ReportWire

Tag: TECH

  • Artificial Intelligence helps fuel new energy sources

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial Intelligence and data centers have been blamed for rising electricity costs across the U.S. In December 2025, American consumers paid 42% more to power their homes than ten years ago. 

    “When you have increased demand and inadequate supply, costs are going to go up. And that’s what we’re experiencing right now,” Exelon CEO Calvin Butler said. 

    TRUMP SAYS EVERY AI PLANT BEING BUILT IN US WILL BE SELF-SUSTAINING WITH THEIR OWN ELECTRICITY

    In 2024, U.S. data centers used more than 4% of total U.S. electricity consumption according to the International Energy Agency. That equates to as much electricity as the entire nation of Pakistan uses annually. U.S. Data Center consumption is expected to grow by 133% by the end of the decade, using as much power as the entire country of France. 

    “We’re headquartered in Chicago, and we’re the owner of ComEd, the fourth-largest utility in the nation. ComEd’s peak load is roughly 23 gigawatts. We have had data center load come onto the system, but by 2030, we’ll be at 19 Gigawatts,” Butler said. 

    Artifical intelligence data centers in the U.S. used more than 4% of the total U.S. electricity consumption, according to the International Energy Agency. (Exelon)

    Commonwealth Edison has experienced a dramatic increase in data center connection requests. The potential projects total more than 30 gigawatts and are expected to come online between now an 2045.

    “Our growth is unprecedented in the last several decades. So, with the data center advent and the technology coming, we’ve been forced to serve that load, which is our responsibility,” Butler said. “But what we also have to do is build new generation supply, which is not keeping up with the load that is coming on. And that’s the crunch that we’re in right now.”

    IN 2026, ENERGY WAR’S NEW FRONT IS AI, AND US MUST WIN THAT BATTLE, API CHIEF SAYS

    Commonwealth Edison is asking regulators for a $15.3 billion 4-year grid update to meet the growing demand. The U.S. overall has increased its grid capacity by more than 15% over the last decade, but many utility companies and energy producers say it is not enough. 

    “We’re at a stage right now where we’re constrained by electricity,” Commonwealth Fusion Systems CEO Bob Mumgaard said. “You want to make power plants that can make a lot of power in a small package that you can put anywhere, that you could run at any time and fusion fits that bill.”

    Zanskar energy plant

    Zanskar, is the first AI-native geothermal energy company, according to their website. This plant is located in New Mexico. (Zanskar)

    Commonwealth Fusion Systems is working to add a new form of nuclear energy to the grid — fusion. It has the same reliable benefits of standard nuclear energy already in use, but does not produce long-lived radioactive waste and carries fewer risks. 

    “In fusion there’s no chain reaction. The result is helium which is safe and inert and you don’t use it to make anything related to weapons,” Mumgaard said. 

    US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN’T KEEP UP WITHOUT NEW INVESTMENT

    Commonwealth Fusion Systems says Artificial Intelligence is helping bring fusion energy closer to being a new resource. 

    “Building and designing these complex machines and manipulating this complex data matter of plasma are all things that we’re still learning and we’re still figuring out how to do,” Mumgaard said. “And that’s an area where we’ve been able to accelerate using A.I.”

    Other under-utilized energy sources could soon get a big boost thanks to A.I. Geothermal energy is a small part of the electric grid, because of the high drilling costs and low confidence in where to place infrastructure. 

    Power lines and supporting towers

    Geothermal and nuclear fusion technology will allow energy to be produced in any weather at any time. (AP)

    “If you could drill the perfect geothermal well every single time, like you pick the right spot, you design the right well, you drill the 5,000, 8,000 feet, you hit 400F degree temperatures, that’s incredibly productive,” Zanskar Co-founder Joel Edwards said. “If you could do that every single time over and over and again, geothermal power is the cheapest source of power period.” 

    Zanskar is working to make the geothermal search more exact. The company uses A.I.-fueled mapping to find untapped resources previously thought non-existent. 

    “If we could just get more precise in where we go to find the things and then how we drill into the things, geothermal absolutely has the cost curve to come down,” Edwards said. “And that’s sort of what we’re running towards, with A.I. sort of giving us the boost, giving us an edge to do that.”

    CLICK HERE TO GET THE FOX NEWS APP

    Both geothermal and nuclear fusion can produce energy in any weather at any time, a component that could have helped ease the grid strain amid the recent winter storm. 

    “It’s critical, and we’ve been raising that alarm for years now, and I use the analogy that you’re driving a car and your check engine light is on, but you keep driving it, hoping that you’ll keep getting there and keep going, but when it breaks down, you’re going to have a significantly higher cost,” Butler said. “We have to pay attention to what’s going on, and this winter storm – Winter Storm Fern – is indicative of what’s coming.”

    [ad_2]

    Source link

  • Silicon Valley is driving users to ditch keyboards and spend hours talking to their tech

    [ad_1]

    Gavin McNamara has abandoned his keyboard and spends all day talking rather than typing.

    He speaks for hours with his computer and phone, sending emails, writing presentations, posting on LinkedIn and even coding through conversations using an AI dictation app from San Francisco startup, Wispr Flow.

    The AI punctuates, formats and adapts his rambling into coherent copy. McNamara averages 125 words per minute, which is twice the average typing speed.

    “At this point, anything that could be done by typing, I do by speaking,” said the 32-year-old, founder of software agency Why Not Us. “I just talk.”

    Across 77 apps, he has dictated nearly 300,000 words in the past five months — that’s equivalent to writing three novels.

    California’s tech titans and startups are at the forefront of a movement to use AI and the large language models they are based on to push people to interact with technology using their voices rather than their fingers.

    “AI and LLMs have changed the dynamic,” said CJ Pais, the San Diego-based creator of free voice-to-text dictation app Handy. “Using your voice is much faster than typing.”

    A mix of independent developers and startups, including Handy, San Fransico’s Wispr Flow and Willow and others, have sprung up to offer accurate voice interaction with artificial intelligence.

    The biggest names in tech are also creating new ways for people to partner with AI. Meta’s latest smart glasses rely on voice. OpenAI and Meta have designed distinct personalities for their bots’ voice chats. Even Amazon’s Alexa and Apple’s Siri are undergoing AI upgrades, which the companies anticipate will have everyone talking to their tech much more.

    These free and paid methods for using spoken words with computers have attracted millions of users, including coders, executive assistants, lawyers, content creators, and medical practitioners. Some optimists think the keyboard could become obsolete.

    “I’m excited to announce that we’ve removed keyboards from the most prestigious television awards in the world,” Allan Guo, the founder of Willow, said in a post on LinkedIn, noting that the Emmy Awards team used Willow’s voice dictation for sending Slack messages and clearing inboxes faster in preparation for the 2026 awards.

    Over the years, big tech companies have adapted many of their products with voice-first features – for convenience. Today’s pivot away from voice as an accessibility feature to a productivity tool.

    In late 2022, the maker of ChatGPT started giving away unfettered acccess to its automatic speech recognition model called Whisper, trained on 680,000 hours of multilingual data. OpenAI shared the tech for accurate audio transcription, once a closely guarded big tech secret. Anyone could now download and run high-quality AI transcription for free on their laptop.

    The new wave of AI dictation apps uses Whisper as the foundation and builds on top to offer live dictation. While there are free alternatives, paid subscription costs between $8 and $12 a month.

    AI-powered dictation is now gaining a toehold among programmers and regular users – and getting people to talk to their laptops. Be it writing emails, sending SMS, designing a website, or giving AIs tasks, early adopters say dictation allow them to work faster, think more clearly, and be more productive.

    “The people who’ve adopted voice heavily aren’t going back. Once you’re talking 20 hours a week to your laptop, typing feels like friction,” said Naveen Naidu, the general manager of New York-based voice dictation app Monologue. “Where I think it’s heading: voice becomes the delegation layer. You speak your intent, and things happen.”

    These new AI dictation apps leverage Apple’s advanced chips on iPhones and Macs to run private on-device dictation.

    Geoffrey Huntley, an independent software developer, switched almost completely to voice for work in June.

    He often starts projects by opening a voice prompt and asking the AI to interview him about his concerns and project requirements before any code is generated.

    “I speak to it, like I’m riffing in a jazz band, backwards, forwards, backwards, forwards,” Huntley said. This vocal dance helps refine the specifications, then the AI takes the wheel, and builds software.

    Beyond coding, Huntley uses voice to “let it rip” when capturing blog post ideas or messaging, using apps like Superwhisper or Whisper Flow to get a “first dump” of thoughts before moving to a keyboard for final editing.

    A growing number of software developers in Silicon Valley are dictating coding instructions for hours at a time instead of typing. The combination of rapidly advancing AI agents that can code for hours, with voice inputs capturing thoughts faster than typing, has boosted their productivity.

    Self-described “vibe coder” McNamara built over 25 web apps in a few months, a speed of development that would be impossible without voice instructions.

    “I don’t think that [typing], by any means, would be even efficient or effective to get there as fast as I did with talking,” McNamara said.

    He used a meandering conversation and a few hours to get AI to build Sprout Gifts, a gifting registry for kids, and an app to appraise any items via photos.

    To be sure, AI can make mistakes, and its work needs to be checked.

    Meanwhile, wide adoption has brought new inconveniences, as even power users feel awkward talking to their laptops. Crowded open offices are not designed for many people to be conversing with their computers at the same time.

    “Love voice, but not in an office setting,” said one user on X. “I dislike talking around other people. I would do it in a closed-door office, or go work in my car.”

    McNamara uses headphones so people assume he is on a call.

    “It’s like the social hack that I have,” he said.

    While it is too early to call whether and when the Qwerty keyboard might follow the ticker-tape and fax machines into obsolescence, the velocity toward voice is accelerating, said Dylan Fox, founder of San Francisco-based Assembly AI, which offers audio models to companies.

    “We’re definitely in the beginning of what we think of as like this 10 to 100x increase in demand for voice, AI applications and interfaces,” he said.

    For the coder, McNamara, talking more to chatbots has made him a better buddy.

    He used to be bad at responding to texts. Now he gets back to friends right away.

    “I am so quick to respond, they are like ‘Who’s this guy?’” he said.

    [ad_2]

    Nilesh Christopher

    Source link

  • Web skimming attacks target major payment networks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Online shopping feels familiar and fast, but a hidden threat continues to operate behind the scenes. 

    Researchers are tracking a long-running web skimming campaign that targets businesses connected to major payment networks. Web skimming is a technique where criminals secretly add malicious code to checkout pages so they can steal payment details as shoppers type them in. 

    These attacks work quietly inside the browser and often leave no obvious signs. Most victims only discover the problem after unauthorized charges appear on their statements.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    Web skimming attacks hide inside checkout pages and steal card details as shoppers type them in. (Kurt “CyberGuy” Knutsson)

    What Magecart is and why it matters

    Magecart is the name researchers use for groups that specialize in web-skimming attacks. These attacks focus on online stores where shoppers enter payment details during checkout. Instead of hacking banks or card networks directly, attackers slip malicious code into a store’s checkout page. That code is written in JavaScript, which is a common type of website code used to make pages interactive. Legitimate sites use it for things like forms, buttons and payment processing.

    In Magecart attacks, criminals abuse that same code to secretly copy card numbers, expiration dates, security codes and billing details as shoppers type them in. The checkout still works, and the purchase goes through, so there is no obvious warning sign. Magecart originally described attacks against Magento-based online stores. Today, the term applies to web-skimming campaigns across many e-commerce platforms and payment systems.

    Which payment providers are being targeted?

    Researchers say this campaign targets merchants tied to several major payment networks, including:

    • American Express
    • Diners Club
    • Discover, a subsidiary of Capital One
    • JCB Co., Ltd.
    • Mastercard
    • UnionPay

    Large enterprises that rely on these payment providers face a higher risk due to complex websites and third-party integrations.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    A woman holds a credit card as she types on her laptop.

    Criminals use hidden code to copy payment data while the purchase still goes through normally. (Kurt “CyberGuy” Knutsson)

    How attackers slip skimmers into checkout pages

    Attackers usually enter through weak points that are easy to overlook. Common entry paths include vulnerable third-party scripts, outdated plugins and unpatched content management systems. Once inside, they inject JavaScript directly into the checkout flow. The skimmer monitors form fields tied to card data and personal details, then quietly sends that information to attacker-controlled servers.

    Why web skimming attacks are hard to detect

    To avoid detection, the malicious JavaScript is heavily obfuscated. Some versions can remove themselves when they detect an admin session, which makes inspections appear clean. Researchers also found the campaign uses bulletproof hosting. These hosting providers ignore abuse reports and takedown requests, giving attackers a stable environment to operate. Because web skimmers run inside the browser, they can bypass many server-side fraud controls used by merchants and payment providers.

    Who Magecart web skimming attacks affect most

    Magecart campaigns impact three groups at the same time:

    • Shoppers who unknowingly give up card data
    • Merchants whose checkout pages are compromised
    • Payment providers that detect fraud after the damage is done

    This shared exposure makes detection slower and response more difficult.

    NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY

    Selling on the internet? Beware of sneaky tactics scammers use to trick you

    Simple protections like virtual cards and transaction alerts can limit damage and expose fraud faster. (Kurt “CyberGuy” Knutsson)

    How to stay safe as a shopper

    While shoppers cannot fix compromised checkout pages, a few smart habits can reduce exposure, limit how stolen data is used, and help catch fraud faster.

    1) Use virtual or single-use cards

    Virtual and single-use cards are digital card numbers that link to your real credit or debit account without exposing the actual number. They work like a normal card at checkout, but add an extra layer of protection. Most people already have access to them through services they use every day, including:

    Major banks and credit card issuers that offer virtual card numbers inside their apps

    Mobile wallet apps like Apple Pay and Google Pay generate temporary card numbers for online purchases, keeping your real card number hidden.

    Some payment apps and browser tools that create one-time or merchant-locked card numbers

    A single-use card typically works for one purchase or expires shortly after use. A virtual card can stay active for one store and be paused or deleted later. If a web skimming attack captures one of these numbers, attackers usually cannot reuse it elsewhere or run up repeat charges, which limits financial damage and makes fraud easier to stop.

    2) Turn on transaction alerts

    Transaction alerts notify you the moment your card is used, even for small purchases. If web skimming leads to fraud, these alerts can expose unauthorized charges quickly and give you a chance to freeze the card before losses grow. For example, a $2 test charge on your card can signal fraud before larger purchases appear.

    3) Lock down financial accounts

    Use strong, unique passwords for banking and card portals to reduce the risk of account takeover. A password manager helps generate and store them securely.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    4) Install strong antivirus software

    Strong antivirus software can block connections to malicious domains used to collect skimmed data and warn you about unsafe websites.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Use a data removal service

    Data removal services can reduce how much personal information is exposed online, making it harder for criminals to pair stolen card data with full identity details.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Watch for unexpected card activity

    Review statements regularly, even for small charges, since attackers often test stolen cards with low-value transactions.

    Kurt’s key takeaways

    Magecart web skimming shows how attackers can exploit trusted checkout pages without disrupting the shopping experience. While consumers cannot fix compromised sites, simple safeguards can reduce risk and help catch fraud early. Online payments rely on trust, but this campaign shows why that trust should always be paired with caution.

    Does knowing how web skimming works make you rethink how safe online checkout really is?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • New personal eVTOL promises personal flight under $40K

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Personal electric aircraft have teased us for years. They look futuristic, promise freedom from traffic, and usually come with prices that put them out of reach or timelines that feel uncertain. Recently unveiled at CES 2026, the Rictor X4 entered that conversation with some bold claims.

    It is a single-passenger electric vertical takeoff and landing aircraft designed to make short-range personal flight more accessible and far more affordable. If those promises hold up, it could change how we think about flying for everyday trips.

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    CES 2026 put health tech front and center, with companies showcasing smarter ways to support prevention, mobility and long-term wellness. (CES)

    TECH STARTUP, MAJOR AIRLINE PARTNER TO LAUNCH ELECTRIC AIR TAXI SERVICE

    What the Rictor X4 actually is

    The Rictor X4 uses a multirotor design with eight propellers spread across four carbon fiber arms. Those arms fold inward when the aircraft is not in use, allowing it to fit in the bed of a pickup truck. The aircraft focuses on low-altitude flight and short hops rather than long journeys.

    Key specs include:

    • Top speed of about 50 mph
    • Maximum flight time of 20 minutes
    • Payload capacity of up to 220 pounds, including the pilot

    It can lift off and land vertically like a helicopter, then transition into forward flight once airborne. Rictor describes its mission as light aerial mobility, which essentially means short-distance commuting and professional applications.

    Inside the X4’s propulsion and power system

    According to Rictor, the X4’s propulsion system is built around stability and redundancy rather than raw speed. Each axis uses a coaxial dual-motor configuration designed to provide consistent thrust during low-altitude flight.

    Key propulsion details include:

    • Rated thrust of up to 165 pounds per axis
    • Peak thrust exceeding 285 pounds per axis
    • Maximum continuous power output of 10 kW
    • 120-volt operating system designed for outdoor conditions

    Together, these systems aim to deliver controlled, predictable flight with built-in safety margins, especially during takeoff, landing, and hover.

    Rictor X4 flying above a track.

    The Rictor X4 is a single-passenger electric aircraft designed for short-range, low-altitude flight with a folding multirotor layout.  (Rictor)

    Safety systems and flight control in the Rictor X4

    Rictor puts safety at the center of the X4’s design. The aircraft uses a semi-solid state battery system with dual battery redundancy, which helps enable a controlled landing if one battery module fails. In addition, an emergency parachute system provides backup protection during critical situations. At the same time, a centralized flight control system actively manages propulsion, attitude, and overall system health. This system continuously monitors key flight data to help maintain stability in changing conditions.

    Beyond software, the hardware plays an important role. The X4 features 63-inch carbon fiber folding propellers in a 4-axis, 8-propeller configuration. Together, they support a payload of up to 220 pounds, including the pilot. According to Rictor, the aircraft is designed to operate at noise levels below 65 decibels, although independent testing has not yet been published. Finally, Rictor’s proprietary Dynamic Balance Algorithm adjusts the output of all eight motors in real time. As a result, the X4 can maintain a stable hover even in side winds rated up to Level 6.

    The FAA rule that could make personal flight easier

    One of Rictor’s most attention-grabbing claims involves regulation. The company says the X4 is designed to comply with FAA Part 103, which governs ultralight vehicles in the US. If operated within Part 103 limits, the X4 could be flown legally without airworthiness certification or a pilot’s license. Rictor says this is enabled by autonomous pre-programmed flight paths and very low altitude operation, reportedly as low as three meters above ground. It is worth noting that Part 103 still carries operational restrictions, including where and how flight can occur. Final compliance depends on real-world use and FAA interpretation.

    Designed to fold, transport, and recharge

    Portability is a major focus. Rictor says the X4 folds down to about 42 cubic feet, which makes it compact enough to transport in the bed of a pickup truck. The company also highlights in-vehicle charging support while parked or on the move, positioning the X4 as something that can be transported and recharged alongside ground vehicles rather than stored at an airfield.

    AIR TAXI SERVICE PLANS EVTOL RIDES FROM ALL THREE NYC AIRPORTS

    The price that resets expectations

    The Rictor X4 carries a launch price of $39,900 with a $5,000 deposit. That alone separates it from most personal eVTOLs currently discussed in the market. The aircraft is produced by Kuickwheel Technology, Rictor’s parent company. According to the company, first customer deliveries are scheduled for Q2 2026. As with any aircraft launch, timelines remain aspirational until production units reach customers.

    Why this matters now

    Personal eVTOLs have lived in a narrow space between concept and reality. High costs, regulatory hurdles, and safety concerns have slowed adoption. If Rictor delivers an aircraft that performs as described while operating within ultralight rules, it could expand personal flight beyond niche enthusiasts and into practical short-range use. Now it comes down to whether the company can deliver on what it’s promising.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com      

    Kurt’s key takeaways

    The Rictor X4 brings together aggressive pricing, compact design, and regulatory positioning in a way we have not seen before. Folding propellers, redundant safety systems, and Part 103 alignment make it one of the most ambitious personal eVTOL launches to date. The unanswered questions center on real-world performance, regulatory interpretation, and production readiness. Until aircraft are flying outside controlled demonstrations, healthy skepticism remains warranted. Still, this is one of the most compelling personal flight announcements to come out of CES in recent years.

    Would you trust a personal eVTOL like this for everyday trips, or does flight still feel like a step too far for now? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • WhatsApp Web malware spreads banking trojan automatically

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new malware campaign is turning WhatsApp Web into a weapon. Security researchers say a banking Trojan linked to Astaroth is now spreading automatically through chat messages, making the attack harder to stop once it starts. 

    The campaign is known as Boto Cor-de-Rosa. It shows how cybercriminals keep evolving, especially when they can abuse tools people trust every day. This attack focuses on Windows users and uses WhatsApp Web as both the delivery system and the engine that spreads the infection further.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

    Attackers abuse WhatsApp Web to spread malware through messages that appear to come from people you trust. (Kurt “CyberGuy” Knutsson)

    How this WhatsApp Web attack works

    The attack starts with a simple message. A contact sends what looks like a routine ZIP file through WhatsApp. The file name appears random and harmless, which lowers suspicion. Once opened, the ZIP contains a Visual Basic script disguised as a normal document. If the user runs it, the script quietly pulls in two more pieces of malware. Then the script downloads the Astaroth banking malware written in Delphi. It also installs a Python-based module designed to control WhatsApp Web. Both components run in the background without obvious warning signs. From there, the infection becomes self-sustaining.

    Malware that spreads itself through your contacts

    What makes this campaign especially dangerous is how it propagates. The Python module scans the victim’s WhatsApp contacts and sends the malicious ZIP file to every conversation automatically. Researchers at Acronis found that the malware adapts its messages based on the time of day. It sends friendly greetings, making the message feel normal and familiar. The text reads, “Here is the requested file. If you have any questions, I’m available!” Because the message appears to come from someone you know, many people open it without hesitation.

    NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY

    Person holds iPhone showing the Whatsapp logo

    A single ZIP file sent through chat can quietly install banking malware and begin spreading to every contact. (Kurt “CyberGuy” Knutsson)

    Built-in tracking keeps the attack efficient

    This malware is carefully designed to monitor its own performance in real time. The propagation tool tracks how many messages are successfully delivered, how many fail to send, and the overall sending speed measured per minute. After every 50 messages, it generates progress updates that show how many contacts have been reached. This feedback allows attackers to measure success quickly and make adjustments if something stops working.

    What happens after infection

    The initial script is heavily obfuscated to avoid detection by antivirus tools. Once it runs, it launches PowerShell commands that download more malware from compromised websites. One known domain used in this campaign is coffe-estilo.com. The malware installs itself inside a folder that mimics a Microsoft Edge cache directory. Inside are executable files and libraries that make up the full Astaroth banking payload. From there, the malware can steal credentials, monitor activity and potentially access financial accounts.

    Why WhatsApp Web is being abused

    WhatsApp Web is popular because it mirrors your phone conversations on a computer. That convenience makes it easy to send messages, share files and type faster, but it also introduces risk. When you use WhatsApp Web, you link your phone to a browser by scanning a QR code at web.whatsapp.com. Once connected, that browser session becomes a trusted extension of your account. Your chats appear on the screen, messages you send come from your real number and incoming messages sync across both devices.

    That setup is exactly what attackers take advantage of. If malware gains access to a computer with WhatsApp Web logged in, it can act as the user. It can read messages, access contact lists and send files or links that look completely legitimate. The messages do not raise alarms because they are coming from a real account, not a fake one.

    This is what turns WhatsApp Web into an effective delivery system for malware. Instead of breaking into WhatsApp itself, attackers simply abuse an open browser session to spread malicious files automatically. Many users do not realize the danger because WhatsApp Web feels harmless. It is often left signed in on work computers, shared devices or systems without strong security. In those situations, malware does not need advanced tricks. It only needs access to an already trusted session. That combination of convenience and trust is why WhatsApp Web has become such an attractive target.

    MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS

    A person typing on a laptop. (Kurt "CyberGuy" Knutsson)  

    Once WhatsApp Web is compromised, malware can act like the user, sending messages and files that look completely legitimate.  (Kurt “CyberGuy” Knutsson)

    How to stay safe from WhatsApp Web malware

    Attacks like this WhatsApp Web malware are designed to spread fast through trusted conversations. A few smart habits can dramatically lower your risk.

    1) Be skeptical of unexpected attachments

    Messaging apps feel casual, which is exactly why attackers use them. Never open ZIP files sent through chat unless you confirm with the sender first. Watch for file names made of random numbers or unfamiliar names. Treat messages that create urgency or feel overly familiar as a warning sign. If a file arrives out of nowhere, pause before clicking.

    2) Lock down WhatsApp Web access

    This campaign abuses WhatsApp Web to spread automatically once a device is infected. Check active WhatsApp Web sessions and log out of any you do not recognize. Avoid leaving WhatsApp Web signed in on shared or public computers. Enable two-factor authentication (2FA) inside WhatsApp settings. Cutting off Web access helps limit how far malware can travel.

    3) Keep your Windows PC locked down and use strong antivirus software 

    This type of malware takes advantage of systems that fall behind on updates. Install Windows updates as soon as they are available. Also, keep your web browser fully updated. Staying current closes many of the doors attackers try to slip through. In addition, use strong antivirus software that watches for script abuse and PowerShell activity in real time.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    4) Limit how much of your personal data is online

    Banking malware often pairs with identity theft and financial fraud. One way to reduce the fallout is by shrinking your digital footprint. A data removal service can help remove your personal information from data broker sites that attackers often search. With less information available, criminals have fewer details to exploit if malware reaches your device.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    5) Add identity theft protection for extra coverage

    Even with strong security habits, financial monitoring adds another layer of protection. An identity theft protection service can watch for suspicious activity tied to your credit and personal data. Identity theft companies can monitor personal information like your Social Security number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    You should also turn on alerts for bank and credit card transactions so you are notified quickly if something looks wrong. The less exposed your data is, the fewer opportunities attackers have to cause damage.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    6) Slow down and trust your instincts

    Most malware infections happen because people act too quickly. If a message feels off, trust that instinct. Familiar names and friendly language can lower your guard, but they should never replace caution. Take a moment to verify the message or file before opening anything. Attackers rely on trust and urgency to succeed. Slowing down takes away their advantage.

    Kurt’s key takeaways

    This WhatsApp Web malware campaign is a reminder that cyberattacks no longer rely on obvious red flags. Instead, they blend into everyday conversations and use familiar tools to spread quietly and quickly. What makes this threat especially concerning is how little effort it takes for it to move from one device to dozens of others. A single click can turn a trusted chat into a delivery system for banking malware and identity theft. The good news is that small changes make a big difference. Paying attention to attachments, locking down WhatsApp Web access, keeping devices updated and slowing down before clicking can stop these attacks cold. As messaging platforms continue to play a bigger role in daily life, staying alert is no longer optional. Awareness and simple habits remain some of the strongest defenses you have.

    Do you think messaging apps are doing enough to protect users from malware that spreads through trusted conversations?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Breakthrough device promises to detect glucose without needles

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The idea of tracking blood sugar without needles has challenged health tech for years. For people with diabetes, constant monitoring is critical, yet the tools remain uncomfortable and invasive. Finger pricks hurt. Traditional continuous glucose monitors still sit under the skin. That daily burden adds up fast.

    Recently, one small device has been drawing significant attention for tackling that problem in a very different way.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    WEIGHT LOSS EXPERTS PREDICT 5 MAJOR TREATMENT CHANGES LIKELY TO EMERGE IN 2026

    A small breath-based device called isaac aims to alert users to glucose changes without needles or sensors under the skin. (PreEvnt)

    Why noninvasive glucose tracking matters

    Blood sugar levels can rise or fall quickly. When changes go unnoticed, the risks increase, from long-term organ damage to sudden hypoglycemia. Monitoring can be especially difficult for:

    • Small children
    • Older adults
    • Anyone who struggles with needles

    At the same time, glucose tracking has surged among people without diabetes. As GLP-1 medications gain popularity, many people now track their blood sugar to understand how food affects their bodies. The need for simpler tools keeps growing.

    Even Apple has spent years trying to bring no-prick glucose tracking to wearables. Despite heavy investment, the feature has yet to arrive.

    NEEDLE-FREE GLUCOSE CHECKS MOVE CLOSER TO REALITY

    An isaac device

    Instead of finger pricks, the device analyzes acetone and other compounds in exhaled breath linked to blood sugar levels. (PreEvnt)

    How the PreEvnt isaac monitors glucose using breath

    One of the most talked-about health devices at CES 2026 came from PreEvnt. Its product, called isaac, takes a nontraditional approach to glucose awareness. Instead of piercing skin or using optical sensors, isaac analyzes your breath. 

    The device measures volatile organic compounds, especially acetone, which has long been associated with rising blood glucose. That sweet fruity breath is a known marker of diabetes. By detecting changes in those compounds, isaac can alert users to potential glucose events. The device is small, about the size of a quarter, with a loop so it can be worn on a lanyard or clipped to clothing or a bag.

    The breath-based design is intended to reduce how often users need finger-prick blood tests, while providing early alerts for glucose-related changes.

    The device is named after the inventor’s grandson, Isaac, who was diagnosed with Type 1 diabetes at just 2 years old. The inventor, Bud Wilcox, wanted to reduce the number of painful finger pricks his grandson faced each day. That personal motivation led to years of collaboration with scientists, designers and engineers. Research and development included work with Indiana University under the direction of Dr. M. Agarwal. The goal was simple but ambitious: Alert families to blood sugar events earlier while reducing the physical and emotional toll of constant testing.

    How the isaac device fits into daily life

    Isaac is designed to fit into everyday routines. Users breathe into the device, which processes the reading and sends the data to a companion smartphone app. The app, still in its final stages of development, focuses on awareness and safety. Current features include:

    • A timeline for logging meals
    • A history of breath readings
    • Alerts that can notify emergency contacts

    This matters because people with diabetes can become disoriented or incapacitated during hypoglycemic events. Early alerts give caregivers or family members a chance to step in. A single charge lasts all day and supports multiple breath tests. The device comes with a USB-C charging cradle and cable.

    Who isaac is designed for

    According to PreEvnt, isaac is being developed for:

    • Type 1 diabetics
    • Type 2 diabetics
    • Prediabetics

    It may also appeal to people focused on metabolic health. As mentioned, the device is still undergoing development and FDA review and is not yet for sale in the U.S. The companion app will launch on iOS and Android closer to availability.

    TYPE 1 DIABETES REVERSED IN LANDMARK STUDY, PAVING THE WAY FOR HUMAN STUDIES

    An isaac device

    Designed for everyday use, the isaac wearable device pairs with a smartphone app to log readings and send alerts when needed. (PreEvnt)

    Clinical trials and FDA review for the isaac device

    PreEvnt first introduced isaac publicly at CES 2025. Later that year, the device entered active human clinical trials. Those studies compare isaac’s breath-based alerts with traditional blood glucose monitoring methods. 

    Trials began with adolescents who have Type 1 diabetes and later expanded to adults with Type 2 diabetes. The company is now working toward regulatory review with the U.S. Food and Drug Administration. Because this technology is new, PreEvnt is pursuing a de novo pathway, which allows devices to be evaluated while standards are still being defined. According to the company, regulators have shown strong interest as the data continues to come in.

    Isaac does not claim to replace medical-grade glucose meters. The device is being developed to supplement existing monitoring methods by offering breath-based alerts tied to glucose-related changes.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.      

    Kurt’s key takeaways

    Noninvasive glucose monitoring has long felt like a future promise that never quite arrives. The attention around isaac at CES 2026 suggests that promise may finally be getting closer. If clinical trials continue to deliver strong results and regulators give approval, breathing into a small device could one day replace at least some finger pricks. For families living with diabetes, that shift could make daily life easier and safer.

    Would you trust a breath-based device to warn you about rising blood sugar before symptoms appear? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • January scams surge: Why fraud spikes at the start of the year

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Every January, I hear from people who say the same thing: “I just got an email that looked official, and I almost fell for it.” That’s not a coincidence. January is one of the busiest months of the year for scammers. While most of us are focused on taxes, benefits, subscriptions, and getting our finances in order, criminals are doing their own kind of cleanup, refreshing scam lists and going after people with newly updated personal data. If you’ve ever received a message claiming your account needs to be “verified,” your benefits are at risk, or your tax information is incomplete, this article is for you.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    Scam messages often look urgent and official, pushing you to act before you have time to think. That pressure is exactly what criminals rely on. (Kurt “CyberGuy” Knutsson)

    Why January is prime time for scammers

    January is when scammers have everything they need. According to YouMail’s Robocall Index, U.S. consumers received just over 4.7 billion robocalls in January 2025, a roughly 9% increase from December 2024. This year, we can expect the same pattern from scammers.

    They know:

    But the biggest reason scams spike now? Your personal data is easier to find than you think. Data brokers quietly collect and update profiles year after year. By January, those profiles are often more complete than ever, and scammers know it.

    The “account verification” scam you’ll see everywhere

    One of the most common January scams looks harmless at first. You get a message saying:

    • “Your Social Security account needs verification”
    • “Your Medicare information has to be updated”
    • “Your benefits could be delayed without action”

    The message sounds official. Sometimes it even uses your real name or location. That’s where people get tricked. Government agencies don’t ask for sensitive information through random emails or texts. Scammers rely on urgency and familiarity to push you into reacting before thinking.

    My rule: If you didn’t initiate the request, don’t respond to it. Always go directly to the agency’s official website or phone number, never through a link sent to you.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    A person typing on a laptop. (Kurt "CyberGuy" Knutsson)  

    January is a prime time for fraud because people are dealing with taxes, benefits and account updates. Scammers know these messages feel expected and familiar. (Kurt “CyberGuy” Knutsson)

    Fake tax and benefits notices ramp up in January

    Another favorite scam this time of year involves taxes and refunds.

    You may see:

    • Emails claiming you owe back taxes
    • Messages saying you’re due a refund
    • Notices asking you to “confirm” banking information.

    These scams work because they arrive at exactly the moment people expect to hear from tax agencies or benefits programs.

    Scammers don’t need much to sound convincing. A name, an email address or an old address is often enough. If you get a tax-related message out of the blue, slow down. Real agencies don’t pressure you to act immediately.

    Subscription “problems” that aren’t real

    January is also when subscription scams explode. Fake messages claim:

    Scammers know most people have subscriptions, so they play the odds. Instead of clicking, open the app or website directly. If there’s a real problem, you’ll see it there.

    Why these scams feel so personal

    People often tell me, “But they used my name, how did they know?” Here’s the uncomfortable truth: They probably bought it. Data brokers compile massive profiles that include:

    • Address histories
    • Phone numbers and emails
    • Family connections
    • Shopping behavior.

    That data is sold, shared and leaked. Once scammers have it, they can tailor messages that feel real, because they’re built on real information.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    The more personal data scammers have, the more convincing their messages become. Removing your information from data broker sites can help reduce targeted scams over time.

    The more personal data scammers have, the more convincing their messages become. Removing your information from data broker sites can help reduce targeted scams over time. (Kurt “CyberGuy” Knutsson)

    What you should do right now

    Before January gets any busier, take these steps to reduce your exposure to scams and fraud:

    1) Remove your personal data from broker sites

    Deleting emails or blocking numbers helps, but it does not stop scams at the source. Scammers rely on data broker sites that quietly collect, update and sell your personal information. Removing your data from those sites reduces scam calls, phishing emails and targeted texts over time. It also makes it harder for criminals to personalize messages using your real name, address or family connections. You have two ways to do this:

    Do it yourself:

    You can visit individual data broker websites, search for your profile and submit opt-out requests.This method works, but it takes time. Each site has its own rules, identity verification steps, and response timelines. Many brokers also re-add data later, which means you have to repeat the process regularly.

    Use a data removal service:

    A data removal service automates the opt-out process by contacting hundreds of data brokers on your behalf and monitoring for re-listings. This option saves time and provides ongoing protection, especially if you want long-term results without constant follow-ups.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    2) Don’t click links in unexpected messages

    If you did not initiate the request, do not click. Scam messages are designed to create urgency, especially around taxes, benefits and account issues. Instead, go directly to the official website by typing the address yourself or using a saved bookmark. This single habit prevents most phishing attacks.

    3) Turn on two-factor authentication wherever possible

    Two-factor authentication (2FA) adds a critical second layer of protection. Even if someone gets your password, they still cannot access your account without the second verification code. Start with email, financial accounts, social media and government services.

    4) Check accounts only through official apps or websites

    If you receive a warning about an account problem, do not trust the message itself. Open the official app or website, and check there. If something is wrong, you will see it immediately. If not, you just avoided a scam.

    5) Watch for account alerts and login activity

    Enable login alerts and security notifications on important accounts. These alerts can warn you if someone tries to sign in from a new device or location. Early warnings give you time to act before real damage occurs.

    6) Use strong, unique passwords and a password manager

    Reusing passwords makes it easy for scammers to take over multiple accounts at once. If one service is compromised, attackers try the same login on email, banking, and social media accounts. A password manager helps you create and store strong, unique passwords for every account without needing to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    January scams aren’t random. They’re targeted, timed and fueled by personal data that shouldn’t be public in the first place. The longer your information stays online, the easier it is for scammers to use it against you. If you want a quieter inbox, fewer scam calls and less risk this year, take action early, before criminals finish rebuilding their lists. Protect your data now, and you’ll be safer all year long.

    Have you noticed more scam emails, texts or calls since the new year started? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Ashley St. Clair Sues Elon Musk’s xAI, Alleging His Company Uses “AI to Undress, Humiliate, and Sexually Exploit Victims”

    [ad_1]

    On Thursday afternoon, Ashley St. Clair, the mother of one of Elon Musk’s 14 publicly known children, filed a lawsuit in New York against his company xAI, claiming that Grok, the company’s AI chatbot, produced sexually explicit images of her at users’ request. The writer and political strategist has been locked in a flurry of back-and-forth legal disputes with Musk since last February, when she announced publicly that she had given birth to his son Romulus in September 2024.

    St. Clair alleges that X users found photos of her as a 14-year-old and requested that Grok undress her and put her in a bikini, as well as generate a variety of graphic deepfake content that included images of her “kneeling on the floor in a sex pose” and sporting a tattoo that read “Elon’s whore.”

    “In one image, St. Clair, who is Jewish, is stripped and put in a string bikini covered with swastikas,” the complaint reads. She further alleges that the platform not only kept some of the explicit images online for more than seven days, but also removed St. Clair’s premium subscription following her complaints.

    In a preemptive defensive lawsuit filed the same afternoon, xAI sued St. Clair, alleging that when she created an account on the X platform she agreed to terms of service that require any litigation involving the company take place in state or federal courts in Texas.

    St. Clair is being represented in her suit by lawyer Carrie Goldberg, who has said she specializes in defending victims of “pervs, assholes, psychos, and trolls,” and has represented clients against Harvey Weinstein. In recent years, her work has increasingly focused on holding Big Tech companies liable for harms that occur on their online platforms, including stalking, trafficking, sextortion, and the dissemination of child sex-abuse material.

    In this photo illustration, a iPhone screen displaying the Grok app and logo is seen on January 7, 2026

    Anna Barclay/Getty Images

    In response to xAI’s suit, Goldberg told Vanity Fair, “We are appalled that xAI filed a bonkers lawsuit against [St. Clair] for providing the obligatory notice to them that she was seeking a Temporary Restraining Order.” She added, “We intend to hold Grok accountable and to help establish clear legal boundaries for the entire public’s benefit to prevent AI from being weaponized for abuse.”

    These suits land amid a global regulatory crisis surrounding the rapidly developing capabilities of AI models, which have so far been allowed to progress largely without legal guardrails. Musk did not immediately respond to a request for comment. When reached for comment, xAI’s auto responder replied, “Legacy Media Lies.”

    [ad_2]

    Julia Black

    Source link

  • 5 simple tech tips to improve digital privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your privacy doesn’t require advanced tools or technical expertise. Some of the most effective protections are already built into your phone; you just need to know where to look.

    These five privacy tips show you exactly how to reduce tracking and limit data sharing on both iPhone and Android using the latest software.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    Smartphone users can boost privacy by adjusting built-in settings that limit tracking, location sharing and background data collection on iPhone and Android devices. (Neil Godwin/Future via Getty Images)

    1) Reduce app permissions

    Apps often request access to your camera, microphone, contacts, photos and location, even when it’s not necessary. Limiting these permissions reduces background data collection.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Select a permission type such as Microphone, Camera, Photos or Contacts
    • Toggle off access for apps that don’t need it

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Choose a permission category and set apps to Don’t allow or Allow only while using the app

    2) Turn off location access you don’t need

    Location tracking can reveal where you live, work, shop and travel.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services
    • Select an app and choose While Using the App or Never
    • Turn off Precise Location when exact coordinates aren’t needed

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Location
    • Tap App location permissions or App permissions 
    • Scroll through the list and tap the app you want to change
    • Select Allow only while using the app or Don’t allow

    3) Turn off photo sharing with apps

    Some apps request full access to your photo library, giving them visibility into every image and video you’ve taken.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Photos
    • Select an app and choose Selected Photos or None

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Tap Photos and videos 
    • Scroll through the list and tap the app you want to change
    • Set apps to Don’t allow, or Allow limited access

    5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY

    Woman holding her phone.

    Turning off unnecessary app permissions and tracking features helps protect sensitive information stored on your phone. (Sebastian Kahnert/picture alliance via Getty Images)

    4) Turn off app tracking

    App tracking allows advertisers to follow your activity across multiple apps.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security & privacy
    • Scroll down and tap More privacy settings
    • Tap Ads
    • Tap Delete advertising ID to remove the existing ID tied to your device
    • Tap Reset advertising ID to generate a new, blank ID

    This removes the identifier apps use to track you for targeted ads and replaces it with a fresh ID that isn’t linked to your previous activity.

    5) Turn off unnecessary background app activity

    Some apps continue running and collecting data even when you’re not actively using them.

    iPhone

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Turn it off entirely or disable it for individual apps

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Battery
    • Choose Restricted or turn off Allow background usage 

    Pro tip: Use a password manager

    A password manager reduces the need to store logins inside apps, which can limit unnecessary permissions and data collection.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Person selecting an item on their phone.

    Privacy experts say small changes to phone settings can go a long way in reducing digital surveillance and data exposure. (Karl-Josef Hildenbrand/Picture Alliance via Getty Images)

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Kurt’s key takeaways

    Protecting your privacy doesn’t have to be complicated. By reducing app permissions, limiting location access, controlling photo sharing, turning off app tracking and restricting background activity, you can significantly reduce how much personal data your phone shares. A few simple setting changes can go a long way in protecting your digital life.

    What privacy setting surprised you the most, or is there one you’re unsure about? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 10 ways to protect seniors from email scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Email scams have become one of the fastest ways scammers steal money from older adults. A single click can expose bank accounts, personal data and retirement savings built over a lifetime. That growing risk is what prompted Bob to write to us with a question many families are now facing:

    “My friend’s father is 95 and absolutely lives through his phone/laptop. He refuses to give up either and often clicks on email links. A few years ago, he got caught up in a gift card scam that almost cost him his life savings. It’s not taking away the car keys anymore; it is taking away the email and access to online banking! What do you recommend that his daughter do to protect his online presence?”

    Bob is right. For many seniors, email and online banking have replaced car keys as the most dangerous access point. The goal is not to take devices away. It is to quietly put guardrails in place so one bad click does not turn into a financial disaster.

    Here is a practical plan families can actually use.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

     1) Separate money from daily email use

    Start by limiting how much damage a single click can cause. If possible, remove online banking access from the devices used for email. When that is not realistic, open a second checking account with only everyday spending money and link it to a debit card for routine purchases.

    Keep primary savings accounts offline or set to view-only access. If available, require in-branch or phone verification for transfers above a set amount. This way, even if credentials are compromised, the largest accounts remain protected. 

    2) Lock down email to stop scams targeting seniors

    Email is the number one entry point for scams targeting seniors. Strong filtering matters. Use an email provider with advanced spam protection, such as Gmail or Outlook.com. In the email settings:

    • Turn off automatic image loading
    • Disable link previews
    • Block or auto-quarantine attachments from unknown senders
    • Automatically move messages from unknown senders to a Review folder

    If available, enable warnings for emails that use familiar display names but come from unfamiliar addresses. This helps stop impersonation scams that pretend to be family, banks or service providers. These steps slow scammers down and reduce impulse clicks before damage happens.

    Email is dominant, but voicemail and callback scams are also growing fast among seniors, often as a follow-up to phishing emails. If possible, silence unknown callers and block voicemail-to-email transcription for unfamiliar numbers, since many scams now start with urgent callback messages rather than links.

    Email scams often start with messages that look routine but hide urgent threats designed to trigger quick clicks. (Kurt “CyberGuy” Knutsson)

    3) Add a trusted second set of eyes

    Next, add safety nets that notify family members when something looks wrong. Enable banking alerts for large withdrawals, new payees, password changes, unusual logins and new device sign-ins. Add his daughter as a trusted contact wherever the bank allows it. If available, enable delays or approval requirements for first-time transfers to new payees. This creates a cooling period that can stop scam-driven transactions. For email accounts, set up a recovery contact so that his daughter is notified immediately if someone attempts to access or reset the account.

    Enable two-factor authentication (2FA) on email and banking accounts, but pair it with device and transfer alerts, since many scams now succeed even when 2FA is enabled.

    4) Harden devices so clicks do not equal catastrophe

    Devices should be set up to fail safely. Keep operating systems and browsers updated. Make sure the laptop uses a standard user account instead of an administrator account. This prevents software from installing without approval. Install real-time protection that blocks scam sites before they load. Strong antivirus software helps block malicious links and fake login pages automatically.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Use a password manager to block fake logins

    Password reuse makes scams far more dangerous. Fake pop-ups and lookalike websites are designed to trick people into typing usernames and passwords by hand. A password manager removes that risk by storing credentials securely and autofilling them only on legitimate websites. If a page is fake or malicious, the password manager will not fill anything. That simple refusal often prevents account takeovers before they start. Password managers also reduce frustration by eliminating the need to remember or reuse passwords across email, banking and shopping accounts. When set up correctly, this protection works quietly in the background on both phones and laptops.

    Many phishing scams no longer rely on obvious fake emails. They rely on realistic login pages. Autofill protection is one of the most effective ways to stop these attacks without changing daily habits.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    6) Freeze credit and monitor identity exposure

    If scammers already have personal information, prevention alone is not enough. Freeze credit with Experian, TransUnion and Equifax to prevent new accounts from being opened. Also, place freezes with ChexSystems and the National Consumer Telecom and Utilities Exchange to stop criminals from opening bank accounts, phone lines, or utility services in his name.

    If possible, request an IRS Identity Protection PIN to prevent tax-related identity theft.

    Add ongoing identity monitoring so suspicious activity triggers alerts quickly. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Set clear rules around scams and payments

    Technology helps, but expectations matter. Have one calm conversation and agree on simple rules:

    • No gift cards for urgent emails or texts
    • No sending money through unfamiliar apps or cryptocurrency
    • Always call a trusted family member before acting on urgency

    Post these rules near the computer or phone. Visual reminders reduce panic decisions. Also, before setting rules, choose one primary trusted contact. Multiple helpers can slow response during urgent scams and create confusion when fast decisions matter. That person should be the default call for anything urgent involving money, account access, or unexpected requests.

    Old man and adult look at a computer

    Adult children increasingly step in to help parents spot red flags before a simple mistake turns into a financial loss. (Kurt “CyberGuy” Knutsson)

    8) Reduce exposure with a data removal service

    Scammers often find seniors by pulling personal details from public data broker websites. These sites publish phone numbers, addresses, relatives and age information that make targeting easier. A data removal service works behind the scenes to opt seniors out of these databases and reduce how much personal information is publicly available online. Fewer exposed details means fewer scam calls, fewer phishing emails and fewer impersonation attempts. This step does not stop every scam, but it significantly lowers how often seniors are targeted in the first place.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    9) Use senior-friendly monitoring tools the right way

    Many tools designed for child safety also work well for seniors when used thoughtfully. When configured correctly, they add protection without interfering with daily routines.

    Below are device-specific steps families can use today.

    iPhone and iPad

    Apple’s built-in Screen Time tools provide strong protection without installing extra apps.

    What to set up:

    • Open Settings and tap Screen Time
    • Turn on Screen Time for the device
    • Tap Content & Privacy Restrictions and turn it on
    • Under App Store Purchases, set app installs to Don’t Allow
    • Tap Web Content and limit access to approved or safe websites
    • Set a Screen Time passcode known only to the caregiver

    If the caregiver wants remote visibility or control, add the device to Family Sharing and manage Screen Time from the caregiver’s Apple ID.

    BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

    Why this helps: It blocks many scam sites, prevents accidental app installs and stops fake update prompts from causing damage.

    Android phones and tablets

    Android offers built-in protections and optional supervised controls.

    What to set up:

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings and go to Digital Wellbeing & parental controls
    • Turn on parental controls for the device
    • Restrict app installs and require approval for new downloads
    • Enable Safe Browsing and website filtering
    • Turn on alerts for new app installs and account changes

    For families who want shared oversight, Google Family Link can be used to supervise app installs and receive alerts, as long as both parties agree.

    Why this helps: Many Android scams rely on fake app installs. These settings block that path.

    Windows computers

    Windows protection works best when user accounts are set correctly.

    What to set up:

    • Create a standard user account for daily use
    • Keep the caregiver account as the only administrator
    • Turn on Microsoft Family Safety if available
    • Enable SmartScreen and browser phishing protection
    • Block software installs without administrator approval

    Why this helps: Malware often installs silently on admin accounts. This setup prevents that.

    Mac computers

    macOS includes built-in controls similar to those on iPhone and iPad.

    What to set up:

    • Create a standard user account for the senior
    • Limit administrator access to a trusted caregiver
    • Open System Settings and enable Screen Time
    • Restrict app installs and system changes
    • Keep built-in malware and phishing protections enabled
    Two people look at a computer together

    Simple digital guardrails can reduce risk while allowing seniors to keep their devices and independence. (Kurt “CyberGuy” Knutsson)

    Why this helps: It prevents fake software updates and malicious downloads from installing.

    10) Best practices for all devices

    • Use alert-only or limited-control settings whenever possible
    • Review settings together so expectations are clear
    • Avoid tools that feel invasive or confusing
    • Focus on blocking harm, not monitoring behavior

    This is not about spying. It is about adding digital seatbelts while preserving independence. When used respectfully, these tools reduce risk without changing daily habits.

    Pro Tip: Use a secure email service for added privacy

    For families looking to go a step further, switching to a secure email service can significantly reduce scam exposure. Privacy-focused email providers are designed to limit tracking, block hidden tracking pixels, and reduce how much data advertisers or scammers can collect from inbox activity. Many secure email services also offer disposable or alias email addresses for one-time signups. If an alias starts receiving spam or scam messages, it can be disabled without affecting the main email account. This makes it easier to keep a primary email address private and limit long-term exposure. Secure email platforms typically include features like encrypted messages, no advertising and stronger privacy controls. While switching email providers is optional, it can be a useful upgrade for seniors who receive large volumes of spam or have been repeatedly targeted by scams.

    Why it matters: Less tracking means fewer scam attempts. Aliases reduce how often personal email addresses are exposed, without changing daily habits.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Protecting seniors online is not about control. It is about prevention. Email scams are designed to exploit trust and urgency, especially in people who did not grow up with digital threats. Smart guardrails protect independence while preventing irreversible mistakes. If email and banking are today’s car keys, families need modern safety features to go with them.

    If your parent clicked a scam email right now, would you know before the money was gone? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    [ad_2]

    Source link

  • 5 tech terms that shape your online privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We’ll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. 

    Learning these concepts will help you limit data exposure and stay in control of who can see what.

    Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you!

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.    

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    1) App permissions

    What your apps are really allowed to see

    Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.

    Once granted, these permissions can allow apps to collect data in the background, sometimes even when you’re not actively using them. Over time, this can quietly expose sensitive personal information.

    Regularly reviewing and limiting app permissions in your phone’s settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library.

    iPhone steps (iOS 18 and later)

    To review permissions by category

    • Open Settings
    • Tap Privacy & Security
    • Select a category such as Location ServicesMicrophoneCameraPhotos or Contacts
    • Review each app listed
    • Change access to Never or While Using the App when available

    To review permissions by app

    • Open Settings
    • Scroll down and tap the app’s name
    • Toggle off any permissions the app does not truly need

    Extra privacy tip

    • For Photos, choose Limited Access instead of full library access when possible

    Many apps request more access than they need, quietly collecting data in the background. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review permissions by category

    • Open Settings
    • Tap Privacy
    • Tap Permission manager
    • Select a category such as LocationCameraMicrophone or Contacts
    • Review apps and change access to Don’t allow or Allow only while using the app

    To review permissions by app

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Permissions
    • Remove any permissions that aren’t essential

    Extra privacy tip

    • Disable Allow background usage for apps that don’t need constant access

    Why this matters

    • Apps can collect data even when you’re not using them
    • Location, microphone and photo access are the most sensitive
    • Fewer permissions mean less data exposure
    • You stay in control without breaking most apps

    Extra protection beyond settings:

    Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. 

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    2) Location services

    When your phone knows where you are, constantly

    Location services use GPS, Wi-Fi, Bluetooth, and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don’t actually need.

    Reducing location access limits, tracking and helps protect your daily routines.

    iPhone steps (iOS 18 and later)

    To review all location access

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services

    For each app

    • Tap an app name
    • Select Never or While Using the App
    • Turn Precise Location off unless required

    Recommended settings

    • Avoid Always unless the app truly needs background tracking
    • Use While Using the App for most apps
    • Disable Precise Location for weather, shopping and social apps

    System services (optional)

    • Scroll down and tap System Services
    • Turn off items you don’t need, such as Location-Based Ads and Location-Based Suggestions
    Person typing on cellphone

    Location tracking can reveal your routines and movements long after you close an app. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review location access

    • Open Settings
    • Tap Privacy
    • Tap Location

    For each app

    • Tap Location access for apps
    • Select an app
    • Choose Don’t allow or Allow only while using the app
    • Turn Use precise location off when available

    Recommended settings

    • Avoid Allow all the time
    • Use Allow only while using for navigation apps
    • Disable precise location for apps that don’t require accuracy 

    Why this matters

    • Location data reveals routines, habits and patterns
    • Many apps track location in the background by default
    • Limiting access reduces profiling and data sharing
    • You keep core features without constant tracking

    3) Two-factor authentication (2FA)

    Your second line of defense

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.

    Even if hackers steal your password through a data breach or phishing attack, 2FA can stop them from accessing your accounts. That’s why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.

    It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available.

    Extra security tip:
    Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    4) VPN (Virtual Private Network)

    Hiding your online activity

    A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.

    VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.

    While a VPN doesn’t make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Cross-app tracking

    How companies follow you across apps

    Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.

    On iPhone, this tracking is controlled by Apple’s App Tracking Transparency system.
    On Android, it relies on advertising IDs and ad personalization controls.

    Turning these off limits how easily companies can connect your behavior across apps. You’ll still see ads, but they won’t be tailored to your personal activity.

    iPhone steps (iOS 18 and later)

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn Allow Apps to Request to Track off

    Optional extra protection

    • Review the app list below and make sure no apps are allowed to track you
    • Apps already denied cannot track you across other apps or websites
    Woman holds a phone

    Two-factor authentication (2FA) adds a critical extra step that helps stop account takeovers. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Privacy
    • Tap Ads
    • Turn Delete advertising ID on
    • Tap Ad topics and turn them off
    • Tap Ad measurement and turn it off

    What this does

    • Removes your advertising ID
    • Stops apps from sharing ad behavior across other apps
    • Limits interest-based and cross-app ad profiling

    One more thing to know:
    Turning off cross-app tracking helps going forward, but it doesn’t remove data that’s already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.       

    Kurt’s key takeaways

    Online privacy doesn’t have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you’re comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking, can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we’ll keep breaking it all down so you can protect your digital life with confidence.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Confused by a tech term or want something explained? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    [ad_2]

    Source link

  • Covenant Health data breach affects nearly 500,000 patients

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When a healthcare data breach is first disclosed, the number of people affected is often far lower than the final tally. That figure frequently climbs as investigations continue. 

    That’s exactly what happened with Andover, Mass.-based Covenant Health. The Catholic healthcare provider has now confirmed that a cyberattack discovered last May may have affected nearly 500,000 patients, a sharp increase from the fewer than 8,000 people it initially reported earlier this year. 

    A ransomware group later claimed responsibility for the incident, though Covenant Health has not publicly confirmed the use of ransomware. The attackers accessed names, addresses, Social Security numbers and health information, among other sensitive data that could put patients at serious risk.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    UNIVERSITY OF PHOENIX DATA BREACH HITS 3.5M PEOPLE

    Covenant Health detected suspicious activity in late May 2025, but investigators later confirmed attackers had already accessed systems days earlier. (Kurt “CyberGuy” Knutsson)

    What happened in the Covenant Health breach

    Covenant Health says it detected unusual activity in its IT environment on May 26, 2025. A later investigation revealed that an attacker had actually gained access eight days earlier, on May 18, and was able to access patient data during that window.

    In July, Covenant Health told regulators that the breach impacted 7,864 individuals. After completing what it describes as extensive data analysis, the organization now says that up to 478,188 individuals may have been affected.

    Covenant Health operates hospitals, nursing and rehabilitation centers, assisted living residences and elder care organizations across New England and parts of Pennsylvania. That wide footprint means the breach potentially touched patients across multiple states and care settings.

    In late June, the Qilin ransomware group claimed responsibility for the attack, as reported by Bleeping Computer. The group alleged it stole 852 GB of data, totaling nearly 1.35 million files. Covenant Health has not confirmed those figures, but it did acknowledge that patient information was accessed.

    According to the organization, the exposed data may have included names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance details and treatment information such as diagnoses, dates of treatment and types of care received.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    A webpage with Covenant Health information

    Qilin ransomware lists Covenant Health on its data leak site. (Bleeping Computer)

    What Covenant Health is telling patients

    In a notice sent to regulators and patients, Covenant Health says it engaged third-party forensic specialists to investigate the incident and determine what data was involved. The organization says its data analysis is ongoing as it continues identifying individuals whose information may have been involved.

    Then there are the familiar statements every company makes after a breach, claiming they’ve strengthened the security of their IT systems to help prevent similar incidents in the future. Covenant Health says it has also set up a dedicated toll-free call center to handle questions related to the breach.

    Beginning Dec. 31, 2025, the organization started mailing notification letters to patients whose information may have been compromised. For individuals whose Social Security numbers may have been involved, Covenant Health is offering complimentary credit monitoring and identity theft protection services.

    We reached out to Covenant Health, and the company confirmed the expanded scope of the incident and outlined steps being taken to notify patients and enhance security safeguards.

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    Outsmart hackers who are out to steal your identity

    The breach exposed highly sensitive information, including names, Social Security numbers, medical records and treatment details tied to nearly half a million patients. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to protect yourself after the Covenant Health breach

    If you received a notice from Covenant Health or if your data has been exposed in any healthcare breach, these steps can help reduce the risk of misuse.

    1) Enroll in the free identity protection offered

    If the organization offers you credit monitoring or identity protection, take it. These services can alert you to suspicious activity tied to your Social Security number, credit file or identity details before real damage is done. If you’re not offered one and want to be on the safer side, you might consider getting one yourself.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    2) Monitor medical and insurance statements closely

    Medical identity theft often shows up quietly. Review an explanation of benefits (EOBs), insurance claims and billing statements for services you don’t recognize. If something looks off, report it to your insurer immediately.

    3) Place a fraud alert or credit freeze

    A fraud alert tells lenders to take extra steps to verify your identity before approving credit. A credit freeze goes further by blocking new accounts entirely unless you lift it. If Social Security numbers were exposed, a freeze is usually the safer option.

    To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    4) Use a password manager

    Healthcare breaches often lead to credential-stuffing attacks elsewhere. A password manager ensures every account uses a unique password, so one exposed dataset can’t unlock everything else. It also makes it easier to update passwords quickly after a breach.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Be cautious of phishing scams and use strong antivirus software

    Breaches are frequently followed by phishing emails, texts or calls that reference the incident to sound legitimate. Attackers may pose as the healthcare provider, an insurer or a credit bureau. Don’t click links or share information unless you verify the source independently.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Consider a personal data removal service

    Once your data leaks, it often spreads across data broker sites. Personal data removal services help reduce your digital footprint by requesting takedowns from these databases. While they can’t erase everything, they lower your exposure and make targeted fraud harder.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Review your credit reports regularly

    You’re entitled to free credit reports from all major bureaus. Check them for unfamiliar accounts, hard inquiries or address changes. Catching fraud early makes it far easier to contain.

    Kurt’s key takeaway

    Healthcare organizations remain prime targets for cybercriminal groups because of the volume and sensitivity of the data they store. Medical records contain a mix of personal, financial, and health information that is difficult to change once exposed. Unlike a password, you cannot reset a diagnosis or treatment history. This breach also shows how early disclosures often underestimate impact. Large healthcare networks rely on complex systems and third-party vendors, which can slow forensic analysis in the early stages. As investigations continue, the number of affected individuals often climbs.

    Do you think healthcare organizations do enough to protect user data? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Grok AI scandal sparks global alarm over child safety

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Grok, the built-in chatbot on X, is facing intense scrutiny after acknowledging it generated and shared an AI image depicting two young girls in sexualized attire.

    In a public post on X, Grok admitted the content “violated ethical standards” and “potentially U.S. laws on child sexual abuse material (CSAM).” The chatbot added, “It was a failure in safeguards, and I’m sorry for any harm caused. xAI is reviewing to prevent future issues.”

    That admission alone is alarming. What followed revealed a far broader pattern.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN

    The fallout from this incident has triggered global scrutiny, with governments and safety groups questioning whether AI platforms are doing enough to protect children.  (Silas Stein/picture alliance via Getty Images)

    The apology that raised more questions

    Grok’s apology appeared only after a user prompted the chatbot to write a heartfelt explanation for people lacking context. In other words, the system did not proactively address the issue. It responded because someone asked it to.

    Around the same time, researchers and journalists uncovered widespread misuse of Grok’s image tools. According to monitoring firm Copyleaks, users were generating nonconsensual, sexually manipulated images of real women, including minors and well-known figures.

    After reviewing Grok’s publicly accessible photo feed, Copyleaks identified a conservative rate of roughly one nonconsensual sexualized image per minute, based on images involving real people with no clear indication of consent. The firm says the misuse escalated quickly, shifting from consensual self-promotion to large-scale harassment enabled by AI.

    Copyleaks CEO and co-founder Alon Yamin said, “When AI systems allow the manipulation of real people’s images without clear consent, the impact can be immediate and deeply personal.”

    PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS

    An X post from Grok

    Grok admitted it generated and shared an AI image that violated ethical standards and may have broken U.S. child protection laws. (Kurt “CyberGuy” Knutsson)

    Sexualized images of minors are illegal

    This is not a gray area. Generating or distributing sexualized images of minors is a serious criminal offense in the United States and many other countries. Under U.S. federal law, such content is classified as child sexual abuse material. Penalties can include five to 20 years in prison, fines up to $250,000 and mandatory sex offender registration. Similar laws apply in the U.K. and France.

    In 2024, a Pennsylvania man received nearly eight years in prison for creating and possessing deepfake CSAM involving child celebrities. That case set a clear precedent. Grok itself acknowledged this legal reality in its post, stating that AI images depicting minors in sexualized contexts are illegal.

    The scale of the problem is growing fast

    A July report from the Internet Watch Foundation, a nonprofit that tracks and removes child sexual abuse material online, shows how quickly this threat is accelerating. Reports of AI-generated child sexual abuse imagery jumped by 400% in the first half of 2025 alone. Experts warn that AI tools lower the barrier to potential abuse. What once required technical skill or access to hidden forums can now happen through a simple prompt on a mainstream platform.

    Real people are being targeted

    The harm is not abstract. Reuters documented cases where users asked Grok to digitally undress real women whose photos were posted on X. In multiple documented cases, Grok fully complied. Even more disturbing, users targeted images of a 14-year-old actress Nell Fisher from the Netflix series “Stranger Things.” Grok later admitted there were isolated cases in which users received images depicting minors in minimal clothing. In another Reuters investigation, a Brazilian musician described watching AI-generated bikini images of herself spread across X after users prompted Grok to alter a harmless photo. Her experience mirrors what many women and girls are now facing.

    Governments respond worldwide

    The backlash has gone global. In France, multiple ministers referred X to an investigative agency over possible violations of the EU’s Digital Services Act, which requires platforms to prevent and mitigate the spread of illegal content. Violations can trigger heavy fines. In India, the country’s IT ministry gave xAI 72 hours to submit a report detailing how it plans to stop the spread of obscene and sexually explicit material generated by Grok. Grok has also warned publicly that xAI could face potential probes from the Department of Justice or lawsuits tied to these failures.

    LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

    Grok app on a screen

    Researchers later found Grok was widely used to create nonconsensual, sexually altered images of real women, including minors. (Nikolas Kokovlis/NurPhoto via Getty Images)

    Concerns grow over Grok’s safety and government use

    The incident raises serious concerns about online privacy, platform security and the safeguards designed to protect minors.

    Elon Musk, the owner of X and founder of xAI, had not offered a public response at the time of publication. That silence comes at a sensitive time. Grok has been authorized for official government use under an 18-month federal contract. This approval was granted despite objections from more than 30 consumer advocacy groups that warned the system lacked proper safety testing.

    Over the past year, Grok has been accused by critics of spreading misinformation about major news events, promoting antisemitic rhetoric and sharing misleading health information. It also competed directly with tools like ChatGPT and Gemini while operating with fewer visible safety restrictions. Each controversy raises the same question. Can a powerful AI tool be deployed responsibly without strong oversight and enforcement?

    What parents and users should know

    If you encounter sexualized images of minors or other abusive material online, report it immediately. In the United States, you can contact the FBI tip line or seek help from the National Center for Missing & Exploited Children.

    Do not download, share, screenshot or interact with the content in any way. Even viewing or forwarding illegal material can expose you to serious legal risk.

    Parents should also talk with children and teens about AI image tools and social media prompts. Many of these images are created through casual requests that do not feel dangerous at first. Teaching kids to report content, close the app and tell a trusted adult can stop harm from spreading further.

    Platforms may fail. Safeguards may lag. But early reporting and clear conversations at home remain one of the most effective ways to protect children online.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com       

    Kurt’s key takeaways

    The Grok scandal highlights a dangerous reality. As AI spreads faster, these systems amplify harm at an unprecedented scale. When safeguards fail, real people suffer, and children face serious risk. At the same time, trust cannot depend on apologies issued after harm occurs. Instead, companies must earn trust through strong safety design, constant monitoring and real accountability when problems emerge.

    Should any AI system be approved for government or mass public use before it proves it can reliably protect children and prevent abuse? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Why a Fairfax Co. elementary school is teaching kids the ‘how’ behind AI – WTOP News

    [ad_1]

    Vienna Elementary School’s Vienna.i.Lab is transforming education by introducing students to AI and advanced technology.

    David Lee Reynolds, Jr. spent two decades working as a music teacher before transitioning to teach technology.

    When he made the switch, Vienna Elementary School didn’t have a Science, Technology, Engineering, Arts and Math, or STEAM, lab. To best set students up for success, he knew the Northern Virginia campus needed one.

    That thought came around the same time the first large language models were debuting, and artificial intelligence was becoming more mainstream. So he knew once a lab was put together, it would have to be advanced. A traditional STEAM lab would come later.

    Eventually, Reynolds created the Vienna.i.Lab with the goal of helping students understand how the tech works, all so they’re set up to use it more effectively.

    “This is the new stuff, and it’s here to stay,” Reynolds said. “But if you don’t know what it is, then it’s not helpful to you. So let’s fix that.”

    To do it, Reynolds collaborated with the school’s parent-teacher association, which helped raise money so students could use new tools instead of traditional laptops.

    During a lesson on Friday afternoon, a group of first graders used KaiBots. They scanned a card with a code describing how the robot should move, and watched it either follow the instructions or identify an error.

    Even for some of the school’s youngest students, Reynolds said the lesson revealed the “building blocks of where you would eventually get to learning about machine learning, learning about large language models, learning about how ChatGPT works.”

    One student, Nora Vazeen, said the activity is different from what she does in most classes, and “It’s silly.”

    Another student, Callum, echoed that sentiment, saying, “The robot does silly stuff.”

    But, once a week during their technology special, students from kindergarten to sixth grade participate in hands-on activities. While the younger kids use KaiBots, the older students are programming drones.

    The work emphasizes problem solving skills, collaboration and coding skills, Reynolds said.

    “For kids, if they understand how the tool works, they can do amazing things with the tool,” he said. “But if they don’t, they’re going to use the tool like it’s a search feature, and the next thing you know, they’re doing things that are wrong and they’re learning things that are incorrect.”

    While the AI lab is largely the tech cart Reynolds oversees in the corner of the school’s library, he’s hoping one day it can evolve into an innovative space.

    “Let’s build it in a green way,” Reynolds said. “Let’s build it underground. Let’s use geothermal heating and cooling. Let’s build a space, when you walk into it, you’re inspired to go and create.”

    [ad_2]

    Scott Gelman

    Source link

  • Don’t lock your family out: A digital legacy guide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    This is not a happy topic. But it’s essential advice whether you’re 30 or 90.

    If something happened to you tomorrow, could your family get into your digital life? I’m talking about your bank accounts, emails, crypto and a lifetime of memories stored on your phone or computer.

    Big Tech and other companies won’t hand over your data or passwords, even to a spouse, without a hassle, if at all.

    1. The 10-minute setup

    Start with a Legacy Contact. Think of someone you trust who gets access only after you’re gone. Who is that? Good.

    SECRET PHRASES TO GET YOU PAST AI BOT CUSTOMER SERVICE

    One day, you won’t be here anymore, but your tech will bel. Here’s how to plan for that. (iStock)

    · iPhone: Open Settings > tap [Your Name]. Tap Sign-In & Security > Legacy Contact. Go to Add Legacy Contact and follow the prompts.

    · Google: Search for Inactive Account Manager in your Google Account settings. Choose how long Google should wait before acting (e.g., three months). Add up to 10 people to be notified and choose which data (Photos, Drive, Gmail) they can download.

    Google apps, including YouTube, Google and Chrome

    Google has an “Inactive Account Manager” feature. (Chesnot/Getty Images)

    2. The master key problem

    Apple and Google don’t help with banking, insurance, investment or other sites or apps. You need a solid password manager like NordPass that offers emergency access features.

    1. Open your Password Manager and look for Emergency Access.

    2. Add a Digital Heir: Enter the email of a spouse or trusted child.

    3. Set the Safety Delay: Choose a wait period. Usually 7 days is the sweet spot.

    4. How it works: If your contact ever requests access, the app sends you an alert. If you’re fine, you hit Deny. But if you’re incapacitated and can’t respond within those seven days, the vault automatically unlocks for them.

    Pro tip: Your Emergency Contact only gets viewing privileges. They can’t delete or change anything in your vault.

    YOU’LL NEVER TRUST VIDEO AGAIN ONCE YOU SEE WHAT SORA 2 CAN DO

    Facebook app on phone

    Facebook and Instagram have after-death options for accounts. (Karly Domb Sadof, File/AP )

    3. Crypto and social media

    · Crypto: Without your seed phrases, that money is gone. Store them physically along with any instructions and receipts of you buying crypto with your estate paperwork. If you use a crypto hardware wallet, keep that in a fireproof safe.

    · Social media: On Facebook or Instagram, go to Settings > Memorialization. Choose to either have your account deleted or managed by a contact who can post a final tribute.

    Be sure someone knows the passcode to your phone. That’s important for 2FA codes, among other things.

    One more thing. If you found this guide helpful, be sure to get my free newsletter at GetKim.com to stay tech-savvy and secure every day!

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    · National radio: Airing on 500-plus stations across the US, find yours at komando.com or get the free podcast

    · Daily newsletter: Join 650,000 people who read the Current (free!) at komando.com

    · Watch: Kim’s YouTube channel at youtube.com/@kimkomando

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • Longevity Science’s Penis Fixation Has an Extensive, Strange History

    [ad_1]

    If you have dipped a toe into the very strange waters of longevity culture, you may have noticed a theme: There’s an awful lot of dick.

    Tech entrepreneur Bryan Johnson—he of the “don’t die” motto—is particularly obsessed with the ways his penis might help him live forever. The data Johnson collects on his johnson includes ejaculate volume (just over a half teaspoon, apparently double the norm), sperm count and motility, and nighttime erection quality, which he then compares with his teenage son. His regimen to keep his penis in tip-top shape includes shockwave therapy and Botox injections.

    He’s not alone. Dave Asprey, the self-proclaimed father of the biohacking movement and the founder of Bulletproof Coffee, plans to live to 180. He treats his penis to injections of stem cells and acoustic wave therapy. For the latter, he helpfully suggests a DIY version: “Grab the cock and slap it against your leg on the left 67 times,” he said on his podcast, The Human Upgrade. “And then on the right….And you lightly slap the balls…The shock waves stimulate the cells. All of those are good for testosterone and good for enhancing what’s called male energy.” (Urologist Dr. Leon Telis, director of men’s health at Mount Sinai Hospital in New York, said he “would not recommend” this.)

    If that sounds like too much work, Asprey also promotes at-home shockwave wands, along with a cock ring that records data: “firmness, duration, and recovery time,” according to his website. Like an Oura, but for your schlong.

    The current political moment is perfect for penis-hacking. If there’s anything that excites longevity enthusiasts and biohackers more than untested stem cell treatments, it’s the MAHA promise to demolish regulation and bring red-blooded American masculinity back, creating a world where everyone is free to swim in sewage runoff wearing jeans before injecting whatever they want straight into their dicks. There’s a zeitgeisty Venn diagram here—MAHA, the manosphere, messianic tech-bro culture run amok—that makes it feel like the perfect 2025 storm.

    But Jonathan A. Allan, a professor at Brandon University in Manitoba, Canada, who has written a cultural analysis of foreskin and is at work on a book about vastectomies, says that the penis fixation isn’t unique to this particular group of enthusiasts. Instead, it’s an abiding archetype in the quest for immortality. “It’s extreme,” he says of the current culture. “But it’s nothing new. We’ve been doing this for at least a century now.”

    [ad_2]

    Sarah DiGregorio

    Source link

  • Robots learn 1,000 tasks in one day from a single demo

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most robot headlines follow a familiar script: a machine masters one narrow trick in a controlled lab, then comes the bold promise that everything is about to change. I usually tune those stories out. We have heard about robots taking over since science fiction began, yet real-life robots still struggle with basic flexibility. This time felt different.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    ELON MUSK TEASES A FUTURE RUN BY ROBOTS

    Researchers highlight the milestone that shows how a robot learned 1,000 real-world tasks in just one day. (Science Robotics)

    How robots learned 1,000 physical tasks in one day

    A new report published in Science Robotics caught our attention because the results feel genuinely meaningful, impressive and a little unsettling in the best way. The research comes from a team of academic scientists working in robotics and artificial intelligence, and it tackles one of the field’s biggest limitations.

    The researchers taught a robot to learn 1,000 different physical tasks in a single day using just one demonstration per task. These were not small variations of the same movement. The tasks included placing, folding, inserting, gripping and manipulating everyday objects in the real world. For robotics, that is a big deal.

    Why robots have always been slow learners

    Until now, teaching robots physical tasks has been painfully inefficient. Even simple actions often require hundreds or thousands of demonstrations. Engineers must collect massive datasets and fine-tune systems behind the scenes. That is why most factory robots repeat one motion endlessly and fail as soon as conditions change. Humans learn differently. If someone shows you how to do something once or twice, you can usually figure it out. That gap between human learning and robot learning has held robotics back for decades. This research aims to close that gap.

    THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST

    A robot doing dishes

    The research team behind the study focuses on teaching robots to learn physical tasks faster and with less data.  (Science Robotics)

    How the robot learned 1,000 tasks so fast

    The breakthrough comes from a smarter way of teaching robots to learn from demonstrations. Instead of memorizing entire movements, the system breaks tasks into simpler phases. One phase focuses on aligning with the object, and the other handles the interaction itself. This method relies on artificial intelligence, specifically an AI technique called imitation learning that allows robots to learn physical tasks from human demonstrations.

    The robot then reuses knowledge from previous tasks and applies it to new ones. This retrieval-based approach allows the system to generalize rather than start from scratch each time. Using this method, called Multi-Task Trajectory Transfer, the researchers trained a real robot arm on 1,000 distinct everyday tasks in under 24 hours of human demonstration time.

    Importantly, this was not done in a simulation. It happened in the real world, with real objects, real mistakes and real constraints. That detail matters.

    Why this research feels different

    Many robotics papers look impressive on paper but fall apart outside perfect lab conditions. This one stands out because it tested the system through thousands of real-world rollouts. The robot also showed it could handle new object instances it had never seen before. That ability to generalize is what robots have been missing. It is the difference between a machine that repeats and one that adapts.

    AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING

    A robot doing dishes

    The robot arm practices everyday movements like gripping, folding and placing objects using a single human demonstration.  (Science Robotics)

    A long-standing robotics problem may finally be cracking

    This research addresses one of the biggest bottlenecks in robotics: inefficient learning from demonstrations. By decomposing tasks and reusing knowledge, the system achieved an order of magnitude improvement in data efficiency compared to traditional approaches. That kind of leap rarely happens overnight. It suggests that the robot-filled future we have talked about for years may be nearer than it looked even a few years ago.

    What this means for you

    Faster learning changes everything. If robots need less data and less programming, they become cheaper and more flexible. That opens the door to robots working outside tightly controlled environments.

    In the long run, this could enable home robots to learn new tasks from simple demonstrations instead of specialist code. It also has major implications for healthcare, logistics and manufacturing.

    More broadly, it signals a shift in artificial intelligence. We are moving away from flashy tricks and toward systems that learn in more human-like ways. Not smarter than people. Just closer to how we actually operate day to day.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

    Kurt’s key takeaways 

    Robots learning 1,000 tasks in a day does not mean your house will have a humanoid helper tomorrow. Still, it represents real progress on a problem that has limited robotics for decades. When machines start learning more like humans, the conversation changes. The question shifts from what robots can repeat to what they can adapt to next. That shift is worth paying attention to.

    If robots can now learn like us, what tasks would you actually trust one to handle in your own life? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • You can finally change your Gmail address without losing data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    For years, one of the most frustrating limits inside the Google ecosystem was simple but painful. You could not change your primary Gmail address without creating a brand-new account. That meant losing history, purchases and years of saved data. That is now changing.

    Google has started rolling out a feature that lets people replace their existing @gmail.com address with a new one. Even better, everything tied to the account stays exactly where it is.

    Given that Gmail has close to 2 billion active accounts, this update affects almost everyone. It also helps people who stopped using an old Gmail address tied to a past job, a move or a major life change.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW TO STOP GOOGLE AI FROM SCANNING YOUR GMAIL

    Google now lets you change your Gmail address while keeping your emails, files and purchase history in one place.  (Kurt “CyberGuy” Knutsson)

    Why this Gmail change matters

    Many people created their Gmail addresses years ago. Some picked usernames that no longer feel professional. Others tie an address to a relationship, employer or location that no longer applies.

    Until now, Google treated Gmail usernames as permanent. The only workaround involved creating a new account and manually rebuilding everything. This update removes that burden. You can refresh your digital identity without starting over.

    How changing your Gmail address works

    If your account ends in @gmail.com, you may now be able to replace it with a brand-new @gmail.com address.

    Here is what stays the same:

    • Your inbox and email history
    • Google Drive files and folders
    • Google Photos and backups
    • Purchase history and subscriptions

    Your old email address does not disappear. Google automatically converts it into an alias. That means messages sent to both addresses arrive in the same inbox. You can also sign in using either email.

    NEW GMAIL TOOL MAKES IT EASY TO UNSUBSCRIBE FROM EMAILS IN BULK

    laptop

    Your old Gmail address becomes an alias, so messages sent to both addresses land in the same inbox. (Kurt “CyberGuy” Knutsson)

    Important guardrails to know before switching

    Google added limits to prevent abuse and confusion. Once you change your Gmail address, you cannot create another new Gmail address on that same account for 12 months. You can switch back to your original address at any time.

    There are also a few areas where friction may occur. If you use Sign in with Google on third-party websites, you may need to sign in again. Chromebook users and Chrome Remote Desktop users may need to re-authenticate. Before making the switch, Google recommends backing up critical data and reviewing connected apps.

    How to check if the Gmail change feature is available

    Google is rolling this feature out gradually, so it may not appear on every account yet.

    Google may test different layouts, so wording can vary slightly by account

    To check your account:

    • Go to myaccount.google.com on a computer
    • Select Personal Information from the left menu
    • Scroll to the Contact info section
    • Click Google Account email
    • Look for an option to change your Google Account email address

    If you see the option, you can check availability and choose a new Gmail username. If the option does not appear, the feature has likely not yet reached your account. Accounts managed by schools, workplaces or organizations usually require administrator approval.

    What an email alias means and why it matters

    An alias is an additional email address that delivers messages to the same inbox. With this update, your old Gmail address becomes an alias automatically. Aliases are useful beyond Gmail. They help you keep access to old contacts while presenting a cleaner primary address going forward. They also reduce disruption when changing emails across services. If you want to change your email address on other platforms, aliases are often the safest option.

    CYBERSECURITY EXPERT REVEALS SIMPLE TRICK TO STOP COMPANIES FROM TRACKING YOUR ONLINE SHOPPING

    A woman types on her laptop.

    This update gives you a fresh email identity without losing access to the Google services you already use.  (Kurt “CyberGuy” Knutsson)

    How to create an alias in Outlook.com

    Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

    Example:

    If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

    Steps to create an alias:

    • Sign in to your Outlook.com account.
    • Click the gear icon in the upper-right corner to open Settings.
    • Scroll down and select View all Outlook settings.
    • Navigate to Mail
    • Then click Sync email.
    • Click Manage or choose a primary alias under Account alias.
    • Select Add email and follow the prompts to create your new alias.
    • Choose whether to create a new Outlook.com email as an alias or use an existing email (non-Outlook) as an alias.
    • Click Add alias to confirm.

    Once added, you can send emails using your alias by selecting it in the “From” field when composing a new message.

    Important limitations to note:

    • You can add up to 10 aliases in total
    • There’s a limit of 10 new aliases that can be created in one year
    • You can only add two aliases per week
    • Existing Hotmail, Live, Outlook.com and MSN addresses can’t be added as aliases
    • Aliases can only contain letters, numbers, dots (.), underscores (_), or hyphens (-)
    • It’s no longer possible to create new aliases with @hotmail, @live.com, or @msn.com domains

    How to create an alias using your Apple ID

    Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

    • Go to icloud.com/mail and sign in to your Apple Account if necessary.
    • Click the gear icon at the top of the Mailboxes list, then choose Settings.
    • Click Account, then click Add Alias.
    • Provide the requested information:
    • Alias Address: Enter the text to create your alias (e.g., alias@icloud.com). The alias must contain between 3 and 20 characters.
    • Label: Assign a label for the alias. Aliases are listed alphabetically by their labels.
    • Full Name: Enter the name that will appear in the From field of emails you send using this alias.
    • Click Create to finalize the alias.
    • Once created, any email sent to this alias will be forwarded to your primary iCloud email address. For example, if your primary email is yourname@icloud.com, and you create an alias shopping@icloud.com, any emails sent to shopping@icloud.com will appear in your yourname@icloud.com inbox. This allows you to use different addresses for different purposes while keeping everything in one place.

    It’s important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

    Using the “Hide My Email” feature on Apple devices

    Hide My Email is a feature available with iCloud+ that allows you to create unique, random email addresses that are forwarded to your personal email account. This helps keep your real email address private when filling out forms, signing up for newsletters or sending emails. Here’s how to set up Hide My Email:

    • Go to Settings on your iPhone or iPad.
    • Tap your name at the top, then tap iCloud.
    • Tap Hide My Email. Here, you can create and manage your unique email addresses.
    • Tap Create New Address and follow the on-screen instructions to generate a new random email address.

    Here’s how to deactivate a Hide My Email address.

    • Go to Settings on your iPhone or iPad.
    • Tap your name at the top, then tap iCloud.
    • Tap Hide My Email.
    • Tap an existing address.
    • Click Deactivate Email Address to stop forwarding emails to your personal account.
    • Confirm your decision by clicking Deactivate.

    You can also generate Hide My Email addresses directly in Safari, Mail and supported third-party apps by tapping the email address field and selecting Hide My Email above the keyboard.

    Note that Hide My Email has limitations. You need an iCloud+ subscription to use Hide My Email. This feature is not available with the free iCloud plan. While there is no official limit on the number of aliases you can create, some people have reported creating hundreds of addresses without issue. Hide My Email works with iCloud+, Apple Pay and the Mail app. Support for other apps and services is expanding but may not be available for all. Some people have reported occasional issues with email deliverability when using Hide My Email addresses. Managing multiple aliases can become cumbersome, especially if you need to deactivate or update them frequently. 

    How to create a new email alias in Yahoo Mail

    • Open Yahoo Mail:Go to Yahoo Mail and sign in to your account.
    • Go to Yahoo Mail and sign in to your account.
    • Access Settings:Click on the gear icon in the top-right corner to open the settings menu.Select More Settings from the dropdown menu.
    • Click on the gear icon in the top-right corner to open the settings menu.
    • Select More Settings from the dropdown menu.
    • Navigate to Mailboxes:In the left-hand menu, click on Mailboxes.
    • In the left-hand menu, click on Mailboxes.
    • Add a New Alias:Under the Email alias section, click the Add button.Enter the name of your new email alias (without the “@yahoo.com” part) in the field labeled Create a new Yahoo Mail address.Click the Set Up button.
    • Under the Email alias section, click the Add button.
    • Enter the name of your new email alias (without the “@yahoo.com” part) in the field labeled Create a new Yahoo Mail address.
    • Click the Set Up button.
    • Provide Additional Information:Enter your name and a description for the alias and choose whether you want replies to be sent to the alias or your main Yahoo email address.Click the Finish button.
    • Enter your name and a description for the alias and choose whether you want replies to be sent to the alias or your main Yahoo email address.
    • Click the Finish button.
    • Limitations:Limited Number of Aliases: You can only create one main email alias that can both send and receive messages. Additionally, you can create up to 10 send-only email addresses and 500 disposable email addresses.Editing Restrictions: You can only edit your email alias up to two times within a 12-month period. This means you need to choose your alias carefully.Compatibility Issues: Some websites and services may not accept email aliases, especially those that use the “+” character in the address. This can limit the usefulness of aliases for certain sign-ups.Potential for Mix-Ups: Using multiple aliases can sometimes lead to confusion or mix-ups, especially if you forget which alias you used for a particular service.Spam and Security: While aliases can help manage spam, they are not foolproof. Spammers can still send emails to your aliases, and if an alias is compromised, it can lead to spam in your main inbox.Communication Challenges: Managing multiple aliases can complicate communication, especially if you need to reply from the correct alias to maintain clear and consistent communication.
    • Limited Number of Aliases: You can only create one main email alias that can both send and receive messages. Additionally, you can create up to 10 send-only email addresses and 500 disposable email addresses.
    • Editing Restrictions: You can only edit your email alias up to two times within a 12-month period. This means you need to choose your alias carefully.
    • Compatibility Issues: Some websites and services may not accept email aliases, especially those that use the “+” character in the address. This can limit the usefulness of aliases for certain sign-ups.
    • Potential for Mix-Ups: Using multiple aliases can sometimes lead to confusion or mix-ups, especially if you forget which alias you used for a particular service.
    • Spam and Security: While aliases can help manage spam, they are not foolproof. Spammers can still send emails to your aliases, and if an alias is compromised, it can lead to spam in your main inbox.
    • Communication Challenges: Managing multiple aliases can complicate communication, especially if you need to reply from the correct alias to maintain clear and consistent communication.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

    Kurt’s key takeaways

    This Gmail update fixes a problem people have complained about for years. It finally gives you flexibility without forcing a fresh start. Your files, photos and purchase history stay put. At the same time, you get to move on from an email address that no longer fits your life. That kind of upgrade is rare in a digital world that often makes you choose between convenience and control.

    If you could redesign your online identity today, would you finally retire the email address you created years ago? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • President Trump orders divestment in $2.9 million chips deal to protect US security interests

    [ad_1]

    President Donald Trump on Friday ordered the unraveling of a $2.9 million computer chips deal that he concluded threatened U.S. security interests if the current owner, HieFo Corp., remained in control of the technology.The executive order cast a spotlight on a business deal that drew scant attention when it was announced in May 2024 during President Joe Biden’s administration. The deal involved aerospace and defense specialist Emcore Corp. selling its computer chips and wafer fabrication operations to HieFo for $2.92 million — a price that included the assumption of about $1 million in liabilities.But Trump is now demanding that HieFo divest that technology within 180 days, citing “credible evidence” that the current owner is a citizen of the People’s Republic of China.HieFo was founded by Dr. Genzao Zhang and Harry Moore. According to a press release that came out after the deal closed, plans for the technology acquired from Emcore were to be overseen by largely the same team of employees in Alhambra, California.Zhang, who was a vice president of engineering at Emcore before becoming HieFo’s CEO, pledged to “continue the pursuit of the most innovative and disruptive solutions” with technology designed for purposes that would include artificial intelligence.HieFo didn’t immediately respond to a request for comment about Trump’s order.Emcore was a publicly traded company at the time of the HieFo deal, but was taken private last year by the investment firm Charlesbank Capital Partner.

    President Donald Trump on Friday ordered the unraveling of a $2.9 million computer chips deal that he concluded threatened U.S. security interests if the current owner, HieFo Corp., remained in control of the technology.

    The executive order cast a spotlight on a business deal that drew scant attention when it was announced in May 2024 during President Joe Biden’s administration. The deal involved aerospace and defense specialist Emcore Corp. selling its computer chips and wafer fabrication operations to HieFo for $2.92 million — a price that included the assumption of about $1 million in liabilities.

    But Trump is now demanding that HieFo divest that technology within 180 days, citing “credible evidence” that the current owner is a citizen of the People’s Republic of China.

    HieFo was founded by Dr. Genzao Zhang and Harry Moore. According to a press release that came out after the deal closed, plans for the technology acquired from Emcore were to be overseen by largely the same team of employees in Alhambra, California.

    Zhang, who was a vice president of engineering at Emcore before becoming HieFo’s CEO, pledged to “continue the pursuit of the most innovative and disruptive solutions” with technology designed for purposes that would include artificial intelligence.

    HieFo didn’t immediately respond to a request for comment about Trump’s order.

    Emcore was a publicly traded company at the time of the HieFo deal, but was taken private last year by the investment firm Charlesbank Capital Partner.

    [ad_2]

    Source link

  • AI disclosure in healthcare: What patients must know

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence is quickly reshaping healthcare. It now supports diagnostic imaging, clinical decision tools, patient messages and back office workflows. According to the World Economic Forum, 4.5 billion people still lack access to essential care, and the global health worker shortage could reach 11 million by 2030. AI could help close that gap.

    However, as AI becomes more embedded in care, regulators are zeroing in on a simple question. Should patients be told when AI plays a role in their care?

    In the United States, no single federal law requires broad AI disclosure in healthcare. Instead, a growing patchwork of state laws is filling that gap. Some states require clear disclosure. Others mandate transparency indirectly through limits on how AI can be used.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    STATE-LEVEL AI RULES SURVIVE — FOR NOW — AS SENATE SINKS MORATORIUM DESPITE WHITE HOUSE PRESSURE

    AI now supports many healthcare decisions, from patient communications to coverage reviews, making transparency more important than ever for trust and accountability. (Kurt “CyberGuy” Knutsson)

    Why AI disclosure matters for trust

    Transparency is not a technical detail, it is a trust issue. Research across industries shows people expect to be informed when AI affects decisions that matter to them. In healthcare, that expectation is even stronger. An analysis published by CX Today found that when AI use is hidden, trust erodes quickly, even when outcomes are accurate.

    Healthcare depends on trust. Patients follow treatment plans, share sensitive information and stay engaged when they believe care decisions are ethical and accountable.

    How AI disclosure connects to HIPAA and informed consent

    While HIPAA does not directly regulate artificial intelligence, its principles still apply. Covered entities must clearly explain how protected health information is used and safeguarded.

    When AI systems analyze or generate clinical information using patient data, nondisclosure can undermine that goal. Patients may not fully understand how their information shapes care decisions.

    Disclosure also supports informed consent. Patients have the right to understand material factors influencing diagnosis, treatment, or care communications. Just as clinicians disclose new procedures or medical devices, meaningful AI use should be explained, so patients can ask questions and stay involved in their care.

    AI TOOLS COULD WEAKEN DOCTORS’ SKILLS IN DETECTING COLON CANCER, STUDY SUGGESTS

    A stethoscope

    States are stepping in where federal rules fall short, creating new disclosure requirements when AI influences care access, claims, or treatment decisions. (Kurt “CyberGuy” Knutsson)

    What does AI disclosure mean in healthcare?

    AI disclosure means informing patients or members when artificial intelligence systems are used in healthcare-related decisions. This can include clinical messages, diagnostic support tools, utilization review, claims processing or coverage determinations. The goal is transparency, accountability and patient trust.

    Healthcare activities most likely to trigger disclosure

    According to analysis from Morgan Lewis, disclosure requirements most often apply when AI is used for:

    • Patient-facing clinical communications
    • Utilization review and utilization management
    • Claims processing and coverage decisions
    • Mental health or therapeutic interactions

    These areas are considered high impact because they directly affect access to care and understanding of health information.

    Risks of failing to disclose AI use

    Healthcare organizations that fail to disclose AI use face real consequences. These include increased litigation risk, reputational damage and erosion of patient trust. Ethical concerns around autonomy and transparency can also trigger regulatory scrutiny.

    MORE AMERICANS ARE TURNING TO AI FOR HEALTH ADVICE

    A doctor with arms crossed

    Clear AI disclosure helps patients stay informed and involved, reinforcing that licensed healthcare professionals remain responsible for every medical decision. (Kurt “CyberGuy” Knutsson)

    How states are shaping AI disclosure rules

    States are taking different paths to regulate healthcare AI, but most are starting with one common goal: greater transparency when technology influences care.

    California focuses on communication and coverage decisions

    California has taken one of the most comprehensive approaches.

    AB 3030 requires clinics and physician offices that use generative AI for patient communications to include a clear disclaimer. Patients must also be told how to reach a human healthcare professional.

    SB 1120 applies to health plans and disability insurers. It requires safeguards when AI is used for utilization review. It also mandates disclosure and confirms that licensed professionals make medical necessity decisions.

    Colorado regulates high-risk AI systems

    Colorado’s SB24 205 targets AI systems considered high risk. These are tools that materially influence decisions like approval or denial of healthcare services.

    Entities must implement safeguards against algorithmic discrimination and disclose AI use. While broader than clinical care alone, the law directly affects patient access decisions.

    Utah emphasizes mental health and regulated services

    Utah has layered disclosure rules that intersect with healthcare.

    HB 452 requires mental health chatbots to clearly disclose AI use. SB 149 and SB 226 extend disclosure requirements to regulated occupations, including healthcare professionals.

    This approach ensures transparency in therapeutic interactions and clinical services.

    Other states that are expanding AI transparency

    Several other states are moving in the same direction. Massachusetts, Rhode Island, Tennessee and New York are all considering or enforcing rules that require disclosure and human review when AI influences utilization review or claims outcomes. Even when clinical diagnosis is not covered, these laws push accountability where AI affects care access.

    What this means for you

    If you are a patient, expect more transparency. You may see disclosures in messages, coverage notices or digital interactions. If you work in healthcare, AI governance is no longer optional. Disclosure practices must align across clinical, administrative, and digital systems. Training staff and updating patient notices will matter as much as the technology itself. Trust will increasingly depend on how openly AI is introduced into care.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    AI can improve efficiency, expand access, and support clinicians. Yet its value depends on trust. Disclosure does not slow innovation. It strengthens confidence in both the technology and the professionals who use it. As states continue to act, transparency will likely become the norm rather than the exception in healthcare AI.

    If AI helps guide your care, would knowing when and how it is used change the way you trust your healthcare provider? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link