & impersonation

    Hackers often pretend to be someone you trust, like an IT admin, a coworker or even a Microsoft representative. They create fake profiles and logos that look convincing to trick you into clicking a link or sharing credentials. Microsoft says attackers “take advantage of the same resources as legitimate organizations” to pull off their scams.

    Initial access & malware delivery

    Once they’ve earned your trust, hackers send a chat or call that includes a malicious link or file. You might get a message saying, “Your Teams account needs verification” or “Update required for better security.” It’s all bait. These links can install spyware, steal logins or deliver ransomware that locks up your data, whether you’re on a company laptop or your personal PC at home.

    MICROSOFT SHAREPOINT BUG PUTS CRITICAL GOVERNMENT AGENCIES AT RISK

    Persistence & lateral movement

    After breaking in, attackers try to stay hidden. They might add guest accounts, install shortcuts or change permissions so they can come back later. In some cases, they use the same Microsoft tools meant for admins to move across Teams, OneDrive or even your personal files stored in the cloud.

    Command & control & data exfiltration

    Once inside, hackers can send commands through Teams messages or hide malware in shared links. They’ve even been known to send ransom demands directly through Teams chat. Microsoft says one group, Octo Tempest, used Teams to taunt victims and pressure them into paying up, showing how personal these attacks can get.

    Tips to stay protected

    You don’t need to be a cybersecurity expert to stay safe on Microsoft Teams. A few smart tools and habits can go a long way in keeping hackers, scammers and snoops from taking advantage of your information.

    1) Enable privacy mode

    Keep your online presence private. Turn on Privacy Mode in Teams to stop strangers from seeing when you’re active or trying to join meetings. It’s a simple setting that makes it harder for hackers to target you or your company.

    2) Be careful with roles and permissions

    If you share your Teams account with coworkers or family members, don’t give everyone full control. Keep admin access limited to one trusted person. This reduces the chance of someone accidentally approving a scam link or letting malware spread.

    3) Use a data removal service

    Hackers often rely on personal details found online to make their scams more convincing, things like your job title, workplace or even who you’ve video-chatted with. That information helps them build fake Teams profiles or send messages that look legitimate. Using a personal data removal service helps wipe your private details from data broker sites, cutting off one of the main sources hackers use to impersonate you. The less they can learn about you, the harder it is for them to trick you into trusting a fake message or clicking a malicious link.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    A man stares at computer code on his monitor in a darkened room, with a ring light reflected on the screen and an open canned beverage next to him.

    There are attack techniques used to compromise people. (Kurt “CyberGuy” Knutsson)

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Double-check links and files, plus use strong antivirus software

    Hackers love to send fake messages pretending to be support or IT help. Never open links or attachments from people you don’t recognize, even if the message looks official. Use strong antivirus software to automatically scan downloads and attachments before you open them.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Limit guest access

    Only allow trusted guests into your Teams chats and meetings. If you invited someone for a one-time project, remove them afterward. Tight control over who can join helps prevent impersonators from slipping in unnoticed.

    6) Turn on alerts

    Activate Teams alerts to catch anything unusual, like sign-ins from new devices or unexpected permission changes. Pair that with your antivirus program’s real-time protection to get notified if malicious activity starts on your device.

    7) Think “zero trust”

    Zero Trust means verifying every user, every time. Don’t assume messages or calls are legitimate, especially if someone asks for a password or authentication code. If you’re unsure, contact your company’s IT team or verify the person’s identity through a separate channel.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    8) Practice spotting phishing attempts

    Hackers rely on panic and urgency to make you click. If you get a message claiming your account will be locked or that support needs your password, pause. Report suspicious messages to Microsoft or your security provider. Regular phishing awareness training helps you spot scams faster.

    9) Keep everything updated

    Always install the latest Teams and operating system updates. Patches fix security holes that hackers exploit to sneak in.

    Stock image shows nefarious man typing on laptop.

    Cybercriminals often impersonate IT support or trusted colleagues to trick users into sharing credentials. (CyberGuy.com)

    Kurt’s key takeaways

    Microsoft’s warning about Teams is a reminder that hackers are always searching for new ways to reach you, even through apps you use every day. What makes these attacks so dangerous is their familiarity. Messages look normal, video calls seem real, and fake tech support chats can sound convincing. That’s why awareness, not fear, is your strongest defense. With privacy settings enabled, antivirus protection running, and a reliable personal data removal service scrubbing your info from the web, you’re already several steps ahead of scammers. Staying alert to phishing attempts and keeping your software up to date can turn Teams back into what it’s meant to be: a safe, helpful way to stay connected.

    If attackers can weaponize your day-to-day communication platform, how confident are you that your Teams environment is truly safe? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • The Bourbon Industry Is in Turmoil. Could Tech Provide the Shot It Needs?

    [ad_1]

    If you’ve never toured a whiskey distillery, the experience can be uncommonly old-fashioned. While newer distilleries thrive on automation, many still tout their “by hand” operations as a defining characteristic, a heritage that gives them street cred. Many distilleries are downright smug about the lack of computers or even climate control in any facet of their operations—even if this means things don’t always go according to plan. Easily preventable errors are chalked up as a cost of doing business, perhaps adding to the romance of whiskey-making while draining the budget.

    Mandell says that while the influence of a seasoned master distiller is great, there’s a real risk in eschewing technology when it comes to the finished product. “What many of the other guys get is just inconsistent,” he says, “because they have less control over the process.” And that inconsistency, he adds, can often be felt down the line, in the quality of their whiskey.

    Contract Negotiations

    Like many industries, whiskey is very incestuous, and the distillery named on the label may not really make the liquid inside the bottle. In fact, that distillery may not exist at all. For example, you can’t visit Redemption Whiskey’s distillery, because there isn’t one; the brand sources all its stock from MGP Ingredients in Indiana.

    There are two primary ways to get whiskey without distilling it yourself. Sourcing usually involves buying barrels that have already been made by someone else. Contract distilling happens when whiskey is distilled to order for a client’s specifications. Both are commonplace.

    Mandell is a veteran of Bardstown Bourbon Company, a well regarded operation he helped to launch in 2014. Bardstown made (and still makes) its own whiskeys, but like many distillers it also produces for others on contract. These contract distilling services are where the fast money is made. Whiskey produced today won’t be sold until it’s properly aged—for years—but unlike consumers, contract customers have to pay up front. Bardstown has been able to thread the needle and do both sides successfully—though without its thriving contract production business and the hiring of Hargrove (who now leads the Whiskey House production team) to fix some quality issues, Mandell implies that Bardstown might not have been so fortunate in its early days.

    When Mandell and Hargrove departed Bardstown around the time of a private equity buyout a few years ago, they got to work on a new business almost immediately. The concept, Mandell says, was simple: “What if we could start over, take everything that we learned, and create the distillery and the system from scratch,” he says. “What’s needed out there? What problems can we solve?”

    It turns out there were a lot of problems to solve, and a lot of demand. After all, the many so-called non-distiller producer brands—including most of the “celebrity” whiskeys that now crowd the market, like Beyonce’s SirDavis—have to be made somewhere.

    [ad_2]

    Christopher Null

    Source link

  • Microsoft pushes AI updates in Windows 11 as it ends support for Windows 10

    [ad_1]

    Microsoft is encouraging people to talk to their laptops as it rolls out new artificial intelligence updates to Windows 11 and pushes users to phase out its predecessor, Windows 10.

    Microsoft ended free security support for Windows 10 this week, though millions of people still use personal computers running the older operating system.

    To entice people to upgrade, the software giant on Thursday announced new Windows 11 features, most of them further integrating the company’s AI chatbot, Copilot, into the experience of using a laptop.

    Among the features is a voice mode that enables users to dictate “Hey, Copilot” to start chatting with their computer instead of typing or clicking a touchpad.

    Microsoft first introduced Windows 10 a decade ago and launched its successor, Windows 11, in 2021.

    But many people around the world still are using Windows 10, particularly those with older computers that can’t upgrade to Windows 11. Consumer advocates have spent months petitioning Microsoft to extend technical support for an estimated hundreds of millions of devices that will no longer get automatic security fixes.

    “With the end of Windows 10, users face the choice between exposing themselves to cyberattacks or discarding their old computers and buying new ones,” said Brenna Stevens of the Oregon State Public Interest Research Group, which advocated on behalf of local repair shops, students and others.

    Microsoft has said people can pay extra for a year of extended security support through October 2026. Some users, including those in the European Union as well as U.S. users who can synchronize with Microsoft’s cloud service, will be able to get that extended support for free.

    But most people faced with unsupported devices are likely to either keep using them despite the vulnerabilities or throw them away, which “creates both a security problem and an environmental problem,” generating huge amounts of toxic electronic waste, said Nathan Proctor, who leads PIRG’s Right to Repair campaign. Both PIRG and Microsoft urge those who are replacing their computers to avoid sending their older models to the landfill.

    Those concerns were not a focus of Microsoft’s Windows 11 announcements Thursday. Instead, Yusuf Mehdi, an executive vice president and chief marketing officer for Microsoft’s consumer division, argued that conversing with a laptop will be “as transformative as the mouse and keyboard” in shaping the PC experience. Microsoft says all Windows 11 users will also now have access to Copilot Vision, an AI feature that can analyze and give feedback on the documents, video games and other activities happening on the screen.

    Mehdi acknowledged it could take some adjustment to get used to human-computer conversations in shared workspaces.

    “Just like when the mouse came out, people have to figure out when to use it, what’s the right way, how to make it happen,” Mehdi told reporters.

    The updates are Microsoft’s latest attempt to make its widely used Windows operating system a gateway to hook people on its suite of generative AI tools. The tech giant competes heavily on AI services with Apple, Google and startups like Anthropic and OpenAI.

    Mehdi said the updates are “not a replacement for Recall,” a screen-tracking feature on some Windows computers that gives Copilot a “photographic memory” of a user’s virtual activity. Microsoft CEO Satya Nadella described it last year as a step toward machines that “instantly see us, hear, reason about our intent and our surroundings,” but the idea was met with criticism from privacy and security experts and took a year before it started to roll out.

    [ad_2]

    Source link

  • Programming in Assembly Is Brutal, Beautiful, and Maybe Even a Path to Better AI

    [ad_1]

    Rollercoaster Tycoon wasn’t the most fashionable computer game out there in 1999. But if you took a look beneath the pixels—the rickety rides, the crowds of hungry, thirsty, barfing people (and the janitors mopping in their wake)—deep down at the level of the code, you saw craftsmanship so obsessive that it bordered on insane. Chris Sawyer, the game’s sole developer, wrote the whole thing in assembly.

    Certain programming languages, like Python or Go or C++, are called “high-level” because they work sort of like human language, written in commands and idioms that might fit in at a poetry slam. Generally speaking, a piece of software like a compiler transforms this into what the machine really reads: blocks of 1s and 0s (or maybe hex) that tell actual transistors how to behave. Assembly, the lowest of the “low-level” languages, has a near one-to-one correspondence with the machine’s native tongue. It’s coding straight to metal. To build a complex computer game from assembly is like weaving a tapestry from shedded cat fur.

    Why would anyone do this? I recently asked Sawyer, who lives in his native Scotland. He told me that efficiency was one reason. In the 1990s, the tools for high-level programming weren’t all there. Compilers were terribly slow. Debuggers sucked. Sawyer could avoid them by doing his own thing in x86 assembly, the lingua franca of Intel chips.

    We both knew that wasn’t the real reason, though. The real reason was love. Before turning to roller coasters, Sawyer had written another game in assembly, Transport Tycoon. It puts players in charge of a city’s roads, rail stations, runways, and ports. I imagined Sawyer as a model-train hobbyist—laying each stretch of track, hand-sewing artificial turf, each detail a choice and a chore. To move these carefully crafted pixels from bitmaps to display, Sawyer had to coax out the chip’s full potential. “RollerCoaster Tycoon only came about because I was familiar with the limits of what was possible,” he told me.

    Working within the limits? A foreign idea, perhaps, in this age of digital abundance, when calling a single function in an AI training algorithm can engage a million GPUs. With assembly, you get one thing and one thing only, and it is the thing you ask for—even, as many a coder has learned the hard way, if it is wrong. Assembly is brutal and beautiful that way. It requires you to say exactly what you mean.

    I’ve done assembly’s creators a disservice. They wanted things to be easier, not harder. I imagine they were tired of loading up punchcards and flipping switches on their steampunk leviathans. Perhaps they dreamed of a world like ours, where computers can do so much with such minimal guidance.

    [ad_2]

    Gregory Barber

    Source link

  • Want to Start a Website? These Are the Best Website Builders

    [ad_1]

    Top Website Builders

    Best for Most People

    Squarespace Core

    Read More

    Best Cheap Website Builder

    Hostinger Website Builder

    Read More

    Best for Small Business

    Strikingly Core

    Read More

    Best Free Website Builder

    Strikingly Website Builder

    Read More

    Publishing a website is still more complicated than it has any right to be, but the best website builders streamline the process. Instead of juggling a bunch of files on a server and learning the ins and outs of networking, website builders do exactly what’s written on the tin. Piece by piece, using a drag-and-drop interface, you can design your website the way you want with immediate feedback, rather than spending time buried in code and hoping it comes out on the other end.

    There are dozens of website builders, and most of them range from decent to straight-up bad. Any web host with a bit of ambition has a website builder floating around, even if it’s slow, clunky, and lacking features. I focused on finding the best tools for building your website that go beyond just an add-on, and these are my favorites. If you’re after something simpler than a full-blown website, check out our list of the Best Portfolio Websites.

    Table of Contents

    Best Website Builder for Most

    Squarespace via Jacob Roach

    You’ve heard of Squarespace over and over again, I’m sure, and that’s not an accident. It’s an inviting website builder that made a name for itself with bold, striking templates. Beneath the veneer of attractive, but seemingly simple, websites, you’ll find one of the most capable website builders on the market. That balance of power and usability is what sets Squarespace apart.

    It feels like a creative tool. Where other website builders lag and stutter to get a new element on your page, Squarespace feels fluid. Your dashboard gives you quick access to edit your site, and around every corner, Squarespace feels designed so you never have to look up a tutorial. I started a simple photography website, and within an hour, I had a custom course page set up, an appointment schedule with automated confirmation emails, and services (with pricing and the ability to accept payments) configured.

    Squarespace isn’t cheap, but it also doesn’t meddle in restrictive, low-cost plans. Even on the Basic plan, you have access to ecommerce tools and space for multiple contributors.

    Squarespace Pricing and Plans

    Best Cheap Website Builder

    Hostinger via Jacob Roach

    Hostinger is better known as a web hosting provider, but it has a surprisingly robust website builder that you can use on its own or for free as part of a hosting package. You don’t get the same world-class template design and dense feature-set of a more expensive builder like Squarespace, but that’s OK. Hostinger’s website builder will run you just a few bucks a month, and based on my testing, it feels heavily angled toward newcomers.

    You sacrifice some power for convenience, but there’s an awful lot you can accomplish with Hostinger. Integrations with PayPal, Stripe, and Square allow you to quickly set up e-commerce. Add-ons with WhatsApp give you live chat capabilities, and Printful support means you can sell print-on-demand merchandise. And, if you outgrow the website builder, Hostinger allows you to export your website’s content to WordPress.

    Where Hostinger wins for me is through its AI tools. Just about every website builder these days has AI integrated in some way, but it’s around every corner at Hostinger. You need to pay extra for some of these AI features—the logo generator, for example, requires credits—but they give you a great starting point for mocking up the look, feel, and tone of your website.

    Hostinger Pricing and Plans

    Best for Small Businesses

    Wix via Jacob Roach

    Wix is undoubtedly the biggest competitor to Squarespace, and I had a hard time putting one above the other. Ultimately, Wix ended up in the backseat due to higher prices and a slightly less intuitive interface. That’s partly because of how powerful Wix is. Rather than corral you in an elegant (if restrictive) website-building workflow, Wix gives you a ton of options.

    First, templates. You get a few hundred elsewhere, but Wix offers over 2,000 templates. At the time of writing, there are 223 pages of them on Wix’s website. They aren’t all winners, but I was able to mock up a quick photography portfolio website within a few minutes by browsing the templates and uploading a few photos.

    [ad_2]

    Jacob Roach

    Source link

  • How malicious party invites target your inbox

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals are getting sneakier, and one of their latest tricks is using fake invitation emails that look like they’re coming from legitimate services. They promise you an “exclusive invite” or ask you to download and install something before you can see the details. If you’re not careful, that simple click could install malware on your computer.

    Recently, I received one of these deceptive emails. It used a Gmail address, which made it look more authentic at first glance. But the red flag was in the language: “Save the invite and install to join the list.” No legitimate service should ever ask you to install software just to see an invite.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Cybercriminals use fake “invitation” emails to trick users into downloading malware. (Photo by Felix Zahn/Photothek via Getty Images)

    How the fake invitation scam works

    The email looks polished and even mimics well-known event platforms. When you click the link, it sends you to a site that pretends to host the invitation. Instead of showing event details, it pushes you to download an “invitation” file.

    That file is likely malware. Once installed, it can:

    • Steal your personal information
    • Access your email contacts and spread the scam further
    • Hijack your system for criminal use

    The link in my case pointed to a suspicious domain ending in “.ru.com.” At first glance, it mimicked a legitimate brand name, but the extra suffix is a clue it’s not official. Hackers often use look-alike domains to trick you into thinking the site is real.

    Red flags that reveal fake invitation email scams

    Here are some warning signs that should make you pause before clicking:

    • Unusual instructions like “install” or “save” just to view an invite
    • Urgent or exclusive language pushing you to act fast
    • Look-alike URLs that swap in extra characters or use different endings
    • Download prompts when all you expected was an online invite

    If you see any of these, close the email and delete it.

    SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

    Hacker typing code.

    Scammers mimic legitimate services, urging victims to “install” files that steal data. (Photo by Jens Büttner/picture alliance via Getty Images)

    How to protect yourself from fake invitation email malware

    These fake party invite emails are designed to trick you into downloading malware before you even realize what’s happening. Follow these steps to stay safe and keep your inbox secure.

    1) Hover over links before clicking

    Before you click on any “Download Invitation” button, hover your mouse over the link. Real invites use the company’s official domain. Scams like this often use odd endings such as “.ru.com” instead of “.ru” or “.com.” That small clue can help you avoid a big problem.

    2) Use strong antivirus software

    If you click by mistake, strong antivirus protection can detect and block malware before it spreads. Think of it as your last line of defense against a fake invite that sneaks into your inbox.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    3) Use a personal data removal service

    Scammers often spread these emails by stealing contact lists from infected accounts. A personal data removal service reduces the amount of your personal information floating around online, making it harder for cybercriminals to target you in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Keep your system updated

    Hackers love outdated systems because they’re easier to exploit. Keeping your operating system and apps updated patches those holes and makes it much harder for malware to take hold.

    5) Report suspicious emails

    Don’t just delete a suspicious invite, report it to your email provider. This helps improve their filters, protecting you and others from future fake emails.

    6) Enable multi-factor authentication (MFA)

    Even if hackers get your password from a phishing attack, MFA adds an extra lock to your accounts. It makes breaking in nearly impossible without your phone or secondary code.

    7) Back up your files regularly

    If the worst happens and malware damages your computer, backups ensure you don’t lose everything. Use an external hard drive or a trusted cloud service for peace of mind.

    NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS

    A hacker typing into his laptop.

    Hackers send polished emails with malicious links disguised as exclusive invites. (Photo by Thomas Trutschel/Photothek via Getty Images)

    Kurt’s key takeaways

    Fake invitation emails are designed to catch you off guard. Hackers count on you being in a hurry and clicking without thinking. Taking a moment to question an unexpected email could save you from installing dangerous malware.

    Have you ever received a fake invitation email that looked convincing? How did you handle it? Let us know by writing to us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Woman who lost her ability to speak due to ALS got it back in an unexpected way

    [ad_1]

    KCCI EIGHT NEWS AT TEN. A NORWALK WOMAN WHO LOST HER VOICE TO ALS GOT IT BACK IN AN UNEXPECTED WAY. KCCI ABIGAIL CURTIN SPOKE WITH HER THIS EVENING. ABIGAIL, TELL US A LITTLE MORE ABOUT HER STORY. WELL, THIS IS A PRETTY INCREDIBLE STORY, AND THERE ARE A LOT OF THINGS THAT PEOPLE CAN STRUGGLE WITH WHEN THEY HAVE ALS. MUSCLE WEAKNESS. DIFFICULTY EATING, EATING, AND COMMUNICATING. THOSE CAN BE HARD. AND THOSE ARE JUST SOME OF THE STRUGGLES THAT ROBIN LEEPER HAS HAD TO OVERCOME SINCE SHE WAS DIAGNOSED BACK IN 2023. BUT NEW TECHNOLOGY HAS BEEN ABLE TO EASE SOME OF THAT STRUGGLE AND GIVE HER A PART OF HERSELF BACK. WHEN ROBIN LEEPER WAS DIAGNOSED WITH ALS IN 2023, IT WAS ONE OF THE HARDEST MOMENTS OF HER LIFE. BUT WHEN SHE LOST HER ABILITY TO TALK, IT WAS EVEN HARDER. I CRIED, AND FOR THE FIRST YEAR I COULDN’T EVEN SAY ALS WITHOUT CRYING. AT THE TIME, SHE WAS THE PARKS AND REC DIRECTOR FOR THE CITY OF NORWALK. FOR A WHILE, SHE TRIED OTHER FORMS OF COMMUNICATION LIKE TEXT TO SPEECH, SOFTWARE OR SIGN LANGUAGE. BUT THAT’S WHERE THE CITY’S MARKETING AND COMMUNICATION SPECIALIST, TY LUE, CAME IN. WE HAVE FIVE SWIMMING POOLS. SHE COMBED THROUGH HOURS OF PUBLIC MEETINGS, RECORDS ISOLATING CLIPS OF ROBIN SPEAKING FROM WHEN SHE STILL COULD. FROM THERE, SHE UPLOADED THEM INTO AN AI SOFTWARE TO RECREATE ROBIN’S VOICE, WHICH SHE USED TO ACCEPT. NORWALK CITIZEN OF THE YEAR AWARD. I AM TRULY, DEEPLY HUMBLED AND GRATEFUL FOR THIS RECOGNITION. IT SOUNDED AS IF SHE WAS JUST STANDING THERE SPEAKING ON HER OWN. IN FACT, I HAD SEVERAL PEOPLE SAY I DIDN’T REALIZE THAT SHE WAS PLAYING A RECORDING OF HER VOICE. BUT FOR LEEPER, IT WASN’T JUST EXCITING TO BE ABLE TO HEAR HER OWN VOICE AGAIN. IT WAS A CHANCE TO FEEL LIKE HERSELF AGAIN. IT’S YOUR IDENTITY. PEOPLE CAN HEAR YOUR VOICE WITHOUT SEEING YOUR FACE, AND THEY KNOW THAT’S YOU. AS FOR WHAT’S NEXT, SHE’S GOT A NEW PRIORITY. FINDING A CURE. BOXHOLM. LIKE I SAID, A PRETTY INCREDIBLE STORY. AND SPEAKING OF FINDING A CURE, LEEPER WILL BE AT THIS SATURDAY’S WALK TO DEFEAT ALS IN ALTOONA. FOR MORE DETAILS ON THAT WALK AND HOW YOU CAN HELP SUPPORT LEEPER. BE SURE TO CHECK OUT THIS STORY ON KCCI.COM. FIRST OF ALL, AN AMAZING EXAMPLE OF THE GOOD THAT TECHNOLOGY CAN DO. ABSOLUTELY A CREDIT TO EVERYBODY WHO HELPED THIS HAPPEN. AND ROBIN, YOU KNOW, WE’RE THINKING OF YOU AND ADMIRE YOUR STRENGTH. AND I KNO

    Woman who lost her ability to speak due to ALS got it back in an unexpected way

    Updated: 4:02 AM PDT Oct 11, 2025

    Editorial Standards

    An Iowa woman who lost her ability to speak due to ALS got it back in an unexpected way.Robin Leaper was diagnosed with ALS, or amyotrophic lateral sclerosis, in 2023. Since then, she’s struggled with muscle weakness and difficulty eating, and she’s no longer able to speak. It’s been an adjustment, to say the least.”For the first year, I couldn’t even say ALS without crying,” she said. When she was diagnosed, she was the Parks and Recreation director for the city of Norwalk.Since then, she’s tried to communicate in other ways, like text-to-speech software or sign language, but neither one has allowed her to use her own voice.Until the city’s marketing and communications specialist, Tai Lieu, came in.Lieu combed through hours of public meeting recordings in which Leaper spoke, isolating her vocals and uploading them to an AI voice recreation software.That software allows Leaper to type her words, which are then read aloud in her own voice.”It sounded as if she was just standing there, speaking on her own,” Lieu said of Leaper’s first attempt at using the software when she won Norwalk’s Citizen of the Year Award last year. “I had several people say, ‘I didn’t realize she was playing a recording of her voice.’”But for Leaper, the AI recreation does more than allow her to use her own voice; it allows her to feel like herself again.”It’s your identity,” she said. “People can hear your voice without seeing, and they know it’s you. It gave me back a little piece ALS stole from me.”As for what’s next, Leaper says she has a new priority: finding a cure.She plans to start with Altoona’s Walk to Defeat ALS on Saturday.

    An Iowa woman who lost her ability to speak due to ALS got it back in an unexpected way.

    Robin Leaper was diagnosed with ALS, or amyotrophic lateral sclerosis, in 2023. Since then, she’s struggled with muscle weakness and difficulty eating, and she’s no longer able to speak.

    It’s been an adjustment, to say the least.

    “For the first year, I couldn’t even say ALS without crying,” she said.

    When she was diagnosed, she was the Parks and Recreation director for the city of Norwalk.

    Since then, she’s tried to communicate in other ways, like text-to-speech software or sign language, but neither one has allowed her to use her own voice.

    Until the city’s marketing and communications specialist, Tai Lieu, came in.

    Lieu combed through hours of public meeting recordings in which Leaper spoke, isolating her vocals and uploading them to an AI voice recreation software.

    That software allows Leaper to type her words, which are then read aloud in her own voice.

    “It sounded as if she was just standing there, speaking on her own,” Lieu said of Leaper’s first attempt at using the software when she won Norwalk’s Citizen of the Year Award last year. “I had several people say, ‘I didn’t realize she was playing a recording of her voice.’”

    But for Leaper, the AI recreation does more than allow her to use her own voice; it allows her to feel like herself again.

    “It’s your identity,” she said. “People can hear your voice without seeing, and they know it’s you. It gave me back a little piece ALS stole from me.”

    As for what’s next, Leaper says she has a new priority: finding a cure.

    She plans to start with Altoona’s Walk to Defeat ALS on Saturday.

    [ad_2]

    Source link

  • Opinion | The Oct. 7 Warning for the U.S. on China

    [ad_1]

    Hamas’s shock troops poured across Israel’s border two years ago, kidnapping, raping and killing civilian men, women and children. Israel’s bitter experience offers lessons America should learn before our own moment of reckoning.

    The most important is that the hypothetical war can actually happen. Even if we’re intellectually prepared, there’s a risk that years of relative peace has lulled us into a false sense of security. The Israeli defense establishment never truly believed Hamas would launch a full-scale invasion. They viewed Gaza as a chronic but manageable problem—one for diplomats and intelligence officers, distant from the daily concerns of citizens. Israeli politicians and generals also spoke of open conflict with the Iran-led Islamist axis much like their American counterparts speak of China and a Taiwan crisis—the pacing threat and the most likely test, yes, but ultimately a question for tomorrow. Then tomorrow came.

    Copyright ©2025 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

    [ad_2]

    Mike Gallagher

    Source link