ReportWire

Tag: TECH

  • VA issues overpayment scam alert for veterans

    [ad_1]

    NEWYou can now listen to Fox News articles!

    As the nation honors veterans for their service, the Department of Veterans Affairs is reminding the community to stay alert to a growing threat, the VA overpayment scam.

    Reports show that fraudsters are contacting veterans through text, email and phone calls, pretending to be VA employees. They claim you were overpaid on your benefits and must send money or banking details to correct the issue.

    These criminals often make their messages look official with VA logos, formal wording and even fake caller IDs. Once they gain your trust, they push for quick payment, hoping you act before verifying. Staying informed and cautious is the best way to protect your benefits and your identity.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    Scammers are claiming veterans were overpaid on their benefits by impersonating VA employees. (Kurt “CyberGuy” Knutsson)

    How to spot a VA overpayment scam

    Be on alert for these red flags:

    • Messages demanding urgent payment, especially by gift card, wire transfer or cryptocurrency.
    • Requests for your VA login or password.
    • Emails or texts with links that don’t lead to VA.gov.
    • Caller ID spoofing showing “VA” or “Debt Center” to look official.
    • Messages or letters that lack detailed explanations or account numbers.

    If you spot any of these, don’t engage; instead, verify the communication directly through VA.gov or by calling the VA’s official number.

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

    Real VA communications always direct veterans to VA.gov or the official Debt Management Center.

    Legitimate VA communications always direct veterans to VA.gov or the official Debt Management Center.  (Kurt “CyberGuy” Knutsson)

     How real VA overpayments work

    When the VA determines an actual overpayment, it sends a formal letter explaining the amount and your options to appeal or set up a payment plan. You’ll never be told to pay through text or third-party apps, and you’ll never be asked to share login credentials or banking info outside VA.gov.

    Real VA notices always direct you to official channels like VA.gov or the Debt Management Center (1-800-827-0648). If something feels off, it probably is, so always verify before taking action.

    Staying alert and verifying messages through official channels helps protect your hard-earned VA benefits.

    To protect your hard-earned VA benefits stay alert and verify messages through official channels.  (Kurt “CyberGuy” Knutsson)

    Top ways to protect yourself from VA overpayment scams

    Stay ahead of scammers by following these simple but powerful steps to protect your VA benefits.

    1) Verify through your official VA.gov account

    Whenever you receive a notice about an overpayment, log in to your VA.gov account directly instead of clicking any link or responding to a message. The site shows your current balance, payment status and any real debts.

    2) Use official VA payment channels

    If you discover a legitimate debt, handle it only through VA’s official payment options. Call the Debt Management Center at 1-800-827-0648 or make payments through your secure VA.gov dashboard. Avoid sending funds through apps, wire transfers, or prepaid cards as the VA will never ask for those.

    3) Never share your login information

    Your VA login and password are like your house keys. The VA will never ask for them, not by phone, email, or text. Anyone who requests them is a scammer. If you think your credentials were compromised, change your password immediately and enable multi-factor authentication (MFA) if available.

    Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    4) Avoid suspicious links and attachments

    Fraudsters often embed fake links in messages that look real at first glance. Hover over a link before clicking to preview the URL; if it doesn’t start with “https://www.va.gov,” it’s fake. Be equally cautious with attachments, as they can install malware designed to steal your personal data.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    5) Use a data removal service

    Data brokers often publish your name, phone number and even veteran status online, information scammers use to target you. Personal data removal services can automatically request data removals from hundreds of broker sites, reducing your exposure and lowering the odds of being targeted.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    6) Watch out for unusual payment methods

    Scammers love untraceable transactions. Any request for payment through gift cards, Bitcoin, prepaid debit cards, or wire transfers is an instant red flag. The VA does not and will not use these methods to collect payments.

    7) Limit your social media exposure

    Scammers sometimes gather information from social networks to make messages seem more personal. Review your friends and followers, tighten privacy settings and think twice before posting details about your military service or VA benefits.

    8) Report suspected fraud immediately

    If you think someone tried to scam you, contact the VA directly at 1-800-827-1000. You can also report incidents at VSAFE.gov or call (833) 38V-SAFE (833-388-7233). Reporting quickly helps protect others in the veteran community.

    Kurt’s key takeaways

    This Veterans Day is a time to reflect on service, sacrifice and strength, and that includes protecting what you have earned. Scammers may be persistent, but staying alert and using official VA resources gives you the upper hand. Your benefits represent more than money; they are recognition of your service. Keep them safe, stay skeptical of sudden messages and verify everything before you act.

    How can technology companies and the government do a better job of protecting veterans online? Let us know your thoughts in the comments below. Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Aerospace tech startup lets you design your own personal aircraft

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The dream of personal flight has always felt just out of reach, until now. A company called AltoVolo has unveiled something that might make it real: the world’s first eVTOL configurator.

    That might sound technical, but it’s actually simple. “eVTOL” stands for electric vertical takeoff and landing. Think of a small, quiet aircraft that lifts off like a helicopter but flies forward like a plane, all powered by electric or hybrid engines instead of noisy fuel-burning ones. 

    And a configurator? It’s a tool that lets you design your own version online, choosing colors, materials and other personal details. Put the two together, and you’ve got something quite remarkable: the ability to design your own flying vehicle from your laptop.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF

    With AltoVolo’s world-first online configurator, you can design every detail of your Sigma eVTOL. (AltoVolo)

    A new kind of personal aircraft

    AltoVolo’s aircraft is called the Sigma, and it’s unlike anything on the market. It’s a three-seater hybrid-electric vehicle that combines quiet operation with long range. The Sigma can fly about 500 miles, reach speeds over 220 mph and is more than 80% quieter than a helicopter.

    That quietness isn’t just about comfort; it’s what makes urban air travel possible. Imagine small aircraft quietly taking off from rooftops or open fields, connecting cities and towns without the noise pollution we associate with helicopters today.

    Safety is built in, too. The Sigma can keep flying even if one of its small electric jet engines fails, and it carries a ballistic parachute for emergencies. It’s compact and light, just under 16 feet wide and weighing a little over 2,100 pounds, making it easier to operate and store than you might expect.

    The Sigma combines sleek hybrid-electric power with quiet performance, flying over 500 miles while staying over 80% quieter than a helicopter.

    The Sigma is over 80% quieter than a helicopter combining sleek hybrid-electric power with quiet performance. (AltoVolo)

    From concept to customization

    The idea of customizing your own aircraft might sound futuristic, but AltoVolo’s online configurator makes it surprisingly accessible.

    Like building your own car online, you can choose colors, seat materials, interior details and even the stitching on your seatbelts. Founder and CEO Will Wood says the company’s goal isn’t to compete on price but on experience and technology.

    “Much like you’d expect from a supercar brand, we’re focused on performance and refinement,” he explained.

    The first 100 Sigma models will be limited editions, offering special finishes and materials that won’t appear on later production units.

    NASA’S ‘QUIET’ SUPERSONIC JET COMPLETES FIRST FLIGHT IN POTENTIAL BREAKTHROUGH FOR COMMERCIAL AIR TRAVEL

    Taking flight before you take off

    AltoVolo isn’t stopping at online design. They’ve built a high-fidelity flight simulator that mirrors the Sigma’s cockpit exactly, right down to its carbon fiber and soft leather interior.

    Customers can train in the simulator and even use those hours toward a pilot’s license. The simulator gives them a chance to “fly” their customized Sigma before ever leaving the ground.

    And for everyone else? The company is sharing flight footage from its simulator on YouTube, so people can see how the Sigma handles in the air.

    “For AltoVolo, opening our order book is a major milestone in bringing the Sigma to life,” Wood tells CyberGuy. “Having early customers make an initial financial commitment shows us real demand. In turn, we are able to raise capital to finalise the product, progress certification and prepare for production. Presenting the flight simulator has been a useful catalyst. Allowing customers to fly in a simulated environment really helps them realise how easy this type of aircraft will be to fly.”

    Early Sigma owners join an exclusive community shaping the future of personal air travel and sustainable innovation.

    An exclusive community for early Sigma owners shapes the future of personal air travel and sustainable innovation. (AltoVolo)

    Innovation you can feel

    One of the most interesting details about the Sigma is something you can’t see: the sound inside the cabin. AltoVolo’s engineers are working to reduce vibration and interior noise, creating a calm, smooth flight experience.

    At the same time, they’re experimenting with a synthesized soundscape, a gentle background tone that changes with the aircraft’s power use. It helps pilots sense how the vehicle is performing and adds a cinematic touch to the flying experience.

    It’s part science, part art and a hint at how human-centered this design really is.

    AltoVolo’s high-fidelity simulator lets future pilots train in a realistic Sigma cockpit and even log hours toward a license.

    Future pilots can train in a realistic Sigma cockpit simulator and even log hours toward a license. (AltoVolo)

    The path to certification

    The Sigma will benefit from new U.S. aviation rules called MOSAIC, which simplify the process for certifying small, advanced aircraft. This means the Sigma can be sold as a light sport aircraft, lowering costs for both the company and future pilots. Certification is also underway in Europe and the UK, which could make global operations possible in the next few years.

    Building a community around flight

    Buying a Sigma isn’t just about owning an aircraft; it’s about joining a new kind of community. AltoVolo wants Sigma owners to become collaborators, helping to shape the product and the future of urban flight. The company is also planning a global service and support network, including maintenance and training centers, to make ownership practical for people beyond traditional aviation circles.

    What this means to you

    For most of us, flying still means boarding a big plane at a crowded airport. But companies like AltoVolo are trying to change that. The Sigma represents a future where small, efficient aircraft could handle regional travel, connecting towns, suburbs and cities in new ways. It’s the kind of innovation that could one day make air travel as personal as driving. And while it’s still very early, AltoVolo’s new configurator makes the dream of personal air travel feel a bit more real. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com

    Kurt’s key takeaways

    AltoVolo’s Sigma may not replace your car anytime soon, but it gives us a glimpse of what’s coming: a world where flight is cleaner, quieter and designed around the individual. It’s a preview of how the future of travel might not be on the road at all, but instead in the air.

    If you could design your own aircraft, where would your first flight take you? Let us know by writing to us at CyberGuy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter. 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Sam Bankman-Fried’s Mom Is Posting From His Substack. Why?

    [ad_1]

    On Tuesday, as an attorney for Sam Bankman-Fried argued with a judge considering his appeal, an email landed in the inboxes of those who subscribed to the disgraced crypto mogul’s Substack.

    The email was from Bankman-Fried’s mother, Barbara, a Stanford Law professor. So there was no confusion, she wrote, “Just to confirm for those asking: yes, the post below was written by Barbara Fried.”

    Attached was a 65-page report, written by Fried, which made an aggressive case in defense of her son, who was charged in 2023 with defrauding customers of his crypto exchange FTX out of billions of dollars. The erstwhile billionaire was convicted on seven counts of fraud and conspiracy and sentenced to 25 years in prison.

    It’s a sentence Bankman-Fried’s lawyers are appealing in federal court this week. Oral arguments began on Tuesday, with his lawyer Alexandra Shapiro reportedly making the case that his first trial was “fundamentally unfair.” She put forth a similar argument to Bankman-Fried’s mother: that FTX collapsed as a result of a liquidity crisis, not fraud.

    Judges in the 2nd U.S. Circuit Court of Appeals – where, in a neat coincidence, Bankman-Fried’s mother once clerked – were reportedly skeptical of his lawyer’s arguments. “From my reading of the record, [there was] very substantial evidence of guilt,” one of the judges told Shapiro. The other two judges on the panel reportedly shared in that skepticism.

    Should Bankman-Fried lose his appeal, which seems likely given the high burden in such cases, there is another well-trodden path out of federal prison: a pardon.

    President Donald Trump has, in just his first year back in office, proven to be perhaps the most unrestrained pardoner in modern presidential history, with a particular focus on white collar criminals. Those to whom he has tossed salvation include Silk Road creator Russ Ulbricht, Ozy Media fraudster Carlos Watson, and another criminal cryptobillionaire, Binance founder Changpeng Zhao.

    So it may not be that far-fetched that Bankman-Fried, despite his past life as a Democratic megadonor, would nab a coveted get-out-of-jail-free card from Trump. He’s been making the rounds. Bankman-Fried sat for a jailhouse interview with Tucker Carlson in March, during which he put forth some subtle MAGA-signalling. “In 2020, I was center-left and I gave to Biden’s campaign. I was optimistic he would be a center-left president,” he told Carlson. “I spent the next few years in D.C. a lot. I was really really shocked by what I saw there… and not in a good direction.” He added: “By late 2022 I was giving to Republicans as much as Democrats.”

    [ad_2]

    Aidan McLaughlin

    Source link

  • 3,000+ YouTube videos deliver malware disguised as free software

    [ad_1]

    NEWYou can now listen to Fox News articles!

    YouTube is arguably the most popular and most visited platform for entertainment, education and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike or need help with work or school. But recent research by Check Point reveals a darker side: a sprawling malware distribution network quietly operating within the platform. Hackers are using compromised accounts, fake engagement and clever social engineering to spread information-stealing malware disguised in more than 3,000 software cracks and game hack videos.

    Most victims begin by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity for “free” software opens the door to the Ghost Network’s traps.

    META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Cybercriminals are exploiting YouTube’s massive reach by disguising malware inside fake “how-to” and “free software” videos. (Kurt “CyberGuy” Knutsson)

    All about YouTube’s ghost network

    According to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity surging threefold in 2025. It’s built around a simple but effective formula, which blends social manipulation with technical stealth. The network’s primary targets are people searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

    Researchers discovered that these videos often feature positive comments, likes and community posts from compromised or fake accounts. This coordinated engagement gives potential victims a false sense of safety.

    The fake social proof and fabricated likes, comments and subscriber activity play a key psychological role. They trick viewers into believing the content is legitimate and widely trusted, allowing the operation to persist even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.

    Once a user clicks the provided links, they’re usually taken to file-sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. The linked files are often password-protected archives, making them harder for antivirus tools to scan. Victims are then asked to disable Windows Defender before installation, effectively disarming their own protection before running the malware.

    Check Point found that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine. These programs harvest passwords, browser data and other sensitive information, sending it back to the attacker’s command and control servers.

    What makes the network particularly resilient is its role-based structure. Each compromised YouTube account serves a function; some upload malicious videos, others post download links and a third group boosts credibility by commenting and liking content. When an account gets banned, it’s quickly replaced, allowing the operation to continue largely uninterrupted.

    YouTube.com displayed on a laptop

    A single click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutsson)

    Inside the malicious campaigns

    Two major campaigns stood out in Check Point’s investigation. The first involved the Rhadamanthys infostealer, spread through a compromised YouTube channel named @Sound_Writer, which had nearly 10,000 subscribers.

    The attackers uploaded fake cryptocurrency-related videos and used phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which connected to multiple control servers to exfiltrate stolen data.

    The second campaign, involving HijackLoader and Rhadamanthys, leveraged a much larger channel, @Afonesio1, with around 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    One of these videos gained over 291,000 views and dozens of glowing comments claiming the software worked perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop the Rhadamanthys payload, which then connected to rotating control servers every few days to avoid detection.

    Even if you never complete the installation, you can still be at risk. Simply visiting the phishing or file-hosting sites may expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed.

    youtube smartphone

    Strong passwords, two-factor authentication, and regular security scans are your best defense against YouTube’s Ghost Network. (Cyberguy.com)

    7 steps you can take to stay safe from YouTube’s ghost network

    The Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “free software” or “game hacks,” relying on users to click before thinking. Protecting yourself means adopting habits that make it harder for attackers to fool you. Here are seven steps to stay safe:

    1) Avoid cracked software and cheat downloads

    Most infections start with people trying to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where anyone can upload malicious content. Even if a YouTube video looks polished or filled with positive comments, that doesn’t mean it’s safe. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.

    Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals a perfect delivery channel for malware.

    2) Use a strong antivirus

    Make sure you have a trusted antivirus solution installed and always running. Real-time protection can detect suspicious downloads and block harmful files before they do any damage. Schedule regular system scans and keep your antivirus updated so it can recognize the latest threats.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

    3) Never disable your antivirus or Windows Defender

    If a tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There’s no legitimate reason to turn off protection, even temporarily. The moment a file asks you to do so, delete it immediately.

    4) Be cautious with YouTube links and download sources

    Always inspect links before clicking. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true target. Downloads hosted on unfamiliar domains or file-sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open-source communities.

    5) Use a password manager and enable two-factor authentication (2FA)

    Turning on 2FA for important accounts adds another layer of protection, ensuring that even if someone gets your password, they can’t access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them harder to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com

    6) Keep your operating system and apps updated

    Software updates don’t just bring new features, but they also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infections.

    7) Use a trusted data removal service

    Even after securing your system, your personal information might already be circulating online from past breaches. A reliable data removal service can continuously scan and request deletion of your data from people-search and broker sites, making it harder for cybercriminals to exploit your exposed information.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and shut down.

    Do you think YouTube is doing enough to stop malware distribution on its platform? Let us know by writing to us at CyberGuy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • How This CEO Took Charge During a Crisis and Built a Fire-Fighting Powerhouse

    [ad_1]

    Fire Rover is all about responding quickly and efficiently to crises: the Farmington Hills, Michigan-based tech company—which has now cracked the Inc. 5000 list five years in a row—works to detect and extinguish industrial fires before they get too big.

    So it’s fitting that Will Schmidt, Fire Rover’s CEO, joined the company in a moment of crisis, too.

    Schmidt says he initially met the Fire Rover team at a trade show in early 2018, back when he was still working for Pacific Western Bank. The fire-fighting company so interested him that he made a trip out to their Detroit-area headquarters for a tour.

    “It didn’t really fit into any box that I had at the time—it was a little small and so forth—but [I] nevertheless wanted to keep in touch,” he recalls.

    About nine months later, Brad Gladstone—who’d founded the company in 2015—passed away. Conversations about what Schmidt could do to help during that period of transition eventually led to him taking on the CEO role in fall 2019, he says: “The idea was hatched to come out and…flip from the side of investing and telling people what they should do, to actually getting in the hot seat.”

    Fire Rover’s fire-fighting tech can be broken down into two parts: detection (which involves using thermal cameras, light sensors and smoke-detecting computer vision software to notice an industrial fire early) and suppression (which finds remote operators reviewing the situation and releasing a targeted suppression stream as needed).

    “Typically, we’ll be applying suppression five minutes before something like a traditional sprinkler head would pop, because it takes some time for the heat to accumulate at that sprinkler head,” Schmidt explains. “Because we’re highly concentrated, we’re able to use about 88 percent less water, typically, to put this fire out, which means they can get back to work quicker, less cleanup, less damage from the fire and less damage from water.”

    That such a fast-growing tech company (No. 1,434 on the 2025 Inc. 5000 list) is being run out of a suburb north of Detroit may surprise people used to looking to San Francisco, Austin and Boston for innovation. But the CEO says the Midwest has a good regional talent pool of mechanics, electrical engineers and plumbers he can draw on.

    Becoming CEO meant Schmidt had to move his family from St. Louis to the Detroit area—a transition complicated by the onset of COVID soon after. Still, it ended up working out for the company. Since joining, Schmidt has sought to scale and professionalize Fire Rover, which he says has finally given key employees the flexibility to take vacations.

    “The business is probably 10 times the size it was,” he says of his tenure, estimating that the employee headcount has sextupled since he came on board.

    Maintaining good relationships with customers—many of whom are in the waste management, scrap metal and recycling sectors—has been key to that growth, he adds.

    Sales opportunities are also growing as industrial fires among Fire Rover’s core customer base become more common, Schmidt says, which he attributes to waste facility’s efforts to process more material and boost efficiency.

    “A lot of times, you’re pushing the edges of physics,” he explains. “Moving that material creates more friction and things [like] that, so many industrial processes are inherently a little bit more dangerous than they used to be as people seek to become more efficient.”

    While Schmidt comes from a finance background—“spreadsheets are my natural gravitation,” he tells Inc.–he points to his company’s culture as a key driver of its success. 

    “As you bring people on and rapidly expand,” he says, “making sure that culture is well defined—whether that’s written-down core values, or you sit down and tell everyone about the founding of the company and what your expectations are—that’s, to us, been part of the secret sauce.”

    [ad_2]

    Brian Contreras

    Source link

  • Nike partners with robotics company to create world’s first motor-powered footwear system

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Nike has taken a bold step into the future with Project Amplify, the world’s first motor-powered footwear system made for people who love to move. Created with robotics partner Dephy, the design combines a carbon-plated running shoe with a motorized cuff and drive belt that add a gentle push to every stride.

    Unlike performance tech built for pros, Project Amplify is designed for everyday movers such as runners, walkers and commuters. It helps anyone who wants to go a little faster and a little farther with less effort. Think of it like the running world’s version of an e-bike. It makes movement simpler, smoother and more fun for everyone.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    SKECHERS’ AIRTAG SHOES LET YOU TRACK YOUR KIDS’ STEPS

    How Project Amplify works

    At the center of Project Amplify is a small but powerful motor. It connects to a rechargeable cuff that wraps comfortably around your calf. The cuff links to a carbon plate inside the shoe. Together, they provide natural assistance with each step.

    Nike’s Project Amplify pairs sleek design with advanced robotics to help every step feel lighter and smoother. (Nike)

    Testing in the Nike Sport Research Lab has been extensive. More than 400 athletes have taken over 2.4 million steps during trials. According to testers, the system makes uphill running feel like flat ground. Some even said it helped them go from a 12-minute mile to a 10-minute mile with less effort.

    NIKE IS NOW ON AMAZON: SHOP WALKING SHOES, JOGGERS, SOCKS AND SHORTS TODAY

    Because of this, Nike says Project Amplify isn’t about competition. The company’s focus is on making movement easier and more approachable for a wider range of people. Whether someone is new to running or wants to fit more walking into daily life, the technology is designed to offer gentle support without taking over the effort.

    Innovation made accessible

    Nike’s VP of Emerging Sport and Innovation Michael Donaghu described the idea behind Project Amplify as this, “What if we could help athletes move faster and farther with less energy and a lot more fun?”

    HUMANOID ROBOT TURNS HEADS AT NYC SNEAKER STORE

    That question inspired years of research and collaboration between Nike and Dephy. Together, they combined robotics, biomechanics and motion algorithms to create a powered shoe that feels natural to wear.

    Like e-bikes transformed cycling, Project Amplify could do the same for running and walking. It aims to help people stay active more often and enjoy movement in new ways. Through this approach, Nike is showing how innovation can make fitness more accessible to everyone.

    Nike’s Project Amplify neon shoe model on display.

    Early testing shows the powered cuff and drive system give runners steady support on every stride. (Nike)

    What this means for you

    AFFORDABLE 3D-PRINTED BIONIC ARM USES MUSCLE SIGNALS TO MOVE

    Imagine finishing a run with energy to spare. Picture walking an extra mile without feeling tired. Project Amplify makes that possible. Its gentle mechanical assist feels like an extra set of calf muscles that supports your natural stride.

    For casual runners, this means more miles with less strain. For commuters, it could make daily travel faster and more efficient. Overall, it gives you the power to enjoy movement again. The goal is not to do less. The goal is to get more from every step.

    Take my quiz: How safe is your online security?

    NEW EXOSKELETON BUILT TO BOOST ENDURANCE AND CUT FATIGUE

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    With Project Amplify, Nike is blending art, science and sport to change how movement feels. This new technology aims to enhance natural motion rather than replace it. As testing moves forward, one thing is clear: Project Amplify could completely change how we think about running, walking and human performance.

    man tying shoes

    As Nike refines Project Amplify, the focus remains on making movement easier, more natural, and more enjoyable for everyone. (iStock)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    If powered shoes could make running and walking easier, would you try them or stick with pure muscle power? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 183 million email passwords leaked: Check yours now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A massive online leak has exposed more than 183 million stolen email passwords gathered from years of malware infections, phishing campaigns and older data breaches. Cybersecurity experts say it is one of the largest compilations of stolen credentials ever discovered.

    Security researcher Troy Hunt, who runs the website Have I Been Pwned, found the 3.5-terabyte dataset online. The credentials came from infostealer malware and credential stuffing lists. This malware secretly collects usernames, passwords and website logins from infected devices.

    Researchers say the data contains both old and newly discovered credentials. Hunt confirmed that 91% of the data had appeared in previous breaches, but about 16.4 million email addresses were completely new to any known dataset.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT

    Cyber experts uncovered a 3.5-terabyte data dump containing millions of stolen logins. (Kurt “CyberGuy” Knutsson)

    The real risk behind the password leak

    The leak puts millions of users at risk. Hackers often collect stolen logins from multiple sources and combine them into large databases that circulate on dark web forums, Telegram channels and Discord servers.

    If you have reused passwords across multiple sites, attackers can use this data to break into your accounts through credential stuffing. This method tests stolen username and password pairs on many different platforms.

    The risk remains real for anyone using old or repeated credentials. One compromised password can unlock social media, banking and cloud accounts.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices.

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices. (Jens Büttner/picture alliance via Getty Images)

    Google responds to the reports

    Google confirmed there was no Gmail data breach. In a post on X, the company stated “reports of a Gmail security breach impacting millions of users are false. Gmail’s defenses are strong, and users remain protected.”

    Google clarified that the leak came from infostealer databases that compile years of stolen credentials from across the web. These databases are often mistaken for new breaches when, in fact, they represent ongoing theft activity. Troy Hunt also confirmed the dataset originated from Synthient’s collection of infostealer logs, not from a single platform or recent attack. While no new breach occurred, experts warn that leaked credentials remain dangerous because cybercriminals reuse them for future attacks.

    How to check if you were exposed

    To see if your email was affected, visit Have I Been Pwned. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the Synthient leak.

    Many password managers also include built-in breach scanners that use the same data sources. However, they may not yet include this new collection until their databases update.

    If your address shows up, treat it as compromised. Change your passwords immediately and turn on stronger security features to protect your accounts.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    hacker on laptop

    The 183 million exposed credentials came from malware, phishing and old data breaches. (Kurt “CyberGuy” Knutsson)

    9 steps to protect yourself now

    Protecting your online life starts with consistent action. Each step below adds another layer of defense against hackers, malware and credential theft.

    1) Change your passwords immediately

    Start with your most important accounts, such as email and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. 

    Never reuse passwords. One stolen password can unlock multiple accounts. Each login should be unique to protect your data.

    A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed.

    Next, check whether your email has been caught in a recent credential leak. Our No. 1 password manager pick includes a built-in Breach Scanner that searches trusted databases, including the newly added Synthient data from Have I Been Pwned. It helps you find out if your email or passwords have appeared in any known leaks. If you see a match, change any reused passwords right away and secure those accounts with strong, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Enable two-factor authentication (2FA)

    Turn on 2FA wherever possible. It adds a powerful second layer of defense that blocks intruders even if they have your password. You will receive a code by text, app or security key. That code ensures only you can log in to your accounts.

    3) Use an identity theft service for continuous monitoring

    Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. It’s a smart way to stay one step ahead of hackers.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    4) Protect your devices with strong antivirus software 

    Infostealer malware hides inside fake downloads and phishing attachments. A strong antivirus software scans your devices to stop threats before they spread. Keep your antivirus updated and run frequent scans. Even one unprotected device can put your whole digital life at risk.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Avoid saving logins in your web browser

    Browsers are convenient but risky. Infostealer malware often targets saved passwords in your web browser. 

    6) Keep software updated

    Updates fix security flaws that hackers exploit. Turn on automatic updates for your operating system, antivirus and apps. Staying current keeps threats out. 

    7) Download only from trusted sources

    Avoid unknown websites that offer free downloads. Fake apps and files often contain hidden malware. Use official app stores or verified company websites. 

    8) Review your account activity often

    Check your accounts regularly for unusual logins or device connections. Many platforms show a login history. If something looks off, change your password and enable 2FA immediately.

    9) Consider a personal data removal service

    The massive leak of 183 million credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites.

    While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    This leak highlights the ongoing danger of malware and password reuse. Prevention remains the best defense. Use unique passwords, enable 2FA and stay alert to keep your data safe. Visit Have I Been Pwned today to check your email and take action. The faster you respond, the better you protect your identity.

    Have you ever discovered your data in a breach? What did you do next? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 5 hidden battery drainers you can fix right now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You plug in your phone overnight, but by lunchtime, it’s already gasping for charge. Sound familiar? Hidden background features, sneaky settings and apps you forgot existed can quietly drain your battery faster than you think. The good news is a few quick tweaks can help your device stay powered all day, without sacrificing performance or convenience.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    1) Turn off background app refresh

    Stop apps from sapping power when you’re not using them. Even when you’re not actively scrolling or tapping, many apps continue running in the background, fetching updates, refreshing data and sending notifications. It’s convenient, but it drains your battery faster than you realize.

    For iPhone 

    • Go to Settings.
    • Tap General.
    • Click Background App Refresh.
    • Tap Background App Refresh again.
    • Select Off, or choose Wi-Fi to limit data use and battery drain.
    • You can also toggle off refresh for individual apps if you still want certain ones to run.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Stop background apps from quietly draining your battery. (Kurt “CyberGuy” Knutsson)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Battery (or Battery & device care, Power management, or similar).
    • Select Background usage limitsApp battery management, or Battery optimizationwording depends on your device.
    • Choose the apps you rarely use, then set them to Restricted or Optimized, or Put unused apps to sleep.
    • To let Android manage this automatically, turn on Adaptive Battery (found under Settings › Battery › Adaptive Battery).

    Pro tip: Keep essential apps, such as messaging, navigation, or weather, active so they can update in real time. Restricting background activity for apps you don’t open often can extend battery life by several hours a day.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    3 phones are plugged in with dark screens

    Turn off background refresh to stop unused apps from quietly draining your battery. (Kurt Knutsson)

    2) Disable Always-in Display

    That sleek clock on your screen might look cool, but it’s constantly using power. Always-On Display keeps your screen partially lit, even when you’re not touching it, to show time, notifications or widgets. Over time, that adds up, especially overnight.

    For iPhone (14 Pro and later)

    • Go to Settings.
    • Tap Display & Brightness.
    • Click Always On Display.
    • Toggle Off next to Always On Display to stop your phone from lighting up when locked.

    For Android

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Lock screen (sometimes labeled “Lock screen & security,” “Lock screen & AOD,” “Display & lock screen,” etc.).
    • Look for Always On Display (AOD) (or similar, such as “Always show time & info”, “Ambient display”, “Screen always on when locked”).
    • Toggle Off to disable the AOD entirely, or choose an alternative mode (for example: “Tap to show” / “Show on tap” so the AOD only appears when you tap the screen) if available.
    • (Optional) Some devices allow scheduling of AOD or limiting it to when notifications are present. If you want more control, explore the sub-options under the AOD setting.

    Turning off Always-On Display can extend standby battery life by up to 10 to 15%.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Samsung Galaxy S23 Ultra smartphone is seen in South Korea

    Turn off Always-On Display to save more power each day.  (SeongJoon Cho/Bloomberg via Getty Images)

    3) Limit location access

    GPS is one of the biggest hidden battery drains. Apps that track your location in the background, from ride-sharing to retail, can quietly sap your phone’s power even when you’re not using them. Adjusting permissions keeps your phone secure and efficient.

    For iPhone 

    • Go to Settings.
    • Tap Privacy & Security.
    • Click Location Services.
    • Tap each app individually and change Always to While Using the App or Never.
    • Now, scroll to the bottom and tap System Services.
    • Tap Significant Locations, then toggle it Off to stop your iPhone from storing detailed location and travel history. (You can also tap “Clear History” here to erase past entries.)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Location (or sometimes Privacy & Security → Location).
    • Tap App permissions (or App location permissionsLocation permissions for apps).
    • Select an app, then choose the appropriate permission, such as “Allow only while using the app” (or “Allow only when in use”) or “Don’t allow” (or “Deny”).
    • On the same screen (for that app), you may see a toggle for “Use precise location”. If the app doesn’t need GPS accuracy, toggle Off to let it use only an approximate location.

    Apps like Maps and Weather need access, but most don’t. Tightening this setting not only boosts battery life, it also improves your privacy by limiting background tracking.

    Pro tip: Leaving essential features like Find My iPhone or Emergency Calls & SOS enabled under System Services ensures your phone can still help locate or protect you if it’s lost, even with other location options turned off.

    CLICK HERE TO GET THE FOX NEWS APP

    Limit location tracking to protect privacy and extend battery life.

    Limit location tracking to protect privacy and extend battery life. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    4) Turn off Raise to Wake and Tap to Wake

    Ever notice your screen lighting up when you simply pick up your phone? Those quick flashes add up. Every time your display activates — even for a second, it consumes battery power. Turning off these motion-activated features can reduce unnecessary screen wake-ups.

    For iPhone

    • Go to Settings.
    • Tap Display & Brightness.
    • Turn off Raise to Wake.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Display (or Lock screen & security, or Advanced features, depending on your device).
    • Look for Lift/ Raise to wakeTap to wake, or Double tap to wake (sometimes found under Gestures or Motion settings).
    • Turn off “Lift/Raise to wake” and “Tap/Double tap to wake” (or choose to disable whichever is active).
    • If you want a simpler way to wake your phone only when you intend to, rely on the power-button wake (which is the default on nearly all phones).

    5) Review battery usage and spot the culprits

    If your phone is dying faster than usual, the Battery Usage tool can reveal the exact cause. You’ll see which apps are using the most power, both on screen and in the background, so you can take action.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Scroll to view the battery usage graph and list of apps and system processes that are using power.
    • Look for any highlighted items (indicating unusually high usage).
    • Tap an app or process to view more details about its usage and background activity.
    • If you notice an app draining power in the background on an ongoing basis, consider limiting its background activity or uninstalling it if it’s not needed.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Battery (or Battery & device carePower & battery, depending on your device).
    • Tap Battery usage or Battery usage by app (or similar).
    • Look through the list of apps and sort or filter by App usage or Screen time, if available, to identify top battery consumers.
    • Tap a high-drain app, then choose something like Restrict background usageOptimize, or Disallow background activity (depending on the options your phone offers).

    Common battery-draining culprits include social media apps, streaming apps, location-based apps and apps with heavy background update behavior. Reviewing this every few weeks can help catch new drains early. 

    Bonus: Check your battery health

    If your phone still drains quickly after these fixes, your battery might be aging. Both iPhones and Android devices offer built-in diagnostics to check battery health and capacity.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Tap Battery Health & Charging (on some older versions, it may simply be “Battery Health”).
    • On the Battery Health screen, look at the Maximum Capacity percentage. This tells you how the battery’s current capacity compares to when it was new.
    • If the percentage is well below ~80%, it may be a good time to replace the battery to restore performance and capacity. (Apple notes that batteries are designed to retain around 80 % of their original capacity at 500 full charge cycles under ideal conditions.)

    For Android

    Settings may vary, depending on your Android phone’s manufacturer.

    • Go to Settings.
    • Tap Battery (or “Battery & device care,” “Power & battery,” depending on your phone).
    • Look for an option called Battery healthBattery capacityBattery status or Battery Information. Note: this may not appear on all phones.
    • If the built-in health indicator isn’t available, you can open the hidden test menu by dialing *#*#4636#*#* in the Phone app. If “Battery information” appears, you may see stats such as health, capacity, or cycle count.
    • If your battery health or capacity is shown as “Reduced” or significantly lower than expected, consider replacing the battery for better performance and longevity.

    Replacing an aging battery can dramatically improve performance and lifespan, often more than any software tweak.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    With a few quick tweaks, your phone can finally keep up with you all day. Adjusting settings, limiting background activity and checking battery health really do make a difference. You’ll spend less time stressing about a low battery and more time actually using your phone. Stay proactive, and your device will stay powered when you need it most.

    Got a tip you’d like to share, and/or what other everyday tech challenges would you like help solving? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 5 social media safety tips to protect your privacy online

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Let’s face it: Social media can feel like a minefield. Between oversharing personal details, friend requests from strangers and sneaky scams sliding into your DMs, it’s easy to put yourself at risk without realizing it. But staying safe online doesn’t have to be complicated. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to.

    Settings and menus on social media platforms can change over time and may vary by device (iOS vs. Android vs. Web) or region. The steps below were accurate at the time of publishing, but you may see slightly different wording or paths depending on updates, app version or mobile device manufacturer.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter

    HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES

    1) Turn off Location Sharing

    Many apps automatically tag your posts with your location. That can let strangers know your routines or even your home address.

    Scammers have a harder time learning about your life the less you share online.    (Kurt “CyberGuy” Knutsson)

    How to turn off Location Sharing

    On iPhone

    • Go to Settings.
    • Click Privacy & Security.
    • Tap Location Services.
    • Then pick the app.
    • Set it to “Never” or “While Using the App.”

    On Android

    (Settings may vary depending on your Android phone’s manufacturer.)

    • Go to Settings.
    • Tap Location.
    • Click App permissions.
    • Then select the app and toggle location off or select Don’t allow.

    Note: Some apps may still have permission for “While using the app” or “Only this time.” So, you should check each app individually, especially camera and social-media apps, for location permissions.

    Pro tip: Even turning off location for just your camera app helps keep photos from carrying hidden location data.

    META TO ALLOW TEENS’ PARENTS TO DISABLE PRIVATE CHATS WITH AI AFTER BACKLASH OVER FLIRTY CHATBOTS

    A child holds an iPhone at an Apple store on Sept. 25, 2015 in Chicago.

    Parents — and even some teens — are growing increasingly concerned about the effects of social media use on young people. (AP Photo/Kiichiro Sato, File)

    2) Use a private account

    A private account means only people you approve can see your posts and photos. Think of it like putting a lock on your front door.

    How to set private accounts

    Facebook

    • Go to Settings & Privacy.
    • Tap Settings.
    • Scroll to the Audience & Visibility (or Your Activity) section.
    • Click Posts.
    • Find “Who can see your future posts?” and set it to Friends.

    Instagram

    • Tap your profile.
    • Tap the menu (☰).
    • Tap Account Privacy.
    • Toggle on Private account.

    TikTok

    • Go to your Profile.
    • Tap the menu (☰).
    • Select Settings and privacy.
    • Tap Privacy.
    • Toggle on Private account.

    X (formerly Twitter)

    • Click on your profile icon in the top left of the screen.
    • Open Settings and privacy.
    • Select Privacy and safety.
    • Tap Audience and tagging.
    • Toggle Protect your posts (or Protect your Tweets).
    • Once enabled, only approved followers can see your posts.

    Snapchat

    • Open Settings (gear icon).
    • Scroll to Privacy Controls.
    • Under “Who Can,” adjust options like Contact Me, View My Story and See Me in Quick Add to Friends only.

    YouTube

    • Go to your YouTube Studio (desktop or mobile app).
    • When uploading, set visibility to Private or Unlisted.
    • For existing videos, open the video’s settings and change visibility as needed.

    Note: Entire channels cannot be made private, only individual videos.

    LinkedIn

    • Tap your profile photo
    • Settings.
    • Go to Visibility.
    • Under Profile viewing options, select Private mode.
    • You can also control who sees your connections and activity under “Visibility of your LinkedIn activity.”
    identity theft tech scam

    Identity theft has become so commonplace that it no longer shocks you to hear about the latest scam. (Cyberguy.com)

    3) Report suspicious accounts

    Fake profiles are everywhere. Scammers may pose as friends, celebrities or even customer service reps. Reporting them helps keep you (and others) safe.

    How to report an account

    Facebook

    • Go to the fake or impersonating profile.
    • Tap the three-dot menu (Options).
    • Select Find support or report profile.
    • Choose a reason, such as pretending to be someone else.
    • Follow the on-screen prompts to submit the report.

    Instagram

    • Go to the profile.
    • Tap the three-dot menu.
    • Select Report.
    • Choose a reason.
    • Follow the on-screen instructions to complete the report.

    TikTok

    • Open the profile.
    • Tap the three-dot menu (or sometimes the Share icon).
    • Select Report.
    • Choose Report account.
    • Select the reason.
    • Submit the report.

    X (formerly Twitter)

    • Go to the account profile.
    • Tap the three-dot or overflow icon.
    • Select Report.
    • Choose the type of issue.
    • If you’re reporting an entire profile rather than a single post, select Report @username from the profile page.

    YouTube

    • Go to the channel page.
    • Tap the About tab (on desktop) or the three-dot menu (on mobile).
    • Select Report.
    • Choose the reason.
    • Submit the report.

    Snapchat

    • Go to the user’s profile.
    • Tap the three-dot menu or gear icon.
    • Select Report.
    • Choose the reason.
    • Submit the report.

    LinkedIn

    • Visit the fake or suspicious profile.
    • Tap the More button (or three dots).
    • Select Report abuse.
    • Select a reason and follow the prompts.

    Pro tip: Don’t just block. Report alerts to the platform so they can remove the account for everyone.

    Teenage boy on smartphone

    With a few smart settings and habits, you can enjoy social media without giving away more than you mean to. (Thai Liang Lim/Getty Images)

    4) Enable two-factor authentication (2FA)

    Even if someone steals your password, 2FA makes it harder for them to break in. It adds an extra step, like a code texted to your phone.

    How to enable two-factor authentication (2FA)

    Facebook

    • Go to the menu and select Settings & Privacy, then Settings.
    • Tap Accounts Center.
    • Then click Password and Security.
    • Tap Two-factor authentication.
    • It may ask you to choose an account to set up two-factor authentication. 
    • Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.

    Instagram

    • Go to your profile and open Settings.
    • Click Accounts Center. 
    • Select Password and Security.
    • Then Two-Factor Authentication.
    • It may ask you to choose an account to set up two-factor authentication. 
    • Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.

    TikTok

    • Go to your Profile.
    • Then open the Menu.
    • Select Settings and privacy.
    • Then, Security and permissions.
    • Tap 2-step verification.
    • Choose one or more verification methods, such as text message, email or an authentication app.
    • Click Turn On. 
    • Follow the prompts to finish setup.

    X (formerly Twitter)

    • Click on your profile on the upper left of the screen.
    • Open Settings and privacy.
    • Select Security and account access, then Security.
    • Tap Two-factor authentication.
    • Choose your preferred method, such as text message, authentication app or security key.
    • Follow the steps to turn it on.

    Note: Text message (SMS) verification on X may only be available for paid (Premium) users or in certain regions. If SMS isn’t available, you can still use an authentication app or a physical security key for two-factor authentication.

    Pro tip: Use an authenticator app (like Google Authenticator or Authy) instead of text messages for stronger protection.

    5) Check your photos before posting

    Your photos may reveal more than you think — house numbers, car license plates or even vacation details that signal you’re away from home.

    Quick fixes before posting

    • Crop or blur backgrounds that show personal details.
    • Avoid posting in real time while traveling. Wait until you’re back.
    • Review old posts to make sure you’re not unintentionally sharing private info.

    SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATE

    Bonus tip: Keep personal info under wraps

    Every time you post, share or comment online, you’re leaving small clues about your life, and scammers are great at putting those pieces together. The less information fraudsters can find about you, the weaker their scams become.

    Many impersonators use public details like your hometown, workplace or family connections to build fake profiles that seem trustworthy. Even information like your email address or phone number can be exploited if it’s floating around the internet.

    A personal data removal service can help reduce that risk by scrubbing your personal details from people search sites and data brokers. While no solution is perfect, minimizing your digital footprint makes you a much harder target for impersonation and social-engineering scams. These services actively monitor and systematically remove your information from hundreds of sites, saving you time and giving you peace of mind.

    Protecting your privacy online isn’t just about what you share on social media; it’s also about controlling what’s out there already. Limiting that data means scammers can’t easily cross-reference your information with data from breaches or the dark web.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    Kurt’s key takeaways

    Staying safe on social media isn’t about deleting your accounts; it’s about taking control of your information. Turning off location sharing keeps your whereabouts private. Switching to a private account gives you more say over who sees your posts. Being cautious with friend requests and DMs helps you avoid scams. And double-checking your photos before posting prevents oversharing. With just a few quick settings and habits, you can enjoy social media with peace of mind.

    Have you ever spotted a scam or fake account online? Tell us what happened by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • From retail to tech, here are the 10 corporations that recently announced mass layoffs | Fortune

    [ad_1]

    Amid wider economic uncertainty, some analysts have said that businesses are at a “no-hire, no fire” standstill. That’s caused many to limit new work to only a few specific roles, if not pause openings entirely. At the same time, some sizeable layoffs have continued to pile up — raising worker anxieties across sectors.

    Some companies have pointed to rising operational costs spanning from President Donald Trump’s barrage of new tariffs and shifts in consumer spending. Others cite corporate restructuring more broadly — or, as seen with big names like Amazon, are redirecting money to investments like artificial intelligence.

    In such cases, “it’s not so much AI directly taking jobs, but AI’s appetite for cash that might be taking jobs,” said Jason Schloetzer, professor business administration at Georgetown University’s McDonough School. He pointed to wider “trade offs” from employment to infrastructure investment seen across companies today.

    Federal employees have encountered additional doses of uncertainty, impacting worker sentiment around the job market overall. Shortly after Trump returned to office at the start of the year, federal jobs were cut by the thousands. And many workers are now going without pay as the U.S. government shutdown nears its fourth week.

    “A lot of people are looking around, scanning the job environment, scanning the opportunities that are available to them — whether it’s in the public or private sector,” said Schloetzer. “And I think there’s a question mark around the long-term stability everywhere.”

    Government hiring data is on hold during the shutdown, but earlier this month a survey by payroll company ADP showed a surprising loss of 32,000 jobs in the private sector in September.

    Here are some companies that have moved to cut jobs recently.

    Amazon

    Amazon said Tuesday that it will cut about 14,000 corporate jobs, close to 4% of its workforce, as the online retail giant ramps up spending on AI while trimming costs elsewhere. A letter to employees said most workers would be given 90 days to look for a new position internally.

    CEO Andy Jassy previously said he anticipated generative AI would reduce Amazon’s corporate workforce in the coming years. And he has worked to aggressively cut costs overall since 2021.

    UPS

    United Parcel Service has cut about 34,000 jobs since the start of this year as part of turnaround efforts, amid wider shifts in the company’s shipping outputs.

    The layoffs, disclosed in a regulatory filing on Tuesday, are notably higher than the roughly 20,000 cuts UPS forecast earlier this year. On Tuesday, UPS said it also closed closed daily operations at 93 leased and owned buildings during the first nine months of this year.

    Target

    Last week, Target that it would eliminate about 1,800 corporate positions, or about 8% of its corporate workforce globally.

    Target said the cuts were part of wider streamlining efforts — with Chief Operating Officer Michael Fiddelke noting that “too many layers and overlapping work have slowed decisions.” The retailer is also looking to rebuild its customer base. Target reported flat or declining comparable sales in nine of the past eleven quarters.

    Nestlé

    In mid-October, Nestlé said it would be cutting 16,000 jobs globally — as part of wider cost cutting aimed at reviving its financial performance.

    The Swiss food giant said the layoffs would take place over the next two years. The cuts arrive as Nestlé and others face headwinds like rising commodity costs and U.S. imposed tariffs. The company announced price hikes over the summer to offset higher coffee and cocoa costs.

    Lufthansa Group

    In September, Lufthansa Group said it would shed 4,000 jobs by 2030 — pointing to the adoption of artificial intelligence, digitalization and consolidating work among member airlines.

    Most of the lost jobs would be in Germany, and the focus would be on administrative rather than operational roles, the company said. The layoff plans arrived even as the company reported strong demand for air travel and predicted stronger profits in years ahead.

    Novo Nordisk

    Also in September, Danish pharmaceutical company Novo Nordisk said it would cut 9,000 jobs, about 11% of its workforce.

    Novo Nordisk — which makes drugs like Ozempic and Wegovy — said the layoffs were part of wider restructuring as the company works to sell more obesity and diabetes medications amid rising competition.

    ConocoPhillips

    Oil giant ConocoPhillips has said it plans to lay off up to a quarter of its workforce, as part of broader efforts from the company to cut costs.

    A spokesperson for ConocoPhillips confirmed the layoffs on Sept. 3, noting that 20% to 25% of the company’s employees and contractors would be impacted worldwide. At the time, ConocoPhillips had a total headcount of about 13,000 — or between 2,600 and 3,250 workers. Most reductions were expected to take place before the end of 2025.

    Intel

    Intel has moved to shed thousands of jobs — with the struggling chipmaker working to revive its business as it lags behind rivals like Nvidia and Advanced Micro Devices.

    In a July memo to employees, CEO Lip-Bu Tan said Intel expected to end the year with 75,000 “core” workers, excluding subsidiaries, through layoffs and attrition. That’s down from 99,500 core employees reported the end of last year. The company previously announced a 15% workforce reduction.

    Microsoft

    In May, Microsoft began began laying off about 6,000 workers across its workforce. And just months later, the tech giant said it would be cutting 9,000 positions — marking its biggest round of layoffs seen in more than two years.

    The latest job cuts hit Microsoft’s Xbox video game business and other divisions. The company has cited “organizational changes,” with many executives characterizing the layoffs as part of a push to trim management layers. But the labor reductions also arrive as the company spends heavily on AI.

    Procter & Gamble

    In June, Procter & Gamble said it would cut up to 7,000 jobs over the next two years, 6% of the company’s global workforce.

    The maker of Tide detergent and Pampers diapers said the cuts were part of a wider restructuring — also arriving amid tariff pressures. In July, P&G said it would hike prices on about a quarter of its products due to the newly-imposed import taxes, although it’s since said it expects to take less of a hit than previously anticipated for the 2026 fiscal year.

    [ad_2]

    Wyatte Grantham-Philips, The Associated Press

    Source link

  • Google’s Monopoly Survives Antitrust Ruling

    [ad_1]

    Last year, the Department of Justice won a ruling that found Google had secured an illegal monopoly, which many call a huge win against Big Tech. Since then, DC District Court Judge Amit Mehta has been deciding what to do about it.

    I hoped he would force Google to spin off Chrome or Android or give up its default status with device makers—any of the hard-hitting remedies proposed by the DOJ.

    When Mehta prescribed remedies in early September, I felt like Charlie Brown when Lucy swipes that darn football right out from under his feet.

    Based on the rulings:

    • Google can’t be the only/exclusive default search, browser, assistant, or AI app on devices. It can’t force bundling or conditional licenses for its products, nor can it prohibit partners from offering Google’s apps alongside those of competitors.
    • Google must share some of its search index data and search ad syndication data to competitors—once, not continuously—so they have a better shot at building rival products.

    None of these measures weakens Google or enables significant competition. Google can still make billion-dollar deals to retain its default status on devices and remain structurally intact. After the ruling, Google stock jumped 8 percent.

    A pathetic outcome for a five-year ordeal. Why?

    According to Mehta’s decision, the restrained decision was made out of “humility,” because Mehta has “no expertise” in search engines, online ads, or generative AI. He suggests a stauncher ruling would err by meddling in the trajectory of innovation. The ruling hopes that AI-native search competitors will disrupt Google’s hold on the search and ad ecosystem.

    This refrain of ignorance isn’t new. Governmental powers making legal decisions in this realm must quit singing it.

    A history of misunderstanding

    Must judges and lawmakers hold deep technical expertise to make good, impactful decisions or craft legislation around technology? No.

    Consider 1986’s Computer Fraud and Abuse Act (CFAA), the foundational statute criminalizing hacking. Ronald Regan kickstarted the CFAA after seeing WarGames, a thriller about a high school hacker who stumbles upon the back door to a military supercomputer and almost starts World War III.

    Many criticize the CFAA for being harmfully broad and vague. Despite amendments over the years that apply greater specificity, the CFAA remains imperfect.

    Still, it’s far better than nothing, and it shows how strong legislation can evolve.

    In 1998, the DOJ and 20 states accused Microsoft of an illegal monopoly after Microsoft began bundling its Explorer internet browser with its Windows operating system. The presiding Judge Thomas Jackson was notably unfamiliar with technology and the software industry. Still, he ultimately ruled that Microsoft had created an illegal monopoly.

    During the trial, an opinion piece published in the Washington Post described Jackson’s role as the “judicial Everyman in this case, grappling with the mysteries of tech wizards.” Jackson himself said generalist district judges should “acquire one way or another the knowledge that we need to decide almost anything.” He credited lawyers on both sides and his more tech-savvy law clerks for explaining the technical material.

    We believe he’s right. Judges are responsible for obtaining enough understanding to make sound decisions.

    We can’t keep taking their word for it

    We can’t trust CEOs like Mark Zuckerberg and Sam Altman to shed light on emerging technology or self-regulate their platforms. Congress is simply unequipped to hold Big Tech to account, according to expert opinions.

    Zuckerberg has given sketchy answers on Cambridge Analytica, Meta’s data collection practices, and the harms Meta products have inflicted upon children. Before Congress, he and other CEOs get by with some version of, “This is bad, we’re sorry it happened. It isn’t our fault, but we’ll do some things to fix it.”  

    Altman got ahead of these kinds of confrontations, holding lawmakers’ hands and walking them into his narrative. In 2023, Altman debuted ChatGPT in its nonprofit form while advocating for AI caution and sensible regulation. By 2025, billions of dollars later, he’s tossing regulation aside under the guise of cementing America’s AI dominance, sentiments immediately echoed by lawmakers.

    As recently as May 2025, Altman quashed Senator Amy Klobuchar’s question about AI hallucinations (which she had only just heard of), assuring her that “users are smart” and “people understand what they can do and what they can’t.” Despite constant assurances that hallucinations would disappear, it appears they’re getting worse. Meanwhile, the AI giant has drastically increased its lobbying efforts.

    Third-party experts do exist

    Lindsey Witmer Collins is the founder of WLCM App Studio.

    [ad_2]

    Lindsey Witmer Collins

    Source link

  • Tesla revives ‘Mad Max’ mode in Full Self-Driving

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Tesla is making headlines again with the return of its Mad Max mode in Full Self-Driving (Supervised). This feature, designed to make the car drive more aggressively, has arrived just as the automaker faces new scrutiny from regulators and ongoing lawsuits from customers. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    Mad Max Mode returns in Tesla’s latest FSD update

    Tesla recently launched its FSD v14.1.2 update. The update follows last year’s major FSD v14 release, which introduced “Sloth Mode” for slower, more cautious driving. The latest update moves to the opposite end of the spectrum with Mad Max mode.

    According to Tesla’s release notes, this profile allows higher speeds and more frequent lane changes than Hurry mode. The update has sparked mixed reactions. Some Tesla fans praise it for making driving feel more natural. Critics argue that it invites risky behavior at a time when regulators like the NHTSA and California DMV are already investigating Tesla’s advanced driver-assist systems.

    TESLA’S SELF-DRIVING CARS UNDER FIRE AGAIN

    A new Mad Max speed profile is now included in Tesla’s Full Self-Driving interface. (Tesla)

    History of Tesla’s Mad Max mode since 2018

    The Mad Max setting isn’t new. Tesla first introduced it in 2018 for the original Autopilot system. At the time, Elon Musk described it as ideal for handling aggressive city traffic. The name, borrowed from the post-apocalyptic movie series, immediately drew attention for its bold tone.

    Now, the feature is back in Tesla’s latest FSD version. Within hours of release, drivers reported seeing cars equipped with Mad Max mode rolling stop signs and driving over the speed limit. These early reports highlight how the mode may behave more assertively than before.

    Why Tesla brought back its Mad Max mode

    Bringing back Mad Max mode may serve several purposes for Tesla. It helps demonstrate the company’s continuous development of FSD software while appealing to drivers who prefer faster, more decisive movement in traffic. It also acts as a signal that Tesla is still chasing the goal of Level 4 autonomy, even though its system remains classified as Level 2, requiring constant driver supervision.

    Elon Musk sitting with hands together

    Tesla owners can access Mad Max mode through the car’s settings under Speed Profiles.  (Chesnot/Getty Images)

    For Tesla, this feature shows confidence in its progress. For observers, it raises concerns about timing. With multiple investigations and lawsuits in progress, many expected Tesla to focus on safety rather than on more aggressive driving profiles.

    What this means for you

    If you own a Tesla with Full Self-Driving (Supervised), you can access Mad Max mode through the car’s settings under Speed Profiles. This mode provides a more assertive driving experience that includes quicker acceleration, more lane changes, and less hesitation.

    However, remember that Tesla’s Full Self-Driving system still requires active driver attention. You must keep your hands on the wheel and remain ready to take control at any moment. While the name suggests thrill and speed, safety and awareness should remain your top priority.

    Tesla Model Y on California highway

    Tesla’s speed-profile menu includes the toggle options of Chill, Standard, Hurry, and Mad Max profiles to customize how aggressively their car responds in traffic.  (REUTERS/Mike Blake)

    If you share the road with Teslas, it’s smart to stay alert. Vehicles using Mad Max mode may accelerate or change lanes more quickly than expected. Giving Teslas a little extra space can help reduce surprises and keep everyone safer on the road.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.

    WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?

    Kurt’s key takeaways

    Tesla’s decision to reintroduce Mad Max mode is both strategic and provocative. It revives a feature from its early Autopilot days while reigniting debate over the balance between innovation and responsibility. The mode’s return reminds everyone that Tesla continues to test the limits of driver-assist technology and public tolerance for it.

    Will Tesla’s revived Mad Max mode mark a bold step toward autonomy or a dangerous gamble in the race for self-driving dominance? Let us know by writing to us at CyberGuy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Teen sues AI tool maker over fake nude images

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A teenager in New Jersey has filed a major lawsuit against the company behind an artificial intelligence (AI) “clothes removal” tool that allegedly created a fake nude image of her. 

    The case has drawn national attention because it shows how AI can invade privacy in harmful ways. The lawsuit was filed to protect students and teens who share photos online and to show how easily AI tools can exploit their images.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

    How the fake nude images were created and shared

    When she was 14, the plaintiff posted a few photos of herself on social media. A male classmate used an AI tool called ClothOff to remove her clothing in one of those pictures. The altered photo kept her face, making it look real.

    The fake image quickly spread through group chats and social media. Now 17, she is suing AI/Robotics Venture Strategy 3 Ltd., the company that operates ClothOff. A Yale Law School professor, several students and a trial attorney filed the case on her behalf.

    A New Jersey teen is suing the creators of an AI tool that made a fake nude image of her. (iStock)

    The suit asks the court to delete all fake images and stop the company from using them to train AI models. It also seeks to remove the tool from the internet and provide financial compensation for emotional harm and loss of privacy.

    The legal fight against deepfake abuse

    States across the U.S. are responding to the rise of AI-generated sexual content. More than 45 states have passed or proposed laws to make deepfakes without consent a crime. In New Jersey, creating or sharing deceptive AI media can lead to prison time and fines.

    At the federal level, the Take It Down Act requires companies to remove nonconsensual images within 48 hours after a valid request. Despite new laws, prosecutors still face challenges when developers live overseas or operate through hidden platforms.

    APPARENT AI MISTAKES FORCE TWO JUDGES TO RETRACT SEPARATE RULINGS

    courtroom and gavel

    The lawsuit aims to stop the spread of deepfake “clothes-removal” apps and protect victims’ privacy. (iStock)

    Why legal experts say this case could set a national precedent

    Experts believe this case could reshape how courts view AI liability. Judges must decide whether AI developers are responsible when people misuse their tools. They also need to consider whether the software itself can be an instrument of harm.

    The lawsuit highlights another question: How can victims prove damage when no physical act occurred, but the harm feels real? The outcome may define how future deepfake victims seek justice.

    Is ClothOff still available?

    Reports indicate that ClothOff may no longer be accessible in some countries, such as the United Kingdom, where it was blocked after public backlash. However, users in other regions, including the U.S., still appear able to reach the company’s web platform, which continues to advertise tools that “remove clothes from photos.”

    On its official website, the company includes a short disclaimer addressing the ethics of its technology. It states, “Is it ethical to use AI generators to create images? Using AI to create ‘deepnude’ style images raises ethical considerations. We encourage users to approach this with an understanding of responsibility and respect for others’ privacy, ensuring that the use of undress app is done with full awareness of ethical implications.”

    Whether fully operational or partly restricted, ClothOff’s ongoing presence online continues to raise serious legal and moral questions about how far AI developers should go in allowing such image-manipulation tools to exist.

    CLICK HERE TO GET THE FOX NEWS APP

    Insurance data breach exposes sensitive info of 1.6 million people

    This case could set a national precedent for holding AI companies accountable for misuse of their tools. (Kurt “CyberGuy” Knutsson)

    Why this AI lawsuit matters for everyone online

    The ability to make fake nude images from a simple photo threatens anyone with an online presence. Teens face special risks because AI tools are easy to use and share. The lawsuit draws attention to the emotional harm and humiliation caused by such images.

    Parents and educators worry about how quickly this technology spreads through schools. Lawmakers are under pressure to modernize privacy laws. Companies that host or enable these tools must now consider stronger safeguards and faster takedown systems.

    What this means for you

    If you become a target of an AI-generated image, act quickly. Save screenshots, links and dates before the content disappears. Request immediate removal from websites that host the image. Seek legal help to understand your rights under state and federal law.

    Parents should discuss digital safety openly. Even innocent photos can be misused. Knowing how AI works helps teens stay alert and make safer online choices. You can also demand stricter AI rules that prioritize consent and accountability.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    This lawsuit is not only about one teenager. It represents a turning point in how courts handle digital abuse. The case challenges the idea that AI tools are neutral and asks whether their creators share responsibility for harm. We must decide how to balance innovation with human rights. The court’s ruling could influence how future AI laws evolve and how victims seek justice.

    If an AI tool creates an image that destroys someone’s reputation, should the company that made it face the same punishment as the person who shared it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Hackers steal medical records and financial data from 1.2M patients in massive healthcare breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    More than 1 million patients have been affected by a data breach involving SimonMed Imaging, one of the country’s largest outpatient radiology and medical imaging providers. The breach came to light after a cyberattack compromised sensitive patient data, with reports indicating that ransomware operators may have been behind the incident. What makes this case particularly concerning is the scale of the attack and the type of information stolen, which could easily be misused for financial or identity fraud.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    What happened at SimonMed Imaging

    In January 2025, SimonMed Imaging was alerted by one of its vendors about a potential security incident. The following day, the company noticed suspicious activity on its own network. The company says in response, it reset passwords, enforced two-factor authentication and tightened endpoint security while cutting off third-party vendor access.

    Unfortunately, the attackers had already gained access. Between Jan. 21 and Feb. 5, 2025, cybercriminals exfiltrated sensitive data belonging to around 1.2 million individuals. The Medusa ransomware group later claimed responsibility, alleging they had stolen more than 200 GB of data, including patient IDs, financial records and medical scans.

    DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT

    SimonMed Imaging discovered suspicious network activity in January 2025, prompting an immediate security response and system lockdown. (Kurt “CyberGuy” Knutsson)

    The attackers reportedly demanded 1 million dollars to delete the stolen files, or 10,000 dollars per day to delay publishing. SimonMed was later removed from the Medusa leak site, which could suggest a ransom payment, although the company has not confirmed this. In the aftermath, SimonMed brought in cybersecurity experts to investigate and has offered complimentary credit monitoring services to affected individuals.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    Close-up of a person typing on a black Acer laptop keyboard

    Hackers linked to the Medusa ransomware group stole data from 1.2 million patients, including IDs, financial details and medical scans. (Kurt “CyberGuy” Knutsson)

    What data got exposed in the SimonMed breach

    While SimonMed’s official filing described the exposed data as names and other data elements, the ransomware group’s claims suggest a much broader leak. According to the attackers, the stolen dataset included identity documents, payment details, medical reports, account balances and raw imaging scans (via BleepingComputer).

    Such information is extremely valuable on dark web marketplaces. Identity details and medical records are often sold in bulk to fraud operators who use them to commit financial scams, insurance fraud, or obtain prescription drugs. Medical breaches are harder to recover from because you cannot reset or replace a medical history or a government ID scan the same way you can change a password.

    We reached out to SimonMed for comment, but did not hear back before our deadline.

    DELIVERY GIANT’S DATA BREACH EXPOSES 40,000 PERSONAL RECORDS

    Hands typing on a laptop with green code on screen

    After the breach, SimonMed hired cybersecurity experts, tightened defenses and offered free credit monitoring to affected individuals.  (Kurt “CyberGuy” Knutsson)

    7 steps you can take to stay protected

    Even though the company is offering free credit monitoring, leaked data often circulates long after an incident is closed publicly. That is why it is important to take additional precautions on your end to reduce the long-term impact of this breach and future-proof your personal security.

    1) Use a data removal service

    People-search sites collect personal records and make them publicly accessible. Data removal services handle outreach and removals on your behalf, which reduces your exposed footprint online. With less information easily available, it becomes harder for attackers to assemble a complete identity profile for scams.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK

    2) Change your passwords and use a password manager

    If you have ever interacted with SimonMed or any related platform, change your passwords immediately. Avoid reusing old passwords across different accounts. A password manager helps generate strong credentials and stores them securely so you do not have to remember them manually. This reduces the risk of one breach affecting multiple accounts.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Turn on two-factor authentication everywhere

    Enabling 2FA adds an important layer of verification to your accounts. Even if someone gets hold of your password, they will not be able to log in without the code delivered to your phone or app. It is one of the simplest and most effective security upgrades you can make.

    4) Install a strong antivirus

    Modern malware includes remote access tools and silent monitoring modules that can stay hidden before launching an attack. Strong antivirus software can detect unusual behavior, protect against ransomware and alert you in real time if something attempts to access your data without permission. This is no longer just about traditional virus protection but active threat monitoring.

    The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Monitor your financial and medical statements

    Regularly review your bank statements, insurance records and medical billing activity. Cybercriminals often test stolen information with small, easily overlooked transactions before moving to larger fraud attempts. Catching and reporting these early can prevent a much bigger loss.

    6) Consider an identity theft protection plan

    Because breaches involving medical providers often expose sensitive identifiers, an identity protection service can be useful. These services scan dark web listings, alert you when your information appears in leaked databases and assist with recovery if fraud occurs. Some plans include legal support and help with credit restoration.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Stay informed and cautious

    After a major breach, attackers often launch phishing campaigns that reference the affected company to appear legitimate. Be skeptical of emails or texts mentioning SimonMed or credit monitoring, especially if they request payment or personal verification. Staying aware of current scams and keeping your software updated adds a strong layer of defense.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The SimonMed Imaging breach is another reminder that cyberattacks on healthcare providers are becoming more frequent and far more invasive. Once data is taken, it can circulate indefinitely across criminal networks. Taking protective steps early, including monitoring your identity and reducing your exposed data online, can help you stay ahead of potential misuse.

    Do you think healthcare providers are doing enough to protect your personal and medical data? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Spotify gives parents new power to control what their kids hear on streaming platform

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Spotify is rolling out a major update for parents who want more control over what their children listen to. Managed accounts, first tested in select countries, are now expanding to the United States, the United Kingdom, Canada, Australia, Germany, France and the Netherlands. These accounts create a safer and more personalized way for young listeners to enjoy music while parents stay in control of what plays.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

    A safer way for kids to explore music

    Spotify’s new managed accounts are built for kids under 13. They offer a music-only experience inside the main Spotify app. Parents can use their Family Plan settings to filter explicit lyrics, block certain artists or songs and hide videos or looping visuals called Canvas. Unlike the limited Spotify Kids app, these accounts exist within the regular Spotify platform. Kids get a familiar interface with features like Discover Weekly and Daylist, but with restrictions that fit their age.

    Parents can now guide what their kids listen to while enjoying music together on Spotify. (Spotify)

    How managed accounts work

    Premium Family subscribers can set up a managed account directly from their Spotify settings. Choose “Add a Member,” then select “Add a listener aged under 13.” Parents control what content plays, while kids build their own playlists and get personalized recommendations based on their listening habits. This separation keeps parents’ Discover Weekly and Wrapped playlists clean from unexpected surprises like a sudden obsession with gaming soundtracks or silly meme songs.

    META STRENGTHENS TEEN SAFETY WITH EXPANDED ACCOUNTS

    Child’s Spotify library screen showing playlists and a song by Chappell Roan playing.

    Managed accounts make family streaming safer, simpler and more personalized for young listeners. (Spotify)

    Why this matters for parents

    For years, parents have struggled to give kids music freedom while keeping explicit content away. This update finally solves that challenge. Managed accounts let parents turn off videos, block podcasts and make sure no age-restricted content slips through. It provides peace of mind for families who love streaming music together.

    Spotify parental controls screen shows playback settings for a child’s account named Maya.

    Kids get their own playlists and recommendations without changing what parents hear. (Spotify)

    What this means for you

    If you already subscribe to the Premium Family plan, this update adds even more value. You still get six individual accounts, and now you can include a customized child account. Parents can share their favorite songs safely while using filters that protect young listeners. Kids get the freedom to explore new music and create playlists without affecting the main account’s recommendations.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    Spotify screen shows a search for

    Spotify’s new tools give families more control and more ways to connect through music. (Spotify)

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Spotify’s expansion of managed accounts is a smart move toward safer, family-friendly streaming. It protects young listeners while helping them build their own love for music. With strong parental controls built right into the app, families can enjoy listening together with confidence and ease.

    Will you set up a Spotify managed account for your child, or keep family listening under one shared profile? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • With $1 trillion pay package on the line, Elon Musk blasts influential firms telling shareholders to reject it: ‘Those guys are corporate terrorists’ | Fortune

    [ad_1]

    Elon Musk stole the show in the final minutes of Tesla’s Wednesday earnings call to label the advisory firms pushing shareholders to reject his $1 trillion pay package “corporate terrorists.”

    After months of being relatively quiet following his resignation from the Department of Government Efficiency and subsequent fallout with President Donald Trump, Musk slammed proxy advisory firms Institutional Shareholder Services (ISS) and Glass Lewis.

    “I just don’t feel comfortable building a robot army here and then being ousted because of some asinine recommendations from ISS and Glass Lewis, who have no freaking clue,” Musk said. “I mean, those guys are corporate terrorists.”

    Musk, in a separate X post on Wednesday, also called into question the role of proxy advisory firms generally. The Tesla CEO echoed criticism from ARK Invest CEO Cathie Wood by saying these firms—which issue recommendations to shareholders for how they should vote on proposals at public companies’ annual shareholder meetings—have too much sway, especially with passive investors like index funds, which have substantial voting power because of the shares they hold for clients.

    “ISS and Glass Lewis have no actual ownership themselves and often vote along random political lines unrelated to shareholder interests! This is a major problem that is not just limited to Tesla,” Musk wrote on X.

    However, advisory firms do not vote directly in annual shareholder meetings and merely recommend positions that are also individually analyzed by some of the biggest institutional investors, including BlackRock, Vanguard, and State Street, which do their own in-house research. Both ISS and Glass Lewis twice recommended voters reject Musk’s previous 2018 pay package. Shareholders ultimately approved the package twice.

    A spokesperson for Glass Lewis told Fortune in a statement its job is to provide analysis and recommendations to its clients. 

    “Those that are Tesla shareholders will ultimately make their own decisions about Mr. Musk’s pay proposal and the Board directors that put it forward for shareholder vote,” the statement read.

    ISS declined to comment. Tesla did not immediately respond to a request for comment.

    Musk, who has a net worth of $455 billion, said he needs an ownership stake “in the mid-20s approximately” to achieve his goals at Tesla. The pay package in question would give Musk about $1 trillion over 10 years if he meets performance metrics, one of which includes boosting the company’s market cap more than 500% to $8.5 trillion. 

    ISS and Glass Lewis both issued reports earlier this month questioning Musk’s pay package, in part because of the package’s size and because it would dilute existing shareholders’ holdings. 

    While Tesla claimed regular benchmarking doesn’t apply to Musk’s pay, because no other company has “remotely similar goals embodied in their compensation programs,” Glass Lewis wrote in its report that Musk’s 2025 performance award is “unprecedented” compared with that of other public companies, and around 33.5x larger than its predecessor from 2018.

    “It is clear that the quantum, on a realizable and granted basis, outpaces all other pay packages.”

    [ad_2]

    Marco Quiroz-Gutierrez

    Source link

  • Living in giant moon glass spheres could be our future

    [ad_1]

    NEWYou can now listen to Fox News articles!

    One day, we might see glowing cities of glass scattered across the Moon’s surface, shining softly under Earth’s light. NASA is teaming up with Skyeports, a California-based company, to explore how lunar dust could be turned into massive glass spheres strong enough to live in. These futuristic, transparent habitats could become the first real homes for astronauts on the Moon.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    INSIDE NASA’S FAST-TRACK PLANS FOR LUNAR NUCLEAR POWER AND NEW SPACE STATIONS TO OUTPACE GLOBAL RIVALS

    Skyeports’ vision begins with melting lunar dust in microwave furnaces to create durable glass. (Skyeports)

    Turning moon dust into homes

    Skyeports has developed a way to transform lunar dust, known as regolith, into durable glass that can be shaped into massive spheres. Using a microwave furnace, the regolith melts and expands like a bubble before cooling into a hard, transparent shell. These spheres could one day serve as living and working spaces for astronauts.

    The innovation lies in building directly on the Moon using local materials. No costly shipments from Earth are required. The same pipes used to blow the molten glass will become entrances, while 3D printers inside the spheres will create furniture and fittings using lunar materials.

    SPACE STARTUP UNVEILS 1-HOUR ORBITAL DELIVERY SYSTEM

    A mockup of a glass sphere in space

    The spherical glass design evenly spreads pressure, forming strong, transparent habitats that can withstand micrometeorites and extreme lunar conditions. (Skyeports)

    Self-healing and solar-powered living

    The planned glass spheres go far beyond simple shelters. They are designed as self-sustaining ecosystems. The glass can repair small cracks caused by micrometeorites or moonquakes, and built-in solar panels will allow each habitat to generate its own energy.

    Inside, temperature layers could create condensation to support plant growth. This would produce oxygen, water and food, making each sphere a self-contained life-support system.

    The science behind the glass sphere design

    The spherical shape is more than a design choice. It evenly distributes pressure, giving the structure incredible strength. By adding elements like titanium, magnesium and calcium, the glass becomes even tougher and stronger than steel.

    Dr. Martin Bermudez, CEO of Skyeports, shared that current prototypes are only a few inches wide, but future spheres could stretch up to 1,640 feet across. His long-term vision is a network of glass cities connected by transparent bridges across the lunar landscape.

    CLICK HERE TO GET THE FOX NEWS APP

    A mockup of a glass sphere in space

    NASA’s Innovative Advanced Concepts program supports this research as part of its push to prepare for long-term human life on the Moon under the Artemis mission. (Skyeports)

    Future plans to test glass sphere habitats on the moon

    This concept is part of NASA’s Innovative Advanced Concepts program, which funds forward-thinking projects that could transform future missions. With the Artemis program aiming to return humans to the Moon soon, finding safe and sustainable habitats is a top priority.

    The Skyeports team plans to test the glassblowing technique in a thermal vacuum chamber, followed by parabolic flight experiments that simulate microgravity. Future trials are scheduled aboard the International Space Station to see how the process performs in real space conditions. If all goes well, tests on the lunar surface could happen within the next few years. 

    What this means for you

    The idea behind these lunar glass spheres reaches far beyond space exploration. It represents a new approach to sustainable design, one that could reshape how we build on Earth. The same techniques could lead to eco-friendly, energy-efficient buildings for our own planet’s future. If these glass structures can protect astronauts from extreme lunar conditions, they might inspire a new generation of sustainable architecture here at home.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: Cyberguy.com 

    Kurt’s key takeaways

    NASA’s partnership with Skyeports feels like the start of something big. It shows that life beyond Earth is moving from imagination to reality. The mix of science, design, and creativity behind these glass habitats could be the first real step toward building lasting communities on the Moon. Humanity is learning how to move from exploring space to actually living there.

    Would you choose to live in a glass city on the Moon if you had the chance? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Delete the fake VPN app stealing Android users’ money

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Malware targeting Android devices has grown increasingly sophisticated. From fake banking apps to phishing campaigns, attackers are finding new ways to trick you into giving up sensitive data.

    One of the newest threats comes in the form of malicious apps that appear legitimate but can take full control of your device. Security researchers are now warning Android users to delete a fake VPN and streaming app that can allow criminals to take over your phone and drain your bank account.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    How Klopatra infects devices

    The malicious VPN and streaming app is called Mobdro Pro IP TV + VPN, and it was recently discovered by researchers at Cleafy. Once you install the app, it drops a malware strain called Klopatra. It’s a new and highly sophisticated Android malware currently being used in active campaigns targeting financial institutions and their customers.

    THIS CHROME VPN EXTENSION SECRETLY SPIES ON YOU

    Fake VPN apps can hide dangerous malware that steals your data and money. (iStock)

    At first glance, the app looks like a free streaming platform offering high-quality channels, which makes it appealing to Android users. Once installed, though, it deploys a banking Trojan and a remote-access tool that give attackers full control over the infected device. With that level of access, criminals can steal your banking credentials and even carry out fraudulent transactions without your knowledge.

    The infection chain is carefully planned. It starts with social engineering, tricking you into downloading and installing the app from outside the official Play Store. From there, Klopatra bypasses Android’s built-in protections and reaches deep into the system to gain persistence and control.

    HACKERS PUSH FAKE APPS WITH MALWARE IN GOOGLE SEARCHES

    Router VPNs vs device VPNs: Which privacy solution is best for you?

    The Klopatra Trojan gives hackers full control of infected Android devices. (Kurt “CyberGuy” Knutsson)

    Fake VPNs are a growing problem

    VPNs are widely promoted as privacy tools that hide your IP address and encrypt internet traffic. Millions rely on them to bypass geographic restrictions, protect sensitive communications or simply browse more securely. Yet not all VPNs are trustworthy. Various studies have proved that popular commercial VPNs have alarming shortcomings. Some use protocols that are not designed to protect privacy, obscure ownership or fail to encrypt traffic properly.

    When fake apps like Mobdro are combined with these weaknesses, users are left exposed. Criminals exploit both the popularity of VPNs and the prevalence of pirated streaming services to distribute malware effectively. This growing ecosystem of risky apps underscores how important it is to research, verify and only download software from reputable sources.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    A man typing on a laptop

    Stay safe by downloading apps only from trusted sources and keeping your phone updated. (Kurt “Cyberguy” Knutsson)

    9 steps you can take to protect yourself

    If you suspect that you’ve downloaded a fake app from the internet, there’s no need to panic. The steps below will help you stay protected and keep your data safe.

    1) Stick to trusted sources

    Only download VPNs, streaming services and apps from Google Play, Apple App Store or the official developer’s website. Avoid links in forums, social media messages or emails promising free content.

    2) Check app permissions

    Carefully review what access an app requests. If it asks for control over your device, settings or accessibility services unnecessarily, do not install it. Legitimate VPNs rarely require full device control.

    3) Use a secure VPN

    When choosing a VPN, opt for one with strong privacy policies, transparent ownership and robust encryption. A secure VPN ensures your connection remains private without giving attackers a foothold.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com

    4) Install strong antivirus software

    A strong antivirus on your device can detect malware and suspicious behavior before damage occurs. These services can scan new downloads and provide ongoing protection.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    5) Monitor your accounts

    Banking Trojans target sensitive credentials. Identity monitoring services can alert you if your personal information appears online or is being misused, helping you respond before harm is done. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    6) Remove the malicious app immediately

    If you discover a suspicious app on your Android device, remove it right away.

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open Settings
    • Click Apps and locate the fake app.
    • Tap Uninstall to remove it from your device.
    • If the uninstall option is unavailable, restart your phone in Safe Mode and try again.
    • After removal, run a full antivirus scan to delete any remaining malware components.

    7) Keep devices updated

    Regular system updates patch security vulnerabilities that malware like Klopatra exploits. Combined with antivirus protection, this significantly reduces the chance of infection.

    8) Change passwords and enable 2FA

    Once your device is secure, update your login credentials.

    • Change passwords for banking, email, and Google accounts immediately. Consider using a password manager to generate and store complex passwords. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords
    • Turn on two-factor authentication (2FA) for extra protection.
    • Use an authenticator app instead of text messages for better security.

    This step helps protect your accounts if hackers steal your credentials. 

    9) Report the malicious app

    Finally, take steps to protect others and report the threat.

    • Report the fake app to Google Play Protect or your antivirus provider.
    • If your bank details were exposed, contact your bank’s fraud department immediately.
    • Reporting helps cybersecurity teams track and block similar fake VPNs in the future.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Fake VPNs and streaming apps exploit your trust and the gaps in app verification processes, showing that even tech-savvy individuals can fall victim. While official stores offer a layer of protection, you must remain vigilant, check permissions and rely on reputable security tools. Never download anything from the random links you see on the internet.

    Do you think Google is doing enough to prevent malware from entering the Android OS? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Police agencies turn to virtual reality to improve split-second decision-making

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Police departments across the country are turning to virtual reality training to help officers make split-second decisions in difficult, and sometimes dangerous, situations.

    The goal is to help officers respond quickly and safely to any call, according to tech company Axon, and more than 1,500 police agencies across the United States and Canada are now using Axon’s virtual reality training program to make that happen.

    Recruits at the Aurora Police Department in Colorado are among those training with the technology. 

    “You get to be actually in the scene, move around, just feel for everything,” recruit Jose Vazquez Duran said.

    AMAZON DEFENDS AMBITIOUS AI STRATEGY THAT COULD PREVENT 600,000 FUTURE HIRES THROUGH INNOVATION

    Police departments across the U.S. and Canada are increasingly adopting virtual reality training programs to better prepare officers for real-life, high-pressure situations. (Kennedy Hayes/FOX News)

    Fellow recruit Tyler Frick described it as “Almost like… a 3D Movie. Except this is exactly what we are going to be doing when we graduate the academy.”

    Aurora PD uses Axon’s virtual reality program to prepare recruits for scenarios including de-escalation, Taser use and other high-stress interactions.

    “It’s filmed with live actors who are re-enacting scenarios. And we have a lot of content there focused on a wide range of topics, from mental health to people who are experiencing drug overdose or encountering domestic violence,” said Thi Luu, vice president and general manager of Axon Virtual Reality.

    EX-POLICE CHIEF WARNS CHICAGO COPS WILL GET HURT BECAUSE MAYOR JOHNSON WON’T HELP ICE

    virtual reality police training on tablet

    In Aurora, Colorado, police recruits are training with VR to prepare for real-life scenarios, including de-escalation, Taser use and other high-stress interactions. (Kennedy Hayes/FOX News)

    The Aurora Police Department has used Axon’s virtual reality training program for three years. Officials say the technology keeps getting more advanced and easier to use, which helps free up other resources.

    “Really helps on manpower for my staff, the training staff, when we can have, you know, 10 or 15 recruits all doing the exact same scenario at the same time. That means we are getting the most out of our training hours and having well-trained, well-rounded officers is really important,” said Aurora police Sgt. Faith Goodrich.

    Axon said the artificial intelligence in its newest training program can adjust how virtual suspects act – making them friendly, aggressive or anything in between. They can answer questions, talk back or even refuse to cooperate, just like in real life.

    Every session is different, depending on how officers handle the situation.

    Technology helps train police

    Police recruits interact with virtual reality to sharpen their skills. (Kennedy Hayes/ FOX News)

    CLICK HERE TO GET THE FOX NEWS APP

    A study from PwC found that virtual reality can speed up officer training and boost confidence in applying new skills compared with classroom-trained counterparts. 

    According to the study, VR learners showed a four times faster training rate and a 275% boost in confidence when applying learned skills compared to their classroom-trained counterparts.

    [ad_2]

    Source link

  • Tesla reports record sales, record storage—but profit slips as tax-credit rush pulls demand forward | Fortune

    [ad_1]

    Tesla’s Q3 2025 update reports record vehicle deliveries and record energy storage deployments, alongside higher revenue, but earnings pressure persisted due to margin headwinds and a likely pull-forward of demand before U.S. EV tax credits expired in September.

    ​Shares dipped about 1.4% in after-hours trading as investors appeared to brace for softer demand through the remainder of the year.

    CEO Elon Musk is expected to give more detail on the company’s quarterly earnings call at 5:30 p.m. Eastern time.

    Q3 results

    Segment performance

    Profitability and margins

    Guidance and outlook themes

    Notable context

    Musk’s earlier warning

    For this story, Fortune used generative AI to help with an initial draft. An editor verified the accuracy of the information before publishing. 

    [ad_2]

    Ashley Lutz

    Source link