ReportWire

Tag: TECH

  • Amazon shelves Blue Jay warehouse robot

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Amazon made a lot of noise in October when it unveiled Blue Jay, a multi-armed warehouse robot built to speed up same-day deliveries. Just months later, the company quietly ended the program.

    The robot’s core technology will live on in other projects. Still, Blue Jay itself is done.

    That sudden shift raises an important question. If one of the world’s most advanced logistics companies cannot make a high-profile robot work at scale, what does that say about the future of artificial intelligence (AI) in the real world?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Blue Jay was designed as a ceiling-mounted robot that could sort and handle multiple packages at once to speed up same-day delivery. (Amazon)

    What Blue Jay was supposed to do

    Blue Jay was not a simple conveyor belt upgrade. It was a ceiling-mounted system designed to recognize and sort multiple packages at once. Using AI-powered perception models, the robot could:

    • Identify packages in motion
    • Coordinate several arms at the same time
    • Manipulate items with speed and precision

    Amazon said it developed the system in under a year. That pace alone was impressive. The goal was clear: move more packages faster while reducing strain on workers in same-day fulfillment centers. On paper, that sounds like a win for everyone.

    Why Blue Jay ran into trouble

    Despite the hype, Blue Jay faced steep engineering and cost challenges. First, the robot was mounted to the ceiling. That design required complex installation and tight integration into Amazon’s Local Vending Machine warehouses. Those facilities operate as massive, single structures with automation baked into the building itself.

    There was little room to reconfigure hardware once installed. That rigidity likely became a liability. In software, AI can pivot overnight with a code update. In the physical world, changing course means retooling steel beams, motors and entire layouts. That takes time and serious money. Several employees who worked on Blue Jay have already moved to other robotics projects.

    The company reportedly continues to experiment and improve its warehouse systems. The technology behind Blue Jay will, in fact, inform future designs. In other words, the robot failed. The ideas did not.

    WAYMO’S CHEAPER ROBOTAXI TECH COULD HELP EXPAND RIDES FAST

    Amazon Blue Jay robot handling a package

    Engineering complexity and high installation costs limited how easily Blue Jay could scale inside Amazon’s tightly integrated warehouse system. (Amazon)

    From LVM to Orbital: A strategic shift

    Amazon’s next move centers on a new warehouse architecture called Orbital. Unlike the older Local Vending Machine model, Orbital is modular. It can be built from smaller units and deployed faster in different layouts.

    That flexibility matters. Retail is fragmenting. Customers expect same-day delivery from urban hubs, local stores and even grocery locations. Orbital could allow Amazon to place micro-fulfillment centers behind retail stores, including Whole Foods locations. That would help it compete more directly with Walmart, which already has a strong grocery footprint.

    Alongside Orbital, Amazon is developing a new robotics system called Flex Cell. Unlike Blue Jay’s ceiling mount, Flex Cell is expected to sit on the floor.

    That small design change signals something bigger. Amazon appears to be moving from massive centralized automation to smaller, adaptable systems built for the unpredictable realities of local retail.

    What this means for your deliveries

    If you order from Amazon regularly, you might wonder whether this affects you. In the short term, probably not. Your packages will still show up. Same-day and next-day delivery remain core priorities. However, the long-term story is more interesting. Amazon’s robotics strategy shapes how fast your order arrives, how much you pay and how local warehouses operate in your community.

    If Orbital works, you could see:

    • Faster delivery from smaller neighborhood hubs
    • Better handling of chilled and perishable items
    • More automation in retail backrooms

    If it struggles, same-day expansion could slow or become more expensive. That tension reflects a broader truth about AI. Writing code is one thing. Teaching a robot to lift boxes in a real warehouse without breaking down is another.

    AI TRUCK SYSTEM MATCHES TOP HUMAN DRIVERS IN MASSIVE SAFETY SHOWDOWN WITH PERFECT SCORES

    A warehouse worker inspecting the Blue Jay robot

    After only a few months, Amazon discontinued the Blue Jay program while continuing to reuse parts of its underlying robotics technology. (Amazon)

    The gap between AI hype and hardware reality

    Blue Jay highlights a growing divide in the tech world. AI in software is moving at lightning speed. Chatbots, image tools and predictive systems evolve weekly.

    Hardware is different. Robots must deal with gravity, friction, heat and unpredictable human environments. Every mistake has a physical cost.

    Amazon’s course correction shows that even tech giants hit limits when translating AI breakthroughs into moving metal. That does not mean automation is slowing down. It means the path is bumpier than the headlines suggest.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Amazon shelving Blue Jay is not a retreat from robotics. It is a recalibration. The company is betting that modular, flexible systems will win over massive, tightly integrated machines. That shift could define the next era of e-commerce logistics. For you, the promise remains the same: faster delivery, better availability and more local convenience. But behind that promise is a complicated dance between AI ambition and real-world constraints.

    If even Amazon struggles to make advanced robots work at scale, how much of the AI revolution is still more vision than reality? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    Related Article

    Robots learn 1,000 tasks in one day from a single demo

    [ad_2]

    Source link

  • Think your New Year’s privacy reset worked? Think again

    [ad_1]

    NEWYou can now listen to Fox News articles!

    At the start of the year, you did everything right. You searched your name, opted out of several data broker sites and deleted listings that exposed your address, phone number and relatives.

    At first, it felt like a clean slate. However, here’s the uncomfortable truth: your data rarely stays gone. In many cases, February is when it quietly returns.

    Privacy does not work as a one-time cleanup. Instead, it requires ongoing maintenance, because data brokers design their systems to outlast your best intentions.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE
     

    Cybersecurity advocates urge continuous monitoring to prevent data brokers from recreating deleted profiles. (Smith Collection/Gado/Getty Images)

    How data brokers re-list your information (even after you delete it)

    Most people assume that once they remove their profile from a data broker site, it’s gone for good.

    That’s not how the system works. Data brokers don’t “store” your information the way a normal website does. They rebuild it constantly using automated data feeds from:

    • Credit headers
    • Property and mortgage records
    • Utility registrations
    • Loyalty programs
    • App tracking efforts
    • Court filings and public databases
    • Online purchases and subscriptions

    Every few weeks, their systems can re-ingest new records and match them to your identity. That means:

    • Your old address gets replaced with your new one
    • Your new phone number appears
    • Your relatives are updated
    • Your age, job history and household data refresh
    • Your digital footprint grows more detailed over time

    Even if you removed your profile in January, the next data refresh can quietly re-create it in February under a slightly different variation of your name. This is why people often say: “I removed my data… and then found it again a month later.” It wasn’t a mistake. It’s how the business model works.

    Why January cleanups still leave you exposed

    Manual opt-outs feel empowering at first. However, they rarely last. The real issue is scale: hundreds of data brokers collect, trade and republish personal information, and many share data with one another. As a result, removing your profile from one site does not stop the spread. Instead:

    • Another broker re-adds you using a new source
    • A third site scrapes the refreshed profile
    • A fourth copies the updated record
    • The cycle starts again

    You’re not fighting one website. You’re fighting a self-healing network of databases that rebuild your profile every few weeks. That’s why January cleanups don’t protect you throughout the year. Scammers know this. They don’t just scrape old databases; they wait for newly refreshed lists that contain your:

    • Current phone number
    • Correct address
    • Relatives
    • Likely income range
    • Age and life stage

    By February and March, those lists are already circulating again.

    10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

    Data servers are shown with wires sticking out of them.

    Experts warn January privacy cleanups may not last as data broker databases refresh in February. (Jason Alden/Bloomberg via Getty Images)

    What scammers get when your profile is rebuilt

    When your data comes back, it doesn’t just sit on a website. It becomes fuel for:

    That’s why scams feel personal now.  Criminals often have access to:

    • Your current address
    • Names of relatives
    • Your age
    • Your likely income range

    Rather than guessing, scammers search your profile and build their pitch around real details. That precision is what makes today’s fraud attempts so convincing.

    What ‘ongoing removal’ actually protects against

    This is where most people misunderstand privacy tools. The real threat isn’t the old profile you deleted. It’s the next version that gets created.

    Ongoing removal means:

    • Your data is constantly scanned across broker networks
    • New profiles are detected as soon as they appear
    • Fresh listings are removed automatically
    • Re-created records don’t get time to circulate.

    Instead of playing whack-a-mole once a year, you block the rebuild cycle itself. This is the only way to stay ahead of systems designed to outlast you.

    SPYWARE CAN HIJACK YOUR PHONE IN SECONDS

    A person holds a phone with both hands.

    Ongoing data removal services aim to stop personal profiles from reappearing across broker networks. (Elisa Schu/picture alliance via Getty Images)

    How to stop data brokers from rebuilding your profile

    If you truly want to stay off data broker sites, you need a system that:

    1. Scans for new profiles
    2. Removes them as they appear
    3. Keeps doing it every month.

    That’s what a data removal service was built for. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. 

    These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. 

    By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Why this matters more in February than January

    In January, people clean up their digital footprint. By contrast, February is when many data brokers refresh their databases and scammers begin working from newly updated lists. Instead of sending alerts, brokers quietly republish your details. 

    You receive no warning when your profile reappears, and no notification when someone resells your information. As a result, most people only realize what happened after a scam email hits their inbox or a suspicious call lights up their phone. 

    For that reason, February becomes the moment of confusion. That is when readers often say, “I thought I already handled this.”

    Kurt’s key takeaways

    At the start of the year, you did what most people avoid. You searched your name, opted out of broker sites and took control of your information. However, privacy does not work like a one-time spring cleaning. Instead, it works more like lawn care. The moment you stop maintaining it, the growth returns. Data brokers constantly refresh and rebuild profiles. They pull from public records, commercial feeds and shared databases. As a result, when your profile reappears, scammers do not treat it like old data. They treat it like fresh intelligence. That is exactly why February matters. While January feels proactive, February is when many databases quietly update and republish information. So if you want lasting control, you need consistent monitoring and ongoing removal, not a single annual cleanup. The real objective is not simply deleting an old profile. Rather, it is stopping the next version from spreading in the first place. Ultimately, privacy is not about what you remove. It is about what never comes back.

    Have you ever removed your personal information from a data broker site, only to find it listed again weeks later?  Let us know your thoughts by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    Related Article

    Stop data brokers from selling your information online

    [ad_2]

    Source link

  • Your phone is now a crime scene in your pocket

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Take a second and look at your phone. It knows where you slept last night. Who you texted. What you searched. Where you drove.

    For investigators, that information can turn into evidence fast. In fact, a major new survey found smartphones now show up in almost every criminal investigation.

    In other words, your phone can become the primary crime scene. And that should get your attention.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Detectives say smartphones act as “a crime scene in your pocket,” storing messages, GPS history and payment records. (Anna Barclay/Getty Images)

    Why smartphones have become the center of crime investigations

    Your phone is always with you. It logs:

    • Text messages and chats
    • Photos and videos
    • GPS location history
    • App activity
    • Call logs
    • Payment records

    According to the 2026 Industry Trends Report from Cellebrite, a digital forensics company that provides tools to law enforcement and investigators, smartphones are now the most cited source of digital evidence in criminal cases at 97%. The report shows that mobile data can reveal where a person has been, who they communicate with and patterns of daily life.

    For that reason, many in law enforcement now describe the smartphone as “a crime scene in your pocket” to illustrate how deeply these devices factor into investigations. That phrase may sound dramatic. It is not. It reflects how investigations now unfold in the U.S. and around the world. In many criminal cases, phone data regularly helps:

    • Reconstruct timelines using cell site and GPS data
    • Place suspects near crime scenes
    • Confirm or contradict alibis
    • Recover deleted messages
    • Track digital payments

    Police agencies have testified in court that smartphone extractions help establish sequences of events faster than traditional methods. Modern policing no longer relies only on fingerprints and surveillance footage. It often begins with digital footprints.

    Real cases where phone data made the difference

    This is happening in courtrooms right now. Case in point, in the prosecutions tied to the Gilgo Beach serial killings in New York, investigators leaned heavily on burner phone data, cell site records and digital communications to link the suspect to victims. Mobile records helped narrow movements, connect devices and support key search warrants.

    In the ongoing University of Idaho murder case, prosecutors have relied on smartphone location data, digital mapping history and phone activity logs to build a timeline. Location records helped place the suspect’s phone near the crime scene during critical time windows.

    Fraud investigations across the U.S. tell a similar story. In large-scale romance scams and crypto investment schemes, law enforcement now uses smartphone chat logs, transaction screenshots and crypto wallet trails to follow the money. Cryptocurrency evidence appears in a growing share of cases as online scams surge.

    The pattern is clear. Phone data can protect the innocent by confirming where someone was. It can also reveal intent through messages, searches and digital payments.

    Here is what matters most for everyday Americans. Even if you are not committing a crime, your phone creates a detailed and often lasting record of your life. And in today’s justice system, that record carries real weight.

    BRYAN KOHBERGER’S PHONE RECORDS REVEAL PANICKED SEARCHES AFTER POLICE UNCOVERED KEY DETAIL

    Bryan Kohberger sits in court in an orange jumpsuit.

    Bryan Kohberger appears at the Ada County Courthouse in Boise, Idaho, on July 23, 2025, for sentencing in the University of Idaho murders case, where prosecutors relied heavily on cellphone location data and digital evidence. (Kyle Green-Pool/Getty Images)

    The rise of crypto and AI in criminal cases

    The report revealed another important trend. Cryptocurrency is now the fastest-growing source of evidence. Investigators cited crypto data in 22% of cases, largely due to the explosion of online scams and fraud. If you have followed ransomware attacks or crypto investment scams, this makes sense. Payments leave blockchain trails. Law enforcement increasingly follows the money.

    Meanwhile, 65% of detectives believe AI tools can speed up investigations. A typical case can require up to 35 hours of digital review. About 60% of that time goes to sorting and evaluating data. That creates pressure. And pressure can lead to mistakes.

    Experts warn that generative AI can deliver convincing but inaccurate results if no one double-checks them.

    The hidden bottlenecks behind digital evidence

    The report also highlights challenges investigators face behind the scenes. More than half of devices arrive locked. Many investigators report difficulty accessing iOS and Android phones due to constant software updates and encryption. Most teams still review evidence manually. Only a small share of users use advanced analytical tools to connect data across devices and cases. On top of that, agency leaders say training gaps and rising data volume are slowing investigations and stretching resources. As digital evidence grows, so do the pressure points inside the system.

    What this means for you

    Here is the part most people miss. Even if you never plan to break the law, your phone can:

    • Place you at a location
    • Show who you were with
    • Reveal what you searched
    • Expose private conversations
    • Document your purchases

    Sometimes that helps you. It can prove an alibi. It can clear your name. Other times, it raises serious privacy questions. Who has access to your data? How long is it stored? How securely is it handled?

    In most criminal investigations, law enforcement must obtain a warrant or other court-approved legal process to access the contents of your phone. But the sheer volume of data these devices hold has exploded. And that changes the stakes.

    Smartphone data and the growing privacy debate

    We live in an era where digital evidence is the backbone of modern justice. That helps solve crimes. It protects victims. It speeds up investigations. But it also means the device in your pocket contains a map of your life.

    As smartphone digital evidence becomes central to 97% of cases, we need to ask hard questions about privacy, oversight and AI accuracy. Because once data exists, it can be used.

    5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY

    A smartphone is placed in a plastic evidence bag.

    Smartphones now appear in 97% of criminal investigations, with law enforcement relying on mobile data to reconstruct timelines and track suspects. (Boris Roessler/picture alliance via Getty Images)

    Tech tips: Protect your digital footprint

    You cannot eliminate your digital trail. But you can reduce unnecessary exposure.

    1) Review location settings

    Turn off constant location access for apps that do not need it. On iPhone and Android, set most apps to “While Using” instead of “Always.”

    2) Use encrypted messaging

    Apps like Signal and WhatsApp use end-to-end encryption, which means messages are scrambled so only you and the recipient can read them. Apple’s iMessage also uses end-to-end encryption for conversations between Apple devices. Strong encryption protects your messages from hackers and data breaches. It is also why law enforcement often cannot read message content without access to the physical device. Keep in mind that encryption protects message content, not everything around it. Metadata such as who you contacted and when may still exist.

    3) Lock down cloud backups

    Check whether your messages and photos back up to the cloud. Cloud data can become part of investigations.

    4) Enable strong authentication

    Use a long passcode, not a simple four-digit PIN. Turn on biometric security and two-factor authentication (2FA).

    5) Think before you search

    Search history, voice assistant queries and in-app messages often live longer than you expect.

    6) Keep your phone updated

    Security updates patch vulnerabilities that criminals exploit. They also protect your data from being stolen in breaches.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Your phone is no longer just a communication tool. It is a timeline, a diary and a witness. For law enforcement, that is powerful. For you, it is a reminder that convenience comes with consequences. The next time you tap “Allow” on a permissions request, remember this. You are not just installing an app. You are adding another entry to your digital twin.

    If your phone tells the story of your life, who should control that story when it matters most? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    Related Article

    Your phone is tracking you even when you think it’s not

    [ad_2]

    Source link

  • California woman hospitalized with chemical burns after portable charger explodes while sleeping

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A Los Angeles-based sports reporter had a scary morning earlier this month, when her portable charger suddenly exploded while she was sleeping, leaving her with chemical burns on her arm and hair and a hole in her bed.

    “PSA to anybody that uses a portable charger: don’t,” Ashley Nevel said in a video she posted to her social media on Feb. 15. “Mine literally just exploded in my bed. Everything caught on fire. My mattress — burned a hole through it. I literally have nowhere to sleep.”

    She explained that she has an emergency fire blanket that was a housewarming gift from her dad, according to KCAL-TV, that she believes saved her life.

    “Stop using portable chargers,” she reiterated. “I smell like smoke. My entire apartment needs to be cleaned to get the toxicity out. I can’t even stay there. It’s really bad. So, don’t use a portable charger. Make sure you have a fire blanket handy because it honestly saved my life, and I’m just grateful to be alive.”

    DON’T IGNORE APPLE’S URGENT SECURITY UPDATE

    A Los Angeles-based sports reporter had a scary morning earlier this month when her portable charger suddenly exploded while she was sleeping, leaving her with chemical burns on her arm and a hole in her bed. (Getty)

    After she got back from the hospital, Nevel added, “Another terrifying part of all of this is my phone was charged. It was charging in the charger, and it overheated when the charger exploded, so I couldn’t call 911. I couldn’t make any phone calls.”

    She said she was forced to run out on her balcony and scream for others to call 911 — all after waking up to the explosion at 5 a.m.

    “Thankfully my neighbors were like, amazing,” she said, adding that emergency responders arrived within three minutes.

    URGENT RECALL: 13K CHARGERS SOLD AT TJ MAXX, MARSHALLS MAY EXPLODE DURING USE

    damaged portable charger that exploded

    File photo of a phone charger that exploded.  (Getty)

    “When you’re dealing with something like that, fight or flight kicks in,” she said. “You have no f—ing idea what to do.”

    Later, she also suggested that banning portable chargers on airplanes altogether might be a good idea.

    “What if I was on an airplane and that happened?” she questioned. “What do you do in that situation? Like, everyone is in danger with a small little charger and I never thought that was going to happen to me.”

    damaged lithium batteried from portable chargers

    Damaged lithium cells from phone chargers.  (Getty)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    She added that she’s been walking around with portable chargers for years.

    “You never think something is going to happen to you, and I’m just more thankful it isn’t more serious than it could have been,” she continued. “Yeah, throw away your portable chargers.”

    [ad_2]

    Source link

  • The robotaxi price war has started. Here’s everything you need to know.

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Right now, in several American cities, you can open an app, and a car with no driver pulls up and takes you wherever you want to go. No small talk. No wrong turns. No tip. No perfume covering up the cigarette smells.

    A driverless Waymo ride in San Francisco averages $8.17. A human Uber in the same city? $17.25. The robotaxi price war is here.

    CONGRESS MOVES TO SET NATIONAL RULES FOR SELF-DRIVING CARS, OVERRIDING STATES

    I live in Phoenix most of the time, and I see Waymos everywhere. At the grocery store. On the freeway. Sitting at red lights with nobody behind the wheel, just vibing. I still haven’t gotten in one. But I’m giving myself two weeks.

    If I survive, I’ll share the ride. Mostly kidding.

    A Waymo drives across Congress Avenue on 8th Street in front of the Capitol Building as rain arrives in the Austin area on Friday, Jan. 23, 2025 ahead of anticipated drops in temperature and freezing rain over the weekend.  (Sara Diggins/The Austin American-Statesman via Getty Images)

    Who’s on the road?

    Waymo (owned by Google’s parent Alphabet) is the clear leader. It gave 15 million driverless rides in 2025, and today, it’s about 400,000 per week. Valued at $126 billion. Available in Phoenix, San Francisco Bay Area, Los Angeles, Austin, Atlanta and Miami. Coming in 2026: Dallas, Denver, DC, London, Tokyo and more.

    WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?

    Tesla launched in Austin last June but is way behind. Roughly 31 cars. One tester took 42 trips, and every single one still had a safety monitor on board. So supervised.

    Zoox (owned by Amazon) is the wild card. Their pod has no steering wheel and drives in both directions. Rides are free in Vegas and San Francisco while they wait for approval to charge.

    cruise av

    A Cruise vehicle in San Francisco, California, U.S., on Wednesday Feb. 2, 2022. Cruise LLC, the self-driving car startup that is majority owned by General Motors Co., said its offering free rides to non-employees in San Francisco for the first time, a move that triggers another $1.35 billion from investor SoftBank Vision Fund. Photographer: David Paul Morris/Bloomberg via Getty Images

    How do these things ‘see’?

    Waymo uses cameras, lidar (laser radar that builds a 3D map around the car) and traditional radar. It works in total darkness and heavy rain. Tesla uses cameras only. Eight of them, no lidar. Cheaper, which is how they offer rides at $1.99 per kilometer. 

    Now, are they safe? 

    WAYMO UNDER FEDERAL INVESTIGATION AFTER CHILD STRUCK

    Tesla has reported seven crash incidents to regulators since launching. Waymo says it has 80% fewer injury crashes than human drivers. But NHTSA has logged 1,429 Waymo incidents since 2021, 117 injuries, two fatalities. Three software recalls, including one last December for passing stopped school buses. 

    A friend of mine took a Waymo, and it dropped her off a full mile from where she was going. No way to change it. No human to flag down. Just a robot car that said, “You have arrived.” 

    She had not. So yeah. I’m curious. But I’m also cautious.

    Tesla's robotaxi driving on the street in Texas

    A Tesla Inc. robotaxi on Oltorf Street in Austin, Texas, on Sunday, June 22, 2025. The launch of Tesla Inc.’s driverless taxi service Sunday is set to begin modestly, with a handful of vehicles in limited areas of the city.  (Tim Goessman/Bloomberg via Getty Images)

    Here’s where it gets spicy

    When a robotaxi gets confused, a human in a remote center sees through the car’s cameras and draws a path for it. At a Senate hearing on Wednesday, Feb. 4, Waymo admitted some of those helpers are in the Philippines. Senators were not amused. I wasn’t either.

    Your car sits parked 95% of the time. Robotaxis run 15+ hours a day. When a driverless ride costs less than gas and insurance, owning a car feels like a gym membership you never use.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP    

    The future of driving is nobody driving. Steering us in a whole new direction.

    Know someone who still thinks self-driving cars are science fiction? Forward this. They’re in for a ride.

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • Big Tech execs playing ‘Russian roulette’ in the AI arms race could risk human extinction, warns top researcher | Fortune

    [ad_1]

    The global competition to dominate artificial intelligence has reached a fever pitch, but one of the world’s leading computer scientists warned that Big Tech is recklessly gambling with the future of the human species. 

    The loudest voices in AI often fall into two camps: those who praise the technology as world-changing, and those who urge restraint—or even containment—before it becomes a runaway threat. Stuart Russell, a pioneering AI researcher at the University of California, Berkeley, firmly belongs to the latter group. One of his chief concerns is that governments and regulators are struggling to keep pace with the technology’s rapid rollout, leaving the private sector locked in a race to the finish that risks devolving into the kind of perilous competition not seen since the height of the Cold War.

    “For governments to allow private entities to essentially play Russian roulette with every human being on earth is, in my view, a total dereliction of duty,” Russell told AFP from the AI Impact Summit in New Delhi, India.

    While tech CEOs are locked in an “arms race” to develop the next and best AI model, a goal the industry maintains will eventually herald enormous advancements in medicinal research and productivity many ignore or gloss over the risks, according to Russell. In a worst case scenario, he believes the breakneck speed of innovation without regulation could lead to the extinction of the human race.

    Russell should know about the existential risks underlying AI’s rapid deployment. The British-born computer scientist has been studying AI for over 40 years, and published one of the most authoritative textbooks on the subject as far back as 1995. In 2016, he founded a research center at Berkeley focusing on AI safety, which advocates “provably beneficial” AI systems for humanity.

    In New Delhi, Russell remarked on how far off the mark companies and governments seem to be on that goal. Russell’s critique centered on the rapid development of systems that could eventually overpower their creators, leaving human civilization as “collateral damage in that process.”

    The heads of major AI firms are aware of these existential dangers, but find themselves trapped regardless by market forces. “Each of the CEOs of the main AI companies, I believe, wants to disarm,” Russell said, but they cannot do so “unilaterally” because their position would quickly be usurped by competitors and would face immediate ousting by their investors.

    The new Cold War

    Talk of existential risk and humanity’s potential extinction was once reserved for the specter of runaway nuclear proliferation during the Cold War, when great powers stockpiled weapons out of fear that rivals would surpass them. But skeptics like Stuart Russell increasingly apply that same framework to the age of artificial intelligence. The competition between the U.S. and China is often described as an AI “arms race,” complete with the secrecy, urgency, and high stakes that defined the nuclear rivalry between Washington and Moscow in the latter half of the 20th century.

    Vladimir Putin, Russia’s president, captured the enormous stakes succinctly nearly a decade ago: “Whoever becomes the leader in this sphere will become the ruler of the world,” he said in a 2017 address

    While the current arms race cannot be measured in warheads, the scale of it is captured in the staggering amounts of capital being deployed. Countries and corporations are currently spending hundreds of billions of dollars on energy-intensive data centers to train and run AI.In the U.S. alone, analysts expect capital expenditure on AI to exceed $600 billion this year.

    But aggressive corporate action has yet to be matched by restraint through regulatory action, Russell said. “It really helps if each of the governments understand this issue. And so that’s why I’m here,” he said, referring to the India summit.

    China and the EU are among the AI-developing powers that have taken a harder stance on regulating the technology. Elsewhere, the reality has been more hands-off. In India, the government has opted for a largely deregulatory approach. In the U.S., meanwhile, the Trump administration has championed pro-market ideals for AI, and sought to scrap most state-level regulations to give companies free rein.

    [ad_2]

    Tristan Bove

    Source link

  • Bitcoin May Gain If AI Job Losses Trigger Bank Stress, Hayes Says

    [ad_1]

    Arthur Hayes has issued a stark market warning: he sees a growing split between his preferred risk gauge, Bitcoin, and the tech-heavy Nasdaq 100 as a signal that credit stress may be building under the surface.

    Related Reading

    Hayes, a co-founder and former CEO of cryptocurrency exchange BitMEX, calls Bitcoin a “fiat liquidity fire alarm” — an asset that reacts quickly when credit conditions change.

    A Warning From Market Signals

    When two assets that often moved together start to pull apart, traders take notice. Hayes believes that a gap like this deserves investigation because it could point to trouble in bank balance sheets or in the flow of lending.

    He argues the move is not about one stock or one trade; it is about the plumbing of credit and how fast liquidity can dry up when things turn.

    Source: Arthur Hayes

    How AI Job Cuts Could Ripple Through Credit

    Reports note that companies cited AI as a reason for thousands of layoffs in recent years, with an outplacement firm counting roughly 55,000 cuts in 2025 that were tied to AI. Much of that hit was inside tech.

    Hayes sketches a rough scenario: a sizable drop in knowledge-worker employment would weaken mortgage and consumer credit repayment, which could then shave bank equity and tighten lending.

    The numbers he offers are approximate and built on multiple assumptions, but they are intended to show how a shock to white-collar paychecks could cascade into the credit system.

    Source: Arthur Hayes

    Expectations About Central Bank Action

    Hayes expects a policy response if banks start to fail and credit freezes. He argues the Federal Reserve would step in with fresh liquidity, and that more money creation would follow — a move he says would be favorable for Bitcoin’s price outlook.

    That scenario has been a recurring theme in his commentary; past essays and posts have linked anticipated Fed liquidity to sharp rallies in crypto markets.

    BTCUSD currently trading at $67,298. Chart: TradingView

    Altcoin Bets And Fund Positioning

    His fund, Maelstrom, is said to plan staking or stablecoin deployments into privacy-focused and exchange-native plays once liquidity policy shifts occur, naming Zcash and Hyperliquid as examples. That kind of tactical stance is meant to profit from a short-term surge in risk assets after a policy pivot.

    Related Reading

    A Measured View

    This is a dramatic chain of events: AI job losses lead to credit losses, which cause bank stress, which forces the central bank to expand money supply, which lifts Bitcoin.

    Each link is plausible, but none is guaranteed. Some of Hayes’ figures are rough estimates meant to illustrate risk rather than to act as a precise forecast.

    Market history shows that central banks do sometimes step in, and that policy moves can power asset rallies, but outcomes depend on timing, scale and public confidence — factors that are hard to predict in advance.

    Featured image from Unsplash, chart from TradingView

    [ad_2]

    Christian Encila

    Source link

  • Criminals are using Zillow to plan break-ins. Here’s how to remove your home in 10 minutes.

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The whole country is watching the Nancy Guthrie case. When the suspected kidnapping happened, I was curious. How long would it take me to find her home address and cell phone number on a people search site?

    About 30 seconds.

    STOP FOREIGN-OWNED APPS FROM HARVESTING YOUR PERSONAL DATA

    I then pasted her address into Zillow and saw photos of her home. I could match what I found to the video from a home tour done on the Today show. I could see the layout. The entry points. The windows. Where her furniture sat. Imagine if I was a criminal armed with that info.

    Here’s the thing: I’m not some hacker. I used free websites anyone can access from their couch.

    This is happening everywhere

    In Scottsdale, Arizona, two teens dressed as delivery drivers forced their way into a couple’s home. They duct-taped and assaulted the homeowners, looking for $66 million in cryptocurrency. They got the victims’ home address from strangers on an encrypted app.

    Savannah Guthrie and mother Nancy Guthrie on Thursday, June 15, 2023. (Nathan Congleton/NBC via Getty Images)

    In Delray Beach, Florida, a retired couple had their sliding glass door shattered by thieves. The attackers had their home address from leaked personal data. That crew went on to hit victims in multiple states.

    Riverside, California, police confirmed detectives routinely find Zillow and Redfin searches on phones seized from arrested burglary suspects. 

    A former NYPD detective put it bluntly: today’s burglars can case your home from their chair with a cup of coffee and get better intel than they ever could sitting outside with binoculars.

    HOW TECH IS BEING USED IN NANCY GUTHRIE DISAPPEARANCE INVESTIGATION

    The numbers are scary

    Zillow’s database covers over 160 million homes. Listing photos often stay online long after a home is sold. That means photos of your home, taken when you listed it three, five, even 10 years ago, could still be sitting there right now showing every room, every door, every window and exactly where your security cameras are mounted.

    Google Street View covers 10 million miles of road worldwide. Criminals use it to check out vehicles parked in driveways, scope backyards and plan escape routes. In some areas, police say thieves are even using drones to peer into windows and check for dogs.

    Nancy Guthrie’s house and surrounding property viewed from an aerial perspective.

    Aerial drone shots of missing person Nancy Guthrie’s home on Tuesday, February 3, 2026 in Tucson, Arizona. Nancy Guthrie, mother of ‘Today’ show host Savannah Guthrie, is suspected of being abducted from her home earlier this week. (Fox Flight Team)

    Anyone can type your name into a free people search site and get your home address in seconds. Then they plug it into Zillow and see your floor plan, entry points, window types and where the security cameras sit.

    Unless you’re selling your home, take down your photos. Now.

    Take it all down in 10 minutes

    These steps can look a little different depending on your device, app version or browser. If it’s not exact, poke around. The option is there.

    Zillow: Sign in at zillow.com. Click your profile icon > Your Home. Search your address, claim it, then go to Edit Facts and hide or delete the photos. Hit Save.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    Redfin: Sign in at redfin.com. Go to Owner Dashboard. Select your home > Edit Photos > Hide listing photos > Save.

    Realtor.com: Go to realtor.com/myhome. Claim your home, then select it under My Home > Remove Photos > Yes, Remove All Photos.

    Google Street View: Open Google Maps on a computer. Search your address, drop into Street View, then click “Report a problem” (bottom right). Position the red box over your home. Under Request blurring, select “My home.” Submit. FYI, once it’s blurred, it’s permanent. Good.

    Investigators searching the grounds of Nancy Guthrie's property in the Catalina Foothills.

    A member of the Pima County sheriff’s office remains outside of Nancy Guthrie’s home, Monday, Feb. 9, 2026 in Tucson, Ariz. (Ty ONeil/AP Photo)

    Pro tip: Ask your old listing agent to pull photos from the MLS. Once they’re gone from MLS, the feeder sites eventually follow.

    Also, while you’re at it, search yourself on people search sites like Spokeo, WhitePages and BeenVerified. Most let you opt out. It takes some time per site, but it cuts off the first step criminals use to find you. Better bet is to sign up for Incogni, a sponsor of my national radio show and podcasts.

    If you’re not selling, there’s zero reason for the internet to have a virtual tour of your home. Take it down today.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    I guess you could say Zillow gives everyone an open house. Problem is, you never sent the invitations.

    Know someone who bought a home in the last few years? Forward this. Their listing photos are probably still online and they have no idea. You can sign up for my 5-star rated newsletter at my website, Komando.com. 

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • China unveils the world’s largest flying car

    [ad_1]

    NEWYou can now listen to Fox News articles!

    China just sent a clear signal about where it believes air travel is headed next. A Shanghai-based aviation company called AutoFlight has unveiled Matrix, now recognized as the world’s largest flying car. This is not a concept image or a brief hover test. Matrix has already completed successful flight tests near Shanghai, bringing real size and real ambition to an industry still dominated by small prototypes.

    The launch also highlights China’s push to dominate what it calls the low-altitude economy. That sector focuses on short-distance flights using electric aircraft to move people and cargo above busy roads.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF

    Matrix during flight testing near Shanghai, where the aircraft demonstrated real world performance at a scale rarely seen in flying car development. (AutoFlight)

    Matrix becomes the world’s largest flying car

    Matrix stands out immediately once you look at the specs. The aircraft weighs nearly 11,000 pounds. It measures about 56 feet long, stands roughly 11 feet tall and has a wingspan close to 66 feet. That makes it significantly larger than most flying cars currently under development. Most electric vertical takeoff and landing aircraft today focus on compact designs. Many seat four to six passengers and prioritize lightweight frames. Matrix takes a different approach. Its scale allows it to operate more like a true aircraft rather than a personal air vehicle.

     Matrix comes in two versions. One supports passenger travel. The other focuses on heavy cargo transport. The passenger model can carry up to 10 people, which is well above the current industry norm. That added capacity matters. It improves efficiency, lowers cost per passenger and makes commercial operations far more realistic.

    Why battery technology drives flying car progress

    Size alone does not make Matrix possible, power does. AutoFlight receives backing from CATL, the world’s largest electric vehicle battery manufacturer. CATL holds a significant stake in the company and supports battery research and development.

    Battery performance affects nearly every part of electric flight. It shapes range, safety margins and payload capacity. Stronger batteries allow aircraft to fly farther while carrying more weight. In flying cars, that difference often separates experimental designs from aircraft ready for real-world service.

    TRUMP ADMIN CUTS RED TAPE ON COMMERCIAL DRONES TO COMPETE WITH CHINA’S DOMINANCE OF THE MARKET

    Matrix flying vehicle in flight

    The size of Matrix sets it apart, with a wide wingspan and passenger capacity that pushes electric air travel beyond small prototype designs. (AutoFlight)

    China builds rules for the low-altitude economy

    Matrix did not appear by accident. China is actively building a regulatory framework for the low-altitude economy. That includes standards for aircraft design, safety systems, air traffic control and supporting infrastructure. Officials plan to introduce baseline rules by 2027, with more than 300 detailed standards expected by 2030. These rules are meant to prepare cities for flying cars, cargo aircraft and air taxi services. While many countries still debate how electric air travel should work, China is already laying the foundation.

    Cargo flights paved the way for passenger approval

    Before shifting focus to passengers, AutoFlight proved itself with cargo. Its earlier aircraft, CarryAll, received full certification in China for design, production and airworthiness. It also completed a real-world cargo flight between two cities, covering about 100 miles in roughly one hour. That flight demonstrated practical use beyond test environments. It also helped build trust with regulators, which plays a critical role in approving passenger aircraft. Today, passenger travel has become the company’s main focus. About 70 percent of AutoFlight’s total orders involve passenger aircraft. Certification is still underway, but company leaders expect approval within one to two years. Orders are already being accepted for future delivery.

    NEW PERSONAL EVTOL PROMISES PERSONAL FLIGHT UNDER $40K

    Matrix flying vehicle in the sky above a neighborhood

    Flying cars like Matrix point to a future where short distance air travel could ease congestion and reshape how cities move people and cargo. (AutoFlight)

    How Matrix compares to smaller flying cars like Pivotal

    Matrix represents one side of the flying car future. Smaller aircraft such as the Pivotal flying car, which we have covered previously, focus on personal flight and short-range travel. These designs emphasize simplicity, individual control and compact size. Matrix takes the opposite approach. It focuses on shared passenger travel and heavy cargo transport at scale. Together, these models show how the flying car market is splitting into two paths. One is personal air mobility. The other is commercial electric aviation. Both paths matter, but they solve very different transportation problems.

    When passenger flying car flights could begin in China

    Industry experts see 2026 as a pivotal year for flying cars in China. Several companies plan to begin deliveries, and China could see its first paid passenger flying car flights. New infrastructure, such as landing pads and charging stations, will support this growth. AutoFlight is also looking beyond China. Demand is strong in regions with limited transportation networks. Island nations, mountainous areas and remote regions stand out. The company sees Northeast Asia, Southeast Asia and the Middle East as key markets.

    What this means for you

    Flying cars still feel futuristic, but they are moving closer to everyday use. Early flights will likely focus on specific routes, cargo delivery, emergency services and premium passenger travel. Over time, costs could fall to levels similar to high-end ride services on the ground. Even if you never board one soon, this technology will shape logistics, emergency response and how cities plan transportation. It also shows how quickly electric aviation can advance when regulation, manufacturing and demand align.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    Matrix is more than a big flying machine. It shows how fast flying car ideas are turning into aircraft that can actually be certified and used. China is moving from concepts to real operations step by step. Widespread use will take time, but the trend is clear. Electric flight is becoming practical, scalable and much harder to ignore.

    What would need to happen for you to feel comfortable riding in a flying car, and would you try it if one launched in your city? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Woman owes $3,556 for cruise she already paid for after falling victim to elaborate Zelle scam

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A family vacation turned into a five-year nightmare. And it started with one payment.

    L. Williams found a cruise consultant online who booked her family a week on Carnival Freedom. Great price. One catch. He only accepted Zelle. She sent $3,556. The family sailed the Western Caribbean. Gorgeous sunsets. Wonderful memories.

    Five years later, she tried to book another cruise. Nope.

    Carnival told her she was on the Do Not Sail list. Turns out her “consultant” pocketed the Zelle cash, then used a stolen credit card to book the trip. When the real cardholder disputed the charge, Williams got the blame.

    DON’T LOCK YOUR FAMILY OUT: A DIGITAL LEGACY GUIDE

    She now owes $3,556 for a trip she already paid for. Banned for life. The scammer’s phone? Disconnected. (Of course.)

    The deals are real right now

    Here’s what you need to know. The cheapest window for domestic spring break flights is about 43 days before departure. For late March trips, that’s this week. Wait until late February, and prices jump 20% to 25%. That’s your cash walking out the door.

    Fly Tuesday, Wednesday or Saturday, and save up to 30% over weekend flights. Set Google Flights alerts now. Caribbean fares are down 17% from last year. 

    Bundle flights with hotels through Costco, Expedia or Delta Vacations, and you can knock hundreds off the total.

    Travelers arrive at Los Angeles International Airport on Monday, Nov. 3, 2025 in Los Angeles, CA.  (Juliana Yamada / Los Angeles Times via Getty Images)

    Scammers circling like sharks

    Williams’ story isn’t a one-off. Over 38 million people are expected to cruise in 2026, and scammers know it. Here are the big cons I’m seeing.

    • The Google trap. Fake cruise line phone numbers are showing up in search results. One man called what he thought was Carnival’s customer service line and got hit with a $650 per person “docking fee.” That’s not a thing. Real cruise lines don’t charge surprise fees by phone. Always go directly to the official website for contact info.
    • The free cruise postcard. Got one in the mail? Toss it. The fine print buries you in hundreds of dollars of hidden fees and a windowless cabin with bunk beds. How romantic. One investigation found the company behind these changes its name every year so you can’t look them up.

    AI JOBS THAT PAY $200K OR MORE

    • The Facebook agent. Scammers pose as travel agents in Facebook groups and collect payments through Zelle, Venmo or Cash App. Then they vanish. These apps have zero buyer protection. They’re for sending money to people you trust, not strangers selling Caribbean getaways.
    • Your three rules: Always pay with a credit card. Never call a customer service number from a Google search, go to the official site. If you want a travel agent, verify them at ASTA.org.
    Luxury white cruise ship shot at angle at water level on a clear day.

    Book smart and you’ll be sipping something tropical in a few weeks. Book carelessly and you might end up on the Do Not Sail list, which, ironically, is the worst kind of cruise control.

    TRAVELING SOON? KNOW HOW TO NAVIGATE FLIGHT CANCELLATIONS NOW

    If anyone you know is booking a spring break trip, send them this first. It takes two seconds to forward and could save them thousands. One payment to the wrong person cost a woman her vacation money, her cruise line privileges and years of debt headaches.

    An RV parked in a campsite during the early autumn.

    An RV parked in a campsite during the early autumn.  (iStock)

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    National radio show airing on 500+ stations, a free daily newsletter, videos on YouTube, plus the podcast wherever you listen. 

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • Warm-skinned AI robot with camera eyes is seriously creepy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Humanoid robots are no longer hiding in research labs somewhere. These days, they are stepping into public spaces, and they are starting to look alarmingly human. 

    A Shanghai startup has now taken that idea further by unveiling what it calls the world’s first biometric AI robot. Yes, it is as creepy as it sounds. The robot is called Moya, and it comes from DroidUp, also known as Zhuoyide. The company revealed Moya at a launch event in Zhangjiang Robotics Valley, a growing hotspot for humanoid development in China. 

    At first glance, you can still tell Moya is a robot. The skin looks plasticky. The eyes feel vacant. The movements are slightly off. Then you learn more details about her, and that’s when the discomfort kicks in.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Warm skin makes this humanoid robot feel unsettling

    HUMANOID ROBOTS ARE GETTING SMALLER, SAFER AND CLOSER

    Even when standing still, the robot’s posture and proportions blur the line between machine and person in a way many people find unsettling. (DroidUp)

    Most robots feel cold and mechanical. Moya does not. According to DroidUp, Moya’s body temperature sits between 90°F and 97°F, roughly the same range as a human. Company founder Li Qingdu says robots meant to serve people should feel warm and approachable. That idea sounds thoughtful until you picture a humanoid with warm skin standing next to you in a quiet hallway. DroidUp says this design points toward future use in healthcare, education and commercial settings. It also sees Moya as a daily companion. That idea may excite engineers. However, for many people, it triggers the opposite reaction. Warmth removes one of the few clear signals that separates machines from humans. Once that line blurs, discomfort grows fast.

    Why this humanoid robot’s walk feels so off

    Moya does not roll or glide. She walks. DroidUp says her walking motion is 92% accurate, though it is not clear how that number is calculated. On screen, the movement feels cautious and a little stiff. It looks like someone is moving carefully after leg day at the gym. The hardware underneath is doing real work. Moya runs on the Walker 3 skeleton, an updated system connected to a bronze medal finish at the world’s first robot half-marathon in Beijing in April 2025. Put simply, robots are getting better at moving through everyday spaces. Watching one do it this convincingly feels strange, not impressive. It makes you stop and stare, then wonder why it feels so uncomfortable.

    Camera eyes and facial reactions raise privacy concerns

    Behind Moya’s eyes sit cameras. Those cameras allow her to interact with people and respond with subtle facial movements, often called microexpressions. Add onboard AI and DroidUp now labels Moya a fully biomimetic-embodied intelligent robot. That phrase sounds impressive. It also raises obvious questions. If a humanoid robot can see you, track your reactions and mirror emotional cues, trust becomes complicated. You may forget you are interacting with a machine. You may act differently. That shift has consequences in public spaces. This is AI moving out of screens and into physical proximity. Once that happens, the stakes change.

    Price alone keeps this robot out of your home

    If you are worried about waking up to a warm-skinned humanoid in your home, relax for now. Moya is expected to launch in late 2026 at roughly $173,000. That price places her firmly in institutional territory. DroidUp sees the robot working in train stations, banks, museums and shopping malls. Tasks would include guidance, information and public service interactions. That still leaves plenty of people uneasy, especially those whose jobs already feel vulnerable to automation. For homes, the future still looks more like robot vacuums than walking companions.

    Close up of human-like robot with pink hair.

    Up close, Moya’s eyes look almost human, which raises questions about how much realism is too much for robots meant to operate in public spaces. (DroidUp)

    WORLD’S FIRST AI-POWERED INDUSTRIAL SUPER-HUMANOID ROBOT

    What this means to you

    This is not about buying a humanoid robot tomorrow. It is about where technology is heading. Warm skin, camera eyes and human-like movement signal a shift in design priorities. Engineers want robots that blend in socially. The more they succeed, the harder it becomes to maintain clear boundaries. As these machines enter public spaces, questions about consent, surveillance and emotional manipulation will follow. Even if the robot is polite and helpful, the presence alone changes how people behave. Creepy reactions are not irrational. They are early warning signs.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Moya’s debut feels worth paying attention to because she is real enough to trigger discomfort almost instantly. That reaction matters. It suggests people are being asked to get used to lifelike machines before they have time to question what that really means. Humanoid robots do not need warm skin to be helpful. They do not need faces to point someone in the right direction. Still, companies keep pushing toward realism, even when it makes people uneasy. In tech, speed often comes before reflection, and this is one area where slowing down might matter more than racing ahead.

    If a warm-skinned robot with camera eyes greeted you out in public, would you trust it or avoid eye contact and walk faster? Let us know by writing to us at Cyberguy.com.

    Two human-like robots standing side-by-side.

    Moya’s humanlike appearance is intentional, from her warm skin to subtle facial details designed to feel familiar rather than mechanical. (DroidUp)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Mark Zuckerberg is joining Jeff Bezos in Miami’s billionaire bunker: Take a look inside his portfolio | Fortune

    [ad_1]

    Mark Zuckerberg is reportedly adding to his growing list of luxury homes with a waterfront property in the most in-demand section of one of most exclusive neighborhoods in America.

    The Meta CEO and his wife, Dr. Priscilla Chan, are reportedly purchasing a recently completed luxury mansion on Indian Creek Island, a 300-acre, man-made island near Miami with a mere 41 lots and approximately 84 residents, The Wall Street Journal reported. Home prices on the island start at about $60 million, and the market price for a property like Zuckerberg’s ranges from $150 million to $200 million, Mick Duchon, a Miami Beach-based real estate agent with the Corcoran Group who specializes in high-end waterfront properties, told Fortune.

    Even an undeveloped property can fetch big bucks on the island—one vacant lot of roughly the same size as Zuckerberg’s sold for a reported $105 million in 2025.

    The property Zuckerberg reportedly purchased at 2 Indian Creek Island Road puts him in the most coveted area of the already exclusive island, Duchon said. On the western side of the island, where Zuckerberg’s property is reportedly located, lots are about 80,000 square feet, compared to about 50,000 square feet on the east side, according to Duchon. On this side, where Amazon founder and fellow billionaire Jeff Bezos also owns two lots, residents have better access to the open water of Biscayne Bay and a more expansive view with great sunsets, he added.  

    “That side of the island is perceived to be the most appealing,” Duchon said.

    Bezos has been buying up properties on Indian Creek Island since he announced in 2023 he was leaving Seattle, Wash. for Florida. The Amazon founder first purchased a $68 million home that would end up being just a few doors down from Zuckerberg in 2023. Near the end of that year, he paid another $79 million for a neighboring property with the intention of combining the lots into a single compound—a trend Buchon said is increasingly common among wealthy buyers because of the scarcity of truly expansive waterfront properties in the area. Meanwhile, Bezos is living in a third Mediterranean-style property also on Indian Creek Island, on the east side, which he snapped up for $87 million in 2024. Last year, Bezos sold one of his Seattle homes overlooking Lake Washington for a record $63 million, the Puget Sound Business Journal reported.

    Indian Creek Island operates as an independent municipality with its own government and private police who patrol by air, water, and sky. Access to the island is controlled by a single gated bridge, making safety and privacy a defining feature. Most of the interior of the island comprises an 18-hole golf course and the Indian Creek Country Club, with a limited number of members due, in part, to a difficult acceptance process and a $500,000 initiation cost.

    It’s unclear whether Zuckerberg’s deal has closed yet. Miami-Dade county property records note the owner as a land trust. One of Zuckerberg’s future neighbors, Irma Braman, the wife of billionaire car dealer Norman Braman, told WSJ Zuckerberg said he planned to move into the property by April. 

    Meta did not immediately respond to Fortune’s request for comment.

    Zuckerberg is the latest billionaire to pick up a Florida property, especially as a proposed ballot initiative gains steam in California that would impose a one-time 5% “billionaires tax” for any individual worth at least $1 billion dollars retroactive to Jan. 1, 2026. (To be sure, Zuckerberg still very much calls California home, having just invested $50 million through Meta for a Sacramento downtown revitalization and AI-focused project.) Google cofounder Larry Page also recently snagged a $173 million compound in Miami consisting of two waterfront lots in the city’s Coconut Grove area.

    Indian Creek Island, in particular, is home to a number of high profile names, who, besides Bezos, include the financier Carl Icahn and former NFL quarterback Tom Brady. 

    Zuckerberg’s reported newest property is just the latest addition to the tech CEO’s growing portfolio of luxury homes across the U.S.

    Palo Alto compound

    Zuckerberg’s home base remains Palo Alto, Calif., where, according to The New York Times, he owns 11 properties in the Crescent Park neighborhood. Over more than a decade, Zuckerberg has poured $110 million into buying adjacent properties, in some cases drawing complaints from his neighbors

    Vegetation covers the front of Facebook Inc.’s Chief Executive Officer Mark Zuckerberg’s house in Palo Alto, California, U.S. on Saturday, July 14, 2012

    Noah Berger—Bloomberg via Getty Images

    Hawaiian estate

    On the island of Kauai, about 100 miles northwest of Honolulu, Zuckerberg also owns a $300 million property commonly known as Koʻolau Ranch, spanning roughly 1,400 acres. He quietly added about 1,000 additional acres to the compound, last year, Architectural Digest reported, bringing his total Kauai holdings to more than 2,300 acres. 

    The ranch is one of Zuckerberg’s most secretive properties. Almost anyone who passes the compound security, including builders and other workers must sign non-disclosure agreements, Wired reported. The ranch reportedly includes a 5,000 square-foot underground shelter with its own energy source.

    The island of Kauai, where Zuckerberg is reportedly creating a 5,000-square-foot underground shelter, lies about 100 miles northwest of Honolulu.

    DeAgostini—Getty Images

    Lake Tahoe retreat

    Zuckerberg created his own mountain compound in the Lake Tahoe area through the purchase of two adjacent estates in Tahoe City on the lake’s West Shore. Lake Tahoe, in the Sierra Nevada mountains between Nevada and California, has emerged as a popular destination for billionaires seeking a retreat, with both Google cofounder Sergey Brin as well as 2020 presidential candidate Tom Steyer owning homes there.

    Zuckerberg bought the properties—known as Carousel Estate and Brushwood Estate—for a total of $59 million, or $22 million and $37 million, respectively, according to multiple reports. The Brushwood Estate in particular, dates back to the early 1900s and has only ever had two other owners, according to SFGate. The property has six bedrooms, five full baths, and a 2,293-square-foot guesthouse.

    Zuckerberg created his own mountain compound in the Lake Tahoe area through the purchase of two adjacent estates in Tahoe City on the lake’s West Shore.

    Christian Petersen—Getty Images

    Washington, D.C. mansion

    As Meta and Zuckerberg have engaged more with policymakers in Washington, D.C. during the Trump administration, the tech CEO reportedly picked up a $23 million mansion in Washington D.C.’s exclusive Woodland Normanstone neighborhood, Politico reported. The 15,000-square-foot mansion is made of brick and limestone walls divided into three sections divided by glass enclosed “walkways.”

    Mark Zuckerberg’s Washington D.C. home is located in the Woodland-Normanstone neighborhood.

    Andrade-Rhoades—The Washington Post via Getty Images

    [ad_2]

    Marco Quiroz-Gutierrez

    Source link

  • Roblox child safety warning after Nebraska kidnapping case

    [ad_1]

    NEWYou can now listen to Fox News articles!

    What starts as a game can quietly turn into something much more serious. Parents across the country are paying closer attention after a Nebraska man was charged with kidnapping two sisters, ages 12 and 14. 

    According to authorities, he first connected with the girls on Roblox and later continued the conversations on Snapchat.

    Law enforcement says the suspect built trust with the girls online over time before traveling from Nebraska to Florida to meet them in person. Even though the girls left willingly, investigators classified the case as an abduction because of their age. That distinction matters and highlights how grooming can distort a child’s sense of safety and choice.

    The case is a sobering reminder of how online grooming works and why social gaming platforms deserve closer scrutiny from families.

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    Investigators say the suspect first contacted the girls through Roblox, showing how social gaming platforms can quietly become communication hubs. (Thomas Fuller/SOPA Images/LightRocket via Getty Images)

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    What Roblox and Snapchat really are

    To understand how this happened, parents need to understand what these platforms actually do.

    Roblox explained for parents and caregivers

    Roblox is an online gaming platform where users create digital characters and play games made by other players. It is popular with children and preteens, which is why many parents see it as harmless fun. What often gets overlooked is that Roblox is also a social platform. Kids can chat inside games, send direct messages and sometimes use voice chat. These conversations can happen with people they have never met in real life.

    According to investigators, communication in this case began on Roblox as early as the summer of 2025. That long timeline reinforces a key reality about grooming. It is rarely sudden. It is built slowly through repeated contact that starts to feel normal to a child.

    Snapchat explained for parents and caregivers

    Snapchat is a messaging app widely used by teens and young users. It allows people to send photos, videos and messages that usually disappear after they are viewed. That disappearing feature is a major concern. Once conversations move to Snapchat, messages become private and harder for parents to monitor.

    Investigators say communication continued on Snapchat after trust had already been established elsewhere. In many grooming cases, moving from a public or semi-public platform to private messaging is a turning point. 

    Snapchat does include safety features designed to limit unwanted contact, especially for teens. But those protections are most effective before trust is established elsewhere. Once a child has already bonded with someone on another platform, private messaging apps can accelerate grooming quickly. Snapchat also offers a parental tool called Family Center that provides limited visibility into teen interactions, but many families do not activate it until after a problem arises.

    How online grooming typically works

    Grooming rarely happens all at once. It is a gradual process built on time, attention and emotional manipulation. It often starts with shared interests and casual conversation. Trust grows slowly. The relationship begins to feel familiar. Then secrecy enters the picture.

    Authorities in this case said family members later noticed unusual behavior, including gifts and food deliveries showing up at the house. Investigators described this as part of the grooming process. Unexpected gifts tied to online contacts are a serious red flag, even when they seem harmless. Another common warning sign is secrecy. Requests like do not tell your parents or this is just between us are intentional. They isolate a child and make intervention harder.

    Another warning sign is sudden contact from someone outside a child’s normal geographic or social circle, especially when paired with urgency, flattery or offers of gifts.

    Why this matters for every family

    Technology changes fast. Kids adapt even faster. Parents often assume platforms are watching closely enough to catch problems early.  Both Roblox and Snapchat say they are cooperating with law enforcement and have safety measures in place. But cooperation after harm occurs is not the same as prevention before trust is built. Authorities stress that no platform can replace parental vigilance. No system is perfect. The most effective protection is awareness, conversation and involvement.

    “We are investigating this deeply troubling incident and will fully support law enforcement,” Matt Kaufman, Roblox’s chief safety officer, told CyberGuy. “Roblox has robust safety policies to protect users that go beyond many other platforms and advanced safeguards that monitor for harmful content and communications. 

    “We have filters designed to block the sharing of personal information, don’t allow user-to-user image or video sharing and recently rolled out age checks globally to limit kids and teens to chatting with others their age by default. While no system is perfect, our commitment to safety never ends, and we continue to strengthen protections to keep users safe.”

    A Snap company spokesperson provided CyberGuy with the following statement:

    Woman looking through her iPad.

    Law enforcement described the case as an abduction, even though the girls left willingly, highlighting how online grooming can distort a child’s sense of safety. (CyberGuy.com)

    “Our hearts go out to the family affected by this tragic incident, and we are grateful to the law enforcement professionals who worked tirelessly in the rescue efforts. The exploitation of children is an abhorrent crime, and we are committed to combating it. We work closely with law enforcement to support their investigations, including during this incident, and to prevent such heinous activity on our platform and help bring criminals to justice. 

    “While no single safety feature or policy can eliminate every potential threat online or in the world around us, we continuously adapt our strategies as criminals evolve their tactics. We’ve built safeguards, launched safety tutorials, partnered with experts and continue to invest in features and tools that support the safety, privacy and well-being of all Snapchatters.”

    What parents can do right now to protect their kids

    There are clear steps parents and grandparents can take today. These actions combine common sense conversations with practical tech controls.

    1) Lock down chat features

    Disable direct messaging and voice chat with strangers. Allow communication only with approved friends. This is one of the most important steps parents can take.

    On Roblox:

    • Open Roblox and log into your child’s account.
    • Go to Settings and select Privacy.
    • Set Who can chat with me to Friends or No one.
    • Set Who can message me to Friends or No one.
    • Turn off voice chat unless you are actively supervising.

    Check these settings regularly. Platform updates can reset defaults.

    EVEN THE FUTURE KING DISCOVERS SMARTPHONES ARE A ROYAL PAIN FOR KIDS AND PARENTS

    On Snapchat:

    • Open Snapchat and tap your child’s profile icon.
    • Tap Settings, then Privacy Controls, then Privacy Controls.
    • Set Contact Me to Friends.
    • Set View My Story to Friends or Custom.
    • Turn off Quick Add to reduce contact from strangers.

    2) Turn on parental controls and activity reports

    Built-in tools help parents spot changes without reading every message. They are designed to provide visibility and early warning signs.

    On Roblox:

    • Open Settings and select Parental Controls.
    • Create a parent PIN so changes require approval.
    • Set monthly spending limits.
    • Review account activity and friend lists together.

    On Snapchat:

    • Enable Family Center from the parent’s Snapchat account.
    • Add your child to see who they interact with most often.
    • Watch for new friends added quickly or late at night.
    • Look for sudden changes in usage patterns.

    3) Set a no secrets rule

    Make it clear that anyone asking for secrecy online is crossing a line. Kids should feel safe coming to you without fear of punishment.

    4) Keep devices out of bedrooms

    Shared family spaces reduce risk and increase visibility. Late-night and private screen time often create conditions in which grooming escalates. Law enforcement noted that devices had been removed earlier in the day in this case, a reminder that rules alone are not enough without ongoing conversation and awareness.

    5) Talk openly about grooming

    Explain that grooming is a slow manipulation that can take weeks or months. When kids understand how it works, they are more likely to recognize red flags.

    6) Watch for platform switching

    Be alert if conversations suddenly move from a game to another app like Snapchat. That shift is often intentional and deserves immediate attention.

    High school students using their smart phones in a hallway

    High school students using their smartphones in a hallway (iStock)

    7) Trust instincts and act early

    If something feels off, pause the account, block the contact and report the behavior. Acting early is always better than waiting.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.  

    Kurt’s key takeaways

    This case is a wake-up call. Gaming platforms are no longer just games. They are social spaces where real relationships can form, for better or worse. Parental controls help. Open conversations matter more. Staying involved gives kids the confidence to ask for help before a situation turns dangerous.

    Is it time for platforms, not parents alone, to take more responsibility for keeping kids safe online? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • How to protect a loved one’s identity after death

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When someone you love dies, the to-do list can feel endless. There are legal steps, financial paperwork and emotional weight all happening at once. What many families do not realize is that identity protection rarely makes those lists, even though it should.

    Scammers actively target the identities of people who have died. They rely on delays, data gaps and the assumption that someone else is handling it. Janet from Indiana recently reached out with a question many families quietly worry about but rarely ask.

    My husband just passed away in December. There are lists upon lists of things to do to wrap up his estate, but nothing that tells me how to lock down his identity now that he’s gone so that fraudsters cannot use it. Maybe our government is efficient enough to report to all of the credit bureaus that he is deceased, but I don’t want to bet my financial security on it. We both have our credit frozen with all three agencies, but is there more that I should do? Thank you.

    — Janet in Indiana

    Janet’s instincts are exactly right. The system often does not work as cleanly as people expect.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    MICROSOFT CROSSES PRIVACY LINE FEW EXPECTED

    Scammers often look for recently deceased names because they know systems do not update instantly and families are overwhelmed.   (Kurt “CyberGuy” Knutsson)

    What the government and credit bureaus do and don’t do

    When someone dies, Social Security is usually notified by the funeral home. That step helps, but it does not automatically secure a person’s financial identity.

    Here is what often surprises families:

    • Credit bureaus are not synchronized in real time
    • A death notice does not instantly stop fraud attempts
    • Scammers specifically target recently deceased individuals
    • Gaps between systems create opportunities for misuse

    In short, relying on automation alone leaves room for problems.

    AI DEEPFAKE ROMANCE SCAM STEALS WOMAN’S HOME AND LIFE SAVINGS

    Person typing on computer

    Credit freezes and alerts help, but they do not stop every attempt to misuse personal information after a death.  (Kurt “CyberGuy” Knutsson)

    What you’ve already done right

    Before adding more steps, it matters to acknowledge what Janet already did correctly.

    • Credit freezes with all three bureaus
    • Early awareness of identity risks
    • Taking action before fraud appears

    When speed matters, credit locks — different from freezes — give you instant on/off control. That combination puts someone well ahead of most families.

    Steps to protect a loved one’s identity after death

    Once the immediate paperwork is underway, these practical steps help close the gaps scammers look for. None of them is super complicated, but together they create a much stronger layer of protection.

    1) Add a deceased flag to credit files

    Even with a credit freeze in place, this step adds another layer of protection that lenders see immediately.

    Contact Equifax, Experian and TransUnion and ask them to mark the credit file as deceased. Each bureau may request:

    A copy of the death certificate

    • Proof that you are the surviving spouse or executor

    Once the flag is added, fraudulent applications become much harder to process because lenders are alerted upfront. A credit lock provides the same blocking effect, but with real-time control; this can matter when you’re managing a deceased estate or responding quickly to lender requests.

    2) Monitor identity activity while you manage everything else

    This is where many checklists fall short. Credit freezes and deceased flags help, but identity misuse can still surface in other ways.

    Fraud attempts may appear as:

    • Account takeovers
    • Unauthorized credit inquiries
    • Use of personal data outside traditional credit

    That is why ongoing monitoring still matters.

    Why identity theft protection helps at this stage

    Identity theft protection focuses on identity protection rather than just credit scores, which makes it especially useful after a loss.

    • Monitors for misuse tied to your loved one’s information
    • Sends alerts if something suspicious appears
    • Includes fraud support if action is needed
    • Reduces the burden of constant manual checks

    One of the best parts of my pick for top identity theft service is its all-in-one approach to safeguarding your personal and financial life. It includes identity theft insurance of up to $1 million per adult to cover eligible losses and legal fees, plus 24/7 U.S.-based fraud resolution support with dedicated case managers ready to help restore your identity fast. It also combines three-bureau credit monitoring with an instant credit lock that lets you quickly lock down your Experian file right from the app.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    3) Secure sensitive documents during estate administration

    Estate administration often requires sharing paperwork, which is where identity leaks can happen.

    Lock down and limit access to:

    • Death certificate copies
    • Social Security numbers
    • Old tax returns
    • Insurance and pension records

    Only share what is required and keep track of where documents go.

    MILLIONS OF AI CHAT MESSAGES EXPOSED IN APP DATA LEAK
     

    Person typing

    A man types on a laptop. (Kurt “CyberGuy” Knutsson)

    4) Watch mail and phone calls for warning signs

    Small signals often reveal fraud attempts early.

    Pay close attention to:

    • Bills or collection notices in their name
    • Credit card or loan offers
    • Bank or government letters you did not expect
    • Calls asking to verify personal information

    If something feels off, pause before responding and verify the source independently.

    Kurt’s key takeaways

    Protecting a loved one’s identity after death is one more responsibility no one prepares you for. It is not about mistrusting the system. It is about protecting yourself during a time when you are already carrying enough. Janet’s question reflects what many families experience quietly. Identity protection does not end when life does, and scammers know that grief creates gaps. Taking a few extra steps now can spare you months or even years of stress later. You are not being overly cautious. You are being careful at a moment when the system does not always move fast enough to keep up with real life.

    If you have handled an estate or are planning ahead, have you taken steps to protect a loved one’s identity after death, or is this something you are just learning about now? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Microsoft crosses privacy line few expected

    [ad_1]

    NEWYou can now listen to Fox News articles!

    For years, we’ve been told that encryption is the gold standard for digital privacy. If data is encrypted, it is supposed to be locked away from hackers, companies and governments alike. That assumption just took a hit. 

    In a federal investigation tied to alleged COVID-19 unemployment fraud in Guam, a U.S. territory where federal law applies, Microsoft confirmed it provided law enforcement with BitLocker recovery keys. Those keys allowed investigators to unlock encrypted data on multiple laptops.

    This is one of the clearest public examples to date of Microsoft providing BitLocker recovery keys to authorities as part of a criminal investigation. While the warrant itself may have been lawful, the implications stretch far beyond one investigation. For everyday Americans, this is a clear signal that “encrypted” does not always mean “inaccessible.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    In the Guam investigation, Microsoft provided BitLocker recovery keys that allowed law enforcement to unlock encrypted laptops. (David Paul Morris/Bloomberg via Getty Images)

    What happened in the Guam BitLocker case?

    Federal investigators believed three Windows laptops held evidence tied to an alleged scheme involving pandemic unemployment funds. The devices were protected with BitLocker, Microsoft’s built-in disk encryption tool enabled by default on many modern Windows PCs. BitLocker works by scrambling all data on a hard drive so it cannot be read without a recovery key. 

    Users can store that key themselves, but Microsoft also encourages backing it up to a Microsoft account for convenience. In this case, that convenience mattered. When served with a valid search warrant, Microsoft provided the recovery keys to investigators. That allowed full access to the data stored on the devices. Microsoft says it receives roughly 20 such requests per year and can only comply when users have chosen to store their keys in the cloud.

    We reached out to Microsoft for comment, but did not hear back before our deadline.

    How Microsoft was able to unlock encrypted data

    According to John Ackerly, CEO and co-founder of Virtru and a former White House technology advisor, the problem is not encryption itself. The real issue is who controls the keys. He begins by explaining how convenience can quietly shift control. “Microsoft commonly recommends that users back up BitLocker recovery keys to a Microsoft account for convenience. That choice means Microsoft may retain the technical ability to unlock a customer’s device. When a third party holds both encrypted data and the keys required to decrypt it, control is no longer exclusive.”

    Once a provider has the ability to unlock data, that power rarely stays theoretical. “When systems are built so that providers can be compelled to unlock customer data, lawful access becomes a standing feature. It is important to remember that encryption does not distinguish between authorized and unauthorized access. Any system designed to be unlocked on demand will eventually be unlocked by unintended parties.”

    Ackerly then points out that this outcome is not inevitable. Other companies have made different architectural choices. “Other large technology companies have demonstrated that a different approach is possible. Apple has designed systems that limit its own ability to access customer data, even when doing so would ease compliance with government demands. Google offers client-side encryption models that allow users to retain exclusive control of encryption keys. These companies still comply with the law, but when they do not hold the keys, they cannot unlock the data. That is not obstruction. It is a design choice.”

    Finally, he argues that Microsoft still has room to change course. “Microsoft has an opportunity to address this by making customer-controlled keys the default and by designing recovery mechanisms that do not place decryption authority in Microsoft’s hands. True personal data sovereignty requires systems that make compelled access technically impossible, not merely contractually discouraged.”

    In short, Microsoft could comply because it had the technical ability to do so. That single design decision is what turned encrypted data into accessible data.

    “With BitLocker, customers can choose to store their encryption keys locally, in a location inaccessible to Microsoft, or in Microsoft’s consumer cloud services,” a Microsoft spokesperson told CyberGuy in a statement. “We recognize that some customers prefer Microsoft’s cloud storage, so we can help recover their encryption key if needed. While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide whether to use key escrow and how to manage their keys.”

    WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    When companies hold encryption keys, lawful requests can unlock far more data than most people expect. (Kurt “CyberGuy” Knutsson)

    Why this matters for data privacy

    This case has reignited a long-running debate over lawful access versus systemic risk. Ackerly warns that centralized control has a long and troubling history. “We have seen the consequences of this design pattern for more than two decades. From the Equifax breach, which exposed the financial identities of nearly half the U.S. population, to repeated leaks of sensitive communications and health data during the COVID era, the pattern is consistent: centralized systems that retain control over customer data become systemic points of failure. These incidents are not anomalies. They reflect a persistent architectural flaw.”

    When companies hold the keys, they become targets. That includes hackers, foreign governments and legal demands from agencies like the FBI. Once a capability exists, it rarely goes unused.

    How other tech giants handle encryption differently

    Apple has designed systems, such as Advanced Data Protection, where it cannot access certain encrypted user data even when served with government requests. Google offers client-side encryption for some services, primarily in enterprise environments, where encryption keys remain under the customer’s control. These companies still comply with the law, but in those cases, they do not possess the technical means to unlock the data. That distinction matters. As encryption experts often note, you cannot hand over what you do not have.

    What we can do to protect our privacy

    The good news is that personal privacy is not gone. The bad news is that it now requires intention. Small choices matter more than most people realize. Ackerly says the starting point is understanding control. “The main takeaway for everyday users is simple: if you don’t control your encryption keys, you don’t fully control your data.”

    That control begins with knowing where your keys are stored. “The first step is understanding where your encryption keys live. If they’re stored in the cloud with your provider, your data can be accessed without your knowledge.”

    Once keys live outside your control, access becomes possible without your consent. That is why the way data is encrypted matters just as much as whether it is encrypted. “Consumers should look for tools and services that encrypt data before it reaches the cloud — that way, it is impossible for your provider to hand over your data. They don’t have the keys.” Defaults are another hidden risk. Many people never change them. “Users should also look to avoid default settings designed for convenience. Default settings matter, and when convenience is the default, most individuals will unknowingly trade control for ease of use.”

    When encryption is designed so that even the provider cannot access the data, the balance shifts back to the individual. “When data is encrypted in a way that even the provider can’t access, it stays private — even if a third party comes asking. By holding your own encryption keys, you’re eliminating the possibility of the provider sharing your data.” Ackerly says the lesson is simple but often ignored. “The lesson is straightforward: you cannot outsource responsibility for your sensitive data and assume that third parties will always act in your best interest. Encryption only fulfills its purpose when the data owner is the sole party capable of unlocking it.” Privacy still exists. It just no longer comes by default.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    Person holds a phone

    Reviewing default security and backup settings can help you keep control of your private data. (Kurt “CyberGuy” Knutsson)

    Practical steps you can take today

    You do not need to be a security expert to protect your data. A few practical checks can go a long way.

    1) Start by checking where your encryption keys live

    Many people do not realize that their devices quietly back up recovery keys to the cloud. On a Windows PC, sign in to your Microsoft account and look under device security or recovery key settings. Seeing a BitLocker recovery key listed online means it is stored with Microsoft. 

    For other encrypted services, such as Apple iCloud backups or Google Drive, open your account security dashboard and review encryption or recovery options. Focus on settings tied to recovery keys, backup encryption, or account-based access. When those keys are linked to an online account, your provider may be able to access them. The goal is simple. Know whether your keys live with you or with a company.

    2) Avoid cloud-based key backups unless you truly need them

    Cloud backups are designed for convenience, not privacy. If possible, store recovery keys offline. That can mean saving them to a USB drive, printing them and storing them in a safe place, or using encrypted hardware you control. The exact method matters less than who has access. If a company does not have your keys, it cannot be forced to turn them over.

    3) Choose services that encrypt data before it reaches the cloud

    Not all encryption works the same way, even if companies use similar language. Look for services that advertise end-to-end or client-side encryption, such as Signal for messages, or Apple’s Advanced Data Protection option for iCloud backups. These services encrypt your data on your device before it is uploaded, which means the provider cannot read it or unlock it later. Here is a simple rule of thumb. If a service can reset your password and restore all your data without your involvement, it likely holds the encryption keys. That also means it could be forced to hand over access. When encryption happens on your device first, providers cannot unlock your data because they never had the keys to begin with. That design choice blocks third-party access by default.

    4) Review default security settings on every new device

    Default settings usually favor convenience. That can mean easier recovery, faster syncing and weaker privacy. Take five minutes after setup and lock down the basics.

    iPhone: tighten iCloud and account recovery

    Turn on Advanced Data Protection for iCloud (strongest iCloud protection)

    • Open Settings
    • Tap your name
    • Tap iCloud
    • Scroll down and tap Advanced Data Protection
    • Tap Turn On Advanced Data Protection
    • Follow the prompts to set up Account Recovery options, like a Recovery Contact or Recovery Key

    Review iCloud Backup

    • Open Settings
    • Tap your name
    • Tap iCloud
    • Tap iCloud Backup
    • Decide if you want it on or off, based on your privacy comfort level

    Strengthen your Apple ID security

    • Open Settings
    • Tap your name
    • Tap Sign-In & Security
    • Make sure Two-Factor Authentication (2FA) is turned on and review trusted phone numbers and devices
    • Review trusted phone numbers and devices

    Android: lock your Google account and backups

    Review and control device backup

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Google
    • Tap Backup (or All services then Backup)
    • Tap Manage backup
    • Choose what backs up and confirm which Google account stores it

    NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS

    Strengthen your screen lock, since it protects the device itself

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Security or Security & privacy
    • Set a strong PIN or password
    • Turn on biometrics if you want, but keep the PIN strong either way

    Secure your Google account

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Google
    • Tap Manage your Google Account
    • Go to Security
    • Turn on 2-Step Verification and review recent security activity

    Mac: enable FileVault and review iCloud settings

    Turn on FileVault disk encryption

    • Click the Apple menu
    • Select System Settings
    • Click Privacy & Security
    • Scroll down and click FileVault
    • Click Turn On
    • Save your recovery method securely

    Review iCloud syncing

    • Open System Settings
    • Click your name
    • Click iCloud
    • Review what apps and data types sync
    • Turn off anything you do not want stored in the cloud

    Windows PC: check BitLocker and where the recovery key is stored

    Confirm BitLocker status and settings

    • Open Settings
    • Go to Privacy & security
    • Tap Device encryption or BitLocker (wording varies by device)

    Check whether your BitLocker recovery key is stored in your Microsoft account

    • Go to your Microsoft account page
    • Open Devices
    • Select your PC
    • Look for Manage recovery keys or a BitLocker recovery key entry
    • If you see a key listed online, it means the key is stored with Microsoft. That is why Microsoft was able to provide keys in the Guam case.

    If your account can recover everything with a few clicks, a third party might be able to recover it too. Convenience can be helpful, but it can also widen access.

    5) Treat convenience features as privacy tradeoffs

    Every shortcut comes with a cost. Before enabling a feature that promises easy recovery or quick access, pause and ask one question. If I lose control of this account, who else gains access? If the answer includes a company or third party, decide whether the convenience is worth it. 

    These steps are not extreme or technical. They are everyday habits. In a world where lawful access can quietly become routine access, small choices now can protect your privacy later.

    Strengthen protection beyond encryption

    Encryption controls who can access your data, but it does not stop every real-world threat. Once data is exposed, different protections matter.

    Strong antivirus software adds device-level protection

    Strong antivirus software helps block malware, spyware and credential-stealing attacks that can bypass privacy settings altogether. Even encrypted devices are vulnerable if malicious software gains control before encryption comes into play.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com

    An identity theft protection service helps when exposure turns into fraud

    If personal data is accessed, sold, or misused, identity protection services can monitor for suspicious activity, alert you early and help lock down accounts before damage spreads. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    Kurt’s key takeaways

    Microsoft’s decision to comply with the BitLocker warrant may have been legal. That doesn’t make it harmless. This case exposes a hard truth about modern encryption. Privacy depends less on the math and more on how systems are built. When companies hold the keys, the risk falls on the rest of us.

    Do you trust tech companies to protect your encrypted data, or do you think that responsibility should fall entirely on you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Millions of AI chat messages exposed in app data leak

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A popular mobile app called Chat & Ask AI has more than 50 million users across the Google Play Store and Apple App Store. Now, an independent security researcher says the app exposed hundreds of millions of private chatbot conversations online. 

    The exposed messages reportedly included deeply personal and disturbing requests. Users asked questions like how to painlessly kill themselves, how to write suicide notes, how to make meth and how to hack other apps. 

    These were not harmless prompts. They were full chat histories tied to real users.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW TECH IS BEING USED IN NANCY GUTHRIE DISAPPEARANCE INVESTIGATION

    Security researchers say Chat & Ask AI exposed hundreds of millions of private chatbot messages, including complete conversation histories tied to real users. (Neil Godwin/Getty Images)

    What exactly was exposed

    The issue was discovered by a security researcher who goes by Harry. He found that Chat & Ask AI had a misconfigured backend using Google Firebase, a popular mobile app development platform. Because of that misconfiguration, it was easy for outsiders to gain authenticated access to the app’s database. Harry says he was able to access roughly 300 million messages tied to more than 25 million users. He analyzed a smaller sample of about 60,000 users and more than one million messages to confirm the scope.

    The exposed data reportedly included:

    • Full chat histories with the AI
    • Timestamps for each conversation
    • The custom name users gave the chatbot
    • How users configured the AI model
    • Which AI model was selected

    That matters because many users treat AI chats like private journals, therapists or brainstorming partners.

    How this AI app stores so much sensitive user data

    Chat & Ask AI is not a standalone artificial intelligence model. It acts as a wrapper that lets users talk to large language models built by bigger companies. Users could choose between models from OpenAI, Anthropic and Google, including ChatGPT, Claude and Gemini. While those companies operate the underlying models, Chat & Ask AI handles the storage. That is where things went wrong. Cybersecurity experts say this type of Firebase misconfiguration is a well-known weakness. It is also easy to find if someone knows what to look for.

    We reached out to Codeway, which publishes the Chat & Ask AI app, for comment, but did not receive a response before publication.

    149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

    Woman typing on phone.

    The exposed database reportedly included timestamps, model settings and the names users gave their chatbots, revealing far more than isolated prompts. (Elisa Schu/Getty Images)

    Why this matters to everyday users

    Many people assume their chats with AI tools are private. They type things they would never post publicly or even say out loud. When an app stores that data insecurely, it becomes a gold mine for attackers. Even without names attached, chat histories can reveal mental health struggles, illegal behavior, work secrets and personal relationships. Once exposed, that data can be copied, scraped and shared forever.

    YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

    Man outside with Airpods looking at his phone.

    Because the app handled data storage itself, a simple Firebase misconfiguration made sensitive AI chats accessible to outsiders, according to the researcher. (Edward Berthelot/Getty)

    Ways to stay safe when using AI apps

    You do not need to stop using AI tools to protect yourself. A few informed choices can lower your risk while still letting you use these apps when they are helpful.

    1) Be mindful of sensitive topics

    AI chats can feel private, especially when you are stressed, curious or looking for answers. However, not all apps handle conversations securely. Before sharing deeply personal struggles, medical concerns, financial details or questions that could create legal risk if exposed, take time to understand how the app stores protects your data. If those protections are unclear, consider safer alternatives such as trusted professionals or services with stronger privacy controls.

    2) Research the app before installing

    Look beyond download counts and star ratings. Check who operates the app, how long it has been available, and whether its privacy policy clearly explains how user data is stored and protected.

    3) Assume conversations may be stored

    Even when an app claims privacy, many AI tools log conversations for troubleshooting or model improvement. Treat chats as potentially permanent records rather than temporary messages.

    4) Limit account linking and sign-ins

    Some AI apps allow you to sign in with Google, Apple, or an email account. While convenient, this can directly connect chat histories to your real identity. When possible, avoid linking AI tools to primary accounts used for work, banking or personal communication.

    5) Review app permissions and data controls

    AI apps may request access beyond what is required to function. Review permissions carefully and disable anything that is not essential. If the app offers options to delete chat history, limit data retention or turn off syncing, enable those settings.

    6) Use a data removal service

    Your digital footprint extends beyond AI apps. Anyone can find personal details about you with a simple Google search, including your phone number, home address, date of birth and Social Security number. Marketers buy this information to target ads. In more serious cases, scammers and identity thieves breach data brokers, leaving personal data exposed or circulating on the dark web. Using a data removal service helps reduce what can be linked back to you if a breach occurs.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Kurt’s key takeaways

    AI chat apps are moving fast, but security is still lagging behind. This incident shows how a single configuration mistake can expose millions of deeply personal conversations. Until stronger protections become standard, you need to treat AI chats with caution and limit what you share. The convenience is real, but so is the risk.

    Do you assume your AI chats are private, or has this story changed how much you are willing to share with these apps? Let us know your thoughts by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Waymo under federal investigation after child struck

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Federal safety regulators are once again taking a hard look at self-driving cars after a serious incident involving Waymo, the autonomous vehicle company owned by Alphabet.

    This time, the investigation centers on a Waymo vehicle that struck a child near an elementary school in Santa Monica, California, during morning drop-off hours. The crash happened Jan. 23 and raised immediate questions about how autonomous vehicles behave around children, school zones and unpredictable pedestrian movement.

    On Jan. 29, the National Highway Traffic Safety Administration confirmed it had opened a new preliminary investigation into Waymo’s automated driving system.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    TESLA’S SELF-DRIVING CARS UNDER FIRE AGAIN

    Waymo operates Level 4 self-driving vehicles in select U.S. cities, where the car controls all driving tasks without a human behind the wheel. (AP Photo/Terry Chea, File)

    What happened near the Santa Monica school?

    According to documents posted by NHTSA, the crash occurred within two blocks of an elementary school during normal drop-off hours. The area was busy. There were multiple children present, a crossing guard on duty and several vehicles double-parked along the street.

    Investigators say the child ran into the roadway from behind a double-parked SUV while heading toward the school. The Waymo vehicle struck the child, who suffered minor injuries. No safety operator was inside the vehicle at the time.

    NHTSA’s Office of Defects Investigation is now examining whether the autonomous system exercised appropriate caution given its proximity to a school zone and the presence of young pedestrians.

    AI TRUCK SYSTEM MATCHES TOP HUMAN DRIVERS IN MASSIVE SAFETY SHOWDOWN WITH PERFECT SCORES

    A Waymo taxi sensor

    Federal investigators are now examining whether Waymo’s automated system exercised enough caution near a school zone during morning drop-off hours. (Waymo)

    Why federal investigators stepped in

    The NHTSA says the investigation will focus on how Waymo’s automated driving system is designed to behave in and around school zones, especially during peak pickup and drop-off times.

    That includes whether the vehicle followed posted speed limits, how it responded to visual cues like crossing guards and parked vehicles and whether its post-crash response met federal safety expectations. The agency is also reviewing how Waymo handled the incident after it occurred.

    Waymo said it voluntarily contacted regulators the same day as the crash and plans to cooperate fully with the investigation. In a statement, the company said it remains committed to improving road safety for riders and everyone sharing the road.

    Waymo responds to the federal investigation

    We reached out to Waymo for comment, and the company provided the following statement:

    “At Waymo, we are committed to improving road safety, both for our riders and all those with whom we share the road. Part of that commitment is being transparent when incidents occur, which is why we are sharing details regarding an event in Santa Monica, California, on Friday, January 23, where one of our vehicles made contact with a young pedestrian. Following the event, we voluntarily contacted the National Highway Traffic Safety Administration (NHTSA) that same day. NHTSA has indicated to us that they intend to open an investigation into this incident, and we will cooperate fully with them throughout the process. 

    “The event occurred when the pedestrian suddenly entered the roadway from behind a tall SUV, moving directly into our vehicle’s path. Our technology immediately detected the individual as soon as they began to emerge from behind the stopped vehicle. The Waymo Driver braked hard, reducing speed from approximately 17 mph to under 6 mph before contact was made. 

    “To put this in perspective, our peer-reviewed model shows that a fully attentive human driver in this same situation would have made contact with the pedestrian at approximately 14 mph. This significant reduction in impact speed and severity is a demonstration of the material safety benefit of the Waymo Driver.

    “Following contact, the pedestrian stood up immediately, walked to the sidewalk and we called 911. The vehicle remained stopped, moved to the side of the road and stayed there until law enforcement cleared the vehicle to leave the scene. 

    This event demonstrates the critical value of our safety systems. We remain committed to improving road safety where we operate as we continue on our mission to be the world’s most trusted driver.”

    Understanding Waymo’s autonomy level

    Waymo vehicles fall under Level 4 autonomy on NHTSA’s six-level scale.

    At Level 4, the vehicle handles all driving tasks within specific service areas. A human driver is not required to intervene, and no safety operator needs to be present inside the car. However, these systems do not operate everywhere and are currently limited to ride-hailing services in select cities.

    The NHTSA has been clear that Level 4 vehicles are not available for consumer purchase, even though passengers may ride inside them.

    This is not Waymo’s first federal probe

    This latest investigation follows a previous NHTSA evaluation that opened in May 2024. That earlier probe examined reports of Waymo vehicles colliding with stationary objects like gates, chains and parked cars. Regulators also reviewed incidents in which the vehicles appeared to disobey traffic control devices.

    That investigation was closed in July 2025 after regulators reviewed the data and Waymo’s responses. Safety advocates say the new incident highlights unresolved concerns.

    UBER UNVEILS A NEW ROBOTAXI WITH NO DRIVER BEHIND THE WHEEL

    View of a Waymo Jaguar driver seat

    No safety operator was inside the vehicle at the time of the crash, raising fresh questions about how autonomous cars handle unpredictable situations involving children. (Waymo)

    What this means for you

    If you live in a city where self-driving cars operate, this investigation matters more than it might seem. School zones are already high-risk areas, even for attentive human drivers. Autonomous vehicles must be able to detect unpredictable behavior, anticipate sudden movement and respond instantly when children are present.

    This case will likely influence how regulators set expectations for autonomous driving systems near schools, playgrounds and other areas with vulnerable pedestrians. It could also shape future rules around local oversight, data reporting and operational limits for self-driving fleets.

    For parents, commuters and riders, the outcome may affect where and when autonomous vehicles are allowed to operate.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP    

    Kurt’s key takeaways

    Self-driving technology promises safer roads, fewer crashes and less human error. But moments like this remind us that the hardest driving scenarios often involve human unpredictability, especially when children are involved. Federal investigators now face a crucial question: Did the system act as cautiously as it should have in one of the most sensitive driving environments possible? How they answer that question could help define the next phase of autonomous vehicle regulation in the United States.

    Do you feel comfortable sharing the road with self-driving cars near schools, or is that a line technology should not cross yet? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • How tech is being used in Nancy Guthrie disappearance investigation

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Nancy Guthrie, the 84-year-old mother of “Today” show co-anchor Savannah Guthrie, was reported missing from her home in the Catalina Foothills area near Tucson after she failed to appear for church and could not be reached by family. When deputies arrived, several things stood out. Her phone, wallet and car keys were inside the home. The daily medication she relies on was left behind. Given her age and mobility challenges, investigators said she would not have left voluntarily.

    The Pima County Sheriff’s Department has since stated publicly that the case is being treated as a suspected abduction, and the home was processed as a crime scene. As the search continues, investigators are piecing together not only physical evidence and witness tips, but also the digital trail left behind by everyday technology.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

    Investigators are examining digital clues from phones, cameras and networks to help narrow the timeline in the Nancy Guthrie missing person investigation. (Courtesy of NBC)

    Why technology matters in missing person investigations

    In cases like this, technology rarely delivers a single smoking gun. Instead, it helps investigators answer quieter but critical questions that shape a timeline. Investigators ask when everything still looked normal. They look for the moment when devices stopped communicating. They try to pinpoint when something changed. Phones, medical devices, cellular networks and cameras generate timestamps. Those records help narrow the window when events may have taken a dangerous turn.

    YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

    Nancy Guthrie and Savannah Guthrie posing together for a photo.

    Smart cameras and neighborhood footage can provide crucial time markers, even when images are unclear or partially obscured. (Courtesy of NBC)

    How investigators connect data across agencies

    Behind the scenes, investigators rely on advanced analytical systems to connect information from multiple sources and jurisdictions. In Tucson and across Pima County, law enforcement agencies use artificial intelligence-assisted crime analysis platforms such as COPLINK, which allows data sharing with at least 19 other police departments across Arizona. These systems help investigators cross-reference tips, reports, vehicle data and digital evidence more quickly than manual searches.

    The Pima County Sheriff’s Department, Tucson Police Department and the FBI also work through real-time analytical crime centers, including Tucson’s Real-Time Analytical Crime Center (TRACC). These centers allow analysts to review large volumes of data together, from phone records and license plate reads to surveillance timestamps.

    This type of analysis does not replace traditional police work. It helps narrow timelines, rule out possibilities and prioritize leads as new information comes in.

    Bluetooth data and Apple’s potential role

    iOS may retain low-level Bluetooth artifacts outside the pacemaker app. Access to this data typically requires:

    • Legal process
    • Apple cooperation
    • Device forensic extraction

    Bluetooth artifacts cannot determine distance. They cannot show that two devices were a few feet apart. What they can sometimes provide is timestamp correlation, confirming that a Bluetooth interaction occurred. That correlation can help align pacemaker activity with phone movement or inactivity. It is not publicly known whether Apple has been formally contacted in this case. An inquiry has been made. Apple typically does not comment on specific investigations but may confirm what categories of data could be available.

    What the iPhone itself may reveal

    Even without medical data, the iPhone left behind may provide valuable corroboration. With proper legal access, investigators may examine:

    • Motion sensor activity
    • Cellular network connections
    • Wi-Fi associations
    • Camera metadata
    • Power and usage patterns

    This data can help establish whether the phone moved unexpectedly or stopped being used at a specific time. Again, the value lies in confirming timelines, not speculating motives.

    Cell tower data and coverage around the home

    Public mapping databases show dense cellular coverage in the area surrounding the Guthrie residence. There are 41 cell towers within a three-mile radius. The closest carrier towers are approximately:

    • AT&T at 1.0 mile
    • Verizon at 1.4 miles
    • T-Mobile at 3.0 miles

    Carrier records can be analyzed to identify device connections, sector handoffs and anomalous activity during the critical window between Saturday evening and Sunday morning. This analysis is complex, but it can help confirm whether a device moved or disconnected unexpectedly.

    Cameras, license plate readers and neighborhood footage

    Investigators are also reviewing surveillance systems. Tucson primarily uses Verkada cameras integrated with the Fusus platform. Flock Safety cameras are used in other parts of the region, including South Tucson.

    More than 200 automatic license plate readers are deployed in the broader area, allowing investigators to review historical vehicle movements during the critical time window. These systems can capture license plates, vehicle make and color, vehicle type and alerts tied to suspect vehicles.

    Private sources may matter just as much. Neighbor doorbell cameras and home systems can provide important timeline markers, even if the footage is grainy. Some modern vehicles also record motion near parked cars if settings are enabled.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Nancy Guthrie and Savannah Guthrie posing together for a photo.

    Everyday devices quietly record timestamps that may help investigators understand when something has changed and where to look next. (Courtesy of NBC)

    Ways to keep your loved ones safe

    Technology can help protect older or vulnerable relatives, but it works best when combined with everyday habits that reduce risk.

    1) Use connected cameras

    Install smart doorbell cameras and outdoor security cameras that notify family members when someone unfamiliar appears. Alerts can matter just as much as recorded footage. Many newer systems allow AI-based person detection, which can alert you when an unknown person is seen at certain times of day or night. These alerts can be customized, so family members know when activity breaks a normal pattern, not just when motion is detected.

    2) Wear an emergency pendant or medical alert device

    Emergency pendants and wearable SOS devices let someone call for help with a single press. Many newer models work outside the home and can alert caregivers if a fall is detected. Some devices also include GPS, which helps when someone becomes disoriented or leaves home unexpectedly. This remains one of the most overlooked safety tools for older adults.

    3) Enable device sharing and safety features

    If your loved one agrees, enable location sharing, emergency contacts and built-in safety features on their phone or wearable.

    On smartphones, this can include:

    • Emergency SOS
    • Medical ID access from the lock screen
    • Trusted location sharing through apps like Find My

    These features work quietly in the background, allowing help to reach the right people quickly without requiring daily interaction.

    4) Create simple check-in routines

    Use apps, text reminders or calendar alerts that prompt regular check-ins. If a message goes unanswered, it creates a reason to follow up quickly instead of assuming everything is fine. Consistency matters more than complexity.

    5) Use devices with passive safety monitoring

    Some phones, wearables and home systems can detect changes in normal daily activity without requiring a button press. For example, smartphones and smartwatches can notice when movement patterns suddenly stop or change. If a device that usually moves every morning stays still for hours, that shift can trigger alerts or prompt a check-in from a caregiver. Smart home systems can also flag unusual inactivity. Motion sensors that normally register movement throughout the day may show a long gap, which can signal that something is wrong. Passive monitoring works in the background. It reduces the need for constant interaction while still creating early warning signs when routines break.

    6) Know emergency contacts and escalation steps

    Enable smart alerts from home security systems so that family members know when doors open late at night, remain open longer than normal or when systems are armed or disarmed. Fire and smoke listener alerts and bedside panic buttons add another layer of protection, especially overnight. Car apps can also share safety signals, such as when a vehicle is unlocked, a door or window is left open or when location sharing is enabled with trusted family members.

    “No single device can protect someone on its own,” a law enforcement expert told CyberGuy. “What helps most is layering. A camera paired with a wearable. A phone paired with check-ins. Technology paired with human attention. Each layer adds context and reduces blind spots. Together, they create earlier warnings and faster responses when something goes wrong.”

    Kurt’s key takeaways

    The disappearance of Nancy Guthrie is heartbreaking. It also highlights how deeply modern technology is woven into everyday life. Digital data from phones, cellular networks, and cameras can offer valuable insights, but only when used responsibly and in compliance with privacy laws. As this investigation continues, technology may help law enforcement narrow timelines and test theories, even if it cannot answer every question. In cases like this, every detail matters.

    As digital footprints grow more detailed, should tech companies give law enforcement broader access when someone goes missing? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • 149 million passwords exposed in massive credential leak

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It has been a rough start to the year for password security. A massive database containing 149 million stolen logins and passwords was found publicly exposed online. 

    The data included credentials tied to an estimated 48 million Gmail accounts, along with millions more from popular services. Cybersecurity researcher Jeremiah Fowler, who discovered the database, confirmed it was not password-protected or encrypted. Anyone who found it could have accessed the data. 

    Here is what we know so far and what you should do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

    A publicly exposed database left millions of usernames and passwords accessible to anyone who found it online. (Wei Leng Tay/Bloomberg via Getty Images)

    What was found in the exposed database

    The database contained 149,404,754 unique usernames and passwords. It totaled roughly 96 GB of raw credential data. Fowler said the exposed files included email addresses, usernames, passwords and direct login URLs for accounts across many platforms. Some records also showed signs of info-stealing malware, which silently captures credentials from infected devices. 

    Importantly, this was not a new breach of Google, Meta or other companies. Instead, the database appears to be a compilation of credentials stolen over time from past breaches and malware infections. That distinction matters, but the risk to users remains real.

    Which accounts appeared most often

    Based on estimates shared by Fowler, the following services had the highest number of credentials in the exposed database.

    • 48 million – Gmail
    • 17 million – Facebook
    • 6.5 million – Instagram
    • 4 million – Yahoo Mail
    • 3.4 million – Netflix
    • 1.5 million – Outlook
    • 1.4 million – .edu email accounts
    • 900,000 – iCloud Mail
    • 780,000 – TikTok
    • 420,000 – Binance
    • 100,000 – OnlyFans

    Email accounts dominated the dataset, which matters because access to email often unlocks other accounts. A compromised inbox can be used to reset passwords, access private documents, read years of messages and impersonate the account holder. That is why Gmail appearing so frequently in this database raises concerns beyond any single service.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Man typing

    Email accounts appeared most often in the leaked data, which is especially concerning because inbox access can unlock many other accounts. (Felix Zahn/Photothek via Getty Images)

    Why the exposed database creates serious security risks

    This exposed database was not abandoned or forgotten. The number of records increased while Fowler was investigating it, which suggests the malware feeding it was still active. There was also no ownership information attached to the database. After multiple attempts, Fowler reported it directly to the hosting provider. It took nearly a month before the database was finally taken offline. During that time, anyone with a browser could have searched it. That reality raises the stakes for everyday users.

    This was not a traditional hack or company breach

    Hackers did not break into Google or Meta systems. Instead, malware infected individual devices and harvested login details as people typed them or stored them in browsers. This type of malware is often spread through fake software updates, malicious email attachments, compromised browser extensions or deceptive ads. Once a device is infected, simply changing passwords does not solve the problem unless the malware is removed.

    TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

    Facebook login

    Researchers believe infostealing malware collected the credentials, silently harvesting logins from infected devices over time. (Jaap Arriens/NurPhoto via Getty Images)

    How to protect your accounts after a massive password leak

    This is the most important part. Take these steps even if everything seems fine right now. Credential leaks like this often surface weeks or months later.

    1) Stop reusing passwords immediately

    Password reuse is one of the biggest risks exposed by this database. If attackers get one working login, they often test it across dozens of sites automatically. Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    2) Switch to passkeys where available

    Passkeys replace passwords with device-based authentication tied to biometrics or hardware. That means there is nothing for malware to steal. Gmail and many major platforms already support passkeys, and adoption is growing fast. Turning them on now removes a major attack surface.

    3) Enable two-factor authentication on every account

    Two-factor authentication (2FA) adds a second checkpoint, even if a password is exposed. Use authenticator apps or hardware keys instead of SMS when possible. This step alone can stop most account takeover attempts tied to stolen credentials.

    4) Scan devices for malware with strong antivirus software

    Changing passwords will not help if malware is still on your device. Install strong antivirus software and run a full system scan. Remove anything flagged as suspicious before updating passwords or security settings. Keep your operating system and browsers fully updated as well.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Review account activity and login history

    Most major services show recent login locations, devices and sessions. Look for unfamiliar activity, especially logins from new countries or devices. Sign out of all sessions if the option is available and reset credentials right away if anything looks off.

    6) Use a data removal service to reduce exposure

    Stolen credentials often get combined with data scraped from data broker sites. These profiles can include addresses, phone numbers, relatives and work history. Using a data removal service helps reduce the amount of personal information criminals can pair with leaked logins. Less exposed data makes phishing and impersonation attacks harder to pull off.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Close accounts you no longer use

    Old accounts are easy targets because people forget to secure them. Close unused services and delete accounts tied to outdated app subscriptions or trials. Fewer accounts mean fewer chances for attackers to get in.

    Kurt’s key takeaways

    This exposed database is another reminder that credential theft has become an industrial-scale operation. Criminals move fast and often prioritize speed over security. The good news is that simple steps still work. Unique passwords, strong authentication, malware protection and basic cyber hygiene go a long way. Do not panic, but do not ignore this either.

    If your email account was compromised today, how many other accounts would fall with it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Your phone shares data at night: Here’s how to stop it

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If your smartphone stays on your bedside table overnight, it stays busy long after you fall asleep. 

    Even while it appears idle, your phone continues to send and receive data in the background. Some of that activity is expected. Your device checks for security patches, syncs system settings and keeps essential services running. Other data transfers are far less obvious and far less necessary.

    Experts warn that smartphones routinely transmit tracking and advertising signals without you fully realizing it. In many cases, that data includes information that should only be shared with clear and informed consent.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Even while you sleep, a nearby smartphone can continue sending and receiving data in the background. (Getty Images/monkeybusinessimages)

    What data your phone sends while you sleep

    Your phone is not just charging overnight. It operates in a continuous data loop that generally falls into two categories.

    Legitimate system data

    This includes updates, crash reports and basic diagnostics. Operating systems rely on this information to fix bugs, improve stability and protect against security threats. In most cases, this data collection is disclosed and configurable.

    Tracking and advertising data

    This is where concerns grow. Smartphones also transmit location signals, device identifiers, advertising IDs, usage patterns and app behavior data. Companies combine this information to build detailed user profiles and deliver targeted ads that promise higher engagement. The problem is that the line between necessary diagnostics and commercial tracking is often blurry. Many of us never realize how much data flows out of our phones overnight.

    TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

    Phone and alarm clock

    Phones often stay active overnight, syncing apps, checking networks and refreshing data unless you limit background activity. (Kurt “CyberGuy” Knutsson)

    What we know about phone tracking today

    Independent academic investigations found that some Android devices transmitted data linked to tracking behaviors involving major companies like Meta and Yandex. The research, conducted by teams from IMDEA Networks Institute and European universities, showed that certain apps and services continued communicating with external servers even after users attempted to limit tracking. The researchers observed data flows that could link web activity with app identifiers, raising concerns about how effectively privacy controls were enforced at the system level.

    There is also long-standing concern around smartphones appearing to “listen” to conversations. While no public evidence shows that phones actively record private speech for advertising, many users report ads that closely mirror recent conversations. At a minimum, aggressive data collection combined with location, app usage and search history can make these moments feel unsettling.

    Despite years of scrutiny, most smartphones still operate this way today. The good news is that you can reduce how much data leaves your device.

    How to protect yourself from overnight data sharing

    You do not need to give up your smartphone to regain control. Small settings changes can make a real difference.

    1) Review app permissions

    Start with your installed apps. Focus on those with access to your location, microphone, camera and tracking data. Only allow sensitive permissions while the app is in use. Be especially cautious with apps that run continuously in the background.

    How to review app permissions on iPhone 

    • Open Settings
    • Tap Privacy & Security
    • Tap Location ServicesMicrophoneCamera or Tracking
    • Select an app from the list
    • Choose While Using the App or Never when available

    For tracking controls:

    • Go to Settings
    • Click Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    This prevents apps from accessing your advertising identifier and sharing activity across apps and websites.

    AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

    Phone sharing data at night and how to stop it

    Turning off app tracking on your iPhone blocks apps from linking your activity across other apps and websites. (Kurt “CyberGuy” Knutsson)

    How to review app permissions on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Privacy & Security or Security and privacy 
    • Click More privacy settings 
    • Tap Permission Manager
    • Select LocationMicrophoneCamera or Sensors
    • Tap an app and choose Allow only while using the app or Don’t allow

    To review background access:

    • Go to Settings
    • Click Apps
    • Select an app
    • Tap Mobile data & Wi-Fi
    • Turn off Background data if the app does not need constant access

    This limits silent data transfers when the app is not actively open.

    2) Limit background activity

    Disabling background activity reduces how often apps sync data when you are not using them. This also limits automatic cloud activity. Keep in mind that this may affect real-time backups or notifications. Weigh the convenience against the privacy trade-off.

    How to limit background activity on iPhone

    Turn off Background App Refresh

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Tap Background App Refresh at the top
    • Select Off or Wi-Fi

    To disable it for specific apps:

    • Stay on the Background App Refresh screen
    • Toggle off apps that do not need to update in the background

    This prevents apps from quietly syncing data when they are not open.

    How to limit background activity on Android 

    Settings may vary depending on your Android phone’s manufacturer.

    Restrict background data

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Mobile data & Wi-Fi
    • Turn off Background data

    Restrict background battery usage

    • From the app’s settings screen, tap Battery
    • Select Restricted or Limit background usage

    This reduces background syncing and prevents apps from running silently when you are not actively using them.

    3) Turn off personalized advertising

    Personalized ads rely on device identifiers and activity data collected across apps. Turning this off limits how your behavior is used for ad targeting, even when your phone is idle.

    How to turn off personalized ads on iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    To limit Apple ads:

    • Go to Settings
    • Click Privacy & Security
    • Tap Apple Advertising
    • Turn off Personalized Ads

    This reduces ad targeting based on your activity within Apple services.

    TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

    Phone sharing data at night and how to stop it

    Disabling personalized ads reduces how your behavior is used to target ads, even when your phone is idle. (Kurt “CyberGuy” Knutsson)

    How to turn off personalized ads on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Privacy & Security or Security and privacy
    • Click More privacy settings
    • Tap Ads or Advertising
    • Tap Delete advertising ID or Opt out of Ads Personalization
    • Click Delete advertising ID

    You can also reset your advertising ID from this menu to break the link between past activity and future ads.

    This limits how apps and advertisers track behavior across apps and websites.

    4) Consider a VPN

    A reputable VPN can help obscure your IP address and reduce certain forms of network-based tracking. It does not stop all data collection, but it adds a layer of protection, especially on shared or public networks.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Remove your data from broker sites

    Even if you lock down your phone, much of your personal information already exists online. Data brokers collect and sell details like your name, address, phone number and browsing behavior.

    Using a reputable data removal service can help locate and remove your information from these sites. This reduces how easily advertisers and third parties can link your phone activity to your real identity.

    For ongoing protection, these services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Use airplane mode or power off at night

    If overnight data sharing concerns you, the simplest option is also the most effective. Turning your phone off or using airplane mode cuts off wireless communication while still allowing alarms to work.

    How to turn on airplane mode on iPhone

    • Open Control Center by swiping down from the top right corner
    • Tap the airplane icon so it turns orange
    • Confirm that cellular, Wi Fi and Bluetooth turned off

    How to turn on airplane mode on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Swipe down from the top of the screen to open Quick Settings
    • Tap the airplane mode icon
    • Check that mobile data, Wi Fi and Bluetooth are disabled

    If you still want Bluetooth for a watch or headphones, you can turn it back on manually after enabling airplane mode. This keeps most background data transfers blocked while you sleep.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Your smartphone works around the clock, even when you do not. Some background data sharing keeps your device secure and functional. Other data collection exists primarily to fuel tracking and advertising. The key is awareness and control. By tightening permissions, limiting background activity and disabling ad personalization, you reduce how much of your personal data leaves your phone while you sleep. Privacy is not about fear. It is about informed choices.

    Do you leave your phone fully on overnight, or will tonight be the night you finally switch it off? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link