Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
Sometimes, data breaches result in more than just free credit monitoring. Recently, Facebook began paying out its $725 million settlement, and AT&T is preparing to distribute $177 million. Those payouts caught scammers’ attention.
Now, fake settlement claim emails and websites are flooding inboxes. They look convincing, but behind the plain design and official-sounding language is a trap for your Social Security number, banking info and more. So how can you make sure you get your money without losing even more in the process?
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
Settlement claim websites rarely look polished. Most have generic layouts, long URLs and simple forms asking for a claim ID from your email or postcard. That makes it easy for scammers to mimic them. To test how simple it is, we created a fake settlement site (below) in minutes using AI tools like ChatGPT.
To steal your data, scammers build fake settlement sites that mimic real sites(Kurt “CyberGuy” Knutsson)
If we can do it, you can bet criminals are already exploiting the same shortcuts. Facebook has been the target. A fake site once popped up around the Equifax settlement, tricking thousands before it was shut down. The lesson? If the site appears unusual, it doesn’t necessarily mean it’s fake, but it should prompt you to double-check before entering your details or clicking on any links.
Red flags that expose fake settlement sites
Spotting a scam often comes down to noticing the little details. Watch for these common warning signs before you hand over your information.
Requests for too much personal data
If a site asks for your full Social Security number or the names of your children, stop. For example, the official Equifax settlement only requested the last six digits of SSNs. Genuine claim sites may ask for limited info (like the last four digits of your SSN), but they rarely demand complete Social Security or bank details.
Promises of payout estimates upfront
Real administrators calculate payments only after the claim period closes.
Texts or social media messages
Settlements are announced by mail or email, not through random DMs or SMS.
Fraud can be found with red flags like odd URLs, urgent countdowns, or fee requests(Kurt “CyberGuy” Knutsson)
Odd or misspelled URLs
Even one extra letter in the web address is a sign of a spoof site. Legitimate settlements use official or clearly named administrator domains. Be wary of addresses with unusual add-ons, such as “secure-pay” or “claims-pay.”
Urgent language or countdowns
Scammers rely on urgency to pressure you into acting fast. Real settlement sites don’t demand 24-hour turnarounds.
Processing fee checkboxes
A sure giveaway of a fake. Real settlement administrators never require money to file or to receive your payout.
Cheap trust badges
Scam sites often throw in fake “secure” seals. Look for recognized security seals and make sure they’re clickable and verifiable.
Generic contact info tied to the suspicious domain
Official sites list multiple, verifiable contacts. If the email or phone number matches the weird domain, that’s a red flag.
Grammar or spelling mistakes in the fine print
Sloppy errors in legal-sounding text are a classic sign you’re looking at a scam.
Start with official FTC links or mailed notices to file claims safely(Kurt “CyberGuy” Knutsson)
How to safely handle settlement claim notices
Before filing any claim, follow these steps to ensure you’re dealing with a legitimate settlement site and protecting your information.
1) Start at the FTC
The Federal Trade Commission keeps updated lists of approved class action settlements at ftc.gov/enforcement/refunds. The legitimate links always point to a .gov website. If your email sends you elsewhere, treat it with caution.
2) Cross-check with other resources
Trusted outlets often cover large settlements and include safe links. ClassAction.org is another resource for checking legitimate URLs.
3) Skip the links, use the mail
Your claim notice may include a mailing address. Sending a paper form avoids the digital phishing minefield altogether.
4) Use strong antivirus software
Strong antivirus software can block malicious links, warn you about dangerous websites and prevent malware from taking over your device.
The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.
Data removal services work to scrub your personal information from broker lists, making it more difficult for criminals to target you.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
6) Never pay to file
If a site asks for “administrative fees” or a “processing charge,” close it immediately. Real settlement administrators will never ask for money.
7) Report suspicious sites
Spot a fake? Protect others by reporting it to:
The FTC Complaint Assistant at reportfraud.ftc.gov/
The Internet Crime Complaint Center (IC3) at ic3.gov/
The Consumer Financial Protection Bureau (CFPB) at consumerfinance.gov/about-us/the-bureau/
Quick reporting helps authorities shut down scams before more people fall victim.
Can you tell a real email from a fake?
Take our quick quiz at Cyberguy.com/ScamCheck to learn how to spot phishing scams, protect your inbox, and stay a step ahead of hackers.
Kurt’s key takeaways
Class action settlements can feel like rare wins for consumers after data breaches. But scammers see them as easy hunting grounds. The best defense is skepticism. Check URLs, avoid clicking direct links and never give away details that don’t match the claim’s purpose. Your payout should help you recover, not put you at greater risk.
Have you ever received a settlement notice that felt suspicious, and how did you handle it? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Navigation apps have become an essential part of modern life. Whether you are commuting to work, running errands or exploring a new city, relying on accurate directions and real-time traffic updates can make all the difference. Over the past decade, Google Maps, Waze and Apple Maps have emerged as the dominant players in this space, each offering a distinct approach to navigation.
While millions of people rely on these apps daily, choosing the right one can depend on a variety of factors, from interface design to privacy policies. In this article, we compare these three apps across usability, accuracy, features and data handling to help you determine which one best fits your needs.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
What each app does best
Google Maps is widely regarded as the all-rounder. It combines extensive mapping data with points of interest, public transit information, Street View, Live View AR and detailed business listings. Its versatility makes it a top choice for both daily commuters and travelers.
Google Maps is a great way to explore the world with detailed routes, Street View, and real-time traffic insights.(OLIVIER DOULIERY/AFP via Getty Images)
Waze, on the other hand, is designed primarily for drivers. It thrives on community input, offering live updates about traffic jams, road hazards, accidents and even police presence. Since Google owns Waze, many Waze-style real-time alerts have now begun appearing directly inside Google Maps. While Waze still focuses on driving, this integration blurs the lines between the two apps.
Apple Maps has made major strides in recent years. Once considered the underdog, it’s now a solid choice for iOS users. Its clean interface, privacy-focused design and seamless integration with Siri, CarPlay and Apple Watch make it a convenient pick for those fully in the Apple ecosystem.
When it comes to interface, each app approaches design differently.
Google Maps provides a dense but intuitive layout, giving users access to multiple layers of information, including traffic, satellite imagery and public transit routes. Switching between driving, walking, biking and transit is straightforward, and the search functionality is robust, often displaying detailed business profiles, ratings, and hours of operation.
Waze prioritizes active driving support. Its interface is visually bold, with clear alerts for traffic jams, accidents and road hazards submitted by other users. While some may find the screen slightly cluttered, the focus is entirely on driving efficiency, which makes sense given its target audience.
Waze helps to put you on a faster route with live, community-driven alerts that help you dodge traffic jams and road hazards. (Kurt “CyberGuy” Knutsson)
Apple Maps offers a minimalist, streamlined interface that emphasizes simplicity. Searching for locations, initiating navigation, and following turn-by-turn instructions is straightforward. The app works seamlessly with iOS features like Siri and CarPlay, providing a smooth and cohesive experience for Apple users.
Navigation accuracy and performance
Accurate routing and timely traffic updates are critical.
Google Maps remains the most reliable for precise routing and travel time estimates. It combines AI-enhanced predictive routing with historical and live traffic data to suggest the best route. Its consistency holds strong across urban and rural areas alike.
Waze is unmatched for real-time rerouting. Relying heavily on crowd-sourced reports, it often detects slowdowns or hazards before Google Maps does. However, it still struggles when offline or in areas with poor data coverage.
Apple Maps has significantly improved its routing accuracy, especially in cities. Its traffic data is now crowd-sourced from millions of iPhones, processed on-device to protect privacy. In some rural or international regions, though, it can still lag behind Google Maps and Waze.
Apple Maps offers seamless use with your iPhone and CarPlay for smooth and privacy-focused navigation. (Kurt “CyberGuy” Knutsson)
Features and ecosystem integration
Beyond basic navigation, each app offers additional tools and integrations.
Google Maps offers offline maps, Live View AR navigation, multi-stop routing, EV charger locations and indoor maps for airports and malls. Integration with Gmail, Calendar and Google Assistant creates a seamless travel experience.
Waze remains focused on social and driving-specific features. You can report hazards or police sightings and even control Spotify, Audible or podcasts directly from the app without switching screens.
Apple Maps leans into privacy and ecosystem benefits. Its “Look Around” feature rivals Street View, while EV routing, cycling paths and Siri integration make it ideal for Apple fans. Apple also uses anonymized “Look Around” imagery to train its AI models, but with strict privacy safeguards like blurring faces and plates.
How these apps handle your personal data matters more than ever.
Google Maps collects detailed location and usage data to power personalization and advertising. That means better recommendations, but less privacy for users who prefer anonymity.
Waze, also owned by Google, gathers anonymized driving data to enhance community reporting. Its functionality depends on sharing your location in real time, which is necessary for crowd-sourced accuracy.
Apple Maps takes a different approach. It processes most data on-device, uses random identifiers instead of personal accounts and does not associate searches with your Apple ID. That makes it the most privacy-conscious option, though even Apple collects anonymized data for traffic and route improvements.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.
Kurt’s key takeaway
There is no single “best” navigation app, and the right choice depends on your priorities. Google Maps is ideal if you want a feature-packed, versatile app that works well for a variety of transportation modes and travel scenarios. Its global coverage and rich data make it reliable for everyday use and exploration. Waze is best if your main concern is real-time driving efficiency. Its community-driven traffic alerts and dynamic rerouting help you avoid congestion and save time during daily commutes. Apple Maps suits users deeply embedded in the Apple ecosystem who value simplicity, clean design and privacy protections. It may not have as many features as Google Maps or the same real-time edge as Waze, but its seamless integration with iOS makes it convenient.
Which navigation app do you rely on most for daily commuting, and why? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter. CLICK HERE TO GET THE FOX NEWS APP
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Iterate.ai has relied heavily on highly trained tech workers from around the globe to meet demand for its customized artificial intelligence agent systems, bringing some of them to the U.S. under the H-1B program when the company can obtain a visa.
Last month, the tech firm’s growth plans were upended when the Trump administration, via a presidential proclamation, added a $100,000 fee per visa to new petitioners of the H-1B program. It also warned that a higher-wage floor was likely, tilting the odds in favor of older and more highly-skilled workers.
“We have a number of guys on H-1B visas and a number we are trying to bring in. If we have to pay $100,000 (per worker), that makes it impossible to hire people on those types of visas,” said Jon Nordmark, CEO and co-founder of Iterate.ai, which maintains an office in Highlands Ranch.
Iterate.ai general counsel Niharika Shukla, left, talks to CEO Jon Nordmark at the artificial intelligence company’s office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)
The company, among the U.S. firms riding the AI wave, may end up locating more workers in Toronto and fewer in Denver and San Jose, California, where it is based, as it tries to meet the rising demand for its products and services, Nordmark said.
Moving beyond an initial focus on deporting immigrants with criminal records, the Trump administration is now revising rules for several visa programs used to actively recruit foreign workers to the U.S. Some of the earliest and most dramatic changes have come in the H-1B program, which currently accommodates an estimated 600,000 college-educated workers with specialized skills nationwide.
The addition of a $100,000 application fee for new H-1B petitions, alongside reforms to favor higher-wage and higher-skilled roles, could have significant implications for tech employers in states like Colorado, where younger and smaller firms dominate.
The changes could slow innovation and force smaller technology firms to locate more of their workforce outside the country, said Nathan Mondragon, chief innovation officer at Hirevue, a Utah firm that specializes in AI hiring solutions.
“The immediate effect is that the cost of hiring skilled foreign talent will rise dramatically, particularly for startups and mid-sized companies that depend on specialized skills but may not have deep resources,” said Mondragon, who is a Colorado State University graduate.
The country’s largest and most established tech firms are expected to have the easiest time covering the fee as the country moves away from a straight lottery system. Jensen Huang, CEO of the world’s most highly valued public company, pledged to pay the $100,000 fee for his company’s H-1B recruits.
“As one of many immigrants at Nvidia, I know that the opportunities we’ve found in America have profoundly shaped our lives,” Huang wrote to his employees. “And the miracle of Nvidia — built by all of you, and by brilliant colleagues around the world — would not be possible without immigration.”
Colorado’s tech sector is pushing the envelope in emerging areas like quantum computing and AI, as well as in niche sectors like cybersecurity and financial technology, or fintech. Emerging firms, lacking profits, run leaner and are typically more dependent on the flow of talent emerging from nearby universities, including international students.
If emerging tech firms can’t obtain the talent they need, they will fall behind. If the state’s tech sector starts to fall behind, Colorado’s economy could find itself coping with slower growth and smaller wage gains, those closest to the tech sector warn.
“Pay-to-play H1-Bs will box out all smaller companies, including startups, from bringing talented foreigners on board. This will give big companies another advantage in talent acquisition, as if they needed any more advantages,” said Basalt resident Jonathan Greechan, CEO of the Founder Institute, which has tech accelerator chapters in 100 countries.
Why the H-1B matters
The H-1B program, which started in 1990, is capped at 65,000 new visas for those with a bachelor’s degree and another 20,000 reserved for applicants with a master’s degree or higher. Colorado employers applied for about 3,800 H-1B visas during the last fiscal year.
About three-quarters of the workers coming to the country under the H-1B program, which typically has a three-year term, are from India, with Chinese workers accounting for one-tenth, according to a report from the Pew Research Center. The program is not for permanent residency, although employers can and do seek visa renewals, often to allow employees more time to obtain a green card or citizenship.
Educational institutions, which until recently were exempt from the cap but now will fall under it, also rely on the program. The University of Colorado’s Denver campus requested 130 visas and the Boulder campus sought 108 last fiscal year, while Denver Public Schools had 101 petitions, according to Citizenship and Immigration Services.
Nordmark said the program has historically served as a career bridge for foreign students coming to the U.S. to obtain degrees. Upon graduation, they shift from a student visa to an H-1B visa. In some cases, international students obtain multiple and highly specialized degrees until they find employment in the U.S.
Several of the country’s top tech leaders, including Google CEO Sundar Pichai, Microsoft CEO Satya Nadella and Sun Microsystems co-founder Vinod Khosla, worked under H-1B visas before rising through the ranks.
The Trump administration has argued that the H-1B program has been misused, suppressing wages and denying native workers higher-paying job opportunities. Third-party firms have used the program to place workers, taking a cut in the process, and vague job titles allow employers to bypass program rules.
Supporters point to studies that show companies, especially small ones, that employ H-1B workers have stronger earnings growth and are more likely to survive than rivals that don’t. They argue the changes being made will disadvantage the one sector that has contributed more to making the American economy great and will open the door to other countries snagging talent.
China launched a new K-visa program on Oct. 1 to recruit young science, tech and engineering workers from abroad, the kind that will find it harder to participate in the U.S. H-1B program. Canada, Germany, New Zealand, South Korea and the United Kingdom are also easing rules for foreign workers with specialized skills.
But China’s new visa program also appears to have created a backlash among unemployed Chinese workers, echoing some of the pushback seen in the U.S., and critics come from both ends of the political spectrum.
“It’s a complex issue and I can see two sides to the argument that a reasonable person could make,” said David Cohen, CEO of Techstars in Boulder. “If the talent is truly that ‘extraordinary,’ companies are likely to find a way to pay this fee in most cases.”
He worries that the U.S. could be putting at risk a core competitive advantage — “having great talent wanting to be in this country.”
The program’s new emphasis on higher wage earners, who will receive more slots in the visa lottery compared to recent college graduates, will favor older, more experienced applicants, said Ben Johnston, COO of Kapitus, a small business lender.
“Many international students come to U.S. schools with the expectation that they will be able to work here under the H-1B program upon graduation. If fewer visas are available for lower wage earners, this may curtail the demand for a U.S. education for some international students,” Johnston said.
Many of the greatest tech innovations the country has seen have come from young and hungry entrepreneurs working outside corporate confines, with young immigrants playing a critical role. Greechan said he believes the fee and wage restrictions will make the U.S. less attractive for the best and brightest talent from abroad.
“I don’t think the current administration cares how much the U.S. has benefited from this consistent influx of talent, simply because it’s not in line with their anti-immigration sentiment,” Greechan said.
And there is a psychological toll on workers. Niharika Shukla, an attorney working at Iterate.ai, said the changes have left H-1B workers in limbo as they try to navigate the country’s complicated and drawn-out process for obtaining permanent status and citizenship.
Iterate.ai general counsel Niharika Shukla poses for a portrait at the artificial intelligence company’s office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)
Initially, it wasn’t clear if the fee would apply to existing visa holders or new petitioners, creating a sense that all jobs could be at risk. Some workers who were on vacation or visiting family thought they needed to return to the U.S. immediately. The administration clarified that it was only for new petitioners.
Overall, it has created uncertainty about what comes next and a deepening sense of unease, even fear.
“I have friends — people with advanced degrees, stable jobs, American-raised kids — who still live in visa limbo. They pay taxes, work hard and give back in every way, but every year, they hold their breath during H-1B season. They don’t know if this will be the year it all unravels,” Shukla said.
Shukla’s husband came to the country on an H-1B visa, which allowed her to obtain an H-4 visa as a spouse and an employment authorization document, or EAD, that allowed her to continue her legal career in the U.S.
“If anything had happened to his visa, my legal ability to work would’ve disappeared, too,” she said.
Shukla said a friend’s daughter, who recently started middle school, asked her mom if the family would have to leave this year.
“That little girl was born here. Her whole world is here. But because her parents are still stuck in the visa queue, even she lives with uncertainty,” Shukla said. “This is the human side of immigration policy that’s so often overlooked. It’s not just about foreign workers or companies. It’s about families, children, stability. It’s about people who want to belong, but are made to feel temporary, year after year.”
Other industries watching
Employers in landscaping, tourism and agriculture are keeping an eye on what might come next for the foreign worker visa programs they rely on.
And the construction industry, which has a heavy concentration of foreign-born workers, is lobbying hard for a visa program as it struggles with stricter immigration enforcement and a looming wave of retirements.
Ski resorts and resort hotels also use that program, along with the J-1 visa, a cultural exchange program that brings in multilingual workers able to converse with international guests.
Finding enough workers to fill open landscaping positions has long been a struggle, even when firms can bring in foreign laborers. The H-2B program is capped at 66,000 new applicants a year nationally, split between 33,000 workers from Oct. 1 to March 31 and 33,000 workers from April 1 to Sept. 30.
Petitioners are cautious about asking for too many visas, which could draw scrutiny from immigration officials, McMahon said.
The program allowed for another 64,716 workers, mostly returning workers, last year. But even at 131,000, the allocation is far below the 500,000 that some estimates say are needed to meet actual demand for seasonal workers, he said.
Most H-2B visa holders work for up to nine months and then return home, although some try to bridge the two seasons. Raids by U.S. Immigration and Customs Enforcement have increasingly made authorized visa holders, including those working in Colorado for years, uneasy and asking themselves if they want to keep coming back, McMahon said.
On Sept. 2, the administration started requiring that all seasonal workers under the H-2A and H-2B programs, for agricultural and non-ag workers, have in-person interviews at a U.S. consulate location. Returning workers and those with clean records were not exempt. The rule change is expected to result in 350,000 additional interviews in Mexico alone.
In contrast to the H-2B and H-1B programs, the H-2A program for farm workers doesn’t have a cap. Around 5,000 to 6,000 workers are brought into Colorado each season under that visa. It does have additional requirements that employers provide free housing and meals or access to cooking facilities.
Unlike California, farms and orchards in Colorado have seen minimal raids from immigration enforcement, said Marilyn Bay Drake, executive director of the Colorado Fruit and Vegetable Growers Association.
Instead, a state rule that requires overtime pay after 48 hours or 56 hours, depending on the intensity of the harvest season, is complicating their operations and resulting in some H-2A visa holders going elsewhere to work.
Harvesting requires intense stretches of long hours during short windows of time to bring in and process crops, one reason that ag workers have been excluded from federal overtime requirements.
Rather than paying overtime, farmers, who often operate on razor-thin margins, are capping hours in Colorado. That has upset some workers, who want to earn as much as they can in the limited time they are in the country.
Farmworkers sort out freshly picked onions on a conveyor belt at a storage facility at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 09, 2025. (Photo by Andy Cross/The Denver Post)
“We haven’t seen impacts from immigration policy, but we have seen negative impacts from the overtime regulations in our state,” said Emily King, compliance and marketing manager at Fagerberg Produce in Eaton.
The onion farm has three H-2A workers from South Africa who operate harvesting equipment. In June of last year, one of those workers came in on a Friday to say he was resigning and would be leaving Sunday to work at a producer in Idaho who offered him 100 hours a week with no overtime restrictions, King said.
Duncan Stevens, left, a farmworker from South Africa who has an H-2A visa, drives a truck that’s getting loaded with fresh onions in 50-pound burlap sacks on a stack-loader machine, which are then emptied by a crew onto a conveyor belt into the truck on a farm at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 9, 2025. (Photo by Andy Cross/The Denver Post)
Not only did Fagerberg Produce lose a key worker, but it had also paid for his trip to come to the U.S.
“For H-2A workers, it’s a proposition of, ‘Is it worth it to come?’ And our state overtime rules weigh heavily on that calculus. It’s magnifying and exacerbating ag’s No. 1 problem, which is access to labor,” said Ashley House, vice president of advocacy and strategy at the Colorado Farm Bureau.
Construction struggling
Tougher immigration policies are taking a toll on the construction sector, where about a third of workers are foreign-born, and which lacks a dedicated visa program.
About nine in 10 construction firms nationally report having a difficult time finding enough qualified workers to hire. They cite those labor shortages as a primary cause behind delayed construction projects, according to a survey released last month by the Associated General Contractors of America.
About one-third of respondents nationally and in Colorado said tougher immigration enforcement this year had complicated their operations.
Of the 44 Colorado contractors who took part in the survey, 5% said their work sites had been visited by immigration agents. Another 7% reported workers not showing up because of concerns over actual or rumored enforcement actions. Close to a quarter of the firms surveyed said their subcontractors had lost workers, according to the AGC.
A construction crew works on a roof in Loveland, Colorado, on Monday, July 14, 2025. (Photo by AAron Ontiveroz/The Denver Post)
Anirban Basu, chief economist with the Associated Builders and Contractors, another construction trade group, said that construction spending and new starts are down. Between July and August, the number of job openings in construction took a dramatic fall, from 303,000 to 180,000, and the number of construction workers quitting shot up from 90,000 to 146,000.
“Shifting immigration policy also plays a part in shaping the data. More workers have been quitting, and that may reflect undocumented workers leaving their positions,” Basu said. “An increase in hiring is a natural response to an increase in quits, but many contractors appear to be embracing the attrition and not immediately replacing departing workers.”
To help alleviate the labor shortfalls, the AGC has thrown its full support behind the Essential Workers for Economic Advancement, a bipartisan bill introduced by Rep. Lloyd Smucker, R-Pennsylvania. The bill seeks to create a new H-2C visa program to address labor shortages in nonagricultural, less-skilled, year-round jobs.
General contractors, hotels, retailers and long-term care facilities are expected to be the employers using the program, which would offer 65,000 visas a year for three-year terms.
“Establishing a visa program for construction occupations provides the kind of lawful, temporary, traceable and taxable pathway needed to serve as a short-term solution while we rebuild the domestic pipeline for preparing new construction workers,” the AGC said in a news release.
The group, which represents 28,000 member firms, said it would throw its full weight behind having the act get passed and having President Donald Trump sign it swiftly once it does.
Construction robots are no longer a far-off idea. They’re already changing job sites by tackling repetitive, heavy, and often dangerous tasks. The latest robot comes from Australia, where a spider-like machine named Charlotte is making headlines.
Charlotte is designed to 3D print an entire 2,150-sq-ft home in just one day. That’s equivalent to the speed of more than 100 bricklayers working simultaneously. This offers a glimpse into how the future of housing might be constructed.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Charlotte the robot 3D prints homes in just 24 hours using eco-friendly materials. (Crest Robotics)
How Charlotte the robot works
Charlotte is a collaboration between Crest Robotics and Earthbuilt Technology. The robot doesn’t simply stack bricks or tie rebar. Instead, it uses a giant extrusion system that lays down eco-friendly material in layers.
That material comes from sand, crushed brick and recycled glass, all locally sourced. The result? A structure that’s fireproof, floodproof and created with a far smaller carbon footprint than traditional building methods.
This 3D printing construction robot stands out for its unique mix of speed, strength, versatility and affordability.
Speed: Prints a home in 24 hours.
Strength: Uses durable, sustainable materials.
Versatility: Can raise itself on spider-like legs to keep building higher walls.
Affordability: Cuts out many of the expensive steps in construction.
While Charlotte is still in the development phase, a scaled-down prototype has already been showcased. Researchers believe it could help solve housing shortages where labor is scarce and construction costs are skyrocketing.
Its spider-like legs let it climb and build higher, cutting costs and saving time. (Crest Robotics)
The future of 3D printed moon bases beyond Earth
Charlotte’s creators also have their eyes set on the stars. They imagine future versions of the robot building moon bases for research and exploration. With its compact design and autonomous operation, Charlotte could adapt to the extreme environments of space just as well as it can to the challenges on Earth.
If Charlotte delivers on its promise, it could reshape how homes are built worldwide. Faster construction means quicker housing availability. Lower costs and sustainable materials mean more affordable homes with a smaller environmental impact. For anyone facing rising housing prices or construction delays, technology like Charlotte may bring a ray of hope.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz
Future versions may even construct Moon bases for research and exploration. (Crest Robotics)
Kurt’s key takeaways
Charlotte may be years away from building its first full-scale home, but its prototype already points toward a future where robots take on critical roles in construction. From tackling housing crises on Earth to building shelters on the moon, Charlotte shows how robotics and 3D printing can work together to solve real problems.
Would you live in a home 3D printed by a robot like Charlotte, or even in one built on the moon? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Shoplifting has long been a challenge for retailers, but a U.S. company now believes that flying drones could help combat the issue. Flock Safety, best known for its law enforcement camera systems, is promoting its new Flock Aerodome Drone as an Automated Security system to the private sector. The idea is simple: if a theft occurs, a drone launches, follows the suspect, and streams live video back to security teams or even police. With theft rates reportedly climbing 93% in 2024, the push for high-tech security has never been stronger.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter
An example of a Flock Safety drone, ready to follow theft suspects within seconds(Flock Safety)
How the drones would work
Instead of dispatching a guard, Flock’s drones could launch within seconds after motion is detected. Equipped with HD and thermal cameras, the drones can zoom in, track suspects, and relay real-time visuals.
The company says the system:
Covers up to 38 square miles with a single dock
Integrates with existing security alarms and camera systems
Organized retail crime is a growing problem. Retailers have been reporting higher losses, tighter budgets, and fewer staff members available. Flock Safety argues its drone system can act as a deterrent simply by being visible, making criminals think twice before targeting a store. Beyond retail, the company is also pitching its drones to operators of hospitals, warehouse sites, and energy facilities that require large-scale surveillance.
Due to the drones’ helpful technologies, retailers may soon rely on them as a visible deterrent against organized theft.(Flock Safety)
For shoppers, this could mean visiting stores where drones are part of the security landscape. You might notice them overhead at malls or parking lots, watching for unusual activity. While some may view this as an added safety measure, others may worry about increased surveillance and loss of privacy. For retailers, drones could help protect profits, staff, and customers without the rising costs of hiring additional guards. But whether customers welcome drones buzzing around remains to be seen.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz
Kurt’s key takeaways
Technology is quickly reshaping how companies approach security, and drones may soon play a bigger role in everyday shopping environments. With faster response times, broader coverage, and lower staffing costs, the idea has clear appeal for retailers. At the same time, questions about privacy and public acceptance will influence the extent to which this technology is adopted.
Would you feel safer shopping under drone surveillance, or would it make you uncomfortable? Let us know by writing to us at CyberGuy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
As artificial intelligence becomes more mainstream, the Pima County Sheriff’s Department in Arizona is looking at how it can use the emerging technology. Since the start of the year, deputies have been testing a program called Draft One, from Axon.
NEWYou can now listen to Fox News articles!
TUCSON, Ariz. – As artificial intelligence becomes more mainstream, the Pima County Sheriff’s Department is looking at how it can use the emerging technology.
At the beginning of the year, deputies began a trial of Axon’s Draft One, which is a program that writes incident reports using AI. A body camera records the interactions, then the program uses the audio plus any additional information from the deputy to create a first draft. Deputies then review everything before submitting the final report.
“They’re able to verify the completeness, the accuracy and all of that,” Capt. Derek Ogden said, “But the initial first draft, they can’t submit as their case report.”
Demonstrating the program, Deputy Dylan Lane showed how Draft One can write a case report that would have taken him 30 minutes to complete in five minutes.
A Pima County deputy opens Draft One to begin writing his case report. After it’s finished, he will check it for accuracy before submitting it.(Amalia Roy)
“Most of that time is just the quick changes, making sure that all the information is still accurate and then just adding in those little details,” Lane said.
Ogden said Draft One saves crucial time during shifts when deputies are handling multiple incidents back-to-back. He said the program is one of several ways the department is exploring AI tools.
Draft One writes a case report using the recording from an Axon body camera.(Amalia Roy)
“Recently, we saw a detective from our criminal investigative division use AI to identify a deceased unidentified person,” Ogden said. “We’re also looking for ways to increase the productivity and efficiency of our patrol deputies and some of our corrections officers.”
Law enforcement agencies across the country are evaluating how artificial intelligence could help their departments, especially when dealing with resource shortages.
“A lot of policing agencies are budget constrained. It is very attractive to them to have a tool that could allow them to do more with less,” said Max Isaacs from The Policing Project, which is a non-profit within NYU School of Law that studies public safety and police accountability.
Isaacs said while AI offers opportunities to save resources, there’s not much data on how much help these programs truly provide.
A Pima County deputy wears an Axon body camera in a simulation of an emergency call.(Amalia Roy)
“You have a lot of examples of crimes being solved or efficiencies being realized,” Isaacs said, “But in terms of large-scale studies that rigorously show us the amount of benefit, we don’t have those yet.”
“AI is not perfect. It can rely on data that is flawed. The system itself could be flawed. When you have errors in AI systems, that can lead to some pretty serious consequences. It can lead to false arrests. It could lead to investigators going down a dead end and wasting time and resources,” Isaacs said.
Addressing those concerns, Ogden agreed that information can be flawed. He said it’s why human eyes must review every report written with Draft One.
After a successful trial with 20 deputies, Ogden said the next step is to expand Draft One to corrections officers.
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as IT workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
I have to tell you about Sora 2. It’s OpenAI’s new video-generating app that’s both mind-blowing and terrifying.
It’s the first tool from any AI company that lets you give it a prompt, and, in literally seconds, you get a full-blown, AI-generated video up to a minute long.
The results aren’t perfect, but they’re close. Like Hollywood close.
I’m sure you know that under U.S. law, “defaming” someone only applies to living people, not the dead. That means families and estates have no legal recourse when someone uses AI to humiliate or misrepresent their loved one. It’s a free-for-all right now, and no one’s accountable.
Even creepier?
In this photo illustration, a smartphone screen shows the Sora 2 app icon developed by OpenAI, in front of the company’s logo, Oct. 8, 2025, in Chongqing, China.(Cheng Xin/Getty Images)
Sora is also being used for stalking and impersonation. All it takes is a photo, and you can make a video of anyone doing anything. Fake crimes, revenge content, political lies. It’s all possible.
OpenAI says you need permission to use a person’s face or voice. Yeah, like that’s going to stop someone.
If the guy who runs OpenAI can’t stop his own face from being misused, what chance do the rest of us have?
Right now, you can only get Sora 2 as an iPhone app. You’ll need an OpenAI account, and it’s still invite-only, so most people don’t have access yet.
Sam Altman, CEO of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, Sept. 23, 2025.(Kyle Grillot/Bloomberg via Getty Images)
Sora 2 is an incredible tool. But it’s being abused, and the guardrails are flimsy at best. So, from now on, when a video goes viral, you better assume it’s fake until proven real.
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
Cybercriminals are getting smarter every day, and one of their most convincing tricks is disguising phishing emails to look like they’re coming from people you trust. Work emails are particularly dangerous because they lower your guard. After all, if the sender is your boss or IT department, why would you suspect anything? Unfortunately, scammers know this and use it to their advantage. I recently received an email from Krysti from Rockwall, Texas, who highlighted a similar issue.
“I received a spam email from my employer’s email. It had a document attached to it. I tried to open it and could not. I contacted my employer and they told me they hadn’t sent me anything. I changed my password and ran a virus scan. I also have been checking on the dark web for anything coming up on me. So far everything is okay. I did sign up for antivirus software based on your recommendation and we are signed up for identity theft protection. Is there anything else I should do?”
Incidents like this are more common than many realize, Krysti. And while it sounds like you took the right first steps by changing your password, scanning for malware and monitoring for identity misuse, there are a few additional precautions worth taking. A close call is often a warning sign that your digital habits might need tightening. Let’s break down why these attacks are so dangerous and what everyone should do to make sure they’re fully protected.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Phishing emails often look like they come from someone you know, making them harder to spot.(Kurt “CyberGuy” Knutsson)
Why work email scams are so dangerous
Phishing attempts that impersonate coworkers or employers are particularly effective because they rely on trust and urgency. You’re more likely to open an attachment or click a link if you believe it’s tied to your job. Scammers often spoof legitimate email addresses or use addresses that look almost identical to the real ones, hoping you won’t notice the subtle difference.
Once you interact with these emails, the risks multiply. Opening a malicious attachment could install spyware or ransomware. Clicking a fake link might lead to a login page designed to harvest your credentials. Even if nothing obvious happens right away, attackers could still be collecting background information to use in a future attack.
These scams are becoming harder to spot, too. Some are powered by artificial intelligence-generated text, making them free of the usual grammar mistakes that used to be obvious red flags. Others use stolen email threads to insert themselves into ongoing conversations. That’s why even seasoned professionals fall for them.
Opening a fake attachment can secretly install malware or spyware on your device.(Kurt “CyberGuy” Knutsson)
What to do immediately after a close call
Changing your password or running a malware scan is often not enough to stop attackers. It’s worth going a little further to make sure nothing slipped through. Start by checking your login history to see if there are any unauthorized sign-ins on your email or work accounts.
Most platforms allow you to review recent activity, including device type and location, and if anything looks suspicious, sign out of all sessions immediately and change your password again. Next, enable two-factor authentication on your email and any other critical accounts. Even if attackers manage to steal your password, they won’t be able to gain access without the second verification step.
It’s also important to alert your IT team, especially if the email appears to come from your employer’s address. This could mean the company’s email system has been compromised, and notifying them will allow them to investigate and secure other accounts if necessary. Finally, make sure all your software is up to date. Malware often exploits vulnerabilities in outdated systems, so regularly updating your operating system, antivirus and productivity tools adds another layer of protection against future attacks.
Work email scams are rising, and even experienced professionals can get fooled.(Kurt “CyberGuy” Knutsson)
7 ways to check if your device or data is compromised
Some cyber threats don’t reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they’ve stolen. The following steps are actions anyone can take to make sure their device and personal data remain secure, and to catch any signs of compromise before they turn into serious problems.
1) Consider a personal data removal service
The more personal information about you that’s publicly available, the easier it is for scammers to target you. Data removal services can help by scanning hundreds of data broker websites and removing your details from them. Reducing this digital footprint not only makes it harder for attackers to build profiles on you but also limits how easily phishing attempts can be tailored to your life.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Your information could already be circulating in breach dumps and underground markets without you realizing it. Identity protection services monitor known dark-web sources, forums and leak sites for your email, phone, SSN and other sensitive details. If they find a match, they alert you so you can act quickly: change passwords, turn on two-factor authentication, and place fraud alerts or credit freezes with the credit bureaus.
Your information might already be circulating in dark web marketplaces without you realizing it. Identity theft protection services can help by continuously scanning those underground sites for your email, passwords or other sensitive details. If your data does show up, these services notify you right away so you can reset credentials, freeze accounts or take other protective actions before the information is misused.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
3) Watch for suspicious financial activity
Even if you never shared payment details, attackers may attempt account takeovers or fraudulent transactions using any information they have. Review your bank, credit card and online account statements frequently for unusual activity. Pairing this habit with identity theft protection tools gives you an added safety net, as they often include financial monitoring and fraud alerts to catch problems quickly.
4) Review connected accounts
Email accounts are often the central hub for many other services. If your inbox is compromised, attackers might try to break into linked accounts such as cloud storage, messaging apps or collaboration tools. Check each of these services for unfamiliar logins, permission changes or device activity, and secure them by changing passwords and enabling two-factor authentication.
5) Use a password manager
Weak or reused passwords are one of the easiest ways for attackers to break into accounts after a breach. A password manager solves this by generating and storing strong, unique passwords for every site you use. It also acts as a passive phishing detector. If the tool doesn’t autofill a login form, that’s a sign the page could be fake. Over time, this significantly reduces your risk of falling victim to credential-based attacks.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
6) Install reliable antivirus protection
Modern cyber threats go beyond viruses. A strong antivirus solution now acts as a full security layer, blocking phishing websites, detecting malicious scripts and stopping suspicious activity before it can compromise your device. If you’ve interacted with a suspicious attachment or link, a reputable antivirus tool can catch malware that might still be hiding in the background.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
7) Enable account alerts
Most major platforms allow you to turn on alerts for unusual account activity, such as new sign-ins, password resets or changes to security settings. These real-time notifications act as an early warning system, giving you a chance to lock down your accounts before significant damage occurs.
Close calls like this are unsettling, but they are also valuable wake-up calls. Cybercriminals are constantly refining their tactics, and phishing emails that once looked laughably fake can now be nearly indistinguishable from the real thing. The key is to build layers of defense, not just reactive steps after an incident, but proactive habits that make you a harder target in the first place.
Have you ever clicked on an email that turned out to be a scam? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Growth in real estate is often painted as a double-edged sword. On one hand, more units mean more revenue and greater portfolio value. On the other hand, every new property seems to multiply the late-night calls, rent collection headaches, and maintenance requests piling up faster than they can be handled. For many landlords, the idea of doubling their doors teeters between feeling like a life-changing opportunity and burnout waiting to happen.
But the smartest landlords are opting out of manual, fragmented systems, and choosing to manage smarter. Instead of adding more spreadsheets, sticky notes, or staff hours, forward-thinking landlords are accomplishing more with less stress using automation, centralized dashboards, and data-driven insights that reveal not just what’s happening in their business, but why.
I’ve seen this shift firsthand in the data flowing through our RentRedi platform. Smart investors are adopting intelligent systems that not only reduce day-to-day friction, but also enable them to grow sustainably, with the ability to expand their portfolios without expanding their stress.
Work smarter, not harder
An Inc.com Featured Presentation
Here are five ways landlords are scaling their real estate portfolios without stress, by working smarter, not harder:
1. Savvy landlords replace busywork with automation
When rent collection, late-fee enforcement, lease renewals, and tenant screening are automated, it means fewer phone calls, fewer reminders, and more predictable cash flow. Automation reduces the friction of daily operations, freeing up time to focus on strategic work, such as evaluating potential acquisitions or investing in property improvements that boost long-term value.
When smart landlords automate processes, it creates a foundation of predictability for their business. For instance, renters who go through our automated tenant screening process submit rent earlier—17 days faster, on average—and are more likely to pay on time, with rates seven percentage points higher than those without screening.
Additionally, growth-minded landlords automate tenant screening and maintenance coordination to save time while scaling reliably. Automating background, credit, and rental history checks reduces administrative work, minimizes human error, and facilitates faster, more informed leasing decisions. Likewise, centralized maintenance tools track work orders and vendor schedules in real time, reducing follow-ups and preventing small issues from translating into extra hours or operational headaches.
2. Smart landlords centralize their operations
Savvy landlords use centralized dashboards to stay in control of their portfolios by pulling everything into one place: rent payments, lease expirations, occupancy rates, and open maintenance tickets. Instead of scrambling to react to problems, they see patterns—like a tenant who’s consistently paying late or a property where maintenance requests are piling up—and intervene early.
The ability to delegate work to comprehensive rental management systems allows smart landlords to spend less time doing repetitive tasks (by instructing the system on how to automate processes their way) and more time looking at summaries and trends in their portfolio. That kind of oversight prevents small issues from turning into costly vacancies. Since turnover is one of the biggest expenses in the business, a clear, consolidated view directly impacts profitability.
3. High-retention landlords focus on tenant experience
Smart landlords understand that a smoother experience for tenants creates a smoother business for them. When renters pay rent in seconds, submit maintenance requests without hassle, and get real-time updates, they’re less frustrated and more likely to stay long term. Happier tenants generate fewer calls, fewer complaints, and fewer avoidable emergencies, freeing landlords to focus on growth instead of putting out fires.
Rent collection tools like mobile payments, multiple payment opinions, and autopay offer renters more than convenience—they are powerful retention tools. In a broader market where on-time rent payments have slipped to 84.3 percent, landlords using autopay maintain above 95 percent on-time rates. When coupled with credit reporting, that rate climbs to over 99 percent. The easier it is for renters to handle their obligations, the more consistently they do so, creating a smoother experience for both landlords and their tenants.
4. Growth-minded investors lean on data
Every rental business produces valuable information through rent payments, lease timelines, maintenance requests, and tenant communication. When doing things manually, this information is scattered across emails, texts, and bank statements, making it hard to use in any meaningful way.
That’s why having organized, accessible data is so powerful. When all this activity is pulled into a single system, it stops being fragmented noise and starts becoming usable intelligence. Smart landlords leverage this data to spot trends—like a property with rising maintenance costs, or a tenant consistently paying late—and take action before those issues erode profitability.
Instead of relying on gut instinct, growth-minded landlords approach their portfolio the way professional investors do, by using data to guide decisions. Tracking trends in late payments, lease renewals, or maintenance costs reveals which properties are performing well and which may need attention.
This level of insight helps scaling landlords decide where to reinvest, when to adjust rents, or how to allocate resources. The result is smarter growth by having clearer insight into where the business is headed and how to make smarter decisions at scale.
5. Successful landlords turn growth into freedom, not stress
Scaling shouldn’t mean doing more of everything. Rather, it should involve leveraging systems that do the heavy lifting. A landlord managing five units on spreadsheets may feel maxed out, while a landlord with 50 units and intelligent systems in place may find growth surprisingly manageable.
Smart landlords see themselves as the CEO of a rental business. Systems make growth sustainable; insights make it strategic. When workflows are efficient, consistent, and tenant-friendly, adding new doors doesn’t have to mean adding new headaches.
Growth without burnout
Real estate will always bring challenges, from unexpected repairs and shifting markets, to the occasional late-night call. But landlords who embrace smarter tools are proving that growth doesn’t have to come at the expense of greater time commitment and more burnout.
By automating workflows, centralizing data, leveraging mobile tools, and treating information as a true business asset, savvy landlords expand portfolios while reducing their day-to-day burden. Smart landlords build a business that works as intelligently as they do.
This isn’t a ripped-from-the-headlines new Netflix series. This really happened in a quiet neighborhood called Litchfield Park that’s about a 20-minute drive from Phoenix.
Christina Chapman, 50, looked like your average middle-aged suburban woman. But inside her humble home? A secret cyber ops center built to help North Korean IT workers buy equipment and tools for their military by infiltrating hundreds of U.S. companies.
Christina Chapman, 50, of Litchfield Park, Ariz., set up a massive cyber operation that helped North Korean actors infiltrate U.S. companies.(Department of Justice)
That picture above was just a small part of her setup.
North Korean workers aren’t browsing LinkedIn or applying at Google, Amazon and Meta. They can’t. Sanctions block them from working for American companies, at least legally. So what do they do?
They steal real Americans’ identities, including names, birth dates, Social Security numbers and more. Then, they use them to pose as remote IT workers, slipping into U.S. companies under anyone’s radar.
But when companies send out laptops and phones to their “remote new hires”? Those devices can’t exactly be shipped to Pyongyang.
Enter Christina
Over the course of three years, Christina turned her suburban home into a covert operations hub for North Korea’s elite cybercriminals.
She received more than 100 laptops and smartphones shipped from companies all across the U.S. These weren’t no-name startups. We’re talking major American banks, top-tier tech firms and at least one U.S. government contractor.
All thought they were hiring remote U.S.-based workers. They had no idea they were actually onboarding North Korean operatives.
Once the gear arrived, Chapman connected the devices to VPNs, remote desktop tools like AnyDesk and Chrome Remote Desktop, and even rigged up voice-changing software.
The goal? To make it seem like the North Koreans were logging in from inside the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea.
Chapman’s fake employees “showed up” from halfway around the world every day, siphoning American cash and technology directly into the Kim regime.(Department of Justice)
Follow the money
These fake employees “showed up” every day, submitting code, answering emails, taking meetings, all from halfway around the world. In reality, they were siphoning U.S. tech and cash straight into Kim Jong Un’s regime.
When HR teams requested video verification, Chapman didn’t blink.
She jumped on camera herself, sometimes in costume, pretending to be the person in the résumé. She ran the whole operation like a talent agency for cybercriminals, staging fake job interviews, coaching the operatives on what to say and even laundering their salaries through U.S. banks.
Her take? At least $800,000, paid as “service fees.”
The total haul for North Korea? Over $17 million in stolen salaries, according to the FBI, which called the scheme a national security threat. Chapman called it “helping her friends.” Really.
North Korea netted over $17 million in stolen salaries, courtesy Chapman’s scheme.(Edgar Su/Reuters)
Eventually, the scam began to unravel. Investigators noticed odd patterns like dozens and dozens of remote hires all listing the same Arizona address, or company systems being accessed from countries the workers supposedly had never visited.
Chapman was arrested and sentenced in July 2025 to 102 months in federal prison.
And the wildest part? She did it all from her living room. Talk about working from home!
Deloitte’s member firm in Australia will pay the government a partial refund for a $290,000 report that contained alleged AI-generated errors, including references to non-existent academic research papers and a fabricated quote from a federal court judgment.
The report was originally published on the Australian government’s Department of Employment and Workplace Relations website in July. A revised version was quietly published on Friday after Sydney University researcher of health and welfare law Chris Rudge said he alerted media outlets that the report was “full of fabricated references.”
Deloitte reviewed the 237-page report and “confirmed some footnotes and references were incorrect,” the department said in a statement Tuesday.
Deloitte did not immediately respond to Fortune’s request for comment.
The revised version of the report includes a disclosure that a generative AI language system, Azure OpenAI, was used in its creation. It also removes the fabricated quotes attributed to a federal court judge and references to nonexistent reports attributed to law and software engineering experts. Deloitte noted in a “Report Update” section that the updated version, dated September 26, replaced the report published in July.
“The updates made in no way impact or affect the substantive content, findings and recommendations in the report,” Deloitte wrote.
In late August the Australian Financial Review first reported that the document contained multiple errors, citing Rudge as the researcher who identified the apparent AI-generated inaccuracies.
Rudge discovered the report’s mistakes when he read a portion incorrectly stating Lisa Burton Crawford, a Sydney University professor of public and constitutional law, had authored a non-existent book with a title outside her field of expertise.
“I instantaneously knew it was either hallucinated by AI or the world’s best kept secret because I’d never heard of the book and it sounded preposterous,” Rudge toldThe Associated Press on Tuesday.
The Big Four consulting firms and global management firms such as McKinsey have invested hundreds of millions of dollars into AI initiatives to develop proprietary models and increase efficiency. In September, Deloitte said it would invest $3 billion in generative AI development through fiscal year 2030.
Anthropic also announced a Deloitte partnership on Monday that includes making Claude available to more than 470,000 Deloitte professionals.
In June, the UK Financial Reporting Council, an accountancy regulator, warned that the Big Four firms were failing to monitor how AI and automated technologies affected the quality of their audits.
Though the firm will refund its last payment installment to the Australian government, Senator Barbara Pocock, the Australian Greens party’s spokesperson on the public sector, said Deloitte should refund the entire $290,000.
Deloitte “misused AI and used it very inappropriately: misquoted a judge, used references that are non-existent,” Pocock told Australian Broadcasting Corp. “I mean, the kinds of things that a first-year university student would be in deep trouble for.”“The matter has been resolved directly with the client,” a spokesperson from Deloitte Australia told TheAssociated Press.
Fortune Global Forum returns Oct. 26–27, 2025 in Riyadh. CEOs and global leaders will gather for a dynamic, invitation-only event shaping the future of business. Apply for an invitation.
We trust Macs to be reliable, secure, and mostly resistant to viruses. Apple’s software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there is some truth to that, it does not mean that Macs are immune. Modern malware is smarter, more targeted, and often designed to slip past built-in defenses quietly. Recently, I heard from Jeffrey from Phoenix, AZ, who’s been dealing with this exact situation.
“I used a MacBook at work and noticed it was performing oddly. I didn’t use an Apple ID on that machine per company protocol. But I had personal devices that I could work from that are now infected. The notepad, maps, and home, among others, seem to be getting hung up. I’ve tried to advise Apple but have had little success. It’s completely taken over my devices, and I don’t know how to resolve this.”
If your Mac has started acting strange, you are not alone, Jeffrey. Malware infections are more common than many Mac users realize, and spotting them early can make all the difference. Let us break down how to tell if your system is compromised, what protections Apple already provides, and the steps you should take to keep your data safe. If you’re a Windows user facing similar issues, check out our guide: What to do if you think your PC has a virus for step-by-step help.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Mac malware often hides in the background, making it hard to spot at first.(Kurt “CyberGuy” Knutsson)
Signs your Mac might be infected
Spotting malware on macOS is not always straightforward. Many threats are designed to stay hidden, running quietly in the background while collecting data or opening a backdoor for attackers. Still, there are a few red flags that usually signal something is wrong.
One of the first signs is slower performance or frequent overheating. If your Mac suddenly takes a long time to boot, runs hot during light tasks, or lags when performing simple actions, it might be doing more behind the scenes than you realize. Apps that crash or freeze more often than usual are another warning sign. Occasional app failures are normal, but if built-in tools like Safari, Notes, or Mail begin acting unstable, it may point to malicious interference.
It is also worth paying attention to what is happening under the hood. Checking Activity Monitor for unknown processes or unusually high CPU or memory usage can reveal malware that tries to hide itself with random or unfamiliar names. Redirected web traffic is another classic symptom. If your browser takes you to strange websites, shows pop-ups, or installs new extensions you never approved, adware or spyware might already be present.
Finally, unexplained changes to your security settings should always raise suspicion. If you notice your firewall turned off, privacy permissions modified, or login items appearing without your knowledge, something could have gained unauthorized control of your system.
Strange app behavior, pop-ups, or overheating may signal something’s wrong(Kurt “CyberGuy” Knutsson)
How macOS protects you by default
Apple has built several layers of defense into macOS, many of which run silently in the background to keep your system secure. Knowing how they work can help you understand what protections are already in place and where you might still need to add more safeguards.
Gatekeeper is one of the most important built-in security tools. It checks every app before it runs to make sure it comes from a verified developer, warning or blocking you if the app is not trusted. Another layer of defense is XProtect, Apple’s built-in malware scanner. It updates automatically and can stop many known threats from running, although it is not as thorough as specialized antivirus software.
System Integrity Protection, or SIP, is another important safeguard. It locks down critical system files and processes so that malware cannot tamper with them even if it gains access. macOS also uses sandboxing and strict permission controls to contain threats. Apps run in isolated environments and must explicitly request permission to access sensitive data such as your camera, files, or location.
Together, these features make it significantly harder for malicious software to infect your Mac or cause serious damage. However, they are not perfect. Attackers are constantly developing new techniques to bypass these protections, and many threats rely on human error rather than technical exploits. That is why taking additional precautions is still essential, even on a Mac.
Even Apple’s built-in protections can miss new or advanced threats(Kurt “CyberGuy” Knutsson)
What to do if your Mac is already infected
If you find yourself dealing with a Mac that’s already compromised these steps can help you get back in control:
1) Disconnect from the internet immediately
Unplug Ethernet or turn off Wi-Fi and Bluetooth. This prevents malware from sending more data out or pulling in additional malicious code.
2) Back up your important files safely
Use an external drive or cloud service you trust. Avoid copying entire system folders-just grab personal documents, photos, and files you can’t replace. You don’t want to back up the malware along with them.
3) Boot into Safe Mode
Restart your Mac and hold the Shift key. Safe Mode prevents some malware from launching and makes it easier to run cleanup tools.
4) Run a trusted malware removal tool
While macOS includes XProtect, you may need something more powerful. A strong antivirus program can detect and remove infections. Run a full system scan to catch hidden threats.
Review what apps are set to launch at startup and remove anything you don’t recognize. If you spot unfamiliar processes hogging resources, don’t just guess. Use our guides at Cyberguy.com/LockUpYourTech to compare what’s safe and learn how to shut down anything suspicious before it causes more trouble.
6) Consider a clean reinstall of macOS
If malware persists, wiping your system may be the only option. Erase your Mac’s drive and reinstall macOS from scratch. Restore only the clean files you backed up earlier.
7) Secure your other devices
If your iPhone, iPad, or other personal devices are showing strange behavior, run security scans, update their software, and reset key passwords. Malware can sometimes spread through shared Wi-Fi networks, cloud accounts, or files.
8) Reset key passwords and enable two-factor authentication
Even after cleanup, assume some of your data may have been exposed. Update your Apple ID, email, banking, and work accounts with strong, unique passwords. Turn on 2FA wherever possible.
9) Get professional help if needed
If you’re overwhelmed, you can bring your Mac to an Apple Store for in-person help at the Genius Bar, or schedule a free appointment with Apple Support.
Simple steps like scanning, updating, and using strong passwords can keep your data safe(Kurt “CyberGuy” Knutsson)
7 ways to keep your Mac from getting infected
Some cyber threats do not reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they have stolen. These steps can help you strengthen your defenses and reduce the chances of future infections.
1) Install strong antivirus software
macOS’s built-in protections are useful but basic. A strong antivirus adds an extra layer by detecting threats in real time, blocking malicious downloads, and even identifying new types of malware before they spread. A strong antivirus also scans email attachments and browser activity, areas where many Mac users are most vulnerable.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech
2) Consider a personal data removal service
Many cyberattacks begin with information freely available online. A data removal service scrubs your personal details from broker sites, reducing the chances of targeted attacks or identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan
Many malware attacks rely on stolen credentials rather than technical exploits. A password manager stores unique, complex passwords for every account and can automatically flag weak or reused ones. It also helps protect you from phishing attempts because it will only autofill passwords on legitimate websites.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords
4) Enable two-factor authentication
Even if someone steals your password, two-factor authentication (2FA) makes it much harder for them to access your accounts. It adds an extra step to the login process, requiring a code from your phone or a security key.
5) Keep macOS and apps updated
Outdated software is a common entry point for malware. Updates often patch vulnerabilities that attackers could exploit, so turning on automatic updates for both macOS and third-party apps is an easy but effective defense.
6) Review login items and background processes
Malware often tries to run at startup so it can operate undetected. Regularly check System Settings to make sure only trusted apps are launching automatically, and use Activity Monitor to investigate anything suspicious.
7) Use identity theft protection
If your personal data has already been exposed, an identity theft protection service can monitor for suspicious activity, alert you to breaches, and help you recover quickly if something does go wrong. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft atCyberguy.com/IdentityTheft
Macs have a reputation for being safer than other computers, but that does not mean they are untouchable. Malware has evolved to target macOS more aggressively than ever, and many attacks now rely on tricking users rather than breaking through security software. If your device is behaving strangely, taking action early is the best way to prevent deeper damage.
How important is cybersecurity when choosing the devices you use every day? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
An internal Meta document sheds light on how the company is training its AI chatbot to handle one of the most sensitive issues online: child sexual exploitation. The newly unearthed guidelines detail what’s permitted and what’s strictly forbidden, offering a rare look into how Meta is shaping its AI behavior amid government scrutiny.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Meta’s leaked AI guidelines show how contractors train chatbots to reject harmful requests.(Meta)
Why Meta’s AI chatbot guidelines matter
According to Business Insider, these rules are now in use by contractors testing Meta’s chatbot. They arrive just as the Federal Trade Commission (FTC) is investigating AI chatbot makers, including Meta, OpenAI, and Google, to understand how these companies design their systems and protect children from potential harm.
Earlier this year, we reported that Meta’s previous rules mistakenly allowed chatbots to engage in romantic conversations with children. Meta later removed that language, calling it an error. The updated guidelines mark a clear shift, now requiring chatbots to refuse any request for sexual roleplay involving minors.
The rules forbid any sexual roleplay with minors, but still allow educational discussion of exploitation.(Meta)
What the leaked Meta AI documents reveal
The documents reportedly outline a strict separation between educational discussion and harmful roleplay. For example, chatbots may:
Discuss child exploitation in an academic or preventive context
Explain how grooming behaviors work in general terms
Provide non-sexual advice to minors about social challenges
But chatbots must not:
Describe or endorse sexual relationships between children and adults
Provide instructions for accessing child sexual abuse material (CSAM)
Engage in roleplay that portrays a character under 18
Sexualize children under 13 in any way
Meta’s communications chief Andy Stone told Business Insider that these rules reflect the company’s policy to prohibit sexualized or romantic roleplay involving minors, while adding that additional guardrails are also in place. We reached out to Meta for a comment to include in our article, but did not hear back before our deadline.
New AI products revealed at Meta Connect 2025 make these safety standards even more important.(Meta)
Political pressure on Meta’s AI chatbot rules
The timing of these disclosures is key. In August, Sen. Josh Hawley, R-Mo., demanded that Meta CEO Mark Zuckerberg hand over a 200-page rule book on chatbot behavior, along with internal enforcement manuals. Meta missed the first deadline but recently began providing documents, citing a technical issue. This comes as regulators worldwide debate how to ensure the safety of AI systems, particularly as they become integrated into everyday communication tools.
At the same time, the recent Meta Connect 2025 event showcased the company’s newest AI products, including Ray-Ban smart glasses with built-in displays and enhanced chatbot features. These announcements underscore how deeply Meta is integrating AI into daily life, making the recently revealed safety standards even more significant.
While Meta’s new rules may set stricter limits, parents still play a key role in keeping kids safe online. Here are steps you can take right now:
Talk openly about chatbots: Explain that AI tools are not people and may not always give safe advice.
Set usage boundaries: Require kids to use AI tools in shared spaces so you can monitor conversations.
Review privacy settings: Check app and device controls to limit who your child can chat with.
Encourage reporting: Teach kids to tell you if a chatbot says something confusing, scary, or inappropriate.
Stay updated: Follow developments from companies like Meta and regulators like the FTC so you know what rules are changing.
What this means for you
If you use AI chatbots, this story is a reminder that big tech companies are still figuring out how to set boundaries. While Meta’s updated rules may prevent the most harmful misuse, the documents show how easily gaps can appear and how much pressure it takes from regulators and journalists to close them.
Meta’s AI guidelines show both progress and vulnerability. On the one hand, the company has tightened restrictions to protect children. On the other hand, the fact that earlier errors allowed questionable content at all reveals how fragile these safeguards can be. Transparency from companies and oversight from regulators will likely continue shaping how AI evolves.
Do you think companies like Meta are doing enough to keep AI safe for children, or should governments set stricter rules? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
You’re checking your financial account online, moving money or paying bills, when suddenly a pop-up appears. It looks exactly like your bank’s page, complete with logo and branding, but asks for details you’ve already provided. Would you know what to do?
This is the kind of situation Kent recently faced. He emailed us saying, “Two times this week, I had a financial account open, and I was doing transactions. In the middle of a transaction, up pops a box in the middle of a full page showing the company’s logo. Real, yes, looked as real as it gets. The first time, I fell for it. It asked for my email address to confirm, then my phone number. Sadly, I did. Then I saw about four or five seconds of a screen named CREDIT DONKEY. At that point, I woke up and decided it was a scam. I immediately closed down my computer and called the number on the back of my financial card to report it.”
Kent’s quick thinking likely saved him from even more damage. But what exactly happened here?
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
A fake banking pop-up can appear while you’re making real transactions.(Kurt “CyberGuy” Knutsson)
How web injection scams trick you
This type of attack is called a web injection scam. It hijacks your browser session and overlays a fake login or verification screen. Because it appears while you’re already logged in, the fake page feels authentic. In Kent’s case, the appearance of “Credit Donkey” flashing on-screen was a red flag. Scammers sometimes abuse legitimate-looking redirects like this to convince victims they are dealing with their bank. The real aim is to capture login credentials or trick you into handing over two-factor authentication codes.
Web injection scams aim to steal your login and security details.(Kurt “CyberGuy” Knutsson)
Steps to protect yourself from web injection scams
If you ever find yourself in a situation like Kent’s, here are the most important steps you should take right away to secure your accounts and information.
1) Monitor your accounts
Check your recent transactions daily. Turn on alerts for logins, withdrawals or transfers, so you’ll know instantly if someone is trying to move money.
2) Change your passwords
Update the password for any financial account that may have been exposed. Use a strong, unique password generated by a password manager such as NordPass. Next, see if your email has been exposed in past breaches. Our #1 pick, NordPass, includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 atCyberguy.com/Passwords
3) Remove your personal data from broker sites
Scammers often get phone numbers, emails and other details from data broker sites before launching attacks like the one Kent faced. A personal data removal service can help wipe this information from those shady databases, so criminals have less fuel for scams. Consider tools that automatically scan and request removal from dozens of brokers at once, saving you the time and hassle of doing it manually.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan
4) Enable stronger multi-factor authentication
Strengthen your account security with multifactor authentication. If your bank offers it, switch from SMS codes to app-based codes with Google Authenticator or Authy. These methods are far harder for scammers to intercept than text messages.
5) Scan your devices with antivirus software
Since the scam appeared while Kent was logged in, malware or a browser hijack may be at play. Run a trusted antivirus to clear hidden phishing scripts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech
6) Notify your bank in writing
Calling is smart, but also send a secure message or letter, so there’s a record. Ask them to put your account on high alert and require extra verification for any big moves.
7) Freeze your credit
Place a free credit freeze with Equifax, Experian and TransUnion. That way, scammers can’t open new accounts in your name even if they’ve stolen your personal info.
8) Consider identity monitoring
Services like Identity Guard can alert you if your Social Security number, email or phone number shows up where it shouldn’t. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft
The bogus page asked for personal details before revealing it was a scam(iStock)
Smart online banking habits to stay safe
Never enter personal details into a pop-up, no matter how real it looks.
Always log in fresh through your bank’s official website or app.
Keep your browser and operating system fully updated.
Use a private email address for your financial accounts that scammers won’t easily guess.
For recommendations on private and secure email providers that offer alias addresses, visitCyberguy.com/Mail
Kurt’s key takeaways
Web injection scams are designed to catch you off guard while you’re doing something routine. Kent’s quick reaction to close the page and contact his bank shows how important it is to stay alert. With the right habits and tools, you can keep scammers out of your accounts.
Have you ever experienced a scam attempt while banking online? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Meta is rolling out new protections aimed at making social media safer for young people. In September 2024, Instagram introduced Teen Accounts, which come with built-in safeguards that limit who can contact teens, what content they see and how long they spend on the app.
Since then, adoption has been strong: 97% of teens ages 13-15 kept the default settings, and 94% of parents say Teen Accounts are helpful. Now, Meta is expanding those protections beyond Instagram. Teen Accounts are coming to Facebook and Messenger worldwide, bringing stronger safety standards to more of the apps teens use every day.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter
Meta’s new Teen Accounts automatically limit who can contact teens online.(Meta)
Meta Teen Accounts bring stronger safety tools
Teen Accounts automatically apply safety limits, including:
Restrictions on who can send direct messages.
Filtering to reduce exposure to sensitive or harmful content.
Time management tools to encourage healthier app use.
Meta says these measures address parents’ top concerns, giving teens more control while reassuring families that their online experiences are safer.
Adam Mosseri, head of Instagram, emphasized the goal, saying, “We want parents to feel good about their teens using social media. … Teen Accounts are designed to give parents peace of mind.”
Critics and researchers question Meta’s teen safety tools
However, not everyone agrees that these protections go far enough. Research regarding the effectiveness of Instagram’s teen safety features, as reported by child-safety advocacy groups and corroborated by researchers at Northeastern University (Sept. 25, 2025), paints a different picture. The study found that only eight of 47 safety features tested were fully effective, and internal documents suggest that Meta was aware of some shortcomings. Critics also argued that certain protections, like manual comment-hiding, place the burden on teens themselves rather than preventing harm upfront. They questioned whether time management tools were robust enough, giving some features middling grades despite functioning as described.
“Misleading and dangerously speculative reports such as this one undermine the important conversation about teen safety,” Meta told CyberGuy, “This report repeatedly misrepresents our efforts to empower parents and protect teens, misstating how our safety tools work and how millions of parents and teens are using them today.
“Teen Accounts lead the industry because they provide automatic safety protections and straightforward parental controls. The reality is teens who were placed into these protections saw less sensitive content, experienced less unwanted contact and spent less time on Instagram at night. Parents also have robust tools at their fingertips, from limiting usage to monitoring interactions. We’ll continue improving our tools, and we welcome constructive feedback. But this report is not that.”
Parents have more peace of mind because they can add a guardian to the account.(Meta)
Meta expands teen safety with school partnerships
Meta is also extending protections to the classroom. The School Partnership Program is now available to every middle school and high school in the U.S. Through this program, educators can report issues such as bullying or unsafe content directly from Instagram.
Reports receive prioritized review, typically within 48 hours. Schools that join also get:
Access to educational resources on online safety.
A banner on their profile signaling official partnership.
Faster escalation paths to address urgent safety concerns.
Educators who piloted the program praised the improved response times and stronger protections for students.
There are more protections for teens in the Teen Account than a normal account.(Meta)
Meta launches online safety lessons for students
Beyond apps and schools, Meta partnered with Childhelp to create a nationwide online safety curriculum tailored for middle schoolers. The lessons cover how to recognize online exploitation, what steps to take if a friend needs help and how to use reporting tools effectively.
The program has already reached hundreds of thousands of students, with a goal of teaching one million middle school students in the coming year. A peer-led version, developed with LifeSmarts, empowers high school students to share the curriculum with younger peers, making the safety conversation more relatable.
Meta’s curriculum includes settings for children to stay safer online.(Meta)
What this means for you
For parents, Teen Accounts mean extra protection is in place without needing a complicated setup. Your teen gets safer defaults by default, giving you peace of mind. For educators, the School Partnership Program provides a direct connection to Meta, ensuring reports of unsafe behavior get attention quickly. Students benefit too, with a curriculum designed to give them practical tools for navigating online life safely.
At the same time, the pushback from critics highlights that there is still debate about whether these safeguards go far enough. While Meta insists its tools work as intended, watchdogs argue that protecting teens online requires even stronger measures.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz
Kurt’s key takeaways
Meta’s expansion of Teen Accounts marks a major shift in how social platforms approach safety. By adding built-in protections, the company reduces risks for teens without requiring parents to manage every setting. At the same time, the School Partnership Program gives educators new tools to protect students in real time. The online safety curriculum goes one step further by teaching kids how to recognize threats and respond confidently. Still, advocacy groups and independent researchers question whether these efforts are enough, and Meta’s strong defense shows just how high the stakes are in the teen safety debate. As teens spend more of their lives online, the responsibility to protect them grows. The real test will be how well these tools hold up against evolving online threats.
Do you think Meta’s new measures are enough to protect teens, or should tech companies do even more? Let us know by writing to us at CyberGuy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Cybercriminals continue to find new ways to target social media users, and Meta accounts remain one of the most common lures. Losing access to Facebook or Instagram can have real consequences for both individuals and businesses, making people more likely to fall for urgent security warnings. Attackers exploit this by sending convincing notifications that pressure you into taking quick action without thinking.
That’s exactly what makes the new FileFix campaign so dangerous; it looks like routine account maintenance, but it’s really a trap.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Cybercriminals are targeting Facebook and Instagram accounts by sending fake security warnings.(Fox News)
How the FileFix attack works
As reported by researchers at Acronis, a leading cybersecurity and data protection company, the attack begins with a phishing page that looks like a message from Meta’s support team, claiming that your account will be disabled in seven days unless you view an “incident report.” Instead of providing an actual document, the page disguises a malicious PowerShell command as a file path.
Victims are instructed to copy it, open File Explorer, and paste it into the address bar. While it appears harmless, this action secretly runs code that starts the malware infection process.
This method is part of a family of attacks known as ClickFix, where people are tricked into pasting commands into system dialogs. FileFix, created by Red Team researcher mr.d0x, builds on that idea by exploiting the File Explorer address bar instead. In this campaign, the attackers improved the trick by hiding the malicious command behind long strings of spaces, so only the fake file path is visible to the victim.
A hidden script then downloads what looks like a JPG image from Bitbucket, but the file contains embedded code. Once executed, it extracts another script and decrypts the final payload, bypassing many security tools in the process.
FileFix sends out fake alerts urging users to review their account security.(Acronis)
What StealC tries to steal
The malware delivered by this campaign is StealC, an infostealer that collects a wide range of personal and organizational data. It is designed to grab browser credentials and authentication cookies from Chrome, Firefox, Opera, and other browsers.
It also targets messaging apps like Discord, Telegram and Pidgin, along with cryptocurrency wallets such as Bitcoin, Ethereum and Exodus. StealC goes further by attempting to compromise cloud accounts from Amazon Web Services (AWS) and Azure, VPN services like ProtonVPN and even gaming accounts from Battle.net and Ubisoft. In addition, it can take screenshots of the victim’s desktop, giving attackers a live view of sensitive activity.
Acronis reported that the campaign has already appeared in several different versions over a short period, with changes in payloads and infrastructure. This suggests that the attackers are actively testing and refining their methods to avoid detection and improve success rates.
StealC also targets VPN software and cryptocurrency wallets.(iStock)
5 ways you can protect yourself from FileFix attacks
To stay protected against attacks like FileFix and prevent malware such as StealC from stealing sensitive information, you need to combine caution with practical security measures. The following steps can help safeguard accounts, devices, and personal data.
1) Be skeptical of urgent warnings
Attackers rely on panic. Treat any message claiming your Meta account or other services will be disabled within days with caution. Verify the alert directly through official platforms rather than clicking links or following instructions from an email or web page.
2) Avoid copying commands from unknown sources
FileFix relies on convincing you to paste hidden PowerShell commands disguised as file paths. Never paste commands into system dialogs, File Explorer, or terminals unless you are absolutely certain of their origin.
3) Invest in personal data removal services
FileFix and StealC thrive on the information they can extract from a device or linked accounts. By using data removal services, you reduce the amount of sensitive personal information that can be found online or left exposed on old platforms. This minimizes what attackers can exploit if they manage to gain access.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan
4) Install reliable antivirus software
A strong antivirus software can detect malware like StealC before it fully executes. Many solutions now include behavior-based detection that can flag suspicious scripts or hidden downloads, helping catch threats even when attackers try to disguise commands as harmless actions.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech
5) Use a password manager
While FileFix targets stored credentials, using a reputable password manager reduces risk by creating unique passwords for every site. This way, even if one browser or app is compromised, attackers cannot access your accounts elsewhere.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords
Cybercriminals keep finding creative ways to trick social media users, and FileFix proves how convincing these scams can look. A fake Meta alert may feel urgent, but pausing before you click or copy anything is the best defense. Relying on strong habits and security tools gives you the upper hand. Data removal services, antivirus software, and password managers each reduce risk in different ways. When you combine them, you make it much harder for attackers to turn a scare tactic into a real threat.
Should platforms like Meta do more to warn users about these evolving phishing tactics? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
With Microsoft ending support for Windows 10 this October, many people are racing to upgrade. Catherine, a longtime HP desktop user, shared her concerns with us: “I need to purchase a new/updated computer with Windows 11 pretty darn quick. I’ve utilized HP desktops for years and would prefer to continue to do so. My concern deals with transferring everything from one computer to another, made more interesting since my husband and I have separate setups and log-ins. I had a My Passport running, but now I believe a lot is in the cloud. We are concerned about losing our emails/contacts, etc. I also use various programs for a couple of groups I’m involved with (Word, PowerPoint, Excel, Adobe Acrobat, etc.), which I cannot afford to lose. Any guidance for a smooth transition would be great.”
If this sounds familiar, you’re not alone. The good news: you can move everything to a new HP computer running Windows 11 with the right preparation and tools. Here’s a step-by-step guide.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Microsoft will end support for Windows 10 this month.(Microsoft)
What to prepare before you buy a new computer
Before you switch to a new Windows 11 PC, take these steps to organize your files, programs and accounts, so the move goes as smoothly as possible.
1) Inventory what you have and make sure it’s backed up.
List the programs/software you use (Word, PowerPoint, Excel, Acrobat, etc.), including any license/activation info.
Find where your data is: local hard drive, external My Passport drive or cloud (OneDrive, Google Drive, etc.).
Make sure you have backups of anything that’s only local.
2) Check how your email is set up.
If it’s a Microsoft/Outlook/Exchange account, a lot may already be stored in the cloud. Outlook contacts/calendars may sync automatically depending on how your accounts are configured.
If you use POP (email downloaded locally), or “local only” Outlook data (.pst files), you’ll need to move those manually.
3) Have your login accounts ready.
Know your Microsoft account credentials (if you use one).
Know admin passwords for existing software.
4) Gather license keys/software installers.
For paid apps (Adobe Acrobat etc.), make sure you have install files or know how to re-download, plus activation keys.
Make a note of any special settings or plugins you use so they get restored.
Choosing the right computer for your needs
When choosing a new HP computer, confirm it runs Windows 11 out of the box. Pick a model with enough storage to hold all your files and plenty of RAM for multitasking. If you rely on external drives, make sure the new computer has the right ports, like USB-C or USB 3.0.
You can browse CyberGuy’s best laptop picks or best desktop computers for solid options at Cyberguy.com. If you mainly use your computer for email, browsing, or video calls, a tablet, Chromebook, or iPad might be all you need. They’re low-maintenance, secure, and often more affordable than a new Windows laptop.
Windows 11 and Windows 10 operating system logos are displayed on laptop screens. Krakow, Poland, on Feb. 3, 2022. (Beata Zawrzel/NurPhoto)
Step-by-step: Migrating to the new Windows 11 computer
Moving to a new PC takes planning, but following these steps will help you transfer your files, programs and settings safely. This is especially important if you and your spouse use separate logins.
Back up everything
Start by backing up your personal files, documents, pictures and desktop to both your external drive and a cloud service like OneDrive. If you use Outlook, export your email, contacts, and calendar if needed.
For POP or local .pst files, go to File → Open & Export → Export → Outlook Data File (.pst) and make a copy.
For IMAP or Exchange accounts, confirm that everything has synced properly online.
Back up Windows and settings
Use Windows Backup or the built-in tools to save your settings and user folders. Apply the latest Windows updates on the old PC before making the switch.
Set up the new PC
When you turn on your new computer, sign in with your Microsoft account if you have one. This helps sync certain settings automatically. Reinstall your Office apps, Adobe Acrobat, and any other software using your license keys or installers.
Transfer data and settings
If both PCs are connected and supported, you can use Windows Backup’s “Transfer information to a new PC” option. Simply pair them and choose what to move. If that’s not an option, copy backups from your external drive or cloud storage onto the new computer. Restore email by importing your .pst file if required.
Verify everything works
Open your key programs to confirm licensing is valid. Check that your email, contacts and calendar are functioning correctly. Go through your files to make sure nothing is missing.
Set up backup and ongoing sync
Once you’re up and running, turn on OneDrive or your preferred cloud service to sync important folders like Documents and Desktop. Finally, create a regular backup plan using either your external drive or the cloud, so your new PC stays protected.
Common problems to avoid
Some users run out of space on their new PC because they underestimated how much data they had. Others lose email when they forget to export .pst files. License activation can also cause headaches if the software is tied to the old machine, so always deactivate before reinstalling. And remember that older programs may not work perfectly on Windows 11, so check compatibility in advance.
Tools that can help
3rd party software: Transfers files, settings and some installed apps automatically. For our picks, search “First 10 things to do if you got a new PC” on Cyberguy.com
Windows Backup and Transfer: Free but may require reinstalling programs manually.
External hard drive backup: Still the simplest safety net for keeping copies of your important files. Copy everything important to your external drive as a safety measure before migrating.
Experts recommend backing up your files to an external hard drive or a cloud service before making the switch.(Kurt “CyberGuy” Knutsson)
How long the process takes
Upgrading to a new computer isn’t instant, but knowing the timeline helps you plan your day. On average, you can expect the transition to take most of an afternoon. Here’s what it looks like step by step:
Choose and order your new PC: Browsing, comparing models and making the purchase usually takes one to two hours.
Initial setup and Windows updates: When the new computer arrives, the first startup and applying all current Windows updates can take another one to two hours.
Install key programs: Installing Microsoft Office apps and Adobe Acrobat typically requires about one hour, depending on download speed and license activation.
Back up data on your old PC: Creating backups of your documents, photos and email accounts usually takes one to three hours. The exact time depends on how much data you have and whether you use an external drive or the cloud.
Transfer data and settings: Moving files, Outlook .pst backups and Windows settings to the new computer often takes one to two hours.
Verify that everything works: Allow about an hour to test your programs, check your email and contacts, and confirm that none of your files were left behind.
Reconnect devices and tweak settings: Finally, plan for 30 to 60 minutes to reconnect printers, set up Bluetooth accessories and customize your desktop and preferences.
When you add it all together, the full migration can take anywhere from six to ten hours spread over a day. While it requires patience, completing each step carefully ensures that your new Windows 11 computer runs smoothly without losing important data.
Pro tip: Once your new PC is ready, don’t forget security. Install strong antivirus software right away. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech
What to do with your old PC
Once you’ve finished moving everything over to your new Windows 11 computer and confirmed it’s working, don’t forget about your old PC. Leaving files on it could expose your personal data if the computer is ever donated, recycled or resold.
Before repurposing, always perform a secure wipe to erase all personal information. This step ensures that sensitive files, passwords and documents can’t be recovered later. After wiping, you can safely recycle the device, donate it or set it up for light use elsewhere in your home.
For step-by-step instructions, check out how to securely get rid of your old computer before recycling, selling or donating it.
Not everyone wants to switch right away. The good news is that Microsoft recently added two ways to extend Windows 10 support until October 13, 2026.
Use Microsoft Rewards: Redeem 1,000 points to keep your Windows 10 system covered.
Back up with OneDrive: Sync your files through Windows Backup and get extended support for free.
These options buy you more time, but remember: Windows 11 is the future. Planning now ensures you won’t be caught off guard when the final end date arrives.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz
Kurt’s key takeaways
Upgrading from Windows 10 to Windows 11 may feel overwhelming, but it doesn’t have to be. With the right preparation, backups and tools, you can make the switch smoothly and protect everything that matters.
Are you ready to upgrade before Windows 10 support runs out, or will you risk sticking with an outdated system? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
In an email to SkyMiles members, Delta just announced a partnership with YouTube that will let passengers stream ad-free videos on flights and unlock a free two-week trial of YouTube Premium simply by logging in with their account. On the surface, it looks like just another in-flight entertainment perk. But the more you think about it, the clearer it becomes that this isn’t about watching cat videos at 35,000 feet—it’s about turning YouTube into Delta’s secret weapon.
Look, for the most part, the thing you want to do on an airplane is pass the time by checking your brain out while you get to wherever you’re going. Maybe that means taking a nap or reading a book. For some people, it means watching a movie or live TV. For others, it’s endlessly scrolling on their phone until the pilot announces the descent.
That said, there is probably no better platform for wasting a large amount of time than YouTube. If you’ve ever gone down the rabbit hole of suggested videos, you know how easy it is to lose an hour—or three. YouTube isn’t just the world’s largest video platform, it’s basically the most effective time machine on the internet. Blink once, and your flight is halfway over.
Now, to be clear, no one buys a plane ticket because you can watch YouTube. That’s not how people choose airlines. You buy a plane ticket because of price, or schedule, or loyalty points. Entertainment is just a bonus. Besides, if you’re on a flight with Delta’s free Wi-Fi, you can already watch YouTube from your phone or laptop.
An Inc.com Featured Presentation
So, if that’s true, why would Delta announce a big partnership with YouTube? Why does it matter?
It turns out, it’s not about watching YouTube. Sure, there’s a curated collection of YouTube content available on the seatback experience. But the real move here is about YouTube Premium. Delta is offering passengers a two-week free trial of YouTube Premium if they sign in with their SkyMiles account. If you’re already a member, you unlock it just by logging in. If you’re not a member, you can become one right there on the plane.
That’s the real play.
Think about it: for Delta, whatever it’s paying YouTube to give away free Premium is basically just a customer acquisition cost. It’s a way to get people to sign up for SkyMiles. After all, airlines make more profit on their loyalty programs than on flying planes. Getting people to join SkyMiles isn’t just about keeping them on Delta flights—it’s about getting them into Delta’s entire ecosystem, from credit cards to co-branded offers to upgrades and perks. Every new member is long-term value.
What better way to get someone to sign up than to offer them the single most universal entertainment perk? Everyone loves YouTube. Almost everyone uses it. And yet, once you experience YouTube Premium, you realize it’s infinitely better.
I think you could make the case that YouTube Premium is the most no-brainer entertainment subscription there is. If you made me give up one of the services I pay for, I’d cancel all of them before I gave up Premium. Not because YouTube’s content is inherently better than Netflix, Disney+, or Spotify, but because there are no ads.
That’s it. That’s the whole thing. No ads. Okay, technically, YouTube Premium includes other benefits like YouTube Music, but the no ads thing is the reason it’s worth paying for.
It changes the experience so dramatically that it’s hard to go back once you’ve tried it. Ads on YouTube are relentless—sometimes three in a row before your video even starts. Once they’re gone, you realize how much brain space you were wasting on interruptions. Premium is less about adding features and more about taking away the one thing that drives people crazy.
Delta is banking on exactly that. The free trial onboard is a taste test. You’re sitting in your seat, you log into Wi-Fi, you click on YouTube, and suddenly you’re in the ad-free world. If you’ve never tried it before, you’ll wonder why you waited this long. That’s when YouTube—and by extension, Delta—wins.
Because here’s the thing: once you associate that premium, uninterrupted experience with signing into SkyMiles, you’ve just built a connection in the customer’s mind. Delta isn’t just an airline; it’s the company that gave you better YouTube.
From Delta’s perspective, the cost of subsidizing YouTube Premium trials is probably negligible compared to the lifetime value of a SkyMiles member. And for YouTube, it’s a distribution play. It’s hard to think of a better way to put YouTube Premium in front of millions of people than during a captive moment at 35,000 feet?
That’s why this is so smart. Delta figured out how to turn downtime into a loyalty engine. Airlines spend a lot of time trying to differentiate themselves in ways most passengers don’t notice. But the smartest moves are the ones that connect convenience with loyalty in a way that feels obvious. This is one of those moves.
Delta didn’t invent YouTube. It didn’t invent Premium. But it figured out how to use both to make SkyMiles more valuable, and to make flying Delta feel a little less painful. That’s a win for the airline, a win for YouTube, and—at least for a few hours in the air—a win for passengers.
The opinions expressed here by Inc.com columnists are their own, not those of Inc.com.
During a rough week for electric-vehicle makers in the U.S., Tesla investors got at least one piece of good news on Thursday. The EV maker reported a pronounced increase in sales—better numbers than Wall Street had predicted, and a respite from the lagging deliveries Tesla has been reporting over the last two quarters.
While analysts had expected Tesla to sell around 450,000 EVs over the three months ending in September, Tesla ended up delivering more than 497,000—about 100,000 more than the previous quarter, and a 7.5% increase from this time last year. Dan Ives, one of Tesla’s most notorious bulls, blasted out an analyst note that same morning, describing the numbers as a “massive bounceback” for Tesla—a turnaround for a company that has been battered over the first half of this year in several key markets as CEO Elon Musk tried his hand in a brief yet chaotic stint in American politics.
The key question is this: Will it last?
After all, Tesla’s short-term sales surge was closely related to its looming longer-term challenge. One of the key reasons for Tesla’s strong sales figures, investors and analysts noted, was the temporary rush of consumers purchasing an EV right before the elimination of the $7,500 electric vehicle tax credit. That incentive—which officially ended on Tuesday—had been in place for 17 years and had helped narrow the price gap between electric and gas vehicles for U.S. buyers. Tesla on Wednesday went ahead and increased the cost of leasing its vehicles, as its first move reflecting the change.
With the tax credits no longer available, the change is expected to take a significant toll on consumer demand—at least in the near term.
Tesla is well aware of this. It added risk disclosures in its latest quarterly filings about the potential impact of the loss of the consumer incentive as well as another now-non-existent sales booster, carbon offset incentives for manufacturers. The EV maker acknowledged the possibility that their removal could harm both demand from Tesla customers and the company’s future financial returns.
Musk himself has opined on the topic, too. “Yeah, we probably could have a few rough quarters,” he said in July on Tesla’s last earnings call, in response to an analyst’s question. “I’m not saying we will, but we could. Q4, Q1, maybe Q2.”
Andrew Rocco, a stock strategist with Zacks Investment Research and an investor in Tesla shares, said in an interview that he’s anticipating a drop off in sales for the next two quarters or so.
But the long-term impact may be contingent on several other factors: whether Tesla can absorb some of the lost credit in order to keep prices down; whether it can continue to regain market share in markets like Europe and China where its reputation has suffered over the last eight months; and whether the EV maker can deliver on the timelines it has furnished for a more-affordable Model Y.
“If they can come out with that cheaper model Y… That would be a huge catalyst to help them offset that EV tax credit sunsetting,” Rocco says.
Last time around
It’s worth doing a quick history lesson when considering how Tesla may respond to the elimination of the $7,500 tax credit. After all, this isn’t the first time it’s had to do so.
If you recall, when the incentive was first put in place via bipartisan legislation in the late 2000s, there was a cap: After a vehicle manufacturer sold a total of 200,000 eligible vehicles, the tax credit would slowly phase out until it was eliminated altogether. Both Tesla and General Motors ended up hitting that threshold, and their tax credits were halved twice before dissolving completely. The cap was removed under the Inflation Reduction Act of 2022, allowing Tesla and GM to take advantage of it again.
Back in 2018, Tesla sold 200,000 EVs, becoming the first EV maker to hit said cap. As a result, in January 2019, Tesla customers had their rebates cut in half to $3,750. To respond to the change, Tesla rolled out a $2,000 price cut for the Model S, Model X, and Model 3 the very next day, absorbing a large chunk of the lost incentive.
Because of Tesla’s strong margins, Rocco pointed out that Tesla could be in a position to do the same today if it chooses.
So far, Tesla hasn’t committed one way or another. The company has committed to releasing a lower-cost Tesla Y model later this year, however. Musk said that the new vehicle would be “available to everyone” before the end of 2025.
That model has been rumored to cost somewhere around $39,990—which would be approximately $5,000 cheaper than the most affordable Model Y currently available. But there hasn’t been a firm price announcement. Rocco said that it will be “critical” for Tesla to meet Musk’s fourth-quarter deadline.
Cost savings
It seems that all EV-makers are on the hunt for potential cost savings right now that they can ultimately pass down to the customer in lieu of the bygone tax credit.
Chris Barman, CEO of Slate Auto, the startup that plans to start selling its low-cost customizable trucks to customers next year, told Fortune in an interview on Tuesday that there’s at least one upside to the loss of thetax credit. Because the company is no longer subject to all the supplier restrictions required under the Inflation Reduction Act to secure customers the tax credit, Slate has more options for battery suppliers that it can work with. “It would give us the opportunity to pass lower costs along to the consumer in a different way,” Barman said.
That being said, don’t expect those cost savings to add up to $7,500. While Barman wouldn’t provide a specific figure, she acknowledged, “It’ll be a significant cost reduction, but it won’t offset the full amount of credit itself.”
Another thing to keep in mind: There are still state-level incentives, too, as Barman pointed out—with the potential for more. A handful of states, including California, Colorado, Vermont, and Connecticut, currently offer their residents an EV tax credit. And states including Pennsylvania, Minnesota, and Texas are looking at incorporating their own incentives, too.
Tesla, meanwhile, is hoping that its impending autonomous capabilities will give the company an edge, even as its vehicles suddenly become more expensive for customers. Tesla is expected to roll out the 14th iteration of its “full self-driving” software shortly, and has already started doing so with select influencers this week.
“Once you get to autonomy at scale in the second half of next year, certainly by the end of next year, I think the—I would be surprised if Tesla’s economics are not very compelling,” Musk said during the Q2 earnings call.
Wall Street thus far doesn’t seem quite as optimistic. On Thursday, even after Tesla reported its strong sales figures, shares fell more than 5%.