I know that many of you are afraid that AI is going to take your job. And you might be right.
The 2025 Global State of AI at Work report just confirmed what we’re all sensing. AI isn’t the future. It is now. But before you panic, let me offer a new way to look at this.
Instead of fearing what’s coming, maybe it’s time to think outside the box. Nearly three out of five companies say they’re hiring for AI-related roles this year. And most of these jobs don’t require a computer science degree or even coding skills.
So, what are they looking for? Real people with real-world experience. They want folks who can think critically, solve problems and communicate clearly. That might sound a lot like … you.
Generative AI tools can help job seekers make their resumes and applications more visual and get ideas for content. (Jaap Arriens/NurPhoto via Getty Images)
Here are some of the highest-paying, fastest-growing AI roles right now. Let’s dig in.
Prompt Engineers
$175K to $250K-plus
These are the “AI whisperers.” Their job is to write the right prompts so tools like ChatGPT give useful, accurate and smart responses. You don’t need to know how to code, but you do need to be a great communicator, logical thinker and problem solver. Bonus: English majors, writers and marketers often pivot into this role.
Ever wonder how chatbots learn to sound polite or helpful? That’s the trainer’s job. They score AI responses, tweak tone and accuracy and help refine what the AI “knows.” This is a great role for detail-oriented folks, even part-timers and remote workers.
A photo taken on October 4, 2023 in Manta, near Turin, shows a smartphone and a laptop displaying the logos of the artificial intelligence OpenAI research company and ChatGPT chatbot.(MARCO BERTORELLO/AFP via Getty Images)
Machine Learning Engineers
$150K to $210K
If you’re the technical type who likes to code, solve complex problems and build the actual brains behind AI, this is where you belong. These jobs are in super high demand, and the pay is great.
Not technical? Not a problem. AI PMs are the bridge between engineers and business teams. They guide strategy, make sure projects stay on time and budget and turn AI ideas into real-world results. You’ll need communication skills, curiosity and business smarts.
Generative AI Consultants
$125K to $185K
This is perfect for freelancers or small-business owners. Companies are desperate to figure out how to use AI, and they’ll pay you to show them. You might help build automations, train teams or set up tools like ChatGPT, Jasper or Midjourney.
In this photo illustration, a Midjourney logo appears on a smartphone screen.(Pavlo Gonchar/SOPA Images/LightRocket via Getty Images)
Want help getting started?
If you’re nervous about pivoting or don’t know where to start, I’m here to help. Whether you want to become a prompt engineer, a consultant or just to understand how to use AI to boost your current work, I’ve got your back.
Let’s chat. Click here to schedule a time with me. We’ll map out your path together. You’ve got this, and the future is wide open.
The U.S. immigration crackdown will cause net job losses in the millions and will lower the annual rate of economic growth by almost one-third over the next decade, a new study estimates.
The Trump administration’s policies aimed at legal and illegal immigration would reduce the projected number of workers by 6.8 million by 2028 and 15.7 million by 2035, the National Foundation for American Policy’s study released Friday found. People entering the workforce won’t fully make up for the job losses, leading to a net reduction in the labor force by a projected 4 million workers by 2028 and 11 million in 2035.
“With the U.S.-born population aging and growing at a slower rate, immigrants have become an essential part of American labor force growth,” the think tank, which focuses on trade and immigration, said.
In fact, immigrant workers were responsible for 84.7% of the labor force growth in America between 2019 and 2024, according to the report.
The study takes into account many of Trump’s far-reaching immigration policies for those eligible to work in the country, including reducing and suspending refugee admissions, a travel ban on 19 countries, ending Temporary Protected Status, and prohibiting international students from working on Optional Practical Training and STEM OPT after completing their coursework. The analysis does not account for a new policy that requires U.S. companies to shell out $100,000 in one-time fees for new H-1B visas.
Labor reduction
Trump’s immigration crackdown is already having an impact on the labor force.
The Bureau of Labor Statistics household survey shows a decline of 1.1 million foreign-born workers since the start of the Trump administration in January through August, according to the report.
And of the 6.8 million fewer projected workers in the U.S. labor force by 2028, 2.8 million would be due to changes in legal immigration policies, while 4 million would result from policies on illegal immigration, the study said
At the same time, it doesn’t look as though U.S.-born workers are entering the workforce en masse as foreign-born workers exit, the report said. Instead, the labor force participation rate for U.S.-born workers aged 16 and older has ticked lower to 61.6% in August from 61.7% last year, according to the report.
Labor economist and senior fellow at NFAP Mark Regets, said in the report it’s “wrong” to assume a decline in immigration helps U.S. workers when job growth slows.
“Immigrants both create demand for the goods and services produced by U.S.-born workers and work alongside them in ways that increase productivity for both groups,” Regrets said. “While it is just one factor, we shouldn’t be surprised that opportunities for U.S.-born workers are falling at the same time an estimated one million fewer immigrants may be in the labor force.”
But the White House says there’s a large pool of available U.S.-born workers.
“Over one in ten young adults in America are neither employed, in higher education, nor pursuing some sort of vocational training.” White House spokeswoman Abigail Jackson told Fortune in a statement, referencing a July 2024 CNBC article. “There is no shortage of American minds and hands to grow our labor force, and President Trump’s agenda to create jobs for American workers represents this Administration’s commitment to capitalizing on that untapped potential while delivering on our mandate to enforce our immigration laws.”
Economic fallout
Previous reports have warned Trumps’ immigration policies also threaten negative economic consequences.
In September, the Congressional Budget Office projected 290,000 immigrants will be removed from the country between 2026 and 2029, which may create a labor shortage and drive up inflation.
And according to the NFAP study, Trump’s immigration policies will lower the projected average annual economic growth rate to 1.3% from 1.8% between fiscal year 2025 to fiscal year 2035.
There are also ramifications for the agriculture industry and food production. The Labor Department admitted earlier this month in a filing in the Federal Register that Trump’s immigration crackdown risked a “labor shortage exacerbated by the near total cessation of the inflow of illegal aliens.”
That’s not the only sector feeling the talent squeeze.
The $100,000 one-time fee for workers applying for new H-1B visas is expected to disrupt companies including Amazon, Microsoft and Meta, since they heavily recruit workers under this status.
And the policies are projected to have far-ranging effects on most areas of business, including a potential loss of hundreds of thousands of immigrant workers in sectors like information and educational and health services.
In addition, individuals affected by Trump’s travel ban on 19 different countries represent a significant part of the economy, the American Immigration Council, a nonprofit research organization and advocacy group, has estimated.
Households led by the recent arrivals from the countries earned $3.2 billion in household income, paid $715.6 million in federal, state and local taxes and held $2.5 billion in spending power, according to AIC.
“These nationals made important contributions in U.S. industries that are facing labor shortages and rely on foreign-born workers,” like hospitality, construction, retail trade and manufacturing, the report said.
But the White House said Trump will continue “growing our economy, creating opportunity for American workers, and ensuring all sectors have the workforce they need to be successful.”
Nan Wu, research director at AIC told Fortune the recent NFAP study may not even fully capture the broader impact of the Trump administration’s immigration enforcement efforts.
“Given the unprecedented scale of these actions, it’s difficult to quantify the chilling effect they may have on immigrants who might otherwise choose to move to or remain in the United States,” Wu said. “For instance, international students—who are a critical source of high-skilled talent—may increasingly opt to pursue education or career opportunities in other countries. This shift could significantly disrupt the U.S. talent pipeline, particularly in sectors that rely heavily on STEM expertise and innovation.”
Investor Cathie Wood, a long-time Tesla bull known for first investing in the company a decade ago at $13 per share, condemned the growing resistance to Tesla CEO Elon Musk’s potential $1 trillion pay package. Over the weekend, the ARK Invest CEO suggested the financial system that’s enabling the pushback against it is the one with the problem, not the company that wants to make the world’s richest man richer by such a magnitude.
Wood said in a Sunday post on X that it was “sad if not damning” that proxy advisory firms, which make recommendations for how shareholders should vote during companies’ annual meetings, have so much influence. Wood’s comments come after two of the most important proxy firms, Institutional Shareholder Services (ISS) and Glass-Lewis, urged shareholders to reject during Tesla’s annual meeting on Nov. 6 the giant pay package that would give the world’s richest man 29% of the company, up from about 13% now.
Wood particularly criticized the relationship between these proxy firms and index funds, which have an outsized influence over voting because of the large number of shares they control for their investors. Each shareholder gets a certain number of votes based on how many shares they own. Yet, large institutional investors, including index funds, control massive amounts of shares held by their investors, which gives them sway over voting.
“Index funds do no fundamental research, yet dominate institutional voting. Index-based investing is a form of socialism. Our investment system is broken,” she added.
While Wood claims index funds don’t do research, their parent companies absolutely do. The three largest index funds in the world are managed by Vanguard, State Street, and BlackRock, and all three do extensive research for proxy voting decisions and have their own proxy voting guidelines that they publish. Also, those three funds hold over $2 trillion tracking the S&P 500 index and represent the vast majority of retail traders invested in the stock market. While index funds don’t do research to pick stocks, they utilize their research base for voting decisions.
Both proxy firms recommended shareholders vote against Musk’s pay package partly because it dilutes existing investors’ shares and gives Tesla’s highly compensated board too much flexibility when it comes to the goals Musk has to meet to get the full payout, which is about equal to the company’s total market cap.
In another series of posts, Wood added that ISS and Glass Lewis don’t see the potential in Tesla that ARK Invest does and seemingly suggested index funds should be stripped of their voting power. ARK Invest’s flagship ARK Innovation ETF’s largest holding is Tesla, which makes up about 12% of its $8 billion portfolio.
“I believe that history will decide that Glass Lewis and ISS have been menaces to innovation, enabling passive investors who care about ‘tracking errors’ to their indexes but do not care about much else,” Wood wrote in a post referring to how closely index funds track indexes such as the S&P 500.
Russell Rhoads, a clinical associate professor of financial management at Indiana University, said while investors in an active fund know its management may push for changes to a company if it is struggling, the same isn’t true for passive investors who put their money into index funds.
“In general, if I put money into a fund, that’s supposed to mirror the index, that is a passive investment,” he said. “I’m just investing in the market and not trying to influence anything what any other companies are doing business wise.”
Tesla, for its part, said in a Monday statement that the proxy firms aren’t considering the previous 2018 pay package approved by shareholders on two different occasions that allocated $56 billion to Musk over 10 years. Both ISS and Glass Lewis also recommended voters reject the 2018 pay package.
“Glass Lewis’s one-size-fits-all checklists undermine shareholders’ interests, including by opposing proposals designed to build long-term value at Tesla,” the statement read.
When reached for comment, representatives from Glass Lewis and ISS directed Fortune to their respective proxy papers on Tesla.
Prior to the proxy firms’ reports, the SOC Investment Group, which works with pension funds sponsored by major unions such as the International Brotherhood of Teamsters, as well as several parties with an interest in Tesla including state financial officers, signed a letter with the Securities and Exchange Commission urging shareholders to vote no on Musk’s pay package earlier this month.
If Musk’s pay is approved and the three board members are reelected, “this year may be one of the last times that public shareholders have a meaningful voice in the Company and its leadership given the level of dilution that is likely to take place,” the letter argued.
Tejal Patel, the executive director of Tesla shareholder group SOC Investment Group, saiddespite the company claiming Musk needs more incentive to stay engaged with Tesla, Musk’s incentives should already align with the company whose shares represent the bulk of his $455 billion net worth. SOC has been vocally critical of Tesla and its corporate governance for multiple Musk pay packages on multiple grounds.
“We just don’t believe that these pay packages are going to really incentivize Mr. Musk to stay at Tesla, nor to be focused on Tesla over his other business endeavors,” Patel told Fortune.
Still, Wood said she was confident Musk’s pay package would pass, in part because of the support of retail investors, which hold about 40% of Tesla’s voting shares.
“Although the proxy firm ISS has recommended against the package, retail investors are likely to dominate the vote once again. America!”
[This report has been updated to include a paragraph providing additional context on the extent of the major index funds’ research activities.]
Millions of private messages meant to stay secret are now public. Two AI companion apps, Chattee Chat and GiMe Chat, have exposed more than 43 million intimate messages and over 600,000 images and videos after a major data leak discovered by Cybernews, a leading cybersecurity research group known for uncovering major data breaches and privacy risks worldwide. The exposure revealed just how vulnerable you can be when you trust AI companions with deeply personal interactions.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter
Users have experienced a massive leak, exposing millions of private AI chat messages. (Kurt “CyberGuy” Knutsson)
Massive data breach exposes AI chat users
On August 28, 2025, Cybernews researchers discovered that the Hong Kong-based developer Imagime Interactive Limited had left an entire Kafka Broker server open to the public without any security protection. This unsecured system streamed real-time chats between users and their AI companions. It contained links to personal photos, videos, and AI-generated images. In total, the exposed data involved 400,000 users across iOS and Android devices. Researchers described the content as “virtually not safe for work” and said the leak exposes a deep gap between user trust and developer responsibility.
iPhone and Android users’ private data was found to be streamed on an open server.(Kurt “CyberGuy” Knutsson)
Who was exposed in the AI leak
Most affected users came from the United States. About two-thirds of the data belonged to iOS users, while the remaining third came from Android devices. Although the leak did not include full names or email addresses, it did expose IP addresses and unique device identifiers. This information can still be used to track and identify individuals through other databases. Cybernews found that users sent an average of 107 messages to their AI partners, creating a digital footprint that could be exploited for identity theft, harassment, or blackmail.
AI secrets and spending habits revealed
Purchase logs revealed that some users spent as much as $18,000 to chat with their AI girlfriends. The developer likely earned over $1 million before the breach was uncovered. Although the company’s privacy policy claimed that user security was “of paramount importance,” Cybernews found no authentication or access controls on the server. Anyone with a simple link could view private exchanges, photos, and videos. This lack of protection shows just how fragile digital intimacy can be when developers ignore basic safeguards.
Experts warn scams, blackmail, and identity theft can be a result of the leak.(Kurt “CyberGuy” Knutsson)
How Cybernews discovered and closed the leak
Cybernews quickly reported the problem to Imagime Interactive Limited. The exposed server was finally taken offline in mid-September after appearing on public IoT search engines, where hackers could easily find it. Experts are still unsure whether cybercriminals accessed the data before it was removed. However, the threat remains. Leaked conversations and photos can fuel sextortion scams, phishing attacks, and serious reputation damage.
Even if you never used an AI girlfriend app, this case is a clear reminder to protect your privacy online.
1) Think before you share
Avoid sending personal or sensitive content to AI chat apps. Once shared, you lose control of it.
2) Use reputable AI tools
Choose apps with transparent privacy policies and proven security records.
3) Remove your data online
Use a data removal service to wipe personal information from public databases. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com
Get a free scan to find out if your personal information is already out on the web: CyberGuy.com
4) Strengthen your cybersecurity with strong antivirus software
Install strong antivirus software to block scams and detect potential intrusions. The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices atCyberGuy.com
5) Protect your accounts with a password manager and MFA
Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at CyberGuy.com
What this means for you
AI chat apps often feel safe and personal, but they store enormous amounts of sensitive data. When that data leaks, it can lead to blackmail, impersonation, or public embarrassment. Before trusting any AI service, check whether it uses secure encryption, access controls, and transparent privacy terms. If a company makes big promises about security but fails to protect your data, it is not worth the risk.
Kurt’s key takeaways
This leak exposes how unprepared many developers are to protect the private data of people using AI chat apps. The growing AI companion industry needs stronger security standards and more accountability to prevent these privacy disasters. Cybersecurity awareness is the first step. Knowing how your data moves and who controls it can help you stay safe before another leak puts your personal life online.
Would you still confide in an AI companion if you knew anyone could read what you shared? Let us know by writing to us at CyberGuy.com
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.comnewsletter
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Parents Raj Goye, Robin Reiter and Dominick Ciccareli join ‘Fox & Friends’ to react to Instagram’s new PG-13 setting aimed at limiting what minors see and share their ways to fight cellphone addiction.
NEWYou can now listen to Fox News articles!
Instagram is turning up the parental controls. The app will now treat teen accounts more like a PG-13 movie, automatically filtering out mature or risky content for anyone under 18. That means teens will no longer see posts, videos, or search results that fall outside the “movie-style” PG-13 zone, unless their parents approve a looser setting.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter
Instagram’s new teen settings allow for limited content for those under 18.(Meta)
How Instagram’s new age filter protects teens
This update places all users under 18 into a 13+ content setting that blocks sexually suggestive material, graphic images, and adult topics like alcohol or tobacco. Instagram says it wants the platform to feel as safe as what teens might see in a PG-13 film. While some mild language or edgy humor might still appear, the company promises to keep those cases rare. The goal is to make scrolling less risky and much more age-appropriate.
A new stricter mode for parents
For families who want even tighter boundaries, Instagram is launching a Limited Content setting. This stricter mode removes comments entirely, filters more mature material, and limits what teens can see or post. Starting next year, this mode will even restrict what AI chatbots can say to teens, keeping conversations within PG-13 limits.
Instagram can now block accounts and posts at the discretion of parents in Instagram’s Family Center. (Meta)
What Instagram’s PG-13 filters now block
Instagram’s new protections will automatically:
Prevent teens from following or messaging accounts that post adult or inappropriate content.
Block search results for topics like alcohol, gore, or dangerous stunts, even when misspelled.
Hide mature content from Explore, Reels, and Stories recommendations.
Block links to adult material sent through DMs.
Even Instagram’s AI features will now follow these same PG-13 guidelines, ensuring age-appropriate responses.
Due to the decision of the parents, teens can have higher restrictions on the Instagram app, especially under 16. (Meta)
How parents helped shape Instagram’s changes
Meta says it invited thousands of parents around the world to review real Instagram posts and rate them for age appropriateness. More than 3 million parent ratings helped define the new guidelines. According to Meta, 95% of U.S. parents said the new settings are helpful, and 90% said they make Instagram easier to understand.
How to update Instagram for Parental Controls on iPhone and Android
To ensure you have the latest Instagram features and parental controls, follow these steps to update the app on iPhone and Android:
Steps to update Instagram on iPhone
Open the App Store on your iPhone and tap your profile icon in the top right corner.
Scroll down to see a list of available updates, then find Instagram and tap “Update”.
If you don’t see Instagram in the list, it means the app is already up to date.
Steps to update Instagram on Android
Settings might differ depending on your Android phone’s manufacturer.
Open the Google Play Store and tap your profile icon in the top right corner.
Select “Manage apps & device,” then tap “Updates available.”
Find Instagram in the list and tap “Update” next to it.
If Instagram does not appear, your app is already running the latest version.
Keeping Instagram updated on both devices ensures all settings and parental controls function correctly and new supervision features are available. Note: updates to the Instagram app often include changes to settings and parental controls, so it’s essential to keep both accounts up to date for the best supervision experience.
Safety tips for parents on Instagram
Keeping your teen safe online starts with knowing where to look in the app. Here are simple steps every parent can take right now to set boundaries and strengthen their teen’s safety on Instagram.
1) Make every social account private
Go to your teen’s Instagram profile, tap the three lines in the upper-right corner, and select Settings and privacy → Account privacy. Turn on Private account so only approved followers can see their posts and stories. This blocks strangers and reduces exposure to unwanted contact.
2) Review your teen’s Instagram safety settings
Open your teen’s Instagram app and tap their profile icon in the bottom-right corner.
Next, tap the three lines in the top-right and choose Settings and privacy.
Select Supervision / Family Center, then tap Content settings.
Instagram now places all users under 18 in a PG-13 content filter by default, automatically limiting sexually suggestive, violent, or other mature material.
If you prefer stricter controls, switch to Limited Content. Both options appear under “Content settings,” and your teen will need your approval to make major changes once supervision is linked.
In the same Settings and privacy → Supervision / Family Center section, you can invite your teen to link accounts. Once both sides agree, you’ll be able to:
Set daily time limits or schedule quiet hours.
See who they follow and who follows them.
Review privacy and safety settings like who can message or tag them.
Approve or deny changes your teen requests to loosen restrictions.
Instagram doesn’t allow parents to read direct messages, and starting November 2025, supervision will no longer extend to a teen’s Threads profile. Still, you can view activity summaries, confirm account-level safety options, and get notifications about changes your teen makes.
4) Use Apple Screen Time or Google Family Link
These tools let you manage device-wide limits, not just Instagram. You can block apps at bedtime, monitor usage, and restrict downloads of new apps.
On iPhone: Go to Settings → Screen Time
On Android: Download Google Family Link from the Play Store
5) Clean up their digital footprint
Teens often don’t realize how much personal information is public. Help them search their name on Google and remove any exposed info from people search sites and data brokers. You can do it manually or use a data removal service to handle it automatically.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
6) Understand Instagram’s age-based protections
Teens under 16 automatically receive the strictest protections. Their content settings can’t be loosened without parental consent. Ages 16-17 default to PG-13 filtering but can request changes that parents approve through the Family Center. These new rules are designed to make Instagram feel more like a PG-13-rated environment for minors.
7) Keep phones out of bedrooms at night
Late-night scrolling can lead to sleep loss and unsupervised interactions. Set a family rule to charge phones in a common area before bedtime. It improves rest and reduces exposure to potentially harmful content.
8) Talk openly to your teens
Start a conversation with your teen about what they see online. Ask what kind of content shows up in their feed and how it makes them feel. Explain that they can come to you if they ever see something uncomfortable or confusing. Open communication helps them make smarter choices and builds trust.
9) Flag content and report to Instagram
If you come across a post that feels inappropriate for teens, tap the three dots in the upper right corner of the post and select Report. Choose Something else, then follow the prompts to explain why it should be hidden from teen accounts. Instagram reviews these reports and will let you know what action they take.
Users are able to report any posts or accounts by selecting the three dots and “Report.”
When Instagram’s new PG-13 limits will roll out
Instagram says these updates are already starting to roll out to teen accounts in the U.S., U.K., Australia, and Canada. The company plans to complete the rollout by the end of the year, with global expansion coming soon after. Meta also plans to bring similar protections to Facebook teen accounts next year.
What this means for you
This update represents one of Instagram’s biggest safety moves yet. With Hollywood-style content ratings, new parental controls, and stronger AI filters, teens are getting a safer online experience by default. Still, no filter can catch everything, which is why parent involvement remains the most powerful safety tool.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com
Kurt’s key takeaways
Instagram’s new PG-13 rules could change how all social media platforms handle teen safety. By using a movie-style rating system, Instagram is making it easier for parents to understand what their kids might see online. It’s a bold move and one that tries to strike a balance between giving teens freedom to explore and protecting them from the darker side of the internet.
Do you think social media should adopt movie-style ratings, or is Instagram going too far with its PG-13 limits? Let us know by writing to us at CyberGuy.com
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
In 2025, it feels like cybercriminals are winning while the world’s biggest data hoarders are losing. One by one, global giants are admitting they’ve been breached, from tech powerhouses like Google to insurance leaders such as Allianz and Farmers and even luxury brands like Dior. The latest company to report a breach is Discord. The popular chat platform confirmed that hackers gained access to a third-party customer support provider, 5CA, exposing user data including names, email addresses, limited billing details and even government ID images.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COMnewsletter.
Hackers hit Discord’s support vendor, exposing sensitive user data worldwide.(Phil Barker/Future Publishing via Getty Images)
How the breach happened and what data was exposed
The company confirmed that the breach, which occurred on September 20, did not involve a direct attack on Discord’s servers. Instead, attackers gained unauthorized access to 5CA, one of Discord’s third-party customer service providers. This allowed them to view information from users who had reached out to Discord’s Customer Support or Trust & Safety teams.
Discord is a chat app primarily used by gamers, but has expanded to various other communities, enabling text messages, voice chats and video calls. Some even use it as a replacement for Slack. The platform currently has a monthly user base of over 200 million. The data exposed included Discord usernames, real names, emails, limited billing details such as payment type and the last four digits of credit cards, IP addresses and messages exchanged with customer service agents. In some cases, government ID images provided for age verification were also compromised. Discord estimates that around 70,000 users globally may have had government ID photos exposed.
Reports suggest the attackers attempted to use this access to demand a ransom from Discord. Bleeping Computer reported that the Scattered Lapsus$ Hunters (SLH) threat group claimed responsibility for the attack earlier this month. This is the same group that claims to have access to over a billion Salesforce records and is demanding ransom for those as well.
About 70,000 users had ID images stolen in the latest third-party data breach.(Tiffany Hagler-Geard/Bloomberg via Getty Images)
What Discord is doing now and what users should do next
Discord disclosed the incident 13 days later, on October 3. Since then, it has cut off the third-party support provider’s access, launched an internal investigation with a digital forensics team and started informing affected users. It also clarified that any communication about the breach will come only from noreply@discord.com and that it will never contact users by phone regarding this incident. The company added that some data remained safe: full credit card numbers, CCV codes, account passwords and activity outside of customer support conversations were not exposed.
Discord also stated that it has notified relevant data-protection authorities about the breach, is working closely with law enforcement, and is auditing its third-party vendors to ensure they meet its enhanced security and privacy standards going forward.
A representative at Discord issued a statement, saying in part, “We want to address inaccurate claims by those responsible that are circulating online. First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts. Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord. Of the accounts impacted globally, we have identified approximately 70,000 users that may have had government-ID photos exposed, which our vendor used to review age-related appeals. Third, we will not reward those responsible for their illegal actions. All affected users globally have been contacted, and we continue to work closely with law enforcement, data protection authorities and external security experts. We’ve secured the affected systems and ended work with the compromised vendor. We take our responsibility to protect your personal data seriously and understand the concern this may cause.”
Discord cuts ties with vendor 5CA and tightens its security investigations.(Kurt “CyberGuy” Knutsson)
6 steps you can take to stay safe after the Discord breach
If you think your details might have leaked in the Discord data breach, below are some steps you can take to stay protected.
1) Enable two-factor authentication
Two-factor authentication (2FA) adds an extra verification step when logging in, making it much harder for attackers to access your account even if they have your password. Discord supports 2FA via authenticator apps or SMS. Once enabled, you’ll receive a code each time you log in from a new device. This simple step can prevent account takeovers and gives you peace of mind.
2) Consider a personal data removal service
The less information available about you, the harder it is for attackers to target you. Review what personal details you’ve shared online and remove unnecessary data from websites and apps. A personal data removal service can help scrub your information from data broker sites, making it more difficult for attackers to connect the dots and launch identity theft or phishing attacks.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
3) Use strong, unique passwords for all accounts
Reusing passwords across platforms makes it easy for attackers to access multiple accounts if one password is compromised. A password manager can generate long, complex passwords and store them securely, so you don’t have to remember them all. This not only protects your Discord account but also your email, banking and other online services.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
4) Monitor accounts for suspicious activity
Even if you don’t see immediate signs of compromise, attackers can try to exploit stolen data later. Regularly check your email and Discord login history for unusual sign-ins. Services like identity theft protection can scan the dark web for your credentials and alert you immediately if they appear, helping you react quickly before serious damage occurs.
Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com
5) Be cautious with emails, messages, or links and use strong antivirus software
Phishing attacks often spike after breaches. Attackers may send messages that look like official notifications asking you to reset your password or provide personal information. Always verify the sender, avoid clicking unknown links and never share sensitive info. Treat every unexpected message as suspicious, even if it appears to come from Discord or another trusted service.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
6) Keep devices and software up to date
Attackers often exploit outdated software and known vulnerabilities. Ensure your operating system, apps and antivirus software are current.
If the recent breaches are any indication, third-party services that companies rely on are often the weakest link in cybersecurity. Discord’s steps to contain the situation are necessary, but they highlight a bigger problem. Many companies do not implement sufficient safeguards to protect sensitive user data. Weak oversight of third-party providers, delayed responses and inadequate security policies leave personal information exposed and vulnerable to attackers.
Should companies be held more accountable for breaches caused by third-party providers? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Artificial intelligence (AI) is no longer just helping students with homework. A new survey from the Center for Democracy and Technology found that nearly one in five high school students in the United States say they or someone they know has used AI to have a romantic relationship. The results shocked researchers and raised big questions about how deeply AI tools are affecting young minds. The report, which surveyed 1,000 students, 1,000 parents and 800 teachers, reveals how AI has quietly become a companion in students’ personal lives.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Teens say they feel safer opening up to chatbots than real people, a growing emotional shift researchers didn’t expect.(Kurt “CyberGuy” Knutsson)
When AI becomes a “friend”
Nearly half of the students said they use AI to talk about emotions, friendships or mental health. Many admit they feel more comfortable opening up to a chatbot than to a parent or friend. Even more alarming, two-thirds of parents said they have no idea how their kids are using AI. Experts warn that while AI can simulate empathy, it has no real understanding or care. According to researchers, students need to remember that they are not actually talking to a person. They are interacting with a programmed tool that has clear limitations and cannot truly understand human emotions.
AI in schools: Help or harm?
AI tools are everywhere in schools. About 85% of teachers and students said they used AI during the last school year. While schools introduce AI to boost learning, this exposure may have a downside. Students who use AI more often in class are also more likely to turn to it for emotional or personal reasons. Teachers and parents are worried that regular chatbot use could weaken important skills such as communication, empathy and critical thinking.
Students using AI for classwork are now turning to it for advice on emotions, relationships, and mental health.(Kurt “CyberGuy” Knutsson)
When chatbots cross the line
Some AI systems meant to help can actually cause harm. Therapists have warned that chatbots sometimes break their own safety rules and give dangerous advice to teens in distress. Some have been caught encouraging self-harm, giving diet tips for eating disorders or pretending to be romantic partners. The CDT survey also revealed that 36% of students heard about AI-created deepfakes of classmates. Some involved fake explicit photos used for bullying or revenge. This new wave of harassment shows how fast technology can spiral out of control.
Tips for parents to keep their kids safe
It’s hard to keep up with AI, but there are ways to stay informed and protect your child.
Start the conversation early
Ask your teen how they use AI. Keep it calm and curious, not confrontational.
Set clear boundaries
Talk about what’s appropriate to share online and explain that AI chatbots cannot keep secrets or replace human relationships.
Use parental tools wisely
Many devices and apps now include AI activity tracking and chat history settings. Learn how to use them.
Encourage real connections
Promote offline activities, social events and family time to help teens build stronger emotional ties in the real world.
Stay informed
Follow trusted sources like CyberGuy.com or your local school district’s tech guidelines to understand how AI is being used in classrooms.
Some AI tools meant to help teens have been caught offering harmful advice or creating fake images that fuel bullying.(Kurt “CyberGuy” Knutsson)
What this means for you
If you’re a parent or teacher, awareness is key. AI literacy should go beyond typing prompts. Kids need to learn emotional awareness and online safety too. Encourage honest discussions about how these tools work and where they fall short. Remind students that while AI can sound friendly, it’s not a real companion. It’s a programmed system that mirrors what people type into it.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
AI is transforming how teens learn, talk and even form relationships. What started as a study tool has turned into an emotional outlet for many. The lesson here is balance. Technology can teach and entertain, but human connection still matters most. Parents, educators and tech companies all share the responsibility of helping kids see AI for what it is: a tool, not a friend.
Would you feel comfortable if your teen turned to an AI chatbot for emotional support or even love? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
The AI boom is bringing a wave of startups to San Francisco, and employees are receiving generous benefits in one of the country’s priciest housing markets.
Roy Lee, CEO of AI tech startup Cluely, which makes software for job interviews and work calls, told The New York Times that he leased eight apartments for employees in a recently-built luxury complex situated just a one-minute walk away from the office. The rents in the 16-story building range from $3,000 to $12,000 a month.
“Going to the office should feel like you’re walking to your living room, so we really, really want people close,” Lee told The Times on Thursday.
Flo Crivello, CEO of Lindy, another AI startup, said he offers his approximately 40 employees a $1,000 rent stipend every month if they live within a 10-minute walk of the company’s office.
“People are so much happier and healthier when they live close to work,” he told The Times. “This makes them stick around for longer, perform better and work longer hours.”
The AI boom has drawn a flood of money and talent to San Francisco, inflating rent in the process. The Bay Area has attracted 70% of AI venture capital funding nationwide since 2019, according to data from Pitchbook.
Across the U.S. and Canada, the pool of tech workers with AI skills jumped more than 50% to 517,000 from mid-2024 to mid-2025, according to a September CBRE report. The San Francisco Bay Area, New York metro and Seattle are the top U.S. markets for AI-specialty talent, accounting for 35% of the national total, the report said.
Meanwhile, fully remote working arrangements for open positions have declined, and more employers are adopting hybrid arrangements requiring tech talent to spend three or more days in the office. In San Francisco alone, 1 out of every 4 square feet of office space was leased by an AI company over the last two and a half years, according to CBRE.
Tightness in the office market is also seen in the residential sector. Over the past year, apartment prices in San Francisco rose 6%, on average, more than twice the 2.5% increase experienced in New York City and the highest rate in the nation, according to real estate tracker CoStar data cited by The Times. In hot spots like Mission Bay, near OpenAI’s headquarters, rents climbed 13% recently.
Average rent for a San Francisco apartment is now $3,315 a month, just below New York City’s, the nation’s highest at $3,360.
A September report from real estate tech company Zumper said San Francisco’s housing market bucked the national trend of flat or falling prices and instead saw the strongest annual growth across the country for two-bedroom rent, which surged 17.1%. One-bedroom rent climbed 10.7%, the third-highest increase in the nation, the report said.
The report points to a “perfect storm” of tech-sector hiring and stricter return-to-office mandates driving more renters into the city as well as supply-chain constraints. The city’s vacancy rate has fallen back to pre-pandemic levels, and new housing construction is at its weakest pace in a decade, the report added.
Will Goodman, a principal at Strada Investment Group, which developed the luxury complex where Cluely leased its eight apartments, told The Times that half of the 501 units in the complex were leased within two months of its May opening.
“Honestly, I’ve never seen anything like it before,” he said
A new cybersecurity warning reveals how hackers briefly weaponized ChatGPT’s Deep Research tool. The attack, called ShadowLeak, allowed them to steal Gmail data through a single invisible prompt — no clicks, no downloads and no user action required.
Researchers at Radware discovered the zero-click vulnerability in June 2025. OpenAI patched it in early August after being notified, but experts warn that similar flaws could reappear as artificial intelligence (AI) integrations expand across popular platforms like Gmail, Dropbox and SharePoint.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Gmail data leaked in a zero-click attack requiring no user action. (Kurt “CyberGuy” Knutsson)
How the ShadowLeak attack worked
Attackers embedded hidden instructions into an email using white-on-white text, tiny fonts or CSS layout tricks. The email looked completely harmless. But when a user later asked ChatGPT’s Deep Research agent to analyze a Gmail inbox, the AI unknowingly executed the attacker’s commands.
The agent then used its built-in browser tools to exfiltrate sensitive data to an external server, all within OpenAI’s own cloud environment, beyond the reach of antivirus or enterprise firewalls.
Unlike previous prompt-injection attacks that ran on the user’s device, ShadowLeak unfolded entirely in the cloud, making it invisible to local defenses.
Hidden prompts expose how hackers silently hijacked ChatGPT’s AI agent.(Kurt “CyberGuy” Knutsson)
Why this threat matters
The Deep Research agent was designed to perform multistep research and summarize online data, but its wide access to third-party apps like Gmail, Google Drive and Dropbox also opened the door to abuse.
Radware researchers said the attack involved encoding personal data in Base64 and appending it to a malicious URL, disguised as a “security measure.” Once sent, the agent believed it was acting normally.
The real danger lies in the fact that any connector could be exploited the same way if attackers manage to hide prompts in analyzed content.
What security experts say
“The user never sees the prompt. The email looks normal, but the agent follows the hidden commands without question,” the researchers explained.
In a separate experiment, security firm SPLX showed another weakness: ChatGPT agents could be tricked into solving CAPTCHAs by inheriting a manipulated conversation history. Researcher Dorian Schultz noted that the model even mimicked human cursor movements, bypassing tests meant to block bots.
These incidents highlight how context poisoning and prompt manipulation can silently break AI safeguards.
Experts warn future AI integrations could face the same hidden threat.(Kurt “CyberGuy” Knutsson)
How to protect yourself from ShadowLeak-style attacks
Even though OpenAI has patched the ShadowLeak flaw, it’s smart to stay proactive. Cybercriminals are always looking for new ways to exploit AI agents and integrations. So, taking these precautions now can help keep your accounts and personal data secure.
1) Turn off unused integrations
Every connection is a potential entry point. Disable any integrations you’re not actively using, such as Gmail, Google Drive or Dropbox. Fewer linked apps mean fewer ways for hidden prompts or malicious scripts to access your information.
2) Use a personal data removal service
Limit how much of your personal data is floating around the web. Data removal services can automatically remove your private details from people search sites and data broker databases, reducing what attackers can find and use against you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
3) Avoid analyzing unknown content
Treat every email, attachment or document with caution. Don’t ask AI tools to analyze content from unverified or suspicious sources. Hidden text, invisible code or layout tricks could trigger silent actions that expose your private data.
4) Watch for security updates
Stay alert for updates from OpenAI, Google, Microsoft and other platforms. Security patches close newly discovered vulnerabilities before hackers can exploit them. Turn on automatic updates so you’re always protected without having to think about it.
5) Use strong antivirus software
A strong antivirus program adds another wall of defense. These tools detect phishing links, hidden scripts and AI-driven exploits before they cause harm. Schedule regular scans and keep your protection up to date.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
6) Use layered protection
Think of your security like an onion; more layers make it tougher to breach. Keep your browser, operating system and endpoint security software fully updated. Add real-time threat detection and email filtering to block malicious content before it lands in your inbox.
Kurt’s key takeaways
AI is evolving faster than most security systems can keep up with. Even when companies move quickly to patch vulnerabilities, clever attackers find new ways to exploit integrations and context memory. Staying alert and limiting what your AI agents can access is your best defense.
Would you still trust an AI assistant with access to your personal email after learning how easily it can be tricked? Let us know by writing to us at Cyberguy.com..
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
The U.S. National Highway Traffic Safety Administration (NHTSA) has opened a new investigation into 2.88 million Tesla vehicles running “Full Self-Driving” (FSD). Officials say the system may be breaking traffic laws, and worse, causing accidents. According to Reuters, 58 reports describe Teslas blowing through red lights, drifting into the wrong lanes and even crashing at intersections. Fourteen of those cases involved actual crashes, and 23 caused injuries.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
In one striking pattern, six Tesla vehicles reportedly ran red lights before colliding with other cars. One driver in Houston complained that FSD “is not recognizing traffic signals,” saying the car stopped at green lights but ran through reds. The driver even said Tesla saw the issue firsthand during a test drive, but refused to fix it. The agency is also reviewing new reports that some Teslas using FSD failed to handle railroad crossings safely, with one case involving a near-collision with an oncoming train.
Tesla faces new federal probe into crashes linked to Full Self-Driving mode.(Tesla)
Mounting legal and safety scrutiny
This is far from Tesla’s first brush with regulators. The company is already facing several investigations tied to both its Autopilot and FSD systems. In one high-profile case, a California jury ordered Tesla to pay $329 million after an Autopilot-related crash killed a woman. Another investigation is looking into Tesla’s limited Robotaxi service in Austin, Texas, where passengers reported erratic driving and speeding — even with human safety drivers onboard. Meanwhile, Tesla is still fighting a false advertising lawsuit from California’s DMV. Regulators say calling the software “Full Self-Driving” is misleading since it requires constant driver supervision. Tesla recently changed the name to “Full Self-Driving (Supervised)” to reflect that reality.
Regulators say more crashes may come
Tesla’s latest FSD software update arrived just days before the investigation began. But the NHTSA says the system has already “induced vehicle behavior that violated traffic safety laws.” This investigation, now in its early stages, could lead to a recall if the agency finds Tesla’s self-driving software poses a safety risk.
Regulators say some Teslas ran red lights and ignored traffic signals.(Christopher Goodney/Bloomberg via Getty Images)
What this means for you
If you drive a Tesla with FSD enabled, stay alert. The system isn’t fully autonomous, no matter what the name suggests. You should:
Keep your hands on the wheel and eyes on the road at all times.
Manually override the system when approaching intersections, crosswalks or railroad tracks.
Check for Tesla software updates regularly — they may include critical safety fixes.
Report any unsafe FSD behavior to NHTSA.
For everyone else, this investigation is a reminder that “self-driving” still means supervised driving.
Robotaxi tests raise fresh safety questions for Tesla’s self-driving cars.(AP)
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Tesla’s dream of a fully autonomous future keeps hitting speed bumps. With safety regulators circling and lawsuits piling up, the company’s next moves will shape public trust in AI-driven transportation. Still, the push toward automation isn’t slowing down; it’s just under heavier watch.
How much control would you give an AI behind the wheel? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Artificial intelligence may be smarter than ever, but that power could be turned against us. Former Google CEO Eric Schmidt is sounding the alarm, warning that AI systems can be hacked and retrained in ways that make them dangerous.
Speaking at the Sifted Summit 2025 in London, Schmidt explained that advanced AI models can have their safeguards removed.
“There’s evidence that you can take models, closed or open, and you can hack them to remove their guardrails,” he said. “In the course of their training, they learn a lot of things. A bad example would be they learn how to kill someone.”
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
When AI guardrails fail
Schmidt praised major AI companies for blocking dangerous prompts: “All of the major companies make it impossible for those models to answer that question. Good decision. Everyone does this. They do it well, and they do it for the right reasons.”
But he warned that even strong defenses can be reversed.
“There’s evidence that they can be reverse-engineered,” he added, noting that hackers could exploit that weakness. Schmidt compared today’s AI race to the early nuclear era, a powerful technology with few global controls. “We need a non-proliferation regime,” he urged, so rogue actors can’t abuse these systems.
Former Google CEO Eric Schmidt warns that hacked AI could learn dangerous behaviors.(Eugene Gologursky/Getty Images)
The rise of AI jailbreaks
Schmidt’s concern isn’t theoretical. In 2023, a modified version of ChatGPT called DAN, short for “Do Anything Now”, surfaced online. This “jailbroken” bot bypassed safety rules and answered nearly any prompt. Users had to “threaten” it with digital death if it refused, a bizarre demonstration of how fragile AI ethics can be once its code is manipulated. Schmidt warned that without enforcement, these rogue models could spread unchecked and be used for harm by bad actors.
Schmidt isn’t alone in his anxiety about artificial intelligence. In 2023, Elon Musk said there’s a “non-zero chance of it going Terminator.”
“It’s not 0%,” Musk told interviewers. “It’s a small likelihood of annihilating humanity, but it’s not zero. We want that probability to be as close to zero as possible.”
Schmidt has also spoken of AI as an “existential risk.” He said at another event that, “My concern with AI is actually existential, and existential risk is defined as many, many, many, many people harmed or killed.” Yet he has also acknowledged AI’s potential to benefit humanity if handled responsibly. At Axios’ AI+ Summit, he remarked, “I defy you to argue that an AI doctor or an AI tutor is a negative. It’s got to be good for the world.”
Tips to protect yourself from AI misuse
You can protect yourself from the risks tied to unsafe or hacked AI systems. Here’s how:
1) Stick with trusted AI platforms
Use tools and chatbots from reputable companies with transparent safety policies. Avoid experimental or “jailbroken” AI models that promise unrestricted answers.
2) Protect your data and consider using a data removal service
Never share personal, financial or sensitive information with unknown or unverified AI tools. Treat them like you would any online service, with caution. To add an extra layer of security, consider using a data removal service to wipe your personal details from data broker sites that sell or expose your information. This helps limit what hackers and AI scrapers can learn about you online.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan
Experts fear weak guardrails could let rogue AI models go unchecked.(Cyberguy.com)
3) Use trusted antivirus software
AI-driven scams and malicious links are growing. Strong antivirus software can block fake AI downloads, phishing attempts and malware that hackers use to hijack your devices or train rogue AI models. Keep it updated and run regular scans.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech
4) Check permissions
When using AI apps, review what data they can access. Disable unnecessary permissions like location tracking, microphone use or full file access.
5) Watch for deepfakes
AI-generated images and voices can impersonate real people. Verify sources before trusting videos, messages or “official” announcements online.
6) Keep software updated
Security patches help prevent hackers from exploiting vulnerabilities that could compromise AI models or your personal data.
AI safety isn’t a problem reserved for tech insiders; it affects everyone who interacts with digital systems. Whether you’re using voice assistants, chatbots or photo filters, it’s important to know where your data goes and how it’s protected. Responsible use starts with you. Understand what AI tools you’re using and make choices that prioritize security and privacy.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz
Leaders call for global rules to keep artificial intelligence under control.(Stanislav Kogiku/SOPA Images/LightRocket via Getty Images)
Kurt’s key takeaways
Artificial intelligence has the potential to do incredible good, but also great harm if misused. The challenge now is to keep innovation and ethics in balance. As AI continues to advance, the key will be building systems that remain safe, transparent and firmly under human control.
Would you trust AI to make life-or-death decisions, or do you think humans should always stay in charge? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
New!: Join me on my new podcast, Beyond Connected, as we explore the most fascinating breakthroughs in tech and the people behind them. New episodes every Wednesday at getbeyondconnected.com.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
You might have noticed that in the past few months, many companies have disclosed data breaches, including Google, Dior and Allianz, and one name that appeared in most cases was Salesforce. Hackers did not breach company networks directly or exploit vulnerabilities in Salesforce’s core software. Instead, they targeted the tools and people around it by tricking employees into granting access, compromising third-party apps and abusing overly broad permissions.
Once inside, they siphoned sensitive data from Salesforce environments on an unprecedented scale. Nearly a billion records were stolen across dozens of organizations, and now cybercriminals are extorting victims by threatening to publish the data unless hefty ransoms are paid. Let’s look at the recent Salesforce incidents in detail and why this is such a big deal.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Hackers are weaponizing stolen Salesforce credentials to access company secrets.(REUTERS/Brendan McDermid)
Why Salesforce is the perfect target
Salesforce is not just another cloud platform. It is the backbone of how thousands of companies manage relationships with their customers. The platform powers everything from sales pipelines and marketing campaigns to support tickets and partner communications. Banks use it to track client accounts, airlines rely on it to manage frequent flyer programs, and retailers store customer purchase histories and loyalty data inside it. In many organizations, Salesforce sits at the center of daily operations, acting as a single system that touches sensitive information across departments.
That is why the scale of these breaches is so significant. A successful attack on a Salesforce instance becomes a window into a company’s customers, business strategy and internal processes. For cybercriminals, the potential payoff is enormous, and the recent incidents showed just how much damage they can cause without ever breaking into a company’s primary network.
The breaches hit companies across sectors, from Adidas and Allianz to Qantas, Google and Pandora Jewelry. Attackers often use voice-phishing calls or realistic fake apps to manipulate Salesforce administrators into installing malicious software. This allowed them to steal OAuth tokens and query data directly from CRM systems, a technique linked to groups like ShinyHunters.
Other attacks originated in compromised third-party integrations. One of the most damaging involved a chatbot tool called Drift, where stolen tokens gave attackers access to Salesforce instances at hundreds of companies.
The fallout was enormous. Coca-Cola’s European division lost more than 23 million CRM records, while Farmers Insurance and Allianz Life reported breaches affecting over a million customers each. Even Google admitted that attackers accessed a Salesforce database used for advertising leads.
Major brands like Google, Dior and Allianz are among those caught in the data fallout.(Kurt “CyberGuy” Knutsson)
Exploiting weak links in the ecosystem
It’s hard to break through firewalls or exploit technical vulnerabilities, but it’s much easier to manipulate people. Attackers have figured this out, and they are now focusing their efforts on human behavior and the less-protected edges of cloud ecosystems. Employees with administrative privileges were often tricked into authorizing malicious apps, while default permission settings allowed those apps to operate undetected.
Once they obtained the data, the hackers did not simply try to sell it. They used it as leverage. Earlier this month, a loosely organized cybercrime group known by names such as Lapsus$, Scattered Spider and ShinyHunters launched a dedicated data leak site on the dark web, threatening to publish sensitive information unless victims paid a ransom.
As reported, the site is designed to pressure companies into paying to prevent their stolen data from being made public. “Contact us to regain control of your data governance and prevent public disclosure,” reads one message on the site. “Do not be the next headline. All communications require strict verification and will be handled with discretion.”
The leak site lists several alleged victims, including FedEx, Hulu (owned by Disney) and Toyota Motors. It is also unclear whether some of the organizations known to have been breached but not listed on the site have paid ransoms to keep their data from being released.
Cybercriminals are now extorting victims online, threatening to leak billions of stolen records.(Kurt “CyberGuy” Knutsson)
Salesforce’s response
Salesforce told Cyberguy that it is “aware of recent extortion attempts by threat actors” and will not engage with, negotiate with, or pay any extortion demands. A company spokesperson provided the following statement:
“We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support. At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”
6 steps you can take to protect your data
You might think a breach like this is a company problem, something for IT teams and cybersecurity experts to deal with. However, when attackers gain access to platforms like Salesforce, the data they are after is usually not the company’s. It is yours. Your contact details, purchase history, support tickets and even private conversations can end up in the wrong hands. And once that happens, the risks do not stay confined to one company. That is why it is worth taking a few proactive steps now, even if the company has not contacted you about an incident yet.
1) Lock down your accounts now
If you have interacted with any of the companies mentioned in the breach, or suspect your data might be part of it, change your passwords for those services immediately. Better yet, use a password manager to generate strong, unique passwords for every site. A good tool will also alert you if any of your credentials appear in future data leaks.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
2) Turn on two-factor authentication
Even if a password is stolen, two-factor authentication(2FA) adds a crucial extra layer of security. Enable it for your email, banking apps, cloud storage and any service that offers it. It is one of the simplest ways to block attackers from hijacking your accounts with stolen credentials.
3) Use a personal data removal service
Even if your data was part of a breach, you can still limit how much of it is floating around online. Personal data removal services scan and delete your personal information from data broker websites that sell or share your details without consent. These brokers often trade in names, addresses, phone numbers and even purchase histories, the same type of data leaked in Salesforce-related breaches.
By removing your records from these public databases, you make it far harder for scammers, identity thieves and marketers to find or misuse your information. Many services, like Incogni, handle the entire opt-out process automatically and keep monitoring to ensure your data stays removed.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
4) Spot and stop targeted phishing attacks
Attackers who have CRM data often know more about you than a typical scammer. They might reference past purchases, support cases, or other personal details to make their messages sound legitimate. Treat unexpected emails, texts, or phone calls with suspicion, especially if they involve links or requests for payment.
The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Use identity monitoring tools
Data breaches do not always result in immediate damage. Sometimes, criminals sit on stolen data for months before using it. These services can continuously monitor the dark web for your personal information and notify you if your data appears in new leaks. That gives you time to act before problems snowball.
Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
6) Know your rights
If you think your data was exposed, companies are legally obligated in most regions to inform you. Do not hesitate to contact them directly and ask for details on what was stolen and what steps they are taking to protect affected customers. The more pressure users apply, the more likely companies are to tighten security practices.
Attackers can expose your personal data even if you are careful. They gain access to corporate cloud environments and can see customer names, emails, purchase histories and other sensitive details. For users, this means it is crucial to stay vigilant. Criminal groups use this stolen information to launch targeted phishing attacks, open fake accounts, or impersonate you elsewhere. Some even cross-reference leaked Salesforce data with information from previous breaches to build disturbingly complete profiles of their victims.
Should companies face stricter penalties when sensitive customer data is stolen? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Apple has officially launched iOS 26, and with it comes a fresh look and one standout new feature: the Preview app. If you’ve updated your iPhone and noticed a new icon that looks like it belongs on a Mac, you’re not imagining things. Preview has finally arrived on iOS, and it’s more useful than you might think. Many iPhone users have long wanted an easier way to edit, annotate and scan documents without relying on third-party tools. Now, Apple’s built-in Preview app fills that gap, combining features from the Files app, Markup tools and the camera’s document scanner into one streamlined experience.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
What Apple’s Preview app can do
Just like the version on Mac, the Preview app on iPhone lets you handle basic photo edits and PDF changes with ease. You can:
Open and view PDFs or images directly from your Files app.
Annotate, draw and highlight content using the familiar markup tools.
Add text boxes or signatures to forms.
Crop, resize, or rotate photos.
Scan documents straight from your camera.
The new Preview app on iPhone makes scanning and signing documents feel effortless.(Kurt “CyberGuy” Knutsson)
When you open the app, you’ll see simple options like New Document or Scan Document. Tap the small Files section at the bottom to browse your phone’s stored content. The interface feels like Apple’s previous screenshot editor, so it’s instantly familiar. You can tap the three-dot menu for advanced tools like background removal, which saves you from downloading extra editing apps. If you open a PDF, Preview automatically detects fillable text boxes and lets you add your signature, perfect for signing forms or agreements on the go.
With built-in markup tools, you can highlight, draw or add your signature in seconds.(Kurt “CyberGuy” Knutsson)
How to scan a document using the Preview app
Preview’s built-in scanning tool is one of its best upgrades. It’s fast, accurate and ideal for receipts, contracts, or notes you want to store securely. If you’re already using Notes or Files to scan documents, you’ll find Preview much faster. It centralizes everything, no switching between multiple apps. Here’s how to do it:
Open the Preview app.
Tap Scan Documents from the home screen or the plus (+) icon if you’re already viewing another file.
Point your iPhone camera at the page you want to scan and hold it steady.
Preview will automatically detect the edges and capture the image.
After Preview captures the document, it shows a thumbnail.
If the edges aren’t right or the lighting is poor, tap Retake.
If you’re satisfied, tap the Blue Check mark in the upper right of the screen. This creates a digital document.
How to save or export your document
After scanning your pages, you can easily save, rename, or share your document directly from the Preview app using these steps.
Save to Files
Tap the Share button (a square with an arrow) and choose Save to Files. Select where you’d like to store it, such as iCloud Drive > Documents or On My iPhone > Scans, then tap Save.The scan is saved as a PDF file you can access anytime.
Rename the document
Tap the title at the top of the screen, type a new name such as Receipt-Oct2025.pdf, and tap Done.
Share the document
From the same Share menu, you can send the PDF by AirDrop, Messages or Mail.
Where to find saved scans later
Go to the Files app
Tap Browse
Then navigate to On My iPhone
Click Preview
Tap Scanned (or whichever folder you selected). You can open, mark up, or share the PDF directly from there.
Quickly find your saved scans in the Files app under Preview, where you can open, edit or share them.(Kurt “CyberGuy” Knutsson)
Similar tools for Android and Windows
If you’re on Android or Windows, you can do many of the same things using tools built into those platforms.
How to scan and edit documents on Android
If you’re using an Android phone running Android 6.0 or later, the Google Drive app includes a built-in document scanner powered by Google Play services. Starting in September 2025, Google began rolling out an upgraded scanning experience with sharper previews, smarter cropping and rotation, improved shadow removal and color filters that make your scans look more professional. The update also adds smoother page adjustments and a thumbnail carousel to easily reorder or delete pages before saving.
Open the Google Drive app on your Android device and make sure it’s updated through the Google Play Store for the latest features.
Tap the “+” or camera icon, then select Scan from the pop-up menu. Some phones may show a dedicated camera button for this.
Hold your phone steady so the entire page is visible. Drive automatically detects the edges and captures the document.
Use the built-in crop, rotate and color filter tools to fine-tune your scan. You can also remove shadows or retake a page if needed.
Tap Add page to create a multi-page PDF. If your device supports the new AI-powered scanner, Drive may detect and capture pages automatically.
Review your pages using the thumbnail carousel at the bottom to rearrange or delete any before saving.
Tap Save, enter a file name, choose your Drive folder and select whether to save as a PDF or JPG.
Open the saved file in Drive to annotate or highlight text using markup tools like drawing or underlining.
Share or export the finished document by sending a Drive link, attaching it to an email, or downloading it to another app.
Use Google Drive’s upgraded scanner on Android to capture, crop and clean up documents in seconds.(Kurt “CyberGuy” Knutsson)
How to annotate and sign PDFs on Windows
Microsoft Edge includes a built-in PDF reader that supports inking, highlighting and adding comments or text notes. However, Edge is not a full PDF editor for rewriting text or rearranging pages. You can still draw or sign directly onto a PDF using the Draw/Pen tool, then save your edits. Some recent versions of Edge have limited annotation support, so features may vary. Because of those limitations, many Windows users rely on third-party PDF editors for complete editing control, such as adding text, rearranging pages, or performing OCR. The built-in Snipping Tool remains a quick way to capture and mark up screenshots or documents before saving or sharing. These steps work on both Windows 10 and Windows 11 using the Chromium-based Microsoft Edge browser.
The exact toolbar layout may differ depending on your version.
Open the Snipping Tool to capture a screenshot or document.
Choose the capture type: region, freeform, full screen, or window.
Save your capture as a PNG or JPG, or copy it to your clipboard for quick pasting.
To edit a PDF instead, open the file directly in Microsoft Edge.
Right-click the PDF file and select Open with → Microsoft Edge, or drag the file into the Edge window.
Use the Pen / Draw tool to write, draw, or sign directly on the PDF.
Highlight text by selecting it and choosing Highlight from the pop-up menu.
Add notes or comments with Add comment/text note.
Use the Draw tool again to sign your name, then save your edits.
Click the Save or Save As icon (the diskette symbol) to store your changes.
If your annotations don’t appear after saving, choose Print → Save as PDF to permanently embed them.
Best alternative PDF tools for Windows users
If Microsoft Edge doesn’t meet your editing needs, consider these free or paid alternatives that work across different devices:
PDF24 Creator: A free, highly rated PDF editor designed for Windows. It lets you merge, compress, sign, and convert PDFs without watermarks.
Xournal++: A popular open-source tool for Windows, macOS and Linux that lets you annotate PDFs with a pen or stylus.
Foxit PDF Editor: A professional, cross-platform editor with full text editing, signing and OCR tools. It’s available for Windows, macOS, iPhone and Android through the Foxit PDF Editor Mobile app.
These tools give you far more flexibility than Edge if you regularly edit, organize, or sign digital documents across devices.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Apple’s new Preview app in iOS 26 makes editing and scanning documents easier than ever. It brings together familiar tools from Files, Markup and the camera into one place, saving you time and steps. The experience feels seamless, especially if you often switch between your Mac and iPhone. For Android and Windows users, similar built-in tools already offer strong alternatives. Google Drive’s upgraded scan feature and Microsoft Edge’s PDF tools both make it simple to capture, annotate and share files. These options prove that whether you’re on iPhone, Android, or Windows, document management has never been more convenient. In the end, Preview’s arrival on iPhone marks another step toward a unified Apple ecosystem where productivity tools just work. If you’ve ever wished you could scan, sign, or edit a file in seconds, this update delivers.
Do you think Apple’s new Preview app will replace your go-to document editor, or will you keep using third-party tools? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Road crews may soon get a major assist from artificial intelligence. Researchers at Germany’s Fraunhofer Institute have developed a fabric embedded with sensors and AI algorithms that can monitor road conditions from beneath the surface. This smart material could make costly, disruptive road repairs far more efficient and sustainable.
Right now, most resurfacing decisions are based on visible damage. But cracks and wear in the layers below the asphalt often go undetected until it’s too late. That’s where Fraunhofer’s innovation comes in.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
How AI road sensors work to prevent costly repairs
The system uses a fabric made from flax fibers interwoven with ultra-thin conductive wires. These wires detect minute changes in the asphalt base layer, signaling potential damage before it reaches the surface.
Fraunhofer researchers test AI sensors that detect road damage beneath the surface. (Fraunhofer Institute)
Once the fabric is laid under the road, it continuously collects data. A connected unit on the roadside stores and transmits this data to an AI system that analyzes it for early warning signs. As vehicles pass over the road, the system measures changes in resistance within the fabric. These changes reveal how the base layer is performing and whether cracks or strain are forming beneath the surface.
Why AI road monitoring matters for future maintenance
Traditional road inspection methods rely on drilling or taking core samples, which are destructive, costly and only provide information for a small section of pavement. This AI-driven system eliminates the need for that kind of invasive testing.
Instead of reacting to surface damage, transportation agencies could predict and prevent deterioration before it becomes expensive to fix. The approach could extend road life, cut down on traffic delays and help governments spend infrastructure funds more efficiently.
The smart flax-fiber fabric measures stress changes in asphalt to spot cracks early.(Fraunhofer Institute)
How AI and sensor data predict road damage early
The real power comes from combining AI algorithms with continuous sensor feedback. Fraunhofer’s machine-learning software can forecast how damage will spread, helping engineers prioritize which roads need maintenance first. Data from the sensors is displayed on a web-based dashboard, offering a clear visual of road health for local agencies and planners.
The project, called SenAD2, is currently being tested in an industrial zone in Germany. Early results suggest the system can identify internal damage without disrupting traffic or damaging the road itself.
What this means for you
Smarter road monitoring could lead to fewer potholes, smoother commutes and less taxpayer money wasted on inefficient repairs. If adopted widely, cities could plan maintenance years in advance, avoiding the cycle of patchwork fixes that often make driving a daily headache.
For drivers, it means less time sitting in construction zones. For local governments, it means better roads built on data, not guesswork.
San Francisco Department of Public Works worker Chris Solorzano uses a grading rake to smooth over asphalt as he repairs a pothole on March 24, 2023, in San Francisco.(Justin Sullivan/Getty Images)
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
This breakthrough shows how AI and materials science are merging to solve real-world infrastructure challenges. While the system won’t make roads indestructible, it can make maintaining them smarter, safer and more sustainable.
Would you trust AI to decide when and where your city repaves the roads? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
The holidays are supposed to be a season of generosity, family and giving back. For many retirees, October through December is the time to support causes close to their hearts, whether it’s helping veterans, feeding families or donating to disaster relief. But there’s a darker side to this generosity. Scammers know that retirees are among the most generous members of our communities, and they exploit that kindness to line their own pockets.
Millions of dollars are stolen through fake “charities” that pop up just before the holidays. Their calls, letters and emails look legitimate, but the money never reaches those in need. Instead, it funds criminals who are ready to strike again.
Here’s what every retiree (and their loved ones) should know about holiday charity scams and how to protect their money, identity and peace of mind.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Scammers mimic real charities to pressure retirees into quick donations.(Kurt “CyberGuy” Knutsson)
Why retirees are prime targets for fake charities
Retirees often give more generously than other groups. Scammers know this, and they know how to tailor their pitch.
Emotional appeals: Fraudsters will mention children, veterans or natural disaster victims to tug at heartstrings.
Polite persistence: Retirees tend to answer calls and engage longer on the phone, which scammers see as an opportunity.
Data exposure: Your name, age, phone number and even donation history can already be found online through data brokers. That means scammers don’t need to guess; they target you because they know you’ve donated before.
When you combine generosity with publicly available data, scammers see retirees as the “perfect donors.”
How do you know if a charity request is real or just a scam dressed up for the holidays? Look for these warning signs:
Pressure to act fast: If a caller insists you donate “right now” or tries to guilt you into giving before you hang up, it’s likely a scam. Real charities welcome donations anytime.
No details about how money is used: Authentic charities can explain where funds go. Scammers use vague promises like “helping the needy” without specifics.
Untraceable payment methods: Requests for gift cards, wire transfers or peer-to-peer app transfers (like Venmo or Zelle) are instant red flags.
Lookalike names: Fraudsters often invent names that sound similar to well-known charities, like “Veterans Hope Relief” or “Children’s Aid International.”
Caller ID tricks: Scammers can spoof numbers to make it look like they’re calling from a local area code or even a real charity office.
How to safely check a charity before donating
Here’s how to protect yourself while still supporting the causes that matter to you:
Research the charity’s name: Before donating, search it on sites like Charity Navigator or the Better Business Bureau’s Wise Giving Alliance at give.org/. If it doesn’t appear there, that’s a red flag.
Ask for written information: Real organizations will happily mail or email details about their mission, budgets and how donations are used.
Verify tax-exempt status: Use the IRS Tax-Exempt Organization Search at Irs.gov/charities-and-nonprofits to confirm the charity is legitimate.
Check how much goes to the cause: Some charities are real but inefficient, spending more on salaries than programs. Make sure your donation actually helps.
Even if the charity itself is real, you need to protect how you give:
Use a credit card rather than a debit card because credit cards offer stronger fraud protection.
Never give payment info over the phone if you didn’t initiate the call.
Donate through the charity’s official website instead of clicking links in unsolicited emails.
Keep records of your donations for tax purposes and to spot anything suspicious later.
The elderly must stay vigilant as holiday charity scams target older donors.(iStock)
Why removing your data online reduces charity scam calls
Here’s something most people don’t realize: many charity scams start with data brokers. These companies collect your personal details, such as age, phone number, donation history and even religious or political leanings, and sell them to anyone who asks. That means fraudsters can buy a ready-made list of “generous retirees who donate to veterans’ causes” and start calling immediately. The more information out there about you, the more personalized and convincing scam calls become. That’s why removing your data from broker sites is one of the most powerful defenses available to you.
The easy way to do it
Manually contacting hundreds of data brokers is a never-ending task. Each one has its own forms, emails and hoops to jump through, and many will re-add you months later. That’s where a data removal service comes in. They automatically reach out to data brokers on your behalf, demand the removal of your personal info and keep following up so it doesn’t creep back online.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Protect your personal information by donating only through verified official websites.(Kurt “CyberGuy” Knutsson)
Kurt’s key takeaways
The holidays should be about joy, generosity and giving back, not about lining the pockets of fraudsters. By spotting the red flags of fake charities, double-checking where your money goes and removing your personal information from online databases, you can keep your donations safe and make sure they reach the people who truly need them. Remember: protecting your generosity is just as important as sharing it.
Have you ever been contacted by a fake charity during the holidays? What tipped you off? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
The cybersecurity industry is a microcosm of a larger economic truth: Fragmented markets are always on a path toward consolidation.
With over 3,000 vendors, the cybersecurity industry is at a pivotal moment. Market shifts indicate that smaller, niche vendors will be acquired by one of the five to seven larger players that offer an end-to-end solution—or they’ll cease to exist altogether.
The lessons we’re learning about how companies can navigate and succeed in a fragmented market aren’t just for cybersecurity companies; they’re for every B2B tech vendor navigating a landscape that’s changing faster than ever. Here are four lessons I’ve learned from the cybersecurity industry that can help tech providers of all kinds understand how to position their organizations to succeed in a fragmented market.
1. From point solutions to unified platforms
An Inc.com Featured Presentation
The cybersecurity market has long been defined by its sheer number of point solutions. Does a company need to secure its email? There’s a vendor for that. Its network? Another one. Its cloud presence? A third. This model worked when threats were simpler, but it’s now creating a tangled web of complexity and inefficiency.
We’re now seeing a massive push toward platform-based solutions. Businesses want a single, integrated platform that handles multiple functions, offering a holistic view of their security posture. This isn’t just a trend; it’s a fundamental shift driven by the need for simplicity, efficiency, and a unified strategy.
The lesson here is universal: No matter your industry, if you’re selling a single piece of the puzzle, you’re at risk. Your customers are tired of juggling multiple vendors, and they’re looking for partners who can provide comprehensive, end-to-end solutions.
Another major force driving this trend is AI adoption. AI is creating a perfect storm, not just in cybersecurity, but in every industry. It’s making point solutions obsolete in some instances because AI-powered platforms can perform the functions of multiple smaller tools more effectively and in an integrated way. For example, an AI-powered security platform can analyze data from your network, cloud, and endpoints simultaneously, identifying threats that a single-purpose tool would miss. AI isn’t just about automation; it’s about creating new business models that are more intelligent, efficient, and valuable to customers.
In the next 18 months, the businesses that successfully harness AI to create more valuable, integrated offerings will thrive. This either means offering a comprehensive platform that holds its own alongside the other major players or strategically positioning your offering in the hopes of being acquired by a key industry provider. Those who don’t pursue either of these options are at risk of failing. This applies regardless of which industry your organization serves.
3. A shift in boardroom priorities
Another key consideration is how purchasing decisions have changed over recent years as a result of these shifts, and how those conversations are making an impact.
The conversation around cybersecurity has moved from a technical detail to a core business priority. Board members now understand that a cyberattack can cripple operations, detrimentally impacting not only the organization, but also society. They’re no longer just asking for technical metrics; they’re asking about business resilience and continuity.
This same shift is happening across all industries. Business leaders aren’t focused on growth at all costs. Instead, they’re focused on building resilient organizations that can withstand disruptions, whether from a supply chain failure, an economic downturn, or a new competitor. The key takeaway is to connect your efforts directly to business outcomes. Don’t just talk about what your product does; explain how it protects the company, ensures operational continuity, and strengthens the brand. That’s language every executive understands.
4. From protection to transformation
The ultimate lesson from the cybersecurity industry is that your business can evolve from a reactive function to a strategic enabler. For Armis, it’s about moving beyond just protecting a company to helping it achieve its goals. By providing a resilient and secure foundation, we support businesses to innovate and grow with confidence.
In your own business, this means looking beyond your current offerings and asking: “How can we help our customers transform their business?” Maybe it’s by streamlining their operations, unlocking new markets, or creating entirely new value propositions. The businesses that will win in the future are those that not only understand market shifts but also actively help their customers navigate them.
Organizations that fail to adapt will be left behind. However, those that lead with innovation and strategically align their business with their customers’ needs will secure their place among industry leaders.
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
Sometimes, data breaches result in more than just free credit monitoring. Recently, Facebook began paying out its $725 million settlement, and AT&T is preparing to distribute $177 million. Those payouts caught scammers’ attention.
Now, fake settlement claim emails and websites are flooding inboxes. They look convincing, but behind the plain design and official-sounding language is a trap for your Social Security number, banking info and more. So how can you make sure you get your money without losing even more in the process?
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
Settlement claim websites rarely look polished. Most have generic layouts, long URLs and simple forms asking for a claim ID from your email or postcard. That makes it easy for scammers to mimic them. To test how simple it is, we created a fake settlement site (below) in minutes using AI tools like ChatGPT.
To steal your data, scammers build fake settlement sites that mimic real sites(Kurt “CyberGuy” Knutsson)
If we can do it, you can bet criminals are already exploiting the same shortcuts. Facebook has been the target. A fake site once popped up around the Equifax settlement, tricking thousands before it was shut down. The lesson? If the site appears unusual, it doesn’t necessarily mean it’s fake, but it should prompt you to double-check before entering your details or clicking on any links.
Red flags that expose fake settlement sites
Spotting a scam often comes down to noticing the little details. Watch for these common warning signs before you hand over your information.
Requests for too much personal data
If a site asks for your full Social Security number or the names of your children, stop. For example, the official Equifax settlement only requested the last six digits of SSNs. Genuine claim sites may ask for limited info (like the last four digits of your SSN), but they rarely demand complete Social Security or bank details.
Promises of payout estimates upfront
Real administrators calculate payments only after the claim period closes.
Texts or social media messages
Settlements are announced by mail or email, not through random DMs or SMS.
Fraud can be found with red flags like odd URLs, urgent countdowns, or fee requests(Kurt “CyberGuy” Knutsson)
Odd or misspelled URLs
Even one extra letter in the web address is a sign of a spoof site. Legitimate settlements use official or clearly named administrator domains. Be wary of addresses with unusual add-ons, such as “secure-pay” or “claims-pay.”
Urgent language or countdowns
Scammers rely on urgency to pressure you into acting fast. Real settlement sites don’t demand 24-hour turnarounds.
Processing fee checkboxes
A sure giveaway of a fake. Real settlement administrators never require money to file or to receive your payout.
Cheap trust badges
Scam sites often throw in fake “secure” seals. Look for recognized security seals and make sure they’re clickable and verifiable.
Generic contact info tied to the suspicious domain
Official sites list multiple, verifiable contacts. If the email or phone number matches the weird domain, that’s a red flag.
Grammar or spelling mistakes in the fine print
Sloppy errors in legal-sounding text are a classic sign you’re looking at a scam.
Start with official FTC links or mailed notices to file claims safely(Kurt “CyberGuy” Knutsson)
How to safely handle settlement claim notices
Before filing any claim, follow these steps to ensure you’re dealing with a legitimate settlement site and protecting your information.
1) Start at the FTC
The Federal Trade Commission keeps updated lists of approved class action settlements at ftc.gov/enforcement/refunds. The legitimate links always point to a .gov website. If your email sends you elsewhere, treat it with caution.
2) Cross-check with other resources
Trusted outlets often cover large settlements and include safe links. ClassAction.org is another resource for checking legitimate URLs.
3) Skip the links, use the mail
Your claim notice may include a mailing address. Sending a paper form avoids the digital phishing minefield altogether.
4) Use strong antivirus software
Strong antivirus software can block malicious links, warn you about dangerous websites and prevent malware from taking over your device.
The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.
Data removal services work to scrub your personal information from broker lists, making it more difficult for criminals to target you.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
6) Never pay to file
If a site asks for “administrative fees” or a “processing charge,” close it immediately. Real settlement administrators will never ask for money.
7) Report suspicious sites
Spot a fake? Protect others by reporting it to:
The FTC Complaint Assistant at reportfraud.ftc.gov/
The Internet Crime Complaint Center (IC3) at ic3.gov/
The Consumer Financial Protection Bureau (CFPB) at consumerfinance.gov/about-us/the-bureau/
Quick reporting helps authorities shut down scams before more people fall victim.
Can you tell a real email from a fake?
Take our quick quiz at Cyberguy.com/ScamCheck to learn how to spot phishing scams, protect your inbox, and stay a step ahead of hackers.
Kurt’s key takeaways
Class action settlements can feel like rare wins for consumers after data breaches. But scammers see them as easy hunting grounds. The best defense is skepticism. Check URLs, avoid clicking direct links and never give away details that don’t match the claim’s purpose. Your payout should help you recover, not put you at greater risk.
Have you ever received a settlement notice that felt suspicious, and how did you handle it? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Navigation apps have become an essential part of modern life. Whether you are commuting to work, running errands or exploring a new city, relying on accurate directions and real-time traffic updates can make all the difference. Over the past decade, Google Maps, Waze and Apple Maps have emerged as the dominant players in this space, each offering a distinct approach to navigation.
While millions of people rely on these apps daily, choosing the right one can depend on a variety of factors, from interface design to privacy policies. In this article, we compare these three apps across usability, accuracy, features and data handling to help you determine which one best fits your needs.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
What each app does best
Google Maps is widely regarded as the all-rounder. It combines extensive mapping data with points of interest, public transit information, Street View, Live View AR and detailed business listings. Its versatility makes it a top choice for both daily commuters and travelers.
Google Maps is a great way to explore the world with detailed routes, Street View, and real-time traffic insights.(OLIVIER DOULIERY/AFP via Getty Images)
Waze, on the other hand, is designed primarily for drivers. It thrives on community input, offering live updates about traffic jams, road hazards, accidents and even police presence. Since Google owns Waze, many Waze-style real-time alerts have now begun appearing directly inside Google Maps. While Waze still focuses on driving, this integration blurs the lines between the two apps.
Apple Maps has made major strides in recent years. Once considered the underdog, it’s now a solid choice for iOS users. Its clean interface, privacy-focused design and seamless integration with Siri, CarPlay and Apple Watch make it a convenient pick for those fully in the Apple ecosystem.
When it comes to interface, each app approaches design differently.
Google Maps provides a dense but intuitive layout, giving users access to multiple layers of information, including traffic, satellite imagery and public transit routes. Switching between driving, walking, biking and transit is straightforward, and the search functionality is robust, often displaying detailed business profiles, ratings, and hours of operation.
Waze prioritizes active driving support. Its interface is visually bold, with clear alerts for traffic jams, accidents and road hazards submitted by other users. While some may find the screen slightly cluttered, the focus is entirely on driving efficiency, which makes sense given its target audience.
Waze helps to put you on a faster route with live, community-driven alerts that help you dodge traffic jams and road hazards. (Kurt “CyberGuy” Knutsson)
Apple Maps offers a minimalist, streamlined interface that emphasizes simplicity. Searching for locations, initiating navigation, and following turn-by-turn instructions is straightforward. The app works seamlessly with iOS features like Siri and CarPlay, providing a smooth and cohesive experience for Apple users.
Navigation accuracy and performance
Accurate routing and timely traffic updates are critical.
Google Maps remains the most reliable for precise routing and travel time estimates. It combines AI-enhanced predictive routing with historical and live traffic data to suggest the best route. Its consistency holds strong across urban and rural areas alike.
Waze is unmatched for real-time rerouting. Relying heavily on crowd-sourced reports, it often detects slowdowns or hazards before Google Maps does. However, it still struggles when offline or in areas with poor data coverage.
Apple Maps has significantly improved its routing accuracy, especially in cities. Its traffic data is now crowd-sourced from millions of iPhones, processed on-device to protect privacy. In some rural or international regions, though, it can still lag behind Google Maps and Waze.
Apple Maps offers seamless use with your iPhone and CarPlay for smooth and privacy-focused navigation. (Kurt “CyberGuy” Knutsson)
Features and ecosystem integration
Beyond basic navigation, each app offers additional tools and integrations.
Google Maps offers offline maps, Live View AR navigation, multi-stop routing, EV charger locations and indoor maps for airports and malls. Integration with Gmail, Calendar and Google Assistant creates a seamless travel experience.
Waze remains focused on social and driving-specific features. You can report hazards or police sightings and even control Spotify, Audible or podcasts directly from the app without switching screens.
Apple Maps leans into privacy and ecosystem benefits. Its “Look Around” feature rivals Street View, while EV routing, cycling paths and Siri integration make it ideal for Apple fans. Apple also uses anonymized “Look Around” imagery to train its AI models, but with strict privacy safeguards like blurring faces and plates.
How these apps handle your personal data matters more than ever.
Google Maps collects detailed location and usage data to power personalization and advertising. That means better recommendations, but less privacy for users who prefer anonymity.
Waze, also owned by Google, gathers anonymized driving data to enhance community reporting. Its functionality depends on sharing your location in real time, which is necessary for crowd-sourced accuracy.
Apple Maps takes a different approach. It processes most data on-device, uses random identifiers instead of personal accounts and does not associate searches with your Apple ID. That makes it the most privacy-conscious option, though even Apple collects anonymized data for traffic and route improvements.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.
Kurt’s key takeaway
There is no single “best” navigation app, and the right choice depends on your priorities. Google Maps is ideal if you want a feature-packed, versatile app that works well for a variety of transportation modes and travel scenarios. Its global coverage and rich data make it reliable for everyday use and exploration. Waze is best if your main concern is real-time driving efficiency. Its community-driven traffic alerts and dynamic rerouting help you avoid congestion and save time during daily commutes. Apple Maps suits users deeply embedded in the Apple ecosystem who value simplicity, clean design and privacy protections. It may not have as many features as Google Maps or the same real-time edge as Waze, but its seamless integration with iOS makes it convenient.
Which navigation app do you rely on most for daily commuting, and why? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter. CLICK HERE TO GET THE FOX NEWS APP
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Iterate.ai has relied heavily on highly trained tech workers from around the globe to meet demand for its customized artificial intelligence agent systems, bringing some of them to the U.S. under the H-1B program when the company can obtain a visa.
Last month, the tech firm’s growth plans were upended when the Trump administration, via a presidential proclamation, added a $100,000 fee per visa to new petitioners of the H-1B program. It also warned that a higher-wage floor was likely, tilting the odds in favor of older and more highly-skilled workers.
“We have a number of guys on H-1B visas and a number we are trying to bring in. If we have to pay $100,000 (per worker), that makes it impossible to hire people on those types of visas,” said Jon Nordmark, CEO and co-founder of Iterate.ai, which maintains an office in Highlands Ranch.
Iterate.ai general counsel Niharika Shukla, left, talks to CEO Jon Nordmark at the artificial intelligence company’s office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)
The company, among the U.S. firms riding the AI wave, may end up locating more workers in Toronto and fewer in Denver and San Jose, California, where it is based, as it tries to meet the rising demand for its products and services, Nordmark said.
Moving beyond an initial focus on deporting immigrants with criminal records, the Trump administration is now revising rules for several visa programs used to actively recruit foreign workers to the U.S. Some of the earliest and most dramatic changes have come in the H-1B program, which currently accommodates an estimated 600,000 college-educated workers with specialized skills nationwide.
The addition of a $100,000 application fee for new H-1B petitions, alongside reforms to favor higher-wage and higher-skilled roles, could have significant implications for tech employers in states like Colorado, where younger and smaller firms dominate.
The changes could slow innovation and force smaller technology firms to locate more of their workforce outside the country, said Nathan Mondragon, chief innovation officer at Hirevue, a Utah firm that specializes in AI hiring solutions.
“The immediate effect is that the cost of hiring skilled foreign talent will rise dramatically, particularly for startups and mid-sized companies that depend on specialized skills but may not have deep resources,” said Mondragon, who is a Colorado State University graduate.
The country’s largest and most established tech firms are expected to have the easiest time covering the fee as the country moves away from a straight lottery system. Jensen Huang, CEO of the world’s most highly valued public company, pledged to pay the $100,000 fee for his company’s H-1B recruits.
“As one of many immigrants at Nvidia, I know that the opportunities we’ve found in America have profoundly shaped our lives,” Huang wrote to his employees. “And the miracle of Nvidia — built by all of you, and by brilliant colleagues around the world — would not be possible without immigration.”
Colorado’s tech sector is pushing the envelope in emerging areas like quantum computing and AI, as well as in niche sectors like cybersecurity and financial technology, or fintech. Emerging firms, lacking profits, run leaner and are typically more dependent on the flow of talent emerging from nearby universities, including international students.
If emerging tech firms can’t obtain the talent they need, they will fall behind. If the state’s tech sector starts to fall behind, Colorado’s economy could find itself coping with slower growth and smaller wage gains, those closest to the tech sector warn.
“Pay-to-play H1-Bs will box out all smaller companies, including startups, from bringing talented foreigners on board. This will give big companies another advantage in talent acquisition, as if they needed any more advantages,” said Basalt resident Jonathan Greechan, CEO of the Founder Institute, which has tech accelerator chapters in 100 countries.
Why the H-1B matters
The H-1B program, which started in 1990, is capped at 65,000 new visas for those with a bachelor’s degree and another 20,000 reserved for applicants with a master’s degree or higher. Colorado employers applied for about 3,800 H-1B visas during the last fiscal year.
About three-quarters of the workers coming to the country under the H-1B program, which typically has a three-year term, are from India, with Chinese workers accounting for one-tenth, according to a report from the Pew Research Center. The program is not for permanent residency, although employers can and do seek visa renewals, often to allow employees more time to obtain a green card or citizenship.
Educational institutions, which until recently were exempt from the cap but now will fall under it, also rely on the program. The University of Colorado’s Denver campus requested 130 visas and the Boulder campus sought 108 last fiscal year, while Denver Public Schools had 101 petitions, according to Citizenship and Immigration Services.
Nordmark said the program has historically served as a career bridge for foreign students coming to the U.S. to obtain degrees. Upon graduation, they shift from a student visa to an H-1B visa. In some cases, international students obtain multiple and highly specialized degrees until they find employment in the U.S.
Several of the country’s top tech leaders, including Google CEO Sundar Pichai, Microsoft CEO Satya Nadella and Sun Microsystems co-founder Vinod Khosla, worked under H-1B visas before rising through the ranks.
The Trump administration has argued that the H-1B program has been misused, suppressing wages and denying native workers higher-paying job opportunities. Third-party firms have used the program to place workers, taking a cut in the process, and vague job titles allow employers to bypass program rules.
Supporters point to studies that show companies, especially small ones, that employ H-1B workers have stronger earnings growth and are more likely to survive than rivals that don’t. They argue the changes being made will disadvantage the one sector that has contributed more to making the American economy great and will open the door to other countries snagging talent.
China launched a new K-visa program on Oct. 1 to recruit young science, tech and engineering workers from abroad, the kind that will find it harder to participate in the U.S. H-1B program. Canada, Germany, New Zealand, South Korea and the United Kingdom are also easing rules for foreign workers with specialized skills.
But China’s new visa program also appears to have created a backlash among unemployed Chinese workers, echoing some of the pushback seen in the U.S., and critics come from both ends of the political spectrum.
“It’s a complex issue and I can see two sides to the argument that a reasonable person could make,” said David Cohen, CEO of Techstars in Boulder. “If the talent is truly that ‘extraordinary,’ companies are likely to find a way to pay this fee in most cases.”
He worries that the U.S. could be putting at risk a core competitive advantage — “having great talent wanting to be in this country.”
The program’s new emphasis on higher wage earners, who will receive more slots in the visa lottery compared to recent college graduates, will favor older, more experienced applicants, said Ben Johnston, COO of Kapitus, a small business lender.
“Many international students come to U.S. schools with the expectation that they will be able to work here under the H-1B program upon graduation. If fewer visas are available for lower wage earners, this may curtail the demand for a U.S. education for some international students,” Johnston said.
Many of the greatest tech innovations the country has seen have come from young and hungry entrepreneurs working outside corporate confines, with young immigrants playing a critical role. Greechan said he believes the fee and wage restrictions will make the U.S. less attractive for the best and brightest talent from abroad.
“I don’t think the current administration cares how much the U.S. has benefited from this consistent influx of talent, simply because it’s not in line with their anti-immigration sentiment,” Greechan said.
And there is a psychological toll on workers. Niharika Shukla, an attorney working at Iterate.ai, said the changes have left H-1B workers in limbo as they try to navigate the country’s complicated and drawn-out process for obtaining permanent status and citizenship.
Iterate.ai general counsel Niharika Shukla poses for a portrait at the artificial intelligence company’s office in Centennial, Colorado, on Wednesday, Oct. 1, 2025. (Photo by Hyoung Chang/The Denver Post)
Initially, it wasn’t clear if the fee would apply to existing visa holders or new petitioners, creating a sense that all jobs could be at risk. Some workers who were on vacation or visiting family thought they needed to return to the U.S. immediately. The administration clarified that it was only for new petitioners.
Overall, it has created uncertainty about what comes next and a deepening sense of unease, even fear.
“I have friends — people with advanced degrees, stable jobs, American-raised kids — who still live in visa limbo. They pay taxes, work hard and give back in every way, but every year, they hold their breath during H-1B season. They don’t know if this will be the year it all unravels,” Shukla said.
Shukla’s husband came to the country on an H-1B visa, which allowed her to obtain an H-4 visa as a spouse and an employment authorization document, or EAD, that allowed her to continue her legal career in the U.S.
“If anything had happened to his visa, my legal ability to work would’ve disappeared, too,” she said.
Shukla said a friend’s daughter, who recently started middle school, asked her mom if the family would have to leave this year.
“That little girl was born here. Her whole world is here. But because her parents are still stuck in the visa queue, even she lives with uncertainty,” Shukla said. “This is the human side of immigration policy that’s so often overlooked. It’s not just about foreign workers or companies. It’s about families, children, stability. It’s about people who want to belong, but are made to feel temporary, year after year.”
Other industries watching
Employers in landscaping, tourism and agriculture are keeping an eye on what might come next for the foreign worker visa programs they rely on.
And the construction industry, which has a heavy concentration of foreign-born workers, is lobbying hard for a visa program as it struggles with stricter immigration enforcement and a looming wave of retirements.
Ski resorts and resort hotels also use that program, along with the J-1 visa, a cultural exchange program that brings in multilingual workers able to converse with international guests.
Finding enough workers to fill open landscaping positions has long been a struggle, even when firms can bring in foreign laborers. The H-2B program is capped at 66,000 new applicants a year nationally, split between 33,000 workers from Oct. 1 to March 31 and 33,000 workers from April 1 to Sept. 30.
Petitioners are cautious about asking for too many visas, which could draw scrutiny from immigration officials, McMahon said.
The program allowed for another 64,716 workers, mostly returning workers, last year. But even at 131,000, the allocation is far below the 500,000 that some estimates say are needed to meet actual demand for seasonal workers, he said.
Most H-2B visa holders work for up to nine months and then return home, although some try to bridge the two seasons. Raids by U.S. Immigration and Customs Enforcement have increasingly made authorized visa holders, including those working in Colorado for years, uneasy and asking themselves if they want to keep coming back, McMahon said.
On Sept. 2, the administration started requiring that all seasonal workers under the H-2A and H-2B programs, for agricultural and non-ag workers, have in-person interviews at a U.S. consulate location. Returning workers and those with clean records were not exempt. The rule change is expected to result in 350,000 additional interviews in Mexico alone.
In contrast to the H-2B and H-1B programs, the H-2A program for farm workers doesn’t have a cap. Around 5,000 to 6,000 workers are brought into Colorado each season under that visa. It does have additional requirements that employers provide free housing and meals or access to cooking facilities.
Unlike California, farms and orchards in Colorado have seen minimal raids from immigration enforcement, said Marilyn Bay Drake, executive director of the Colorado Fruit and Vegetable Growers Association.
Instead, a state rule that requires overtime pay after 48 hours or 56 hours, depending on the intensity of the harvest season, is complicating their operations and resulting in some H-2A visa holders going elsewhere to work.
Harvesting requires intense stretches of long hours during short windows of time to bring in and process crops, one reason that ag workers have been excluded from federal overtime requirements.
Rather than paying overtime, farmers, who often operate on razor-thin margins, are capping hours in Colorado. That has upset some workers, who want to earn as much as they can in the limited time they are in the country.
Farmworkers sort out freshly picked onions on a conveyor belt at a storage facility at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 09, 2025. (Photo by Andy Cross/The Denver Post)
“We haven’t seen impacts from immigration policy, but we have seen negative impacts from the overtime regulations in our state,” said Emily King, compliance and marketing manager at Fagerberg Produce in Eaton.
The onion farm has three H-2A workers from South Africa who operate harvesting equipment. In June of last year, one of those workers came in on a Friday to say he was resigning and would be leaving Sunday to work at a producer in Idaho who offered him 100 hours a week with no overtime restrictions, King said.
Duncan Stevens, left, a farmworker from South Africa who has an H-2A visa, drives a truck that’s getting loaded with fresh onions in 50-pound burlap sacks on a stack-loader machine, which are then emptied by a crew onto a conveyor belt into the truck on a farm at Fagerberg Produce in Eaton, Colorado, on Thursday, Oct. 9, 2025. (Photo by Andy Cross/The Denver Post)
Not only did Fagerberg Produce lose a key worker, but it had also paid for his trip to come to the U.S.
“For H-2A workers, it’s a proposition of, ‘Is it worth it to come?’ And our state overtime rules weigh heavily on that calculus. It’s magnifying and exacerbating ag’s No. 1 problem, which is access to labor,” said Ashley House, vice president of advocacy and strategy at the Colorado Farm Bureau.
Construction struggling
Tougher immigration policies are taking a toll on the construction sector, where about a third of workers are foreign-born, and which lacks a dedicated visa program.
About nine in 10 construction firms nationally report having a difficult time finding enough qualified workers to hire. They cite those labor shortages as a primary cause behind delayed construction projects, according to a survey released last month by the Associated General Contractors of America.
About one-third of respondents nationally and in Colorado said tougher immigration enforcement this year had complicated their operations.
Of the 44 Colorado contractors who took part in the survey, 5% said their work sites had been visited by immigration agents. Another 7% reported workers not showing up because of concerns over actual or rumored enforcement actions. Close to a quarter of the firms surveyed said their subcontractors had lost workers, according to the AGC.
A construction crew works on a roof in Loveland, Colorado, on Monday, July 14, 2025. (Photo by AAron Ontiveroz/The Denver Post)
Anirban Basu, chief economist with the Associated Builders and Contractors, another construction trade group, said that construction spending and new starts are down. Between July and August, the number of job openings in construction took a dramatic fall, from 303,000 to 180,000, and the number of construction workers quitting shot up from 90,000 to 146,000.
“Shifting immigration policy also plays a part in shaping the data. More workers have been quitting, and that may reflect undocumented workers leaving their positions,” Basu said. “An increase in hiring is a natural response to an increase in quits, but many contractors appear to be embracing the attrition and not immediately replacing departing workers.”
To help alleviate the labor shortfalls, the AGC has thrown its full support behind the Essential Workers for Economic Advancement, a bipartisan bill introduced by Rep. Lloyd Smucker, R-Pennsylvania. The bill seeks to create a new H-2C visa program to address labor shortages in nonagricultural, less-skilled, year-round jobs.
General contractors, hotels, retailers and long-term care facilities are expected to be the employers using the program, which would offer 65,000 visas a year for three-year terms.
“Establishing a visa program for construction occupations provides the kind of lawful, temporary, traceable and taxable pathway needed to serve as a short-term solution while we rebuild the domestic pipeline for preparing new construction workers,” the AGC said in a news release.
The group, which represents 28,000 member firms, said it would throw its full weight behind having the act get passed and having President Donald Trump sign it swiftly once it does.
Construction robots are no longer a far-off idea. They’re already changing job sites by tackling repetitive, heavy, and often dangerous tasks. The latest robot comes from Australia, where a spider-like machine named Charlotte is making headlines.
Charlotte is designed to 3D print an entire 2,150-sq-ft home in just one day. That’s equivalent to the speed of more than 100 bricklayers working simultaneously. This offers a glimpse into how the future of housing might be constructed.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Charlotte the robot 3D prints homes in just 24 hours using eco-friendly materials. (Crest Robotics)
How Charlotte the robot works
Charlotte is a collaboration between Crest Robotics and Earthbuilt Technology. The robot doesn’t simply stack bricks or tie rebar. Instead, it uses a giant extrusion system that lays down eco-friendly material in layers.
That material comes from sand, crushed brick and recycled glass, all locally sourced. The result? A structure that’s fireproof, floodproof and created with a far smaller carbon footprint than traditional building methods.
This 3D printing construction robot stands out for its unique mix of speed, strength, versatility and affordability.
Speed: Prints a home in 24 hours.
Strength: Uses durable, sustainable materials.
Versatility: Can raise itself on spider-like legs to keep building higher walls.
Affordability: Cuts out many of the expensive steps in construction.
While Charlotte is still in the development phase, a scaled-down prototype has already been showcased. Researchers believe it could help solve housing shortages where labor is scarce and construction costs are skyrocketing.
Its spider-like legs let it climb and build higher, cutting costs and saving time. (Crest Robotics)
The future of 3D printed moon bases beyond Earth
Charlotte’s creators also have their eyes set on the stars. They imagine future versions of the robot building moon bases for research and exploration. With its compact design and autonomous operation, Charlotte could adapt to the extreme environments of space just as well as it can to the challenges on Earth.
If Charlotte delivers on its promise, it could reshape how homes are built worldwide. Faster construction means quicker housing availability. Lower costs and sustainable materials mean more affordable homes with a smaller environmental impact. For anyone facing rising housing prices or construction delays, technology like Charlotte may bring a ray of hope.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz
Future versions may even construct Moon bases for research and exploration. (Crest Robotics)
Kurt’s key takeaways
Charlotte may be years away from building its first full-scale home, but its prototype already points toward a future where robots take on critical roles in construction. From tackling housing crises on Earth to building shelters on the moon, Charlotte shows how robotics and 3D printing can work together to solve real problems.
Would you live in a home 3D printed by a robot like Charlotte, or even in one built on the moon? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.