ReportWire

Tag: TECH

  • Don’t fall for fake settlement sites that steal your data

    NEWYou can now listen to Fox News articles!

    Sometimes, data breaches result in more than just free credit monitoring. Recently, Facebook began paying out its $725 million settlement, and AT&T is preparing to distribute $177 million. Those payouts caught scammers’ attention.

    Now, fake settlement claim emails and websites are flooding inboxes. They look convincing, but behind the plain design and official-sounding language is a trap for your Social Security number, banking info and more. So how can you make sure you get your money without losing even more in the process?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    TOP 5 OVERPAYMENT SCAMS TO AVOID

    Why fake settlement sites are so convincing

    Settlement claim websites rarely look polished. Most have generic layouts, long URLs and simple forms asking for a claim ID from your email or postcard. That makes it easy for scammers to mimic them. To test how simple it is, we created a fake settlement site (below) in minutes using AI tools like ChatGPT.

    To steal your data, scammers build fake settlement sites that mimic real sites (Kurt “CyberGuy” Knutsson)

    If we can do it, you can bet criminals are already exploiting the same shortcuts. Facebook has been the target. A fake site once popped up around the Equifax settlement, tricking thousands before it was shut down. The lesson? If the site appears unusual, it doesn’t necessarily mean it’s fake, but it should prompt you to double-check before entering your details or clicking on any links.

    Red flags that expose fake settlement sites

    Spotting a scam often comes down to noticing the little details. Watch for these common warning signs before you hand over your information.

    Requests for too much personal data

    If a site asks for your full Social Security number or the names of your children, stop. For example, the official Equifax settlement only requested the last six digits of SSNs. Genuine claim sites may ask for limited info (like the last four digits of your SSN), but they rarely demand complete Social Security or bank details.

    Promises of payout estimates upfront

    Real administrators calculate payments only after the claim period closes.

    Texts or social media messages

    Settlements are announced by mail or email, not through random DMs or SMS.

    Red flags like odd URLs, urgent countdowns, or fee requests often expose the fraud (Kurt "CyberGuy" Knutsson) 

    Fraud can be found with red flags like odd URLs, urgent countdowns, or fee requests (Kurt “CyberGuy” Knutsson)

    Odd or misspelled URLs

    Even one extra letter in the web address is a sign of a spoof site. Legitimate settlements use official or clearly named administrator domains. Be wary of addresses with unusual add-ons, such as “secure-pay” or “claims-pay.”

    Urgent language or countdowns

    Scammers rely on urgency to pressure you into acting fast. Real settlement sites don’t demand 24-hour turnarounds.

    Processing fee checkboxes

    A sure giveaway of a fake. Real settlement administrators never require money to file or to receive your payout.

    Cheap trust badges

    Scam sites often throw in fake “secure” seals. Look for recognized security seals and make sure they’re clickable and verifiable.

    Generic contact info tied to the suspicious domain

    Official sites list multiple, verifiable contacts. If the email or phone number matches the weird domain, that’s a red flag.

    Grammar or spelling mistakes in the fine print

    Sloppy errors in legal-sounding text are a classic sign you’re looking at a scam.

    Always start at official FTC links or mailed notices to file claims safely (Kurt "CyberGuy" Knutsson) 

    Start with official FTC links or mailed notices to file claims safely (Kurt “CyberGuy” Knutsson)

    How to safely handle settlement claim notices

    Before filing any claim, follow these steps to ensure you’re dealing with a legitimate settlement site and protecting your information.

    1) Start at the FTC

    The Federal Trade Commission keeps updated lists of approved class action settlements at ftc.gov/enforcement/refunds. The legitimate links always point to a .gov website. If your email sends you elsewhere, treat it with caution. 

    2) Cross-check with other resources

    Trusted outlets often cover large settlements and include safe links. ClassAction.org is another resource for checking legitimate URLs.

    3) Skip the links, use the mail

    Your claim notice may include a mailing address. Sending a paper form avoids the digital phishing minefield altogether.

    4) Use strong antivirus software

    Strong antivirus software can block malicious links, warn you about dangerous websites and prevent malware from taking over your device.

    The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS

    5) Try a data removal service

    Data removal services work to scrub your personal information from broker lists, making it more difficult for criminals to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Never pay to file

    If a site asks for “administrative fees” or a “processing charge,” close it immediately. Real settlement administrators will never ask for money.

    7) Report suspicious sites

    Spot a fake? Protect others by reporting it to:

    • The FTC Complaint Assistant at reportfraud.ftc.gov/
    • The Internet Crime Complaint Center (IC3) at ic3.gov/
    • The Consumer Financial Protection Bureau (CFPB) at consumerfinance.gov/about-us/the-bureau/

    Quick reporting helps authorities shut down scams before more people fall victim.

    Can you tell a real email from a fake?

    Take our quick quiz at Cyberguy.com/ScamCheck to learn how to spot phishing scams, protect your inbox, and stay a step ahead of hackers. 

    Kurt’s key takeaways

    Class action settlements can feel like rare wins for consumers after data breaches. But scammers see them as easy hunting grounds. The best defense is skepticism. Check URLs, avoid clicking direct links and never give away details that don’t match the claim’s purpose. Your payout should help you recover, not put you at greater risk.

    Have you ever received a settlement notice that felt suspicious, and how did you handle it? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Google Maps vs Waze vs Apple Maps: Which is best?

    NEWYou can now listen to Fox News articles!

    Navigation apps have become an essential part of modern life. Whether you are commuting to work, running errands or exploring a new city, relying on accurate directions and real-time traffic updates can make all the difference. Over the past decade, Google Maps, Waze and Apple Maps have emerged as the dominant players in this space, each offering a distinct approach to navigation.

    While millions of people rely on these apps daily, choosing the right one can depend on a variety of factors, from interface design to privacy policies. In this article, we compare these three apps across usability, accuracy, features and data handling to help you determine which one best fits your needs.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    What each app does best

    Google Maps is widely regarded as the all-rounder. It combines extensive mapping data with points of interest, public transit information, Street View, Live View AR and detailed business listings. Its versatility makes it a top choice for both daily commuters and travelers.

    Google Maps is a great way to explore the world with detailed routes, Street View, and real-time traffic insights. (OLIVIER DOULIERY/AFP via Getty Images)

    Waze, on the other hand, is designed primarily for drivers. It thrives on community input, offering live updates about traffic jams, road hazards, accidents and even police presence. Since Google owns Waze, many Waze-style real-time alerts have now begun appearing directly inside Google Maps. While Waze still focuses on driving, this integration blurs the lines between the two apps.

    Apple Maps has made major strides in recent years. Once considered the underdog, it’s now a solid choice for iOS users. Its clean interface, privacy-focused design and seamless integration with Siri, CarPlay and Apple Watch make it a convenient pick for those fully in the Apple ecosystem.

    INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS

    Usability and interface

    When it comes to interface, each app approaches design differently.

    Google Maps provides a dense but intuitive layout, giving users access to multiple layers of information, including traffic, satellite imagery and public transit routes. Switching between driving, walking, biking and transit is straightforward, and the search functionality is robust, often displaying detailed business profiles, ratings, and hours of operation.

    Waze prioritizes active driving support. Its interface is visually bold, with clear alerts for traffic jams, accidents and road hazards submitted by other users. While some may find the screen slightly cluttered, the focus is entirely on driving efficiency, which makes sense given its target audience.

    Waze maps app on a phone

    Waze helps to put you on a faster route with live, community-driven alerts that help you dodge traffic jams and road hazards.  (Kurt “CyberGuy” Knutsson)

    Apple Maps offers a minimalist, streamlined interface that emphasizes simplicity. Searching for locations, initiating navigation, and following turn-by-turn instructions is straightforward. The app works seamlessly with iOS features like Siri and CarPlay, providing a smooth and cohesive experience for Apple users.

    Navigation accuracy and performance

    Accurate routing and timely traffic updates are critical.

    Google Maps remains the most reliable for precise routing and travel time estimates. It combines AI-enhanced predictive routing with historical and live traffic data to suggest the best route. Its consistency holds strong across urban and rural areas alike.

    Waze is unmatched for real-time rerouting. Relying heavily on crowd-sourced reports, it often detects slowdowns or hazards before Google Maps does. However, it still struggles when offline or in areas with poor data coverage.

    Apple Maps has significantly improved its routing accuracy, especially in cities. Its traffic data is now crowd-sourced from millions of iPhones, processed on-device to protect privacy. In some rural or international regions, though, it can still lag behind Google Maps and Waze.

    Apple Maps offers smooth, privacy-focused navigation designed for seamless use with your iPhone and CarPlay. 

    Apple Maps offers seamless use with your iPhone and CarPlay for smooth and privacy-focused navigation.  (Kurt “CyberGuy” Knutsson)

    Features and ecosystem integration

    Beyond basic navigation, each app offers additional tools and integrations.

    Google Maps offers offline maps, Live View AR navigation, multi-stop routing, EV charger locations and indoor maps for airports and malls. Integration with Gmail, Calendar and Google Assistant creates a seamless travel experience.

    Waze remains focused on social and driving-specific features. You can report hazards or police sightings and even control Spotify, Audible or podcasts directly from the app without switching screens.

    Apple Maps leans into privacy and ecosystem benefits. Its “Look Around” feature rivals Street View, while EV routing, cycling paths and Siri integration make it ideal for Apple fans. Apple also uses anonymized “Look Around” imagery to train its AI models, but with strict privacy safeguards like blurring faces and plates.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Privacy and data handling

    How these apps handle your personal data matters more than ever.

    Google Maps collects detailed location and usage data to power personalization and advertising. That means better recommendations, but less privacy for users who prefer anonymity.

    Waze, also owned by Google, gathers anonymized driving data to enhance community reporting. Its functionality depends on sharing your location in real time, which is necessary for crowd-sourced accuracy.

    Apple Maps takes a different approach. It processes most data on-device, uses random identifiers instead of personal accounts and does not associate searches with your Apple ID. That makes it the most privacy-conscious option, though even Apple collects anonymized data for traffic and route improvements.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.

    Kurt’s key takeaway

    There is no single “best” navigation app, and the right choice depends on your priorities. Google Maps is ideal if you want a feature-packed, versatile app that works well for a variety of transportation modes and travel scenarios. Its global coverage and rich data make it reliable for everyday use and exploration. Waze is best if your main concern is real-time driving efficiency. Its community-driven traffic alerts and dynamic rerouting help you avoid congestion and save time during daily commutes. Apple Maps suits users deeply embedded in the Apple ecosystem who value simplicity, clean design and privacy protections. It may not have as many features as Google Maps or the same real-time edge as Waze, but its seamless integration with iOS makes it convenient.

    Which navigation app do you rely on most for daily commuting, and why?  Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Stricter visa rules have Colorado employers that rely on foreign workers scrambling

    Iterate.ai has relied heavily on highly trained tech workers from around the globe to meet demand for its customized artificial intelligence agent systems, bringing some of them to the U.S. under the H-1B program when the company can obtain a visa.

    Last month, the tech firm’s growth plans were upended when the Trump administration, via a presidential proclamation, added a $100,000 fee per visa to new petitioners of the H-1B program. It also warned that a higher-wage floor was likely, tilting the odds in favor of older and more highly-skilled workers.

    “We have a number of guys on H-1B visas and a number we are trying to bring in. If we have to pay $100,000 (per worker), that makes it impossible to hire people on those types of visas,” said Jon Nordmark, CEO and co-founder of Iterate.ai, which maintains an office in Highlands Ranch.

    Iterate.ai general counsel Niharika Shukla, left, talks to CEO Jon Nordmark at the artificial intelligence company’s office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)

    The company, among the U.S. firms riding the AI wave, may end up locating more workers in Toronto and fewer in Denver and San Jose, California, where it is based, as it tries to meet the rising demand for its products and services, Nordmark said.

    Moving beyond an initial focus on deporting immigrants with criminal records, the Trump administration is now revising rules for several visa programs used to actively recruit foreign workers to the U.S. Some of the earliest and most dramatic changes have come in the H-1B program, which currently accommodates an estimated 600,000 college-educated workers with specialized skills nationwide.

    The addition of a $100,000 application fee for new H-1B petitions, alongside reforms to favor higher-wage and higher-skilled roles, could have significant implications for tech employers in states like Colorado, where younger and smaller firms dominate.

    The changes could slow innovation and force smaller technology firms to locate more of their workforce outside the country, said Nathan Mondragon, chief innovation officer at Hirevue, a Utah firm that specializes in AI hiring solutions.

    “The immediate effect is that the cost of hiring skilled foreign talent will rise dramatically, particularly for startups and mid-sized companies that depend on specialized skills but may not have deep resources,” said Mondragon, who is a Colorado State University graduate.

    The country’s largest and most established tech firms are expected to have the easiest time covering the fee as the country moves away from a straight lottery system. Jensen Huang, CEO of the world’s most highly valued public company, pledged to pay the $100,000 fee for his company’s H-1B recruits.

    “As one of many immigrants at Nvidia, I know that the opportunities we’ve found in America have profoundly shaped our lives,” Huang wrote to his employees. “And the miracle of Nvidia — built by all of you, and by brilliant colleagues around the world — would not be possible without immigration.”

    Colorado’s tech sector is pushing the envelope in emerging areas like quantum computing and AI, as well as in niche sectors like cybersecurity and financial technology, or fintech. Emerging firms, lacking profits, run leaner and are typically more dependent on the flow of talent emerging from nearby universities, including international students.

    If emerging tech firms can’t obtain the talent they need, they will fall behind. If the state’s tech sector starts to fall behind, Colorado’s economy could find itself coping with slower growth and smaller wage gains, those closest to the tech sector warn.

    “Pay-to-play H1-Bs will box out all smaller companies, including startups, from bringing talented foreigners on board. This will give big companies another advantage in talent acquisition, as if they needed any more advantages,” said Basalt resident Jonathan Greechan, CEO of the Founder Institute, which has tech accelerator chapters in 100 countries.

    Why the H-1B matters

    The H-1B program, which started in 1990, is capped at 65,000 new visas for those with a bachelor’s degree and another 20,000 reserved for applicants with a master’s degree or higher. Colorado employers applied for about 3,800 H-1B visas during the last fiscal year.

    Tech firms claim about two-thirds of the visas issued, with smaller amounts taken by universities, architectural and engineering firms, health care providers and financial companies. In Colorado, EchoStar, Charter Communications, Tata Consultancy Services and Cognizant Technology Services were the private employers requesting the largest number of visas, according to U.S. Citizenship and Immigration Services.

    About three-quarters of the workers coming to the country under the H-1B program, which typically has a three-year term, are from India, with Chinese workers accounting for one-tenth, according to a report from the Pew Research Center. The program is not for permanent residency, although employers can and do seek visa renewals, often to allow employees more time to obtain a green card or citizenship.

    Educational institutions, which until recently were exempt from the cap but now will fall under it, also rely on the program. The University of Colorado’s Denver campus requested 130 visas and the Boulder campus sought 108 last fiscal year, while Denver Public Schools had 101 petitions, according to Citizenship and Immigration Services.

    Nordmark said the program has historically served as a career bridge for foreign students coming to the U.S. to obtain degrees. Upon graduation, they shift from a student visa to an H-1B visa. In some cases, international students obtain multiple and highly specialized degrees until they find employment in the U.S.

    Several of the country’s top tech leaders, including Google CEO Sundar Pichai, Microsoft CEO Satya Nadella and Sun Microsystems co-founder Vinod Khosla, worked under H-1B visas before rising through the ranks.

    The Trump administration has argued that the H-1B program has been misused, suppressing wages and denying native workers higher-paying job opportunities. Third-party firms have used the program to place workers, taking a cut in the process, and vague job titles allow employers to bypass program rules.

    Supporters point to studies that show companies, especially small ones, that employ H-1B workers have stronger earnings growth and are more likely to survive than rivals that don’t. They argue the changes being made will disadvantage the one sector that has contributed more to making the American economy great and will open the door to other countries snagging talent.

    China launched a new K-visa program on Oct. 1 to recruit young science, tech and engineering workers from abroad, the kind that will find it harder to participate in the U.S. H-1B program. Canada, Germany, New Zealand, South Korea and the United Kingdom are also easing rules for foreign workers with specialized skills.

    But China’s new visa program also appears to have created a backlash among unemployed Chinese workers, echoing some of the pushback seen in the U.S., and critics come from both ends of the political spectrum.

    “It’s a complex issue and I can see two sides to the argument that a reasonable person could make,” said David Cohen, CEO of Techstars in Boulder. “If the talent is truly that ‘extraordinary,’ companies are likely to find a way to pay this fee in most cases.”

    He worries that the U.S. could be putting at risk a core competitive advantage — “having great talent wanting to be in this country.”

    The program’s new emphasis on higher wage earners, who will receive more slots in the visa lottery compared to recent college graduates, will favor older, more experienced applicants, said Ben Johnston, COO of Kapitus, a small business lender.

    “Many international students come to U.S. schools with the expectation that they will be able to work here under the H-1B program upon graduation. If fewer visas are available for lower wage earners, this may curtail the demand for a U.S. education for some international students,” Johnston said.

    Many of the greatest tech innovations the country has seen have come from young and hungry entrepreneurs working outside corporate confines, with young immigrants playing a critical role. Greechan said he believes the fee and wage restrictions will make the U.S. less attractive for the best and brightest talent from abroad.

    “I don’t think the current administration cares how much the U.S. has benefited from this consistent influx of talent, simply because it’s not in line with their anti-immigration sentiment,” Greechan said.

    And there is a psychological toll on workers. Niharika Shukla, an attorney working at Iterate.ai, said the changes have left H-1B workers in limbo as they try to navigate the country’s complicated and drawn-out process for obtaining permanent status and citizenship.

    Iterate.ai general counsel Niharika Shukla poses for a portrait at the artificial intelligence company's office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)
    Iterate.ai general counsel Niharika Shukla poses for a portrait at the artificial intelligence company’s office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)

    Initially, it wasn’t clear if the fee would apply to existing visa holders or new petitioners, creating a sense that all jobs could be at risk. Some workers who were on vacation or visiting family thought they needed to return to the U.S. immediately. The administration clarified that it was only for new petitioners.

    Overall, it has created uncertainty about what comes next and a deepening sense of unease, even fear.

    “I have friends — people with advanced degrees, stable jobs, American-raised kids — who still live in visa limbo. They pay taxes, work hard and give back in every way, but every year, they hold their breath during H-1B season. They don’t know if this will be the year it all unravels,” Shukla said.

    Shukla’s husband came to the country on an H-1B visa, which allowed her to obtain an H-4 visa as a spouse and an employment authorization document, or EAD, that allowed her to continue her legal career in the U.S.

    “If anything had happened to his visa, my legal ability to work would’ve disappeared, too,” she said.

    Shukla said a friend’s daughter, who recently started middle school, asked her mom if the family would have to leave this year.

    “That little girl was born here. Her whole world is here. But because her parents are still stuck in the visa queue, even she lives with uncertainty,” Shukla said. “This is the human side of immigration policy that’s so often overlooked. It’s not just about foreign workers or companies. It’s about families, children, stability. It’s about people who want to belong, but are made to feel temporary, year after year.”

    Other industries watching

    Employers in landscaping, tourism and agriculture are keeping an eye on what might come next for the foreign worker visa programs they rely on.

    And the construction industry, which has a heavy concentration of foreign-born workers, is lobbying hard for a visa program as it struggles with stricter immigration enforcement and a looming wave of retirements.

    Landscapers in the state have come to rely heavily on the H-2B program, which is for temporary or seasonal non-agricultural workers. On a per capita basis, Colorado is the biggest user of any state of that program, said John McMahon, CEO of the Associated Landscape Contractors of Colorado.

    Ski resorts and resort hotels also use that program, along with the J-1 visa, a cultural exchange program that brings in multilingual workers able to converse with international guests.

    Finding enough workers to fill open landscaping positions has long been a struggle, even when firms can bring in foreign laborers. The H-2B program is capped at 66,000 new applicants a year nationally, split between 33,000 workers from Oct. 1 to March 31 and 33,000 workers from April 1 to Sept. 30.

    Petitioners are cautious about asking for too many visas, which could draw scrutiny from immigration officials, McMahon said.

    The program allowed for another 64,716 workers, mostly returning workers, last year. But even at 131,000, the allocation is far below the 500,000 that some estimates say are needed to meet actual demand for seasonal workers, he said.

    Most H-2B visa holders work for up to nine months and then return home, although some try to bridge the two seasons. Raids by U.S. Immigration and Customs Enforcement have increasingly made authorized visa holders, including those working in Colorado for years, uneasy and asking themselves if they want to keep coming back, McMahon said.

    On Sept. 2, the administration started requiring that all seasonal workers under the H-2A and H-2B programs, for agricultural and non-ag workers, have in-person interviews at a U.S. consulate location. Returning workers and those with clean records were not exempt. The rule change is expected to result in 350,000 additional interviews in Mexico alone.

    In contrast to the H-2B and H-1B programs, the H-2A program for farm workers doesn’t have a cap. Around 5,000 to 6,000 workers are brought into Colorado each season under that visa. It does have additional requirements that employers provide free housing and meals or access to cooking facilities.

    Unlike California, farms and orchards in Colorado have seen minimal raids from immigration enforcement, said Marilyn Bay Drake, executive director of the Colorado Fruit and Vegetable Growers Association.

    Instead, a state rule that requires overtime pay after 48 hours or 56 hours, depending on the intensity of the harvest season, is complicating their operations and resulting in some H-2A visa holders going elsewhere to work.

    Harvesting requires intense stretches of long hours during short windows of time to bring in and process crops, one reason that ag workers have been excluded from federal overtime requirements.

    Rather than paying overtime, farmers, who often operate on razor-thin margins, are capping hours in Colorado. That has upset some workers, who want to earn as much as they can in the limited time they are in the country.

    Farmworkers sort out freshly picked onions on a conveyor belt at a storage facility at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 09, 2025. (Photo by Andy Cross/The Denver Post)
    Farmworkers sort out freshly picked onions on a conveyor belt at a storage facility at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 09, 2025. (Photo by Andy Cross/The Denver Post)

    “We haven’t seen impacts from immigration policy, but we have seen negative impacts from the overtime regulations in our state,” said  Emily King, compliance and marketing manager at Fagerberg Produce in Eaton.

    The onion farm has three H-2A workers from South Africa who operate harvesting equipment. In June of last year, one of those workers came in on a Friday to say he was resigning and would be leaving Sunday to work at a producer in Idaho who offered him 100 hours a week with no overtime restrictions, King said.

    Duncan Stevens, left, a farmworker from South Africa who has an H-2A visa, drives a truck that's getting loaded with fresh onions in 50-pound burlap sacks on a stack-loader machine, which are then emptied by a crew onto a conveyor belt into the truck on a farm at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 9, 2025. (Photo by Andy Cross/The Denver Post)
    Duncan Stevens, left, a farmworker from South Africa who has an H-2A visa, drives a truck that’s getting loaded with fresh onions in 50-pound burlap sacks on a stack-loader machine, which are then emptied by a crew onto a conveyor belt into the truck on a farm at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 9, 2025. (Photo by Andy Cross/The Denver Post)

    Not only did Fagerberg Produce lose a key worker, but it had also paid for his trip to come to the U.S.

    “For H-2A workers, it’s a proposition of, ‘Is it worth it to come?’ And our state overtime rules weigh heavily on that calculus. It’s magnifying and exacerbating ag’s No. 1 problem, which is access to labor,” said Ashley House, vice president of advocacy and strategy at the Colorado Farm Bureau.

    Construction struggling

    Tougher immigration policies are taking a toll on the construction sector, where about a third of workers are foreign-born, and which lacks a dedicated visa program.

    About nine in 10 construction firms nationally report having a difficult time finding enough qualified workers to hire. They cite those labor shortages as a primary cause behind delayed construction projects, according to a survey released last month by the Associated General Contractors of America.

    About one-third of respondents nationally and in Colorado said tougher immigration enforcement this year had complicated their operations.

    Of the 44 Colorado contractors who took part in the survey, 5% said their work sites had been visited by immigration agents. Another 7% reported workers not showing up because of concerns over actual or rumored enforcement actions. Close to a quarter of the firms surveyed said their subcontractors had lost workers, according to the AGC.

    A construction crew works on a roof in Loveland, Colorado, on Monday, July 14, 2025. (Photo by AAron Ontiveroz/The Denver Post)
    A construction crew works on a roof in Loveland, Colorado, on Monday, July 14, 2025. (Photo by AAron Ontiveroz/The Denver Post)

    Aldo Svaldi

    Source link

  • Australian construction robot Charlotte can 3D print 2,150-sq-ft home in one day using sustainable materials

    NEWYou can now listen to Fox News articles!

    Construction robots are no longer a far-off idea. They’re already changing job sites by tackling repetitive, heavy, and often dangerous tasks. The latest robot comes from Australia, where a spider-like machine named Charlotte is making headlines.

    Charlotte is designed to 3D print an entire 2,150-sq-ft home in just one day. That’s equivalent to the speed of more than 100 bricklayers working simultaneously. This offers a glimpse into how the future of housing might be constructed.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    AUSTRALIA DEBUTS FIRST MULTI-STORY 3D PRINTED HOME – BUILT IN JUST 5 MONTHS

    Charlotte the robot 3D prints homes in just 24 hours using eco-friendly materials.  (Crest Robotics)

    How Charlotte the robot works

    Charlotte is a collaboration between Crest Robotics and Earthbuilt Technology. The robot doesn’t simply stack bricks or tie rebar. Instead, it uses a giant extrusion system that lays down eco-friendly material in layers.

    That material comes from sand, crushed brick and recycled glass, all locally sourced. The result? A structure that’s fireproof, floodproof and created with a far smaller carbon footprint than traditional building methods.

    SUSTAINABLE 3D-PRINTED HOME BUILT PRIMARILY FROM SOIL

    Why Charlotte the robot stands out

    This 3D printing construction robot stands out for its unique mix of speed, strength, versatility and affordability.

    • Speed: Prints a home in 24 hours.
    • Strength: Uses durable, sustainable materials.
    • Versatility: Can raise itself on spider-like legs to keep building higher walls.
    • Affordability: Cuts out many of the expensive steps in construction.

    While Charlotte is still in the development phase, a scaled-down prototype has already been showcased. Researchers believe it could help solve housing shortages where labor is scarce and construction costs are skyrocketing.

    3D printing robot builds a structure beside a supply trailer in a desert setting.

    Its spider-like legs let it climb and build higher, cutting costs and saving time.  (Crest Robotics)

    The future of 3D printed moon bases beyond Earth

    Charlotte’s creators also have their eyes set on the stars. They imagine future versions of the robot building moon bases for research and exploration. With its compact design and autonomous operation, Charlotte could adapt to the extreme environments of space just as well as it can to the challenges on Earth.

    THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST

    What this means for you

    If Charlotte delivers on its promise, it could reshape how homes are built worldwide. Faster construction means quicker housing availability. Lower costs and sustainable materials mean more affordable homes with a smaller environmental impact. For anyone facing rising housing prices or construction delays, technology like Charlotte may bring a ray of hope.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    AMERICA’S LESSONS FROM WORLD’S LARGEST 3D-PRINTED SCHOOLS

    Robot 3D prints a structure on the Moon’s surface under a dark sky with a support vehicle nearby.

    Future versions may even construct Moon bases for research and exploration.  (Crest Robotics)

    Kurt’s key takeaways

    Charlotte may be years away from building its first full-scale home, but its prototype already points toward a future where robots take on critical roles in construction. From tackling housing crises on Earth to building shelters on the moon, Charlotte shows how robotics and 3D printing can work together to solve real problems.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you live in a home 3D printed by a robot like Charlotte, or even in one built on the moon? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • Flying drones take aim at retail theft

    NEWYou can now listen to Fox News articles!

    Shoplifting has long been a challenge for retailers, but a U.S. company now believes that flying drones could help combat the issue. Flock Safety, best known for its law enforcement camera systems, is promoting its new Flock Aerodome Drone as an Automated Security system to the private sector. The idea is simple: if a theft occurs, a drone launches, follows the suspect, and streams live video back to security teams or even police. With theft rates reportedly climbing 93% in 2024, the push for high-tech security has never been stronger.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter  

    An example of a Flock Safety drone, ready to follow theft suspects within seconds (Flock Safety)

    How the drones would work

    Instead of dispatching a guard, Flock’s drones could launch within seconds after motion is detected. Equipped with HD and thermal cameras, the drones can zoom in, track suspects, and relay real-time visuals.

    The company says the system:

    • Covers up to 38 square miles with a single dock
    • Integrates with existing security alarms and camera systems
    • Operates with FAA safety approvals and built-in geofencing
    • Reduces costs by replacing the need for multiple guards

    In theory, the drones act as a “guard in the sky,” providing retailers with rapid coverage across large areas, such as malls, warehouses, or ports.

    Equipped with HD and thermal cameras, the drones track movement across wide areas

    The drone is equipped with HD and thermal cameras; they track movement across wide areas in order to follow suspects. (Flock Safety)

    TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS

    Why retailers may be interested

    Organized retail crime is a growing problem. Retailers have been reporting higher losses, tighter budgets, and fewer staff members available. Flock Safety argues its drone system can act as a deterrent simply by being visible, making criminals think twice before targeting a store. Beyond retail, the company is also pitching its drones to operators of hospitals, warehouse sites, and energy facilities that require large-scale surveillance.

    Retailers may soon rely on drones as a visible deterrent against organized theft

    Due to the drones’ helpful technologies, retailers may soon rely on them as a visible deterrent against organized theft. (Flock Safety)

    HEGSETH TEARS UP RED TAPE, ORDERS PENTAGON TO BEGIN DRONE SURGE AT TRUMP’S COMMAND

    What this means for you

    For shoppers, this could mean visiting stores where drones are part of the security landscape. You might notice them overhead at malls or parking lots, watching for unusual activity. While some may view this as an added safety measure, others may worry about increased surveillance and loss of privacy. For retailers, drones could help protect profits, staff, and customers without the rising costs of hiring additional guards. But whether customers welcome drones buzzing around remains to be seen.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

    Kurt’s key takeaways

    Technology is quickly reshaping how companies approach security, and drones may soon play a bigger role in everyday shopping environments. With faster response times, broader coverage, and lower staffing costs, the idea has clear appeal for retailers. At the same time, questions about privacy and public acceptance will influence the extent to which this technology is adopted.

    Would you feel safer shopping under drone surveillance, or would it make you uncomfortable? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Arizona sheriff’s office utilizing new AI program to assist with writing case reports

    NEWYou can now listen to Fox News articles!

    As artificial intelligence becomes more mainstream, the Pima County Sheriff’s Department is looking at how it can use the emerging technology.

    At the beginning of the year, deputies began a trial of Axon’s Draft One, which is a program that writes incident reports using AI. A body camera records the interactions, then the program uses the audio plus any additional information from the deputy to create a first draft. Deputies then review everything before submitting the final report.

    “They’re able to verify the completeness, the accuracy and all of that,” Capt. Derek Ogden said, “But the initial first draft, they can’t submit as their case report.”

    Demonstrating the program, Deputy Dylan Lane showed how Draft One can write a case report that would have taken him 30 minutes to complete in five minutes.

    CHATGPT MAY ALERT POLICE ON SUICIDAL TEENS

    A Pima County deputy opens Draft One to begin writing his case report. After it’s finished, he will check it for accuracy before submitting it. (Amalia Roy)

    “Most of that time is just the quick changes, making sure that all the information is still accurate and then just adding in those little details,” Lane said.

    Ogden said Draft One saves crucial time during shifts when deputies are handling multiple incidents back-to-back. He said the program is one of several ways the department is exploring AI tools.

    Police report written by AI

    Draft One writes a case report using the recording from an Axon body camera. (Amalia Roy)

    “Recently, we saw a detective from our criminal investigative division use AI to identify a deceased unidentified person,” Ogden said. “We’re also looking for ways to increase the productivity and efficiency of our patrol deputies and some of our corrections officers.”

    Law enforcement agencies across the country are evaluating how artificial intelligence could help their departments, especially when dealing with resource shortages.

    SCHOOLS TURN TO AI GUN DETECTION FOR SAFETY

    “A lot of policing agencies are budget constrained. It is very attractive to them to have a tool that could allow them to do more with less,” said Max Isaacs from The Policing Project, which is a non-profit within NYU School of Law that studies public safety and police accountability. 

    Isaacs said while AI offers opportunities to save resources, there’s not much data on how much help these programs truly provide.

    Body camera on officer

    A Pima County deputy wears an Axon body camera in a simulation of an emergency call. (Amalia Roy)

    “You have a lot of examples of crimes being solved or efficiencies being realized,” Isaacs said, “But in terms of large-scale studies that rigorously show us the amount of benefit, we don’t have those yet.”

    TRUMP SIGNS EXECUTIVE ORDER TO HARNESS AI IN FIGHT AGAINST CHILDHOOD CANCERS

     Isaacs also raised the issue of accuracy. 

    “AI is not perfect. It can rely on data that is flawed. The system itself could be flawed. When you have errors in AI systems, that can lead to some pretty serious consequences. It can lead to false arrests. It could lead to investigators going down a dead end and wasting time and resources,” Isaacs said.

    Addressing those concerns, Ogden agreed that information can be flawed. He said it’s why human eyes must review every report written with Draft One.

    After a successful trial with 20 deputies, Ogden said the next step is to expand Draft One to corrections officers.

    CLICK HERE TO GET THE FOX NEWS APP

    Source link

  • You’ll never trust video again once you see what Sora 2 can do

    NEWYou can now listen to Fox News articles!

    I have to tell you about Sora 2. It’s OpenAI’s new video-generating app that’s both mind-blowing and terrifying.

    It’s the first tool from any AI company that lets you give it a prompt, and, in literally seconds, you get a full-blown, AI-generated video up to a minute long. 

    The results aren’t perfect, but they’re close. Like Hollywood close. 

    LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

    The lighting, camera motion, facial expressions. … It’s all shockingly realistic. 

    AI videos surge in light of the new Sora 2 video-generating app. (iStock)

    Want to see a golden retriever surfing through Times Square in slow motion? Done. A drone shot of a city being built out of clouds? Easy. 

    Dead celebrities

    People are using Sora 2 to generate fake videos of dead celebrities doing things they never did. 

    • JFK is deepfaked into a WWE superstar.
    • Tupac appears with Mr. Rogers talking about respect.
    • Stephen Hawking is attacked in the UFC. Warning: I knew this was all AI, but it was still upsetting to watch. Weird, right?
    • Even Sam Altman, CEO of OpenAI, is shoplifting GPUs from Target.

    SEN SANDERS: AI MUST BENEFIT EVERYONE, NOT JUST A HANDFUL OF BILLIONAIRES

    I’m sure you know that under U.S. law, “defaming” someone only applies to living people, not the dead. That means families and estates have no legal recourse when someone uses AI to humiliate or misrepresent their loved one. It’s a free-for-all right now, and no one’s accountable. 

    Even creepier?  

    Photo of Sora artificial intelligence app on a phone with the Open AI logo in the background

    In this photo illustration, a smartphone screen shows the Sora 2 app icon developed by OpenAI, in front of the company’s logo, Oct. 8, 2025, in Chongqing, China. (Cheng Xin/Getty Images)

    Sora is also being used for stalking and impersonation. All it takes is a photo, and you can make a video of anyone doing anything. Fake crimes, revenge content, political lies. It’s all possible. 

    Zero guardrails

    DEMOCRATS DEMAND ‘ROBOT TAX’ AS AI REPORTEDLY THREATENS TO REPLACE 100M US JOBS

    OpenAI says you need permission to use a person’s face or voice. Yeah, like that’s going to stop someone.  

    If the guy who runs OpenAI can’t stop his own face from being misused, what chance do the rest of us have? 

    Right now, you can only get Sora 2 as an iPhone app. You’ll need an OpenAI account, and it’s still invite-only, so most people don’t have access yet.  

    Sam Altman speaking into a microphone

    Sam Altman, CEO of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)

    Sora 2 is an incredible tool. But it’s being abused, and the guardrails are flimsy at best. So, from now on, when a video goes viral, you better assume it’s fake until proven real.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio: Airing on 500+ stations across the U.S. Find yours or get the free podcast.
    • Daily newsletter: Join 650,000 people who read the Current (free!)
    • Watch: On Kim’s YouTube channel

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

    Source link

  • Scammers now impersonate coworkers, steal email threads in convincing phishing attacks

    NEWYou can now listen to Fox News articles!

    Cybercriminals are getting smarter every day, and one of their most convincing tricks is disguising phishing emails to look like they’re coming from people you trust. Work emails are particularly dangerous because they lower your guard. After all, if the sender is your boss or IT department, why would you suspect anything? Unfortunately, scammers know this and use it to their advantage. I recently received an email from Krysti from Rockwall, Texas, who highlighted a similar issue.

    “I received a spam email from my employer’s email. It had a document attached to it. I tried to open it and could not. I contacted my employer and they told me they hadn’t sent me anything. I changed my password and ran a virus scan. I also have been checking on the dark web for anything coming up on me. So far everything is okay. I did sign up for antivirus software based on your recommendation and we are signed up for identity theft protection. Is there anything else I should do?”

    Incidents like this are more common than many realize, Krysti. And while it sounds like you took the right first steps by changing your password, scanning for malware and monitoring for identity misuse, there are a few additional precautions worth taking. A close call is often a warning sign that your digital habits might need tightening. Let’s break down why these attacks are so dangerous and what everyone should do to make sure they’re fully protected.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    Phishing emails often look like they come from someone you know, making them harder to spot. (Kurt “CyberGuy” Knutsson)

    Why work email scams are so dangerous

    Phishing attempts that impersonate coworkers or employers are particularly effective because they rely on trust and urgency. You’re more likely to open an attachment or click a link if you believe it’s tied to your job. Scammers often spoof legitimate email addresses or use addresses that look almost identical to the real ones, hoping you won’t notice the subtle difference.

    Once you interact with these emails, the risks multiply. Opening a malicious attachment could install spyware or ransomware. Clicking a fake link might lead to a login page designed to harvest your credentials. Even if nothing obvious happens right away, attackers could still be collecting background information to use in a future attack.

    These scams are becoming harder to spot, too. Some are powered by artificial intelligence-generated text, making them free of the usual grammar mistakes that used to be obvious red flags. Others use stolen email threads to insert themselves into ongoing conversations. That’s why even seasoned professionals fall for them.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    A man in a white shirt uses a smartphone, focusing on the screen as he taps with one hand.

    Opening a fake attachment can secretly install malware or spyware on your device. (Kurt “CyberGuy” Knutsson)

    What to do immediately after a close call

    Changing your password or running a malware scan is often not enough to stop attackers. It’s worth going a little further to make sure nothing slipped through. Start by checking your login history to see if there are any unauthorized sign-ins on your email or work accounts.

    Most platforms allow you to review recent activity, including device type and location, and if anything looks suspicious, sign out of all sessions immediately and change your password again. Next, enable two-factor authentication on your email and any other critical accounts. Even if attackers manage to steal your password, they won’t be able to gain access without the second verification step.

    It’s also important to alert your IT team, especially if the email appears to come from your employer’s address. This could mean the company’s email system has been compromised, and notifying them will allow them to investigate and secure other accounts if necessary. Finally, make sure all your software is up to date. Malware often exploits vulnerabilities in outdated systems, so regularly updating your operating system, antivirus and productivity tools adds another layer of protection against future attacks.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Close-up of a person typing on a laptop keyboard, with a computer monitor in the background.

    Work email scams are rising, and even experienced professionals can get fooled. (Kurt “CyberGuy” Knutsson)

    7 ways to check if your device or data is compromised

    Some cyber threats don’t reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they’ve stolen. The following steps are actions anyone can take to make sure their device and personal data remain secure, and to catch any signs of compromise before they turn into serious problems.

    1) Consider a personal data removal service

    The more personal information about you that’s publicly available, the easier it is for scammers to target you. Data removal services can help by scanning hundreds of data broker websites and removing your details from them. Reducing this digital footprint not only makes it harder for attackers to build profiles on you but also limits how easily phishing attempts can be tailored to your life.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS 

    2) Monitor for already exposed personal data

    Your information could already be circulating in breach dumps and underground markets without you realizing it. Identity protection services monitor known dark-web sources, forums and leak sites for your email, phone, SSN and other sensitive details. If they find a match, they alert you so you can act quickly: change passwords, turn on two-factor authentication, and place fraud alerts or credit freezes with the credit bureaus.

    Your information might already be circulating in dark web marketplaces without you realizing it. Identity theft protection services can help by continuously scanning those underground sites for your email, passwords or other sensitive details. If your data does show up, these services notify you right away so you can reset credentials, freeze accounts or take other protective actions before the information is misused.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    3) Watch for suspicious financial activity

    Even if you never shared payment details, attackers may attempt account takeovers or fraudulent transactions using any information they have. Review your bank, credit card and online account statements frequently for unusual activity. Pairing this habit with identity theft protection tools gives you an added safety net, as they often include financial monitoring and fraud alerts to catch problems quickly. 

    4) Review connected accounts

    Email accounts are often the central hub for many other services. If your inbox is compromised, attackers might try to break into linked accounts such as cloud storage, messaging apps or collaboration tools. Check each of these services for unfamiliar logins, permission changes or device activity, and secure them by changing passwords and enabling two-factor authentication. 

    5) Use a password manager

    Weak or reused passwords are one of the easiest ways for attackers to break into accounts after a breach. A password manager solves this by generating and storing strong, unique passwords for every site you use. It also acts as a passive phishing detector. If the tool doesn’t autofill a login form, that’s a sign the page could be fake. Over time, this significantly reduces your risk of falling victim to credential-based attacks.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Install reliable antivirus protection

    Modern cyber threats go beyond viruses. A strong antivirus solution now acts as a full security layer, blocking phishing websites, detecting malicious scripts and stopping suspicious activity before it can compromise your device. If you’ve interacted with a suspicious attachment or link, a reputable antivirus tool can catch malware that might still be hiding in the background.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Enable account alerts

    Most major platforms allow you to turn on alerts for unusual account activity, such as new sign-ins, password resets or changes to security settings. These real-time notifications act as an early warning system, giving you a chance to lock down your accounts before significant damage occurs.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    Close calls like this are unsettling, but they are also valuable wake-up calls. Cybercriminals are constantly refining their tactics, and phishing emails that once looked laughably fake can now be nearly indistinguishable from the real thing. The key is to build layers of defense, not just reactive steps after an incident, but proactive habits that make you a harder target in the first place.

    Have you ever clicked on an email that turned out to be a scam? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • 5 Ways Smart Landlords Manage More Units With Less Effort

    Growth in real estate is often painted as a double-edged sword. On one hand, more units mean more revenue and greater portfolio value. On the other hand, every new property seems to multiply the late-night calls, rent collection headaches, and maintenance requests piling up faster than they can be handled. For many landlords, the idea of doubling their doors teeters between feeling like a life-changing opportunity and burnout waiting to happen.

    But the smartest landlords are opting out of manual, fragmented systems, and choosing to manage smarter. Instead of adding more spreadsheets, sticky notes, or staff hours, forward-thinking landlords are accomplishing more with less stress using automation, centralized dashboards, and data-driven insights that reveal not just what’s happening in their business, but why.

    I’ve seen this shift firsthand in the data flowing through our RentRedi platform. Smart investors are adopting intelligent systems that not only reduce day-to-day friction, but also enable them to grow sustainably, with the ability to expand their portfolios without expanding their stress.

    Work smarter, not harder

    When smart landlords automate processes, it creates a foundation of predictability for their business. For instance, renters who go through our automated tenant screening process submit rent earlier—17 days faster, on average—and are more likely to pay on time, with rates seven percentage points higher than those without screening.

    Additionally, growth-minded landlords automate tenant screening and maintenance coordination to save time while scaling reliably. Automating background, credit, and rental history checks reduces administrative work, minimizes human error, and facilitates faster, more informed leasing decisions. Likewise, centralized maintenance tools track work orders and vendor schedules in real time, reducing follow-ups and preventing small issues from translating into extra hours or operational headaches.

    2. Smart landlords centralize their operations

    Every rental business produces valuable information through rent payments, lease timelines, maintenance requests, and tenant communication. When doing things manually, this information is scattered across emails, texts, and bank statements, making it hard to use in any meaningful way.

    That’s why having organized, accessible data is so powerful. When all this activity is pulled into a single system, it stops being fragmented noise and starts becoming usable intelligence. Smart landlords leverage this data to spot trends—like a property with rising maintenance costs, or a tenant consistently paying late—and take action before those issues erode profitability.

    Instead of relying on gut instinct, growth-minded landlords approach their portfolio the way professional investors do, by using data to guide decisions. Tracking trends in late payments, lease renewals, or maintenance costs reveals which properties are performing well and which may need attention.

    By automating workflows, centralizing data, leveraging mobile tools, and treating information as a true business asset, savvy landlords expand portfolios while reducing their day-to-day burden. Smart landlords build a business that works as intelligently as they do.

    Ryan Barone

    Source link

  • She helped North Korea infiltrate American tech companies

    NEWYou can now listen to Fox News articles!

    This isn’t a ripped-from-the-headlines new Netflix series. This really happened in a quiet neighborhood called Litchfield Park that’s about a 20-minute drive from Phoenix.

    Christina Chapman, 50, looked like your average middle-aged suburban woman. But inside her humble home? A secret cyber ops center built to help North Korean IT workers buy equipment and tools for their military by infiltrating hundreds of U.S. companies. 

    WOMAN LEARNS FATE AFTER DOJ GUILTY PLEA ADMITTING SHE HELPED NORTH KOREAN TECH WORKERS INFILTRATE US COMPANIES

    Christina Chapman, 50, of Litchfield Park, Ariz., set up a massive cyber operation that helped North Korean actors infiltrate U.S. companies. (Department of Justice)

    That picture above was just a small part of her setup.

    North Korean workers aren’t browsing LinkedIn or applying at Google, Amazon and Meta. They can’t. Sanctions block them from working for American companies, at least legally. So what do they do? 

    They steal real Americans’ identities, including names, birth dates, Social Security numbers and more. Then, they use them to pose as remote IT workers, slipping into U.S. companies under anyone’s radar.

    But when companies send out laptops and phones to their “remote new hires”? Those devices can’t exactly be shipped to Pyongyang.

    Enter Christina

    Over the course of three years, Christina turned her suburban home into a covert operations hub for North Korea’s elite cybercriminals.

    She received more than 100 laptops and smartphones shipped from companies all across the U.S. These weren’t no-name startups. We’re talking major American banks, top-tier tech firms and at least one U.S. government contractor. 

    All thought they were hiring remote U.S.-based workers. They had no idea they were actually onboarding North Korean operatives.

    Once the gear arrived, Chapman connected the devices to VPNs, remote desktop tools like AnyDesk and Chrome Remote Desktop, and even rigged up voice-changing software. 

    The goal? To make it seem like the North Koreans were logging in from inside the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea.

    NORTH KOREA LASHES OUT AFTER TRUMP DOJ EXPOSES MASSIVE IT INFILTRATION SCHEME

    Christina Chapman DOJ scene photo

    Chapman’s fake employees “showed up” from halfway around the world every day, siphoning American cash and technology directly into the Kim regime. (Department of Justice)

    Follow the money

    These fake employees “showed up” every day, submitting code, answering emails, taking meetings, all from halfway around the world. In reality, they were siphoning U.S. tech and cash straight into Kim Jong Un’s regime.

    When HR teams requested video verification, Chapman didn’t blink. 

    She jumped on camera herself, sometimes in costume, pretending to be the person in the résumé. She ran the whole operation like a talent agency for cybercriminals, staging fake job interviews, coaching the operatives on what to say and even laundering their salaries through U.S. banks.

    Her take? At least $800,000, paid as “service fees.”

    The total haul for North Korea? Over $17 million in stolen salaries, according to the FBI, which called the scheme a national security threat. Chapman called it “helping her friends.” Really.

    KIM JONG UN’S YOUNG DAUGHTER BEING GROOMED TO LEAD REGIME AFTER MILITARY PARADE VISIT IN CHINA: EXPERT

    North Korea flag next to barb wire

    North Korea netted over $17 million in stolen salaries, courtesy Chapman’s scheme. (Edgar Su/Reuters)

    Eventually, the scam began to unravel. Investigators noticed odd patterns like dozens and dozens of remote hires all listing the same Arizona address, or company systems being accessed from countries the workers supposedly had never visited.

    Chapman was arrested and sentenced in July 2025 to 102 months in federal prison.

    And the wildest part? She did it all from her living room. Talk about working from home! 

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.
    • Daily newsletter: Join 650,000 people who read the Current (free!)
    • Watch: On Kim’s YouTube channel

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

    Source link

  • Deloitte was caught using AI in $290,000 report to help the Australian government crack down on welfare after a researcher flagged hallucinations | Fortune

    Deloitte’s member firm in Australia will pay the government a partial refund for a $290,000 report that contained alleged AI-generated errors, including references to non-existent academic research papers and a fabricated quote from a federal court judgment. 

    The report was originally published on the Australian government’s Department of Employment and Workplace Relations website in July. A revised version was quietly published on Friday after Sydney University researcher of health and welfare law Chris Rudge said he alerted media outlets that the report was “full of fabricated references.”

    Deloitte reviewed the 237-page report and “confirmed some footnotes and references were incorrect,” the department said in a statement Tuesday.

    Deloitte did not immediately respond to Fortune’s request for comment.

    The revised version of the report includes a disclosure that a generative AI language system, Azure OpenAI, was used in its creation. It also removes the fabricated quotes attributed to a federal court judge and references to nonexistent reports attributed to law and software engineering experts. Deloitte noted in a “Report Update” section that the updated version, dated September 26, replaced the report published in July. 

    “The updates made in no way impact or affect the substantive content, findings and recommendations in the report,” Deloitte wrote.

    In late August the Australian Financial Review first reported that the document contained multiple errors, citing Rudge as the researcher who identified the apparent AI-generated inaccuracies. 

    Rudge discovered the report’s mistakes when he read a portion incorrectly stating Lisa Burton Crawford, a Sydney University professor of public and constitutional law, had authored a non-existent book with a title outside her field of expertise.

    “I instantaneously knew it was either hallucinated by AI or the world’s best kept secret because I’d never heard of the book and it sounded preposterous,” Rudge told The Associated Press on Tuesday. 

    The Big Four consulting firms and global management firms such as McKinsey have invested hundreds of millions of dollars into AI initiatives to develop proprietary models and increase efficiency. In September, Deloitte said it would invest $3 billion in generative AI development through fiscal year 2030. 

    Anthropic also announced a Deloitte partnership on Monday that includes making Claude available to more than 470,000 Deloitte professionals.

    In June, the UK Financial Reporting Council, an accountancy regulator, warned that the Big Four firms were failing to monitor how AI and automated technologies affected the quality of their audits. 

    Though the firm will refund its last payment installment to the Australian government, Senator Barbara Pocock, the Australian Greens party’s spokesperson on the public sector, said Deloitte should refund the entire $290,000.

    Deloitte “misused AI and used it very inappropriately: misquoted a judge, used references that are non-existent,” Pocock told Australian Broadcasting Corp. “I mean, the kinds of things that a first-year university student would be in deep trouble for.”“The matter has been resolved directly with the client,” a spokesperson from Deloitte Australia told TheAssociated Press.

    Fortune Global Forum returns Oct. 26–27, 2025 in Riyadh. CEOs and global leaders will gather for a dynamic, invitation-only event shaping the future of business. Apply for an invitation.

    Nino Paoli

    Source link

  • Opinion | Japan Gets New Kind of Leader

    Sanae Takaichi, a hawkish nationalist, wants to make her country great again.

    Walter Russell Mead

    Source link

  • How a single MacBook compromise spread across a user’s Apple devices

    NEWYou can now listen to Fox News articles!

    We trust Macs to be reliable, secure, and mostly resistant to viruses. Apple’s software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there is some truth to that, it does not mean that Macs are immune. Modern malware is smarter, more targeted, and often designed to slip past built-in defenses quietly. Recently, I heard from Jeffrey from Phoenix, AZ, who’s been dealing with this exact situation.

    “I used a MacBook at work and noticed it was performing oddly. I didn’t use an Apple ID on that machine per company protocol. But I had personal devices that I could work from that are now infected. The notepad, maps, and home, among others, seem to be getting hung up. I’ve tried to advise Apple but have had little success. It’s completely taken over my devices, and I don’t know how to resolve this.”

    If your Mac has started acting strange, you are not alone, Jeffrey. Malware infections are more common than many Mac users realize, and spotting them early can make all the difference. Let us break down how to tell if your system is compromised, what protections Apple already provides, and the steps you should take to keep your data safe. If you’re a Windows user facing similar issues, check out our guide: What to do if you think your PC has a virus for step-by-step help.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Mac malware often hides in the background, making it hard to spot at first. (Kurt “CyberGuy” Knutsson)

    Signs your Mac might be infected

    Spotting malware on macOS is not always straightforward. Many threats are designed to stay hidden, running quietly in the background while collecting data or opening a backdoor for attackers. Still, there are a few red flags that usually signal something is wrong.

    One of the first signs is slower performance or frequent overheating. If your Mac suddenly takes a long time to boot, runs hot during light tasks, or lags when performing simple actions, it might be doing more behind the scenes than you realize. Apps that crash or freeze more often than usual are another warning sign. Occasional app failures are normal, but if built-in tools like Safari, Notes, or Mail begin acting unstable, it may point to malicious interference.

    It is also worth paying attention to what is happening under the hood. Checking Activity Monitor for unknown processes or unusually high CPU or memory usage can reveal malware that tries to hide itself with random or unfamiliar names. Redirected web traffic is another classic symptom. If your browser takes you to strange websites, shows pop-ups, or installs new extensions you never approved, adware or spyware might already be present.

    Finally, unexplained changes to your security settings should always raise suspicion. If you notice your firewall turned off, privacy permissions modified, or login items appearing without your knowledge, something could have gained unauthorized control of your system.

    SHAMOS MALWARE TRICKS MAC USERS WITH FAKE FIXES

    Apple logo glows on the front of an Apple Store building at night.

    Strange app behavior, pop-ups, or overheating may signal something’s wrong (Kurt “CyberGuy” Knutsson)

    How macOS protects you by default

    Apple has built several layers of defense into macOS, many of which run silently in the background to keep your system secure. Knowing how they work can help you understand what protections are already in place and where you might still need to add more safeguards.

    Gatekeeper is one of the most important built-in security tools. It checks every app before it runs to make sure it comes from a verified developer, warning or blocking you if the app is not trusted. Another layer of defense is XProtect, Apple’s built-in malware scanner. It updates automatically and can stop many known threats from running, although it is not as thorough as specialized antivirus software.

    System Integrity Protection, or SIP, is another important safeguard. It locks down critical system files and processes so that malware cannot tamper with them even if it gains access. macOS also uses sandboxing and strict permission controls to contain threats. Apps run in isolated environments and must explicitly request permission to access sensitive data such as your camera, files, or location.

    Together, these features make it significantly harder for malicious software to infect your Mac or cause serious damage. However, they are not perfect. Attackers are constantly developing new techniques to bypass these protections, and many threats rely on human error rather than technical exploits. That is why taking additional precautions is still essential, even on a Mac.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Person typing on a laptop at a desk with computer monitors in the background.

    Even Apple’s built-in protections can miss new or advanced threats (Kurt “CyberGuy” Knutsson)

    What to do if your Mac is already infected

    If you find yourself dealing with a Mac that’s already compromised these steps can help you get back in control:

    1) Disconnect from the internet immediately

    Unplug Ethernet or turn off Wi-Fi and Bluetooth. This prevents malware from sending more data out or pulling in additional malicious code.

    2) Back up your important files safely

    Use an external drive or cloud service you trust. Avoid copying entire system folders-just grab personal documents, photos, and files you can’t replace. You don’t want to back up the malware along with them.

    3) Boot into Safe Mode

    Restart your Mac and hold the Shift key. Safe Mode prevents some malware from launching and makes it easier to run cleanup tools.

    4) Run a trusted malware removal tool

    While macOS includes XProtect, you may need something more powerful. A strong antivirus program can detect and remove infections. Run a full system scan to catch hidden threats.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    5) Check your login items and Activity Monitor

    Review what apps are set to launch at startup and remove anything you don’t recognize. If you spot unfamiliar processes hogging resources, don’t just guess. Use our guides at Cyberguy.com/LockUpYourTech to compare what’s safe and learn how to shut down anything suspicious before it causes more trouble.

    6) Consider a clean reinstall of macOS

    If malware persists, wiping your system may be the only option. Erase your Mac’s drive and reinstall macOS from scratch. Restore only the clean files you backed up earlier.

    7) Secure your other devices

    If your iPhone, iPad, or other personal devices are showing strange behavior, run security scans, update their software, and reset key passwords. Malware can sometimes spread through shared Wi-Fi networks, cloud accounts, or files.

    8) Reset key passwords and enable two-factor authentication

    Even after cleanup, assume some of your data may have been exposed. Update your Apple ID, email, banking, and work accounts with strong, unique passwords. Turn on 2FA wherever possible.

    9) Get professional help if needed

    If you’re overwhelmed, you can bring your Mac to an Apple Store for in-person help at the Genius Bar, or schedule a free appointment with Apple Support.

    Person working on a MacBook at a white desk with a smartphone and pen nearby.

    Simple steps like scanning, updating, and using strong passwords can keep your data safe (Kurt “CyberGuy” Knutsson)

    7 ways to keep your Mac from getting infected

    Some cyber threats do not reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they have stolen. These steps can help you strengthen your defenses and reduce the chances of future infections.

    1) Install strong antivirus software

    macOS’s built-in protections are useful but basic. A strong antivirus adds an extra layer by detecting threats in real time, blocking malicious downloads, and even identifying new types of malware before they spread. A strong antivirus also scans email attachments and browser activity, areas where many Mac users are most vulnerable.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Consider a personal data removal service

    Many cyberattacks begin with information freely available online. A data removal service scrubs your personal details from broker sites, reducing the chances of targeted attacks or identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    3) Use a password manager

    Many malware attacks rely on stolen credentials rather than technical exploits. A password manager stores unique, complex passwords for every account and can automatically flag weak or reused ones. It also helps protect you from phishing attempts because it will only autofill passwords on legitimate websites.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4) Enable two-factor authentication

    Even if someone steals your password, two-factor authentication (2FA) makes it much harder for them to access your accounts. It adds an extra step to the login process, requiring a code from your phone or a security key.

    5) Keep macOS and apps updated

    Outdated software is a common entry point for malware. Updates often patch vulnerabilities that attackers could exploit, so turning on automatic updates for both macOS and third-party apps is an easy but effective defense.

    6) Review login items and background processes

    Malware often tries to run at startup so it can operate undetected. Regularly check System Settings to make sure only trusted apps are launching automatically, and use Activity Monitor to investigate anything suspicious.

    7) Use identity theft protection

    If your personal data has already been exposed, an identity theft protection service can monitor for suspicious activity, alert you to breaches, and help you recover quickly if something does go wrong. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Macs have a reputation for being safer than other computers, but that does not mean they are untouchable. Malware has evolved to target macOS more aggressively than ever, and many attacks now rely on tricking users rather than breaking through security software. If your device is behaving strangely, taking action early is the best way to prevent deeper damage.

    How important is cybersecurity when choosing the devices you use every day? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Leaked Meta documents show how AI chatbots handle child exploitation

    NEWYou can now listen to Fox News articles!

    An internal Meta document sheds light on how the company is training its AI chatbot to handle one of the most sensitive issues online: child sexual exploitation. The newly unearthed guidelines detail what’s permitted and what’s strictly forbidden, offering a rare look into how Meta is shaping its AI behavior amid government scrutiny.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    META STRENGTHENS TEEN SAFETY WITH EXPANDED ACCOUNTS

    Meta’s leaked AI guidelines show how contractors train chatbots to reject harmful requests. (Meta)

    Why Meta’s AI chatbot guidelines matter

    According to Business Insider, these rules are now in use by contractors testing Meta’s chatbot. They arrive just as the Federal Trade Commission (FTC) is investigating AI chatbot makers, including Meta, OpenAI, and Google, to understand how these companies design their systems and protect children from potential harm.

    Earlier this year, we reported that Meta’s previous rules mistakenly allowed chatbots to engage in romantic conversations with children. Meta later removed that language, calling it an error. The updated guidelines mark a clear shift, now requiring chatbots to refuse any request for sexual roleplay involving minors.

    CHATGPT MAY ALERT POLICE ON SUICIDAL TEENS

    Smartphone screen with a circular listening indicator and

    The rules forbid any sexual roleplay with minors, but still allow educational discussion of exploitation. (Meta)

    What the leaked Meta AI documents reveal

    The documents reportedly outline a strict separation between educational discussion and harmful roleplay. For example, chatbots may:

    • Discuss child exploitation in an academic or preventive context
    • Explain how grooming behaviors work in general terms
    • Provide non-sexual advice to minors about social challenges

    But chatbots must not:

    • Describe or endorse sexual relationships between children and adults
    • Provide instructions for accessing child sexual abuse material (CSAM)
    • Engage in roleplay that portrays a character under 18
    • Sexualize children under 13 in any way

    Meta’s communications chief Andy Stone told Business Insider that these rules reflect the company’s policy to prohibit sexualized or romantic roleplay involving minors, while adding that additional guardrails are also in place. We reached out to Meta for a comment to include in our article, but did not hear back before our deadline. 

    META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDS

    Phone displaying a furry creature under an umbrella with a share sheet overlay showing contacts and apps.

    New AI products revealed at Meta Connect 2025 make these safety standards even more important. (Meta)

    Political pressure on Meta’s AI chatbot rules

    The timing of these disclosures is key. In August, Sen. Josh Hawley, R-Mo., demanded that Meta CEO Mark Zuckerberg hand over a 200-page rule book on chatbot behavior, along with internal enforcement manuals. Meta missed the first deadline but recently began providing documents, citing a technical issue. This comes as regulators worldwide debate how to ensure the safety of AI systems, particularly as they become integrated into everyday communication tools.

    At the same time, the recent Meta Connect 2025 event showcased the company’s newest AI products, including Ray-Ban smart glasses with built-in displays and enhanced chatbot features. These announcements underscore how deeply Meta is integrating AI into daily life, making the recently revealed safety standards even more significant.

    META ADDS TEEN SAFETY FEATURES TO INSTAGRAM, FACEBOOK 

    How parents can protect their kids from AI risks

    While Meta’s new rules may set stricter limits, parents still play a key role in keeping kids safe online. Here are steps you can take right now:

    • Talk openly about chatbots: Explain that AI tools are not people and may not always give safe advice.
    • Set usage boundaries: Require kids to use AI tools in shared spaces so you can monitor conversations.
    • Review privacy settings: Check app and device controls to limit who your child can chat with.
    • Encourage reporting: Teach kids to tell you if a chatbot says something confusing, scary, or inappropriate.
    • Stay updated: Follow developments from companies like Meta and regulators like the FTC so you know what rules are changing.

    What this means for you

    If you use AI chatbots, this story is a reminder that big tech companies are still figuring out how to set boundaries. While Meta’s updated rules may prevent the most harmful misuse, the documents show how easily gaps can appear and how much pressure it takes from regulators and journalists to close them.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaways

    Meta’s AI guidelines show both progress and vulnerability. On the one hand, the company has tightened restrictions to protect children. On the other hand, the fact that earlier errors allowed questionable content at all reveals how fragile these safeguards can be. Transparency from companies and oversight from regulators will likely continue shaping how AI evolves.

    Do you think companies like Meta are doing enough to keep AI safe for children, or should governments set stricter rules? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Protect yourself from sneaky web injection scams

    NEWYou can now listen to Fox News articles!

    You’re checking your financial account online, moving money or paying bills, when suddenly a pop-up appears. It looks exactly like your bank’s page, complete with logo and branding, but asks for details you’ve already provided. Would you know what to do?

    This is the kind of situation Kent recently faced. He emailed us saying, “Two times this week, I had a financial account open, and I was doing transactions. In the middle of a transaction, up pops a box in the middle of a full page showing the company’s logo. Real, yes, looked as real as it gets. The first time, I fell for it. It asked for my email address to confirm, then my phone number. Sadly, I did. Then I saw about four or five seconds of a screen named CREDIT DONKEY. At that point, I woke up and decided it was a scam. I immediately closed down my computer and called the number on the back of my financial card to report it.”

    Kent’s quick thinking likely saved him from even more damage. But what exactly happened here?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A fake banking pop-up can appear while you’re making real transactions. (Kurt “CyberGuy” Knutsson)

    How web injection scams trick you

    This type of attack is called a web injection scam. It hijacks your browser session and overlays a fake login or verification screen. Because it appears while you’re already logged in, the fake page feels authentic. In Kent’s case, the appearance of “Credit Donkey” flashing on-screen was a red flag. Scammers sometimes abuse legitimate-looking redirects like this to convince victims they are dealing with their bank. The real aim is to capture login credentials or trick you into handing over two-factor authentication codes.

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

    laptop keyboard

    Web injection scams aim to steal your login and security details. (Kurt “CyberGuy” Knutsson)

    Steps to protect yourself from web injection scams

    If you ever find yourself in a situation like Kent’s, here are the most important steps you should take right away to secure your accounts and information.

    1) Monitor your accounts

    Check your recent transactions daily. Turn on alerts for logins, withdrawals or transfers, so you’ll know instantly if someone is trying to move money. 

    2) Change your passwords

    Update the password for any financial account that may have been exposed. Use a strong, unique password generated by a password manager such as NordPass. Next, see if your email has been exposed in past breaches. Our #1 pick, NordPass, includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    3) Remove your personal data from broker sites

    Scammers often get phone numbers, emails and other details from data broker sites before launching attacks like the one Kent faced. A personal data removal service can help wipe this information from those shady databases, so criminals have less fuel for scams. Consider tools that automatically scan and request removal from dozens of brokers at once, saving you the time and hassle of doing it manually.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Enable stronger multi-factor authentication

    Strengthen your account security with multifactor authentication. If your bank offers it, switch from SMS codes to app-based codes with Google Authenticator or Authy. These methods are far harder for scammers to intercept than text messages. 

    5) Scan your devices with antivirus software

    Since the scam appeared while Kent was logged in, malware or a browser hijack may be at play. Run a trusted antivirus to clear hidden phishing scripts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    6) Notify your bank in writing

    Calling is smart, but also send a secure message or letter, so there’s a record. Ask them to put your account on high alert and require extra verification for any big moves.

    7) Freeze your credit

    Place a free credit freeze with Equifax, Experian and TransUnion. That way, scammers can’t open new accounts in your name even if they’ve stolen your personal info.

    8) Consider identity monitoring

    Services like Identity Guard can alert you if your Social Security number, email or phone number shows up where it shouldn’t. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    CLICK HERE TO GET THE FOX NEWS APP

    Person using a credit card

    The bogus page asked for personal details before revealing it was a scam (iStock)

    Smart online banking habits to stay safe

    • Never enter personal details into a pop-up, no matter how real it looks.
    • Always log in fresh through your bank’s official website or app.
    • Keep your browser and operating system fully updated.
    • Use a private email address for your financial accounts that scammers won’t easily guess.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

    Kurt’s key takeaways

    Web injection scams are designed to catch you off guard while you’re doing something routine. Kent’s quick reaction to close the page and contact his bank shows how important it is to stay alert. With the right habits and tools, you can keep scammers out of your accounts.

    Have you ever experienced a scam attempt while banking online? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Meta strengthens teen safety with expanded accounts

    NEWYou can now listen to Fox News articles!

    Meta is rolling out new protections aimed at making social media safer for young people. In September 2024, Instagram introduced Teen Accounts, which come with built-in safeguards that limit who can contact teens, what content they see and how long they spend on the app.

    Since then, adoption has been strong: 97% of teens ages 13-15 kept the default settings, and 94% of parents say Teen Accounts are helpful. Now, Meta is expanding those protections beyond Instagram. Teen Accounts are coming to Facebook and Messenger worldwide, bringing stronger safety standards to more of the apps teens use every day.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter  

    Meta’s new Teen Accounts automatically limit who can contact teens online. (Meta)

    Meta Teen Accounts bring stronger safety tools

    Teen Accounts automatically apply safety limits, including:

    • Restrictions on who can send direct messages.
    • Filtering to reduce exposure to sensitive or harmful content.
    • Time management tools to encourage healthier app use.

    Meta says these measures address parents’ top concerns, giving teens more control while reassuring families that their online experiences are safer.

    Adam Mosseri, head of Instagram, emphasized the goal, saying, “We want parents to feel good about their teens using social media. … Teen Accounts are designed to give parents peace of mind.” 

    Critics and researchers question Meta’s teen safety tools

    However, not everyone agrees that these protections go far enough. Research regarding the effectiveness of Instagram’s teen safety features, as reported by child-safety advocacy groups and corroborated by researchers at Northeastern University (Sept. 25, 2025), paints a different picture. The study found that only eight of 47 safety features tested were fully effective, and internal documents suggest that Meta was aware of some shortcomings. Critics also argued that certain protections, like manual comment-hiding, place the burden on teens themselves rather than preventing harm upfront. They questioned whether time management tools were robust enough, giving some features middling grades despite functioning as described.

    “Misleading and dangerously speculative reports such as this one undermine the important conversation about teen safety,” Meta told CyberGuy, “This report repeatedly misrepresents our efforts to empower parents and protect teens, misstating how our safety tools work and how millions of parents and teens are using them today. 

    “Teen Accounts lead the industry because they provide automatic safety protections and straightforward parental controls. The reality is teens who were placed into these protections saw less sensitive content, experienced less unwanted contact and spent less time on Instagram at night. Parents also have robust tools at their fingertips, from limiting usage to monitoring interactions. We’ll continue improving our tools, and we welcome constructive feedback. But this report is not that.”

    INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS

    Parents say the built-in safety settings give them more peace of mind

    Parents have more peace of mind because they can add a guardian to the account. (Meta)

    Meta expands teen safety with school partnerships

    Meta is also extending protections to the classroom. The School Partnership Program is now available to every middle school and high school in the U.S. Through this program, educators can report issues such as bullying or unsafe content directly from Instagram.

    Reports receive prioritized review, typically within 48 hours. Schools that join also get:

    • Access to educational resources on online safety.
    • A banner on their profile signaling official partnership.
    • Faster escalation paths to address urgent safety concerns.

    Educators who piloted the program praised the improved response times and stronger protections for students. 

    Schools now get faster tools to report bullying and harmful content

    There are more protections for teens in the Teen Account than a normal account. (Meta)

    Meta launches online safety lessons for students

    Beyond apps and schools, Meta partnered with Childhelp to create a nationwide online safety curriculum tailored for middle schoolers. The lessons cover how to recognize online exploitation, what steps to take if a friend needs help and how to use reporting tools effectively.

    The program has already reached hundreds of thousands of students, with a goal of teaching one million middle school students in the coming year. A peer-led version, developed with LifeSmarts, empowers high school students to share the curriculum with younger peers, making the safety conversation more relatable.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Meta’s curriculum teaches middle schoolers how to stay safer online

    Meta’s curriculum includes settings for children to stay safer online. (Meta)

    What this means for you

    For parents, Teen Accounts mean extra protection is in place without needing a complicated setup. Your teen gets safer defaults by default, giving you peace of mind. For educators, the School Partnership Program provides a direct connection to Meta, ensuring reports of unsafe behavior get attention quickly. Students benefit too, with a curriculum designed to give them practical tools for navigating online life safely.

    At the same time, the pushback from critics highlights that there is still debate about whether these safeguards go far enough. While Meta insists its tools work as intended, watchdogs argue that protecting teens online requires even stronger measures.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

    Kurt’s key takeaways

    Meta’s expansion of Teen Accounts marks a major shift in how social platforms approach safety. By adding built-in protections, the company reduces risks for teens without requiring parents to manage every setting. At the same time, the School Partnership Program gives educators new tools to protect students in real time. The online safety curriculum goes one step further by teaching kids how to recognize threats and respond confidently. Still, advocacy groups and independent researchers question whether these efforts are enough, and Meta’s strong defense shows just how high the stakes are in the teen safety debate. As teens spend more of their lives online, the responsibility to protect them grows. The real test will be how well these tools hold up against evolving online threats.

    Do you think Meta’s new measures are enough to protect teens, or should tech companies do even more? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Meta account suspension scam hides FileFix malware

    NEWYou can now listen to Fox News articles!

    Cybercriminals continue to find new ways to target social media users, and Meta accounts remain one of the most common lures. Losing access to Facebook or Instagram can have real consequences for both individuals and businesses, making people more likely to fall for urgent security warnings. Attackers exploit this by sending convincing notifications that pressure you into taking quick action without thinking. 

    That’s exactly what makes the new FileFix campaign so dangerous; it looks like routine account maintenance, but it’s really a trap.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    Cybercriminals are targeting Facebook and Instagram accounts by sending fake security warnings. (Fox News)

    How the FileFix attack works

    As reported by researchers at Acronis, a leading cybersecurity and data protection company, the attack begins with a phishing page that looks like a message from Meta’s support team, claiming that your account will be disabled in seven days unless you view an “incident report.” Instead of providing an actual document, the page disguises a malicious PowerShell command as a file path.

    Victims are instructed to copy it, open File Explorer, and paste it into the address bar. While it appears harmless, this action secretly runs code that starts the malware infection process.

    This method is part of a family of attacks known as ClickFix, where people are tricked into pasting commands into system dialogs. FileFix, created by Red Team researcher mr.d0x, builds on that idea by exploiting the File Explorer address bar instead. In this campaign, the attackers improved the trick by hiding the malicious command behind long strings of spaces, so only the fake file path is visible to the victim.

    A hidden script then downloads what looks like a JPG image from Bitbucket, but the file contains embedded code. Once executed, it extracts another script and decrypts the final payload, bypassing many security tools in the process.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A screenshot of a fake Facebook security alert

    FileFix sends out fake alerts urging users to review their account security. (Acronis)

    What StealC tries to steal

    The malware delivered by this campaign is StealC, an infostealer that collects a wide range of personal and organizational data. It is designed to grab browser credentials and authentication cookies from Chrome, Firefox, Opera, and other browsers.

    It also targets messaging apps like Discord, Telegram and Pidgin, along with cryptocurrency wallets such as Bitcoin, Ethereum and Exodus. StealC goes further by attempting to compromise cloud accounts from Amazon Web Services (AWS) and Azure, VPN services like ProtonVPN and even gaming accounts from Battle.net and Ubisoft. In addition, it can take screenshots of the victim’s desktop, giving attackers a live view of sensitive activity.

    Acronis reported that the campaign has already appeared in several different versions over a short period, with changes in payloads and infrastructure. This suggests that the attackers are actively testing and refining their methods to avoid detection and improve success rates.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Facebook on a phone

    StealC also targets VPN software and cryptocurrency wallets. (iStock)

    5 ways you can protect yourself from FileFix attacks

    To stay protected against attacks like FileFix and prevent malware such as StealC from stealing sensitive information, you need to combine caution with practical security measures. The following steps can help safeguard accounts, devices, and personal data.

    1) Be skeptical of urgent warnings

    Attackers rely on panic. Treat any message claiming your Meta account or other services will be disabled within days with caution. Verify the alert directly through official platforms rather than clicking links or following instructions from an email or web page.

    2) Avoid copying commands from unknown sources

    FileFix relies on convincing you to paste hidden PowerShell commands disguised as file paths. Never paste commands into system dialogs, File Explorer, or terminals unless you are absolutely certain of their origin.

    3) Invest in personal data removal services

    FileFix and StealC thrive on the information they can extract from a device or linked accounts. By using data removal services, you reduce the amount of sensitive personal information that can be found online or left exposed on old platforms. This minimizes what attackers can exploit if they manage to gain access.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Install reliable antivirus software

    A strong antivirus software can detect malware like StealC before it fully executes. Many solutions now include behavior-based detection that can flag suspicious scripts or hidden downloads, helping catch threats even when attackers try to disguise commands as harmless actions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    5) Use a password manager

    While FileFix targets stored credentials, using a reputable password manager reduces risk by creating unique passwords for every site. This way, even if one browser or app is compromised, attackers cannot access your accounts elsewhere.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals keep finding creative ways to trick social media users, and FileFix proves how convincing these scams can look. A fake Meta alert may feel urgent, but pausing before you click or copy anything is the best defense. Relying on strong habits and security tools gives you the upper hand. Data removal services, antivirus software, and password managers each reduce risk in different ways. When you combine them, you make it much harder for attackers to turn a scare tactic into a real threat.

    Should platforms like Meta do more to warn users about these evolving phishing tactics? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Windows 10 support ends: Upgrade to Windows 11 safely

    NEWYou can now listen to Fox News articles!

    With Microsoft ending support for Windows 10 this October, many people are racing to upgrade. Catherine, a longtime HP desktop user, shared her concerns with us: “I need to purchase a new/updated computer with Windows 11 pretty darn quick. I’ve utilized HP desktops for years and would prefer to continue to do so. My concern deals with transferring everything from one computer to another, made more interesting since my husband and I have separate setups and log-ins. I had a My Passport running, but now I believe a lot is in the cloud. We are concerned about losing our emails/contacts, etc. I also use various programs for a couple of groups I’m involved with (Word, PowerPoint, Excel, Adobe Acrobat, etc.), which I cannot afford to lose. Any guidance for a smooth transition would be great.”

    If this sounds familiar, you’re not alone. The good news: you can move everything to a new HP computer running Windows 11 with the right preparation and tools. Here’s a step-by-step guide.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    WHAT HAPPENS WHEN WINDOWS 10 SUPPORT ENDS IN 2025?

    Microsoft will end support for Windows 10 this month. (Microsoft)

    What to prepare before you buy a new computer

    Before you switch to a new Windows 11 PC, take these steps to organize your files, programs and accounts, so the move goes as smoothly as possible.

    1) Inventory what you have and make sure it’s backed up.

    • List the programs/software you use (Word, PowerPoint, Excel, Acrobat, etc.), including any license/activation info.
    • Find where your data is: local hard drive, external My Passport drive or cloud (OneDrive, Google Drive, etc.).
    • Make sure you have backups of anything that’s only local.

    2) Check how your email is set up.

    • If it’s a Microsoft/Outlook/Exchange account, a lot may already be stored in the cloud. Outlook contacts/calendars may sync automatically depending on how your accounts are configured.
    • If you use POP (email downloaded locally), or “local only” Outlook data (.pst files), you’ll need to move those manually.

    3) Have your login accounts ready.

    • Know your Microsoft account credentials (if you use one).
    • Know admin passwords for existing software.

    4) Gather license keys/software installers.

    • For paid apps (Adobe Acrobat etc.), make sure you have install files or know how to re-download, plus activation keys.
    • Make a note of any special settings or plugins you use so they get restored.

    Choosing the right computer for your needs 

    When choosing a new HP computer, confirm it runs Windows 11 out of the box. Pick a model with enough storage to hold all your files and plenty of RAM for multitasking. If you rely on external drives, make sure the new computer has the right ports, like USB-C or USB 3.0.

    You can browse CyberGuy’s best laptop picks or best desktop computers for solid options at Cyberguy.com. If you mainly use your computer for email, browsing, or video calls, a tablet, Chromebook, or iPad might be all you need. They’re low-maintenance, secure, and often more affordable than a new Windows laptop.

    WINDOWS 11 FLAW LETS HACKERS BYPASS SECURE BOOT PROTECTIONS

    Windows 11 and Windows 10

    Windows 11 and Windows 10 operating system logos are displayed on laptop screens. Krakow, Poland, on Feb. 3, 2022.  (Beata Zawrzel/NurPhoto)

    Step-by-step: Migrating to the new Windows 11 computer 

    Moving to a new PC takes planning, but following these steps will help you transfer your files, programs and settings safely. This is especially important if you and your spouse use separate logins.

    Back up everything

    Start by backing up your personal files, documents, pictures and desktop to both your external drive and a cloud service like OneDrive. If you use Outlook, export your email, contacts, and calendar if needed.

    • For POP or local .pst files, go to File → Open & Export → Export → Outlook Data File (.pst) and make a copy.
    • For IMAP or Exchange accounts, confirm that everything has synced properly online.

    Back up Windows and settings

    Use Windows Backup or the built-in tools to save your settings and user folders. Apply the latest Windows updates on the old PC before making the switch.

    Set up the new PC

    When you turn on your new computer, sign in with your Microsoft account if you have one. This helps sync certain settings automatically. Reinstall your Office apps, Adobe Acrobat, and any other software using your license keys or installers.

    Transfer data and settings

    If both PCs are connected and supported, you can use Windows Backup’s “Transfer information to a new PC” option. Simply pair them and choose what to move. If that’s not an option, copy backups from your external drive or cloud storage onto the new computer. Restore email by importing your .pst file if required.

    Verify everything works

    Open your key programs to confirm licensing is valid. Check that your email, contacts and calendar are functioning correctly. Go through your files to make sure nothing is missing.

    Set up backup and ongoing sync

    Once you’re up and running, turn on OneDrive or your preferred cloud service to sync important folders like Documents and Desktop. Finally, create a regular backup plan using either your external drive or the cloud, so your new PC stays protected.

    Common problems to avoid

    Some users run out of space on their new PC because they underestimated how much data they had. Others lose email when they forget to export .pst files. License activation can also cause headaches if the software is tied to the old machine, so always deactivate before reinstalling. And remember that older programs may not work perfectly on Windows 11, so check compatibility in advance.

    Tools that can help

    • 3rd party software: Transfers files, settings and some installed apps automatically. For our picks, search “First 10 things to do if you got a new PC” on Cyberguy.com
    • Windows Backup and Transfer: Free but may require reinstalling programs manually.

    External hard drive backup: Still the simplest safety net for keeping copies of your important files. Copy everything important to your external drive as a safety measure before migrating.

    MICROSOFT AUTHENTICATOR IS DELETING YOUR PASSWORDS

    A person typing on a laptop

    Experts recommend backing up your files to an external hard drive or a cloud service before making the switch. (Kurt “CyberGuy” Knutsson)

    How long the process takes

    Upgrading to a new computer isn’t instant, but knowing the timeline helps you plan your day. On average, you can expect the transition to take most of an afternoon. Here’s what it looks like step by step:

    Choose and order your new PC: Browsing, comparing models and making the purchase usually takes one to two hours.

    Initial setup and Windows updates: When the new computer arrives, the first startup and applying all current Windows updates can take another one to two hours.

    Install key programs: Installing Microsoft Office apps and Adobe Acrobat typically requires about one hour, depending on download speed and license activation.

    Back up data on your old PC: Creating backups of your documents, photos and email accounts usually takes one to three hours. The exact time depends on how much data you have and whether you use an external drive or the cloud.

    Transfer data and settings: Moving files, Outlook .pst backups and Windows settings to the new computer often takes one to two hours.

    Verify that everything works: Allow about an hour to test your programs, check your email and contacts, and confirm that none of your files were left behind.

    Reconnect devices and tweak settings: Finally, plan for 30 to 60 minutes to reconnect printers, set up Bluetooth accessories and customize your desktop and preferences.

    When you add it all together, the full migration can take anywhere from six to ten hours spread over a day. While it requires patience, completing each step carefully ensures that your new Windows 11 computer runs smoothly without losing important data.

    Pro tip: Once your new PC is ready, don’t forget security. Install strong antivirus software right away. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    What to do with your old PC

    Once you’ve finished moving everything over to your new Windows 11 computer and confirmed it’s working, don’t forget about your old PC. Leaving files on it could expose your personal data if the computer is ever donated, recycled or resold.

    Before repurposing, always perform a secure wipe to erase all personal information. This step ensures that sensitive files, passwords and documents can’t be recovered later. After wiping, you can safely recycle the device, donate it or set it up for light use elsewhere in your home.

    For step-by-step instructions, check out how to securely get rid of your old computer before recycling, selling or donating it.  

    CLICK HERE TO GET THE FOX NEWS APP

    What if you’re not ready to upgrade?

    Not everyone wants to switch right away. The good news is that Microsoft recently added two ways to extend Windows 10 support until October 13, 2026.

    • Use Microsoft Rewards: Redeem 1,000 points to keep your Windows 10 system covered.
    • Back up with OneDrive: Sync your files through Windows Backup and get extended support for free.

    These options buy you more time, but remember: Windows 11 is the future. Planning now ensures you won’t be caught off guard when the final end date arrives.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    Upgrading from Windows 10 to Windows 11 may feel overwhelming, but it doesn’t have to be. With the right preparation, backups and tools, you can make the switch smoothly and protect everything that matters.

    Are you ready to upgrade before Windows 10 support runs out, or will you risk sticking with an outdated system? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • The Secret Reason Delta’s Partnership with YouTube Is Smarter Than You Think

    In an email to SkyMiles members, Delta just announced a partnership with YouTube that will let passengers stream ad-free videos on flights and unlock a free two-week trial of YouTube Premium simply by logging in with their account. On the surface, it looks like just another in-flight entertainment perk. But the more you think about it, the clearer it becomes that this isn’t about watching cat videos at 35,000 feet—it’s about turning YouTube into Delta’s secret weapon.

    Look, for the most part, the thing you want to do on an airplane is pass the time by checking your brain out while you get to wherever you’re going. Maybe that means taking a nap or reading a book. For some people, it means watching a movie or live TV. For others, it’s endlessly scrolling on their phone until the pilot announces the descent.

    That said, there is probably no better platform for wasting a large amount of time than YouTube. If you’ve ever gone down the rabbit hole of suggested videos, you know how easy it is to lose an hour—or three. YouTube isn’t just the world’s largest video platform, it’s basically the most effective time machine on the internet. Blink once, and your flight is halfway over.

    Now, to be clear, no one buys a plane ticket because you can watch YouTube. That’s not how people choose airlines. You buy a plane ticket because of price, or schedule, or loyalty points. Entertainment is just a bonus. Besides, if you’re on a flight with Delta’s free Wi-Fi, you can already watch YouTube from your phone or laptop.

    So, if that’s true, why would Delta announce a big partnership with YouTube? Why does it matter?

    It turns out, it’s not about watching YouTube. Sure, there’s a curated collection of YouTube content available on the seatback experience. But the real move here is about YouTube Premium. Delta is offering passengers a two-week free trial of YouTube Premium if they sign in with their SkyMiles account. If you’re already a member, you unlock it just by logging in. If you’re not a member, you can become one right there on the plane.

    That’s the real play.

    Think about it: for Delta, whatever it’s paying YouTube to give away free Premium is basically just a customer acquisition cost. It’s a way to get people to sign up for SkyMiles. After all, airlines make more profit on their loyalty programs than on flying planes. Getting people to join SkyMiles isn’t just about keeping them on Delta flights—it’s about getting them into Delta’s entire ecosystem, from credit cards to co-branded offers to upgrades and perks. Every new member is long-term value.

    What better way to get someone to sign up than to offer them the single most universal entertainment perk? Everyone loves YouTube. Almost everyone uses it. And yet, once you experience YouTube Premium, you realize it’s infinitely better.

    I think you could make the case that YouTube Premium is the most no-brainer entertainment subscription there is. If you made me give up one of the services I pay for, I’d cancel all of them before I gave up Premium. Not because YouTube’s content is inherently better than Netflix, Disney+, or Spotify, but because there are no ads.

    That’s it. That’s the whole thing. No ads. Okay, technically, YouTube Premium includes other benefits like YouTube Music, but the no ads thing is the reason it’s worth paying for.

    It changes the experience so dramatically that it’s hard to go back once you’ve tried it. Ads on YouTube are relentless—sometimes three in a row before your video even starts. Once they’re gone, you realize how much brain space you were wasting on interruptions. Premium is less about adding features and more about taking away the one thing that drives people crazy.

    Delta is banking on exactly that. The free trial onboard is a taste test. You’re sitting in your seat, you log into Wi-Fi, you click on YouTube, and suddenly you’re in the ad-free world. If you’ve never tried it before, you’ll wonder why you waited this long. That’s when YouTube—and by extension, Delta—wins.

    Because here’s the thing: once you associate that premium, uninterrupted experience with signing into SkyMiles, you’ve just built a connection in the customer’s mind. Delta isn’t just an airline; it’s the company that gave you better YouTube.

    From Delta’s perspective, the cost of subsidizing YouTube Premium trials is probably negligible compared to the lifetime value of a SkyMiles member. And for YouTube, it’s a distribution play. It’s hard to think of a better way to put YouTube Premium in front of millions of people than during a captive moment at 35,000 feet?

    That’s why this is so smart. Delta figured out how to turn downtime into a loyalty engine. Airlines spend a lot of time trying to differentiate themselves in ways most passengers don’t notice. But the smartest moves are the ones that connect convenience with loyalty in a way that feels obvious. This is one of those moves.

    Delta didn’t invent YouTube. It didn’t invent Premium. But it figured out how to use both to make SkyMiles more valuable, and to make flying Delta feel a little less painful. That’s a win for the airline, a win for YouTube, and—at least for a few hours in the air—a win for passengers.

    The opinions expressed here by Inc.com columnists are their own, not those of Inc.com.

    Jason Aten

    Source link

  • Tesla vehicle sales made a comeback last quarter. Will a lost EV tax credit end the rebound? | Fortune

    During a rough week for electric-vehicle makers in the U.S., Tesla investors got at least one piece of good news on Thursday. The EV maker reported a pronounced increase in sales—better numbers than Wall Street had predicted, and a respite from the lagging deliveries Tesla has been reporting over the last two quarters.

    While analysts had expected Tesla to sell around 450,000 EVs over the three months ending in September, Tesla ended up delivering more than 497,000—about 100,000 more than the previous quarter, and a 7.5% increase from this time last year. Dan Ives, one of Tesla’s most notorious bulls, blasted out an analyst note that same morning, describing the numbers as a “massive bounceback” for Tesla—a turnaround for a company that has been battered over the first half of this year in several key markets as CEO Elon Musk tried his hand in a brief yet chaotic stint in American politics.

    The key question is this: Will it last? 

    After all, Tesla’s short-term sales surge was closely related to its looming longer-term challenge. One of the key reasons for Tesla’s strong sales figures, investors and analysts noted, was the temporary rush of consumers purchasing an EV right before the elimination of the $7,500 electric vehicle tax credit. That incentive—which officially ended on Tuesday—had been in place for 17 years and had helped narrow the price gap between electric and gas vehicles for U.S. buyers. Tesla on Wednesday went ahead and increased the cost of leasing its vehicles, as its first move reflecting the change.

    With the tax credits no longer available, the change is expected to take a significant toll on consumer demand—at least in the near term. 

    Tesla is well aware of this. It added risk disclosures in its latest quarterly filings about the potential impact of the loss of the consumer incentive as well as another now-non-existent sales booster, carbon offset incentives for manufacturers. The EV maker acknowledged the possibility that their removal could harm both demand from Tesla customers and the company’s future financial returns. 

    Musk himself has opined on the topic, too. “Yeah, we probably could have a few rough quarters,” he said in July on Tesla’s last earnings call, in response to an analyst’s question. “I’m not saying we will, but we could. Q4, Q1, maybe Q2.”

    Andrew Rocco, a stock strategist with Zacks Investment Research and an investor in Tesla shares, said in an interview that he’s anticipating a drop off in sales for the next two quarters or so. 

    But the long-term impact may be contingent on several other factors: whether Tesla can absorb some of the lost credit in order to keep prices down; whether it can continue to regain market share in markets like Europe and China where its reputation has suffered over the last eight months; and whether the EV maker can deliver on the timelines it has furnished for a more-affordable Model Y.

    “If they can come out with that cheaper model Y… That would be a huge catalyst to help them offset that EV tax credit sunsetting,” Rocco says.

    Last time around

    It’s worth doing a quick history lesson when considering how Tesla may respond to the elimination of the $7,500 tax credit. After all, this isn’t the first time it’s had to do so.

    If you recall, when the incentive was first put in place via bipartisan legislation in the late 2000s, there was a cap: After a vehicle manufacturer sold a total of 200,000 eligible vehicles, the tax credit would slowly phase out until it was eliminated altogether. Both Tesla and General Motors ended up hitting that threshold, and their tax credits were halved twice before dissolving completely. The cap was removed under the Inflation Reduction Act of 2022, allowing Tesla and GM to take advantage of it again.

    Back in 2018, Tesla sold 200,000 EVs, becoming the first EV maker to hit said cap. As a result, in January 2019, Tesla customers had their rebates cut in half to $3,750. To respond to the change, Tesla rolled out a $2,000 price cut for the Model S, Model X, and Model 3 the very next day, absorbing a large chunk of the lost incentive.

    Because of Tesla’s strong margins, Rocco pointed out that Tesla could be in a position to do the same today if it chooses.

    So far, Tesla hasn’t committed one way or another. The company has committed to releasing a lower-cost Tesla Y model later this year, however. Musk said that the new vehicle would be “available to everyone” before the end of 2025. 

    That model has been rumored to cost somewhere around $39,990—which would be approximately $5,000 cheaper than the most affordable Model Y currently available. But there hasn’t been a firm price announcement. Rocco said that it will be “critical” for Tesla to meet Musk’s fourth-quarter deadline. 

    Cost savings

    It seems that all EV-makers are on the hunt for potential cost savings right now that they can ultimately pass down to the customer in lieu of the bygone tax credit. 

    Chris Barman, CEO of Slate Auto, the startup that plans to start selling its low-cost customizable trucks to customers next year, told Fortune in an interview on Tuesday that there’s at least one upside to the loss of the tax credit. Because the company is no longer subject to all the supplier restrictions required under the Inflation Reduction Act to secure customers the tax credit, Slate has more options for battery suppliers that it can work with. “It would give us the opportunity to pass lower costs along to the consumer in a different way,” Barman said.

    That being said, don’t expect those cost savings to add up to $7,500. While Barman wouldn’t provide a specific figure, she acknowledged, “It’ll be a significant cost reduction, but it won’t offset the full amount of credit itself.”

    Another thing to keep in mind: There are still state-level incentives, too, as Barman pointed out—with the potential for more. A handful of states, including California, Colorado, Vermont, and Connecticut, currently offer their residents an EV tax credit. And states including Pennsylvania, Minnesota, and Texas are looking at incorporating their own incentives, too.

    Tesla, meanwhile, is hoping that its impending autonomous capabilities will give the company an edge, even as its vehicles suddenly become more expensive for customers. Tesla is expected to roll out the 14th iteration of its “full self-driving” software shortly, and has already started doing so with select influencers this week.

    “Once you get to autonomy at scale in the second half of next year, certainly by the end of next year, I think the—I would be surprised if Tesla’s economics are not very compelling,” Musk said during the Q2 earnings call.

    Wall Street thus far doesn’t seem quite as optimistic. On Thursday, even after Tesla reported its strong sales figures, shares fell more than 5%.

    Jessica Mathews

    Source link