ReportWire

Tag: TECH

  • Flying drones take aim at retail theft

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Shoplifting has long been a challenge for retailers, but a U.S. company now believes that flying drones could help combat the issue. Flock Safety, best known for its law enforcement camera systems, is promoting its new Flock Aerodome Drone as an Automated Security system to the private sector. The idea is simple: if a theft occurs, a drone launches, follows the suspect, and streams live video back to security teams or even police. With theft rates reportedly climbing 93% in 2024, the push for high-tech security has never been stronger.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter  

    An example of a Flock Safety drone, ready to follow theft suspects within seconds (Flock Safety)

    How the drones would work

    Instead of dispatching a guard, Flock’s drones could launch within seconds after motion is detected. Equipped with HD and thermal cameras, the drones can zoom in, track suspects, and relay real-time visuals.

    The company says the system:

    • Covers up to 38 square miles with a single dock
    • Integrates with existing security alarms and camera systems
    • Operates with FAA safety approvals and built-in geofencing
    • Reduces costs by replacing the need for multiple guards

    In theory, the drones act as a “guard in the sky,” providing retailers with rapid coverage across large areas, such as malls, warehouses, or ports.

    Equipped with HD and thermal cameras, the drones track movement across wide areas

    The drone is equipped with HD and thermal cameras; they track movement across wide areas in order to follow suspects. (Flock Safety)

    TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS

    Why retailers may be interested

    Organized retail crime is a growing problem. Retailers have been reporting higher losses, tighter budgets, and fewer staff members available. Flock Safety argues its drone system can act as a deterrent simply by being visible, making criminals think twice before targeting a store. Beyond retail, the company is also pitching its drones to operators of hospitals, warehouse sites, and energy facilities that require large-scale surveillance.

    Retailers may soon rely on drones as a visible deterrent against organized theft

    Due to the drones’ helpful technologies, retailers may soon rely on them as a visible deterrent against organized theft. (Flock Safety)

    HEGSETH TEARS UP RED TAPE, ORDERS PENTAGON TO BEGIN DRONE SURGE AT TRUMP’S COMMAND

    What this means for you

    For shoppers, this could mean visiting stores where drones are part of the security landscape. You might notice them overhead at malls or parking lots, watching for unusual activity. While some may view this as an added safety measure, others may worry about increased surveillance and loss of privacy. For retailers, drones could help protect profits, staff, and customers without the rising costs of hiring additional guards. But whether customers welcome drones buzzing around remains to be seen.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

    Kurt’s key takeaways

    Technology is quickly reshaping how companies approach security, and drones may soon play a bigger role in everyday shopping environments. With faster response times, broader coverage, and lower staffing costs, the idea has clear appeal for retailers. At the same time, questions about privacy and public acceptance will influence the extent to which this technology is adopted.

    Would you feel safer shopping under drone surveillance, or would it make you uncomfortable? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Arizona sheriff’s office utilizing new AI program to assist with writing case reports

    [ad_1]

    NEWYou can now listen to Fox News articles!

    As artificial intelligence becomes more mainstream, the Pima County Sheriff’s Department is looking at how it can use the emerging technology.

    At the beginning of the year, deputies began a trial of Axon’s Draft One, which is a program that writes incident reports using AI. A body camera records the interactions, then the program uses the audio plus any additional information from the deputy to create a first draft. Deputies then review everything before submitting the final report.

    “They’re able to verify the completeness, the accuracy and all of that,” Capt. Derek Ogden said, “But the initial first draft, they can’t submit as their case report.”

    Demonstrating the program, Deputy Dylan Lane showed how Draft One can write a case report that would have taken him 30 minutes to complete in five minutes.

    CHATGPT MAY ALERT POLICE ON SUICIDAL TEENS

    A Pima County deputy opens Draft One to begin writing his case report. After it’s finished, he will check it for accuracy before submitting it. (Amalia Roy)

    “Most of that time is just the quick changes, making sure that all the information is still accurate and then just adding in those little details,” Lane said.

    Ogden said Draft One saves crucial time during shifts when deputies are handling multiple incidents back-to-back. He said the program is one of several ways the department is exploring AI tools.

    Police report written by AI

    Draft One writes a case report using the recording from an Axon body camera. (Amalia Roy)

    “Recently, we saw a detective from our criminal investigative division use AI to identify a deceased unidentified person,” Ogden said. “We’re also looking for ways to increase the productivity and efficiency of our patrol deputies and some of our corrections officers.”

    Law enforcement agencies across the country are evaluating how artificial intelligence could help their departments, especially when dealing with resource shortages.

    SCHOOLS TURN TO AI GUN DETECTION FOR SAFETY

    “A lot of policing agencies are budget constrained. It is very attractive to them to have a tool that could allow them to do more with less,” said Max Isaacs from The Policing Project, which is a non-profit within NYU School of Law that studies public safety and police accountability. 

    Isaacs said while AI offers opportunities to save resources, there’s not much data on how much help these programs truly provide.

    Body camera on officer

    A Pima County deputy wears an Axon body camera in a simulation of an emergency call. (Amalia Roy)

    “You have a lot of examples of crimes being solved or efficiencies being realized,” Isaacs said, “But in terms of large-scale studies that rigorously show us the amount of benefit, we don’t have those yet.”

    TRUMP SIGNS EXECUTIVE ORDER TO HARNESS AI IN FIGHT AGAINST CHILDHOOD CANCERS

     Isaacs also raised the issue of accuracy. 

    “AI is not perfect. It can rely on data that is flawed. The system itself could be flawed. When you have errors in AI systems, that can lead to some pretty serious consequences. It can lead to false arrests. It could lead to investigators going down a dead end and wasting time and resources,” Isaacs said.

    Addressing those concerns, Ogden agreed that information can be flawed. He said it’s why human eyes must review every report written with Draft One.

    After a successful trial with 20 deputies, Ogden said the next step is to expand Draft One to corrections officers.

    CLICK HERE TO GET THE FOX NEWS APP

    [ad_2]

    Source link

  • You’ll never trust video again once you see what Sora 2 can do

    [ad_1]

    NEWYou can now listen to Fox News articles!

    I have to tell you about Sora 2. It’s OpenAI’s new video-generating app that’s both mind-blowing and terrifying.

    It’s the first tool from any AI company that lets you give it a prompt, and, in literally seconds, you get a full-blown, AI-generated video up to a minute long. 

    The results aren’t perfect, but they’re close. Like Hollywood close. 

    LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

    The lighting, camera motion, facial expressions. … It’s all shockingly realistic. 

    AI videos surge in light of the new Sora 2 video-generating app. (iStock)

    Want to see a golden retriever surfing through Times Square in slow motion? Done. A drone shot of a city being built out of clouds? Easy. 

    Dead celebrities

    People are using Sora 2 to generate fake videos of dead celebrities doing things they never did. 

    • JFK is deepfaked into a WWE superstar.
    • Tupac appears with Mr. Rogers talking about respect.
    • Stephen Hawking is attacked in the UFC. Warning: I knew this was all AI, but it was still upsetting to watch. Weird, right?
    • Even Sam Altman, CEO of OpenAI, is shoplifting GPUs from Target.

    SEN SANDERS: AI MUST BENEFIT EVERYONE, NOT JUST A HANDFUL OF BILLIONAIRES

    I’m sure you know that under U.S. law, “defaming” someone only applies to living people, not the dead. That means families and estates have no legal recourse when someone uses AI to humiliate or misrepresent their loved one. It’s a free-for-all right now, and no one’s accountable. 

    Even creepier?  

    Photo of Sora artificial intelligence app on a phone with the Open AI logo in the background

    In this photo illustration, a smartphone screen shows the Sora 2 app icon developed by OpenAI, in front of the company’s logo, Oct. 8, 2025, in Chongqing, China. (Cheng Xin/Getty Images)

    Sora is also being used for stalking and impersonation. All it takes is a photo, and you can make a video of anyone doing anything. Fake crimes, revenge content, political lies. It’s all possible. 

    Zero guardrails

    DEMOCRATS DEMAND ‘ROBOT TAX’ AS AI REPORTEDLY THREATENS TO REPLACE 100M US JOBS

    OpenAI says you need permission to use a person’s face or voice. Yeah, like that’s going to stop someone.  

    If the guy who runs OpenAI can’t stop his own face from being misused, what chance do the rest of us have? 

    Right now, you can only get Sora 2 as an iPhone app. You’ll need an OpenAI account, and it’s still invite-only, so most people don’t have access yet.  

    Sam Altman speaking into a microphone

    Sam Altman, CEO of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)

    Sora 2 is an incredible tool. But it’s being abused, and the guardrails are flimsy at best. So, from now on, when a video goes viral, you better assume it’s fake until proven real.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio: Airing on 500+ stations across the U.S. Find yours or get the free podcast.
    • Daily newsletter: Join 650,000 people who read the Current (free!)
    • Watch: On Kim’s YouTube channel

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

    [ad_2]

    Source link

  • Scammers now impersonate coworkers, steal email threads in convincing phishing attacks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals are getting smarter every day, and one of their most convincing tricks is disguising phishing emails to look like they’re coming from people you trust. Work emails are particularly dangerous because they lower your guard. After all, if the sender is your boss or IT department, why would you suspect anything? Unfortunately, scammers know this and use it to their advantage. I recently received an email from Krysti from Rockwall, Texas, who highlighted a similar issue.

    “I received a spam email from my employer’s email. It had a document attached to it. I tried to open it and could not. I contacted my employer and they told me they hadn’t sent me anything. I changed my password and ran a virus scan. I also have been checking on the dark web for anything coming up on me. So far everything is okay. I did sign up for antivirus software based on your recommendation and we are signed up for identity theft protection. Is there anything else I should do?”

    Incidents like this are more common than many realize, Krysti. And while it sounds like you took the right first steps by changing your password, scanning for malware and monitoring for identity misuse, there are a few additional precautions worth taking. A close call is often a warning sign that your digital habits might need tightening. Let’s break down why these attacks are so dangerous and what everyone should do to make sure they’re fully protected.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    Phishing emails often look like they come from someone you know, making them harder to spot. (Kurt “CyberGuy” Knutsson)

    Why work email scams are so dangerous

    Phishing attempts that impersonate coworkers or employers are particularly effective because they rely on trust and urgency. You’re more likely to open an attachment or click a link if you believe it’s tied to your job. Scammers often spoof legitimate email addresses or use addresses that look almost identical to the real ones, hoping you won’t notice the subtle difference.

    Once you interact with these emails, the risks multiply. Opening a malicious attachment could install spyware or ransomware. Clicking a fake link might lead to a login page designed to harvest your credentials. Even if nothing obvious happens right away, attackers could still be collecting background information to use in a future attack.

    These scams are becoming harder to spot, too. Some are powered by artificial intelligence-generated text, making them free of the usual grammar mistakes that used to be obvious red flags. Others use stolen email threads to insert themselves into ongoing conversations. That’s why even seasoned professionals fall for them.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    A man in a white shirt uses a smartphone, focusing on the screen as he taps with one hand.

    Opening a fake attachment can secretly install malware or spyware on your device. (Kurt “CyberGuy” Knutsson)

    What to do immediately after a close call

    Changing your password or running a malware scan is often not enough to stop attackers. It’s worth going a little further to make sure nothing slipped through. Start by checking your login history to see if there are any unauthorized sign-ins on your email or work accounts.

    Most platforms allow you to review recent activity, including device type and location, and if anything looks suspicious, sign out of all sessions immediately and change your password again. Next, enable two-factor authentication on your email and any other critical accounts. Even if attackers manage to steal your password, they won’t be able to gain access without the second verification step.

    It’s also important to alert your IT team, especially if the email appears to come from your employer’s address. This could mean the company’s email system has been compromised, and notifying them will allow them to investigate and secure other accounts if necessary. Finally, make sure all your software is up to date. Malware often exploits vulnerabilities in outdated systems, so regularly updating your operating system, antivirus and productivity tools adds another layer of protection against future attacks.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Close-up of a person typing on a laptop keyboard, with a computer monitor in the background.

    Work email scams are rising, and even experienced professionals can get fooled. (Kurt “CyberGuy” Knutsson)

    7 ways to check if your device or data is compromised

    Some cyber threats don’t reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they’ve stolen. The following steps are actions anyone can take to make sure their device and personal data remain secure, and to catch any signs of compromise before they turn into serious problems.

    1) Consider a personal data removal service

    The more personal information about you that’s publicly available, the easier it is for scammers to target you. Data removal services can help by scanning hundreds of data broker websites and removing your details from them. Reducing this digital footprint not only makes it harder for attackers to build profiles on you but also limits how easily phishing attempts can be tailored to your life.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS 

    2) Monitor for already exposed personal data

    Your information could already be circulating in breach dumps and underground markets without you realizing it. Identity protection services monitor known dark-web sources, forums and leak sites for your email, phone, SSN and other sensitive details. If they find a match, they alert you so you can act quickly: change passwords, turn on two-factor authentication, and place fraud alerts or credit freezes with the credit bureaus.

    Your information might already be circulating in dark web marketplaces without you realizing it. Identity theft protection services can help by continuously scanning those underground sites for your email, passwords or other sensitive details. If your data does show up, these services notify you right away so you can reset credentials, freeze accounts or take other protective actions before the information is misused.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    3) Watch for suspicious financial activity

    Even if you never shared payment details, attackers may attempt account takeovers or fraudulent transactions using any information they have. Review your bank, credit card and online account statements frequently for unusual activity. Pairing this habit with identity theft protection tools gives you an added safety net, as they often include financial monitoring and fraud alerts to catch problems quickly. 

    4) Review connected accounts

    Email accounts are often the central hub for many other services. If your inbox is compromised, attackers might try to break into linked accounts such as cloud storage, messaging apps or collaboration tools. Check each of these services for unfamiliar logins, permission changes or device activity, and secure them by changing passwords and enabling two-factor authentication. 

    5) Use a password manager

    Weak or reused passwords are one of the easiest ways for attackers to break into accounts after a breach. A password manager solves this by generating and storing strong, unique passwords for every site you use. It also acts as a passive phishing detector. If the tool doesn’t autofill a login form, that’s a sign the page could be fake. Over time, this significantly reduces your risk of falling victim to credential-based attacks.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Install reliable antivirus protection

    Modern cyber threats go beyond viruses. A strong antivirus solution now acts as a full security layer, blocking phishing websites, detecting malicious scripts and stopping suspicious activity before it can compromise your device. If you’ve interacted with a suspicious attachment or link, a reputable antivirus tool can catch malware that might still be hiding in the background.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Enable account alerts

    Most major platforms allow you to turn on alerts for unusual account activity, such as new sign-ins, password resets or changes to security settings. These real-time notifications act as an early warning system, giving you a chance to lock down your accounts before significant damage occurs.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    Close calls like this are unsettling, but they are also valuable wake-up calls. Cybercriminals are constantly refining their tactics, and phishing emails that once looked laughably fake can now be nearly indistinguishable from the real thing. The key is to build layers of defense, not just reactive steps after an incident, but proactive habits that make you a harder target in the first place.

    Have you ever clicked on an email that turned out to be a scam? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 5 Ways Smart Landlords Manage More Units With Less Effort

    [ad_1]

    Growth in real estate is often painted as a double-edged sword. On one hand, more units mean more revenue and greater portfolio value. On the other hand, every new property seems to multiply the late-night calls, rent collection headaches, and maintenance requests piling up faster than they can be handled. For many landlords, the idea of doubling their doors teeters between feeling like a life-changing opportunity and burnout waiting to happen.

    But the smartest landlords are opting out of manual, fragmented systems, and choosing to manage smarter. Instead of adding more spreadsheets, sticky notes, or staff hours, forward-thinking landlords are accomplishing more with less stress using automation, centralized dashboards, and data-driven insights that reveal not just what’s happening in their business, but why.

    I’ve seen this shift firsthand in the data flowing through our RentRedi platform. Smart investors are adopting intelligent systems that not only reduce day-to-day friction, but also enable them to grow sustainably, with the ability to expand their portfolios without expanding their stress.

    Work smarter, not harder

    When smart landlords automate processes, it creates a foundation of predictability for their business. For instance, renters who go through our automated tenant screening process submit rent earlier—17 days faster, on average—and are more likely to pay on time, with rates seven percentage points higher than those without screening.

    Additionally, growth-minded landlords automate tenant screening and maintenance coordination to save time while scaling reliably. Automating background, credit, and rental history checks reduces administrative work, minimizes human error, and facilitates faster, more informed leasing decisions. Likewise, centralized maintenance tools track work orders and vendor schedules in real time, reducing follow-ups and preventing small issues from translating into extra hours or operational headaches.

    2. Smart landlords centralize their operations

    Every rental business produces valuable information through rent payments, lease timelines, maintenance requests, and tenant communication. When doing things manually, this information is scattered across emails, texts, and bank statements, making it hard to use in any meaningful way.

    That’s why having organized, accessible data is so powerful. When all this activity is pulled into a single system, it stops being fragmented noise and starts becoming usable intelligence. Smart landlords leverage this data to spot trends—like a property with rising maintenance costs, or a tenant consistently paying late—and take action before those issues erode profitability.

    Instead of relying on gut instinct, growth-minded landlords approach their portfolio the way professional investors do, by using data to guide decisions. Tracking trends in late payments, lease renewals, or maintenance costs reveals which properties are performing well and which may need attention.

    By automating workflows, centralizing data, leveraging mobile tools, and treating information as a true business asset, savvy landlords expand portfolios while reducing their day-to-day burden. Smart landlords build a business that works as intelligently as they do.

    [ad_2]

    Ryan Barone

    Source link

  • She helped North Korea infiltrate American tech companies

    [ad_1]

    NEWYou can now listen to Fox News articles!

    This isn’t a ripped-from-the-headlines new Netflix series. This really happened in a quiet neighborhood called Litchfield Park that’s about a 20-minute drive from Phoenix.

    Christina Chapman, 50, looked like your average middle-aged suburban woman. But inside her humble home? A secret cyber ops center built to help North Korean IT workers buy equipment and tools for their military by infiltrating hundreds of U.S. companies. 

    WOMAN LEARNS FATE AFTER DOJ GUILTY PLEA ADMITTING SHE HELPED NORTH KOREAN TECH WORKERS INFILTRATE US COMPANIES

    Christina Chapman, 50, of Litchfield Park, Ariz., set up a massive cyber operation that helped North Korean actors infiltrate U.S. companies. (Department of Justice)

    That picture above was just a small part of her setup.

    North Korean workers aren’t browsing LinkedIn or applying at Google, Amazon and Meta. They can’t. Sanctions block them from working for American companies, at least legally. So what do they do? 

    They steal real Americans’ identities, including names, birth dates, Social Security numbers and more. Then, they use them to pose as remote IT workers, slipping into U.S. companies under anyone’s radar.

    But when companies send out laptops and phones to their “remote new hires”? Those devices can’t exactly be shipped to Pyongyang.

    Enter Christina

    Over the course of three years, Christina turned her suburban home into a covert operations hub for North Korea’s elite cybercriminals.

    She received more than 100 laptops and smartphones shipped from companies all across the U.S. These weren’t no-name startups. We’re talking major American banks, top-tier tech firms and at least one U.S. government contractor. 

    All thought they were hiring remote U.S.-based workers. They had no idea they were actually onboarding North Korean operatives.

    Once the gear arrived, Chapman connected the devices to VPNs, remote desktop tools like AnyDesk and Chrome Remote Desktop, and even rigged up voice-changing software. 

    The goal? To make it seem like the North Koreans were logging in from inside the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea.

    NORTH KOREA LASHES OUT AFTER TRUMP DOJ EXPOSES MASSIVE IT INFILTRATION SCHEME

    Christina Chapman DOJ scene photo

    Chapman’s fake employees “showed up” from halfway around the world every day, siphoning American cash and technology directly into the Kim regime. (Department of Justice)

    Follow the money

    These fake employees “showed up” every day, submitting code, answering emails, taking meetings, all from halfway around the world. In reality, they were siphoning U.S. tech and cash straight into Kim Jong Un’s regime.

    When HR teams requested video verification, Chapman didn’t blink. 

    She jumped on camera herself, sometimes in costume, pretending to be the person in the résumé. She ran the whole operation like a talent agency for cybercriminals, staging fake job interviews, coaching the operatives on what to say and even laundering their salaries through U.S. banks.

    Her take? At least $800,000, paid as “service fees.”

    The total haul for North Korea? Over $17 million in stolen salaries, according to the FBI, which called the scheme a national security threat. Chapman called it “helping her friends.” Really.

    KIM JONG UN’S YOUNG DAUGHTER BEING GROOMED TO LEAD REGIME AFTER MILITARY PARADE VISIT IN CHINA: EXPERT

    North Korea flag next to barb wire

    North Korea netted over $17 million in stolen salaries, courtesy Chapman’s scheme. (Edgar Su/Reuters)

    Eventually, the scam began to unravel. Investigators noticed odd patterns like dozens and dozens of remote hires all listing the same Arizona address, or company systems being accessed from countries the workers supposedly had never visited.

    Chapman was arrested and sentenced in July 2025 to 102 months in federal prison.

    And the wildest part? She did it all from her living room. Talk about working from home! 

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.
    • Daily newsletter: Join 650,000 people who read the Current (free!)
    • Watch: On Kim’s YouTube channel

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

    [ad_2]

    Source link

  • Deloitte was caught using AI in $290,000 report to help the Australian government crack down on welfare after a researcher flagged hallucinations | Fortune

    [ad_1]

    Deloitte’s member firm in Australia will pay the government a partial refund for a $290,000 report that contained alleged AI-generated errors, including references to non-existent academic research papers and a fabricated quote from a federal court judgment. 

    The report was originally published on the Australian government’s Department of Employment and Workplace Relations website in July. A revised version was quietly published on Friday after Sydney University researcher of health and welfare law Chris Rudge said he alerted media outlets that the report was “full of fabricated references.”

    Deloitte reviewed the 237-page report and “confirmed some footnotes and references were incorrect,” the department said in a statement Tuesday.

    Deloitte did not immediately respond to Fortune’s request for comment.

    The revised version of the report includes a disclosure that a generative AI language system, Azure OpenAI, was used in its creation. It also removes the fabricated quotes attributed to a federal court judge and references to nonexistent reports attributed to law and software engineering experts. Deloitte noted in a “Report Update” section that the updated version, dated September 26, replaced the report published in July. 

    “The updates made in no way impact or affect the substantive content, findings and recommendations in the report,” Deloitte wrote.

    In late August the Australian Financial Review first reported that the document contained multiple errors, citing Rudge as the researcher who identified the apparent AI-generated inaccuracies. 

    Rudge discovered the report’s mistakes when he read a portion incorrectly stating Lisa Burton Crawford, a Sydney University professor of public and constitutional law, had authored a non-existent book with a title outside her field of expertise.

    “I instantaneously knew it was either hallucinated by AI or the world’s best kept secret because I’d never heard of the book and it sounded preposterous,” Rudge told The Associated Press on Tuesday. 

    The Big Four consulting firms and global management firms such as McKinsey have invested hundreds of millions of dollars into AI initiatives to develop proprietary models and increase efficiency. In September, Deloitte said it would invest $3 billion in generative AI development through fiscal year 2030. 

    Anthropic also announced a Deloitte partnership on Monday that includes making Claude available to more than 470,000 Deloitte professionals.

    In June, the UK Financial Reporting Council, an accountancy regulator, warned that the Big Four firms were failing to monitor how AI and automated technologies affected the quality of their audits. 

    Though the firm will refund its last payment installment to the Australian government, Senator Barbara Pocock, the Australian Greens party’s spokesperson on the public sector, said Deloitte should refund the entire $290,000.

    Deloitte “misused AI and used it very inappropriately: misquoted a judge, used references that are non-existent,” Pocock told Australian Broadcasting Corp. “I mean, the kinds of things that a first-year university student would be in deep trouble for.”“The matter has been resolved directly with the client,” a spokesperson from Deloitte Australia told TheAssociated Press.

    Fortune Global Forum returns Oct. 26–27, 2025 in Riyadh. CEOs and global leaders will gather for a dynamic, invitation-only event shaping the future of business. Apply for an invitation.

    [ad_2]

    Nino Paoli

    Source link

  • Opinion | Japan Gets New Kind of Leader

    [ad_1]

    Sanae Takaichi, a hawkish nationalist, wants to make her country great again.

    [ad_2]

    Walter Russell Mead

    Source link

  • How a single MacBook compromise spread across a user’s Apple devices

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We trust Macs to be reliable, secure, and mostly resistant to viruses. Apple’s software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there is some truth to that, it does not mean that Macs are immune. Modern malware is smarter, more targeted, and often designed to slip past built-in defenses quietly. Recently, I heard from Jeffrey from Phoenix, AZ, who’s been dealing with this exact situation.

    “I used a MacBook at work and noticed it was performing oddly. I didn’t use an Apple ID on that machine per company protocol. But I had personal devices that I could work from that are now infected. The notepad, maps, and home, among others, seem to be getting hung up. I’ve tried to advise Apple but have had little success. It’s completely taken over my devices, and I don’t know how to resolve this.”

    If your Mac has started acting strange, you are not alone, Jeffrey. Malware infections are more common than many Mac users realize, and spotting them early can make all the difference. Let us break down how to tell if your system is compromised, what protections Apple already provides, and the steps you should take to keep your data safe. If you’re a Windows user facing similar issues, check out our guide: What to do if you think your PC has a virus for step-by-step help.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Mac malware often hides in the background, making it hard to spot at first. (Kurt “CyberGuy” Knutsson)

    Signs your Mac might be infected

    Spotting malware on macOS is not always straightforward. Many threats are designed to stay hidden, running quietly in the background while collecting data or opening a backdoor for attackers. Still, there are a few red flags that usually signal something is wrong.

    One of the first signs is slower performance or frequent overheating. If your Mac suddenly takes a long time to boot, runs hot during light tasks, or lags when performing simple actions, it might be doing more behind the scenes than you realize. Apps that crash or freeze more often than usual are another warning sign. Occasional app failures are normal, but if built-in tools like Safari, Notes, or Mail begin acting unstable, it may point to malicious interference.

    It is also worth paying attention to what is happening under the hood. Checking Activity Monitor for unknown processes or unusually high CPU or memory usage can reveal malware that tries to hide itself with random or unfamiliar names. Redirected web traffic is another classic symptom. If your browser takes you to strange websites, shows pop-ups, or installs new extensions you never approved, adware or spyware might already be present.

    Finally, unexplained changes to your security settings should always raise suspicion. If you notice your firewall turned off, privacy permissions modified, or login items appearing without your knowledge, something could have gained unauthorized control of your system.

    SHAMOS MALWARE TRICKS MAC USERS WITH FAKE FIXES

    Apple logo glows on the front of an Apple Store building at night.

    Strange app behavior, pop-ups, or overheating may signal something’s wrong (Kurt “CyberGuy” Knutsson)

    How macOS protects you by default

    Apple has built several layers of defense into macOS, many of which run silently in the background to keep your system secure. Knowing how they work can help you understand what protections are already in place and where you might still need to add more safeguards.

    Gatekeeper is one of the most important built-in security tools. It checks every app before it runs to make sure it comes from a verified developer, warning or blocking you if the app is not trusted. Another layer of defense is XProtect, Apple’s built-in malware scanner. It updates automatically and can stop many known threats from running, although it is not as thorough as specialized antivirus software.

    System Integrity Protection, or SIP, is another important safeguard. It locks down critical system files and processes so that malware cannot tamper with them even if it gains access. macOS also uses sandboxing and strict permission controls to contain threats. Apps run in isolated environments and must explicitly request permission to access sensitive data such as your camera, files, or location.

    Together, these features make it significantly harder for malicious software to infect your Mac or cause serious damage. However, they are not perfect. Attackers are constantly developing new techniques to bypass these protections, and many threats rely on human error rather than technical exploits. That is why taking additional precautions is still essential, even on a Mac.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Person typing on a laptop at a desk with computer monitors in the background.

    Even Apple’s built-in protections can miss new or advanced threats (Kurt “CyberGuy” Knutsson)

    What to do if your Mac is already infected

    If you find yourself dealing with a Mac that’s already compromised these steps can help you get back in control:

    1) Disconnect from the internet immediately

    Unplug Ethernet or turn off Wi-Fi and Bluetooth. This prevents malware from sending more data out or pulling in additional malicious code.

    2) Back up your important files safely

    Use an external drive or cloud service you trust. Avoid copying entire system folders-just grab personal documents, photos, and files you can’t replace. You don’t want to back up the malware along with them.

    3) Boot into Safe Mode

    Restart your Mac and hold the Shift key. Safe Mode prevents some malware from launching and makes it easier to run cleanup tools.

    4) Run a trusted malware removal tool

    While macOS includes XProtect, you may need something more powerful. A strong antivirus program can detect and remove infections. Run a full system scan to catch hidden threats.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    5) Check your login items and Activity Monitor

    Review what apps are set to launch at startup and remove anything you don’t recognize. If you spot unfamiliar processes hogging resources, don’t just guess. Use our guides at Cyberguy.com/LockUpYourTech to compare what’s safe and learn how to shut down anything suspicious before it causes more trouble.

    6) Consider a clean reinstall of macOS

    If malware persists, wiping your system may be the only option. Erase your Mac’s drive and reinstall macOS from scratch. Restore only the clean files you backed up earlier.

    7) Secure your other devices

    If your iPhone, iPad, or other personal devices are showing strange behavior, run security scans, update their software, and reset key passwords. Malware can sometimes spread through shared Wi-Fi networks, cloud accounts, or files.

    8) Reset key passwords and enable two-factor authentication

    Even after cleanup, assume some of your data may have been exposed. Update your Apple ID, email, banking, and work accounts with strong, unique passwords. Turn on 2FA wherever possible.

    9) Get professional help if needed

    If you’re overwhelmed, you can bring your Mac to an Apple Store for in-person help at the Genius Bar, or schedule a free appointment with Apple Support.

    Person working on a MacBook at a white desk with a smartphone and pen nearby.

    Simple steps like scanning, updating, and using strong passwords can keep your data safe (Kurt “CyberGuy” Knutsson)

    7 ways to keep your Mac from getting infected

    Some cyber threats do not reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they have stolen. These steps can help you strengthen your defenses and reduce the chances of future infections.

    1) Install strong antivirus software

    macOS’s built-in protections are useful but basic. A strong antivirus adds an extra layer by detecting threats in real time, blocking malicious downloads, and even identifying new types of malware before they spread. A strong antivirus also scans email attachments and browser activity, areas where many Mac users are most vulnerable.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Consider a personal data removal service

    Many cyberattacks begin with information freely available online. A data removal service scrubs your personal details from broker sites, reducing the chances of targeted attacks or identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    3) Use a password manager

    Many malware attacks rely on stolen credentials rather than technical exploits. A password manager stores unique, complex passwords for every account and can automatically flag weak or reused ones. It also helps protect you from phishing attempts because it will only autofill passwords on legitimate websites.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4) Enable two-factor authentication

    Even if someone steals your password, two-factor authentication (2FA) makes it much harder for them to access your accounts. It adds an extra step to the login process, requiring a code from your phone or a security key.

    5) Keep macOS and apps updated

    Outdated software is a common entry point for malware. Updates often patch vulnerabilities that attackers could exploit, so turning on automatic updates for both macOS and third-party apps is an easy but effective defense.

    6) Review login items and background processes

    Malware often tries to run at startup so it can operate undetected. Regularly check System Settings to make sure only trusted apps are launching automatically, and use Activity Monitor to investigate anything suspicious.

    7) Use identity theft protection

    If your personal data has already been exposed, an identity theft protection service can monitor for suspicious activity, alert you to breaches, and help you recover quickly if something does go wrong. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Macs have a reputation for being safer than other computers, but that does not mean they are untouchable. Malware has evolved to target macOS more aggressively than ever, and many attacks now rely on tricking users rather than breaking through security software. If your device is behaving strangely, taking action early is the best way to prevent deeper damage.

    How important is cybersecurity when choosing the devices you use every day? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Leaked Meta documents show how AI chatbots handle child exploitation

    [ad_1]

    NEWYou can now listen to Fox News articles!

    An internal Meta document sheds light on how the company is training its AI chatbot to handle one of the most sensitive issues online: child sexual exploitation. The newly unearthed guidelines detail what’s permitted and what’s strictly forbidden, offering a rare look into how Meta is shaping its AI behavior amid government scrutiny.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    META STRENGTHENS TEEN SAFETY WITH EXPANDED ACCOUNTS

    Meta’s leaked AI guidelines show how contractors train chatbots to reject harmful requests. (Meta)

    Why Meta’s AI chatbot guidelines matter

    According to Business Insider, these rules are now in use by contractors testing Meta’s chatbot. They arrive just as the Federal Trade Commission (FTC) is investigating AI chatbot makers, including Meta, OpenAI, and Google, to understand how these companies design their systems and protect children from potential harm.

    Earlier this year, we reported that Meta’s previous rules mistakenly allowed chatbots to engage in romantic conversations with children. Meta later removed that language, calling it an error. The updated guidelines mark a clear shift, now requiring chatbots to refuse any request for sexual roleplay involving minors.

    CHATGPT MAY ALERT POLICE ON SUICIDAL TEENS

    Smartphone screen with a circular listening indicator and

    The rules forbid any sexual roleplay with minors, but still allow educational discussion of exploitation. (Meta)

    What the leaked Meta AI documents reveal

    The documents reportedly outline a strict separation between educational discussion and harmful roleplay. For example, chatbots may:

    • Discuss child exploitation in an academic or preventive context
    • Explain how grooming behaviors work in general terms
    • Provide non-sexual advice to minors about social challenges

    But chatbots must not:

    • Describe or endorse sexual relationships between children and adults
    • Provide instructions for accessing child sexual abuse material (CSAM)
    • Engage in roleplay that portrays a character under 18
    • Sexualize children under 13 in any way

    Meta’s communications chief Andy Stone told Business Insider that these rules reflect the company’s policy to prohibit sexualized or romantic roleplay involving minors, while adding that additional guardrails are also in place. We reached out to Meta for a comment to include in our article, but did not hear back before our deadline. 

    META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDS

    Phone displaying a furry creature under an umbrella with a share sheet overlay showing contacts and apps.

    New AI products revealed at Meta Connect 2025 make these safety standards even more important. (Meta)

    Political pressure on Meta’s AI chatbot rules

    The timing of these disclosures is key. In August, Sen. Josh Hawley, R-Mo., demanded that Meta CEO Mark Zuckerberg hand over a 200-page rule book on chatbot behavior, along with internal enforcement manuals. Meta missed the first deadline but recently began providing documents, citing a technical issue. This comes as regulators worldwide debate how to ensure the safety of AI systems, particularly as they become integrated into everyday communication tools.

    At the same time, the recent Meta Connect 2025 event showcased the company’s newest AI products, including Ray-Ban smart glasses with built-in displays and enhanced chatbot features. These announcements underscore how deeply Meta is integrating AI into daily life, making the recently revealed safety standards even more significant.

    META ADDS TEEN SAFETY FEATURES TO INSTAGRAM, FACEBOOK 

    How parents can protect their kids from AI risks

    While Meta’s new rules may set stricter limits, parents still play a key role in keeping kids safe online. Here are steps you can take right now:

    • Talk openly about chatbots: Explain that AI tools are not people and may not always give safe advice.
    • Set usage boundaries: Require kids to use AI tools in shared spaces so you can monitor conversations.
    • Review privacy settings: Check app and device controls to limit who your child can chat with.
    • Encourage reporting: Teach kids to tell you if a chatbot says something confusing, scary, or inappropriate.
    • Stay updated: Follow developments from companies like Meta and regulators like the FTC so you know what rules are changing.

    What this means for you

    If you use AI chatbots, this story is a reminder that big tech companies are still figuring out how to set boundaries. While Meta’s updated rules may prevent the most harmful misuse, the documents show how easily gaps can appear and how much pressure it takes from regulators and journalists to close them.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaways

    Meta’s AI guidelines show both progress and vulnerability. On the one hand, the company has tightened restrictions to protect children. On the other hand, the fact that earlier errors allowed questionable content at all reveals how fragile these safeguards can be. Transparency from companies and oversight from regulators will likely continue shaping how AI evolves.

    Do you think companies like Meta are doing enough to keep AI safe for children, or should governments set stricter rules? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Protect yourself from sneaky web injection scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’re checking your financial account online, moving money or paying bills, when suddenly a pop-up appears. It looks exactly like your bank’s page, complete with logo and branding, but asks for details you’ve already provided. Would you know what to do?

    This is the kind of situation Kent recently faced. He emailed us saying, “Two times this week, I had a financial account open, and I was doing transactions. In the middle of a transaction, up pops a box in the middle of a full page showing the company’s logo. Real, yes, looked as real as it gets. The first time, I fell for it. It asked for my email address to confirm, then my phone number. Sadly, I did. Then I saw about four or five seconds of a screen named CREDIT DONKEY. At that point, I woke up and decided it was a scam. I immediately closed down my computer and called the number on the back of my financial card to report it.”

    Kent’s quick thinking likely saved him from even more damage. But what exactly happened here?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A fake banking pop-up can appear while you’re making real transactions. (Kurt “CyberGuy” Knutsson)

    How web injection scams trick you

    This type of attack is called a web injection scam. It hijacks your browser session and overlays a fake login or verification screen. Because it appears while you’re already logged in, the fake page feels authentic. In Kent’s case, the appearance of “Credit Donkey” flashing on-screen was a red flag. Scammers sometimes abuse legitimate-looking redirects like this to convince victims they are dealing with their bank. The real aim is to capture login credentials or trick you into handing over two-factor authentication codes.

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

    laptop keyboard

    Web injection scams aim to steal your login and security details. (Kurt “CyberGuy” Knutsson)

    Steps to protect yourself from web injection scams

    If you ever find yourself in a situation like Kent’s, here are the most important steps you should take right away to secure your accounts and information.

    1) Monitor your accounts

    Check your recent transactions daily. Turn on alerts for logins, withdrawals or transfers, so you’ll know instantly if someone is trying to move money. 

    2) Change your passwords

    Update the password for any financial account that may have been exposed. Use a strong, unique password generated by a password manager such as NordPass. Next, see if your email has been exposed in past breaches. Our #1 pick, NordPass, includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    3) Remove your personal data from broker sites

    Scammers often get phone numbers, emails and other details from data broker sites before launching attacks like the one Kent faced. A personal data removal service can help wipe this information from those shady databases, so criminals have less fuel for scams. Consider tools that automatically scan and request removal from dozens of brokers at once, saving you the time and hassle of doing it manually.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Enable stronger multi-factor authentication

    Strengthen your account security with multifactor authentication. If your bank offers it, switch from SMS codes to app-based codes with Google Authenticator or Authy. These methods are far harder for scammers to intercept than text messages. 

    5) Scan your devices with antivirus software

    Since the scam appeared while Kent was logged in, malware or a browser hijack may be at play. Run a trusted antivirus to clear hidden phishing scripts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    6) Notify your bank in writing

    Calling is smart, but also send a secure message or letter, so there’s a record. Ask them to put your account on high alert and require extra verification for any big moves.

    7) Freeze your credit

    Place a free credit freeze with Equifax, Experian and TransUnion. That way, scammers can’t open new accounts in your name even if they’ve stolen your personal info.

    8) Consider identity monitoring

    Services like Identity Guard can alert you if your Social Security number, email or phone number shows up where it shouldn’t. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    CLICK HERE TO GET THE FOX NEWS APP

    Person using a credit card

    The bogus page asked for personal details before revealing it was a scam (iStock)

    Smart online banking habits to stay safe

    • Never enter personal details into a pop-up, no matter how real it looks.
    • Always log in fresh through your bank’s official website or app.
    • Keep your browser and operating system fully updated.
    • Use a private email address for your financial accounts that scammers won’t easily guess.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

    Kurt’s key takeaways

    Web injection scams are designed to catch you off guard while you’re doing something routine. Kent’s quick reaction to close the page and contact his bank shows how important it is to stay alert. With the right habits and tools, you can keep scammers out of your accounts.

    Have you ever experienced a scam attempt while banking online? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Meta strengthens teen safety with expanded accounts

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Meta is rolling out new protections aimed at making social media safer for young people. In September 2024, Instagram introduced Teen Accounts, which come with built-in safeguards that limit who can contact teens, what content they see and how long they spend on the app.

    Since then, adoption has been strong: 97% of teens ages 13-15 kept the default settings, and 94% of parents say Teen Accounts are helpful. Now, Meta is expanding those protections beyond Instagram. Teen Accounts are coming to Facebook and Messenger worldwide, bringing stronger safety standards to more of the apps teens use every day.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter  

    Meta’s new Teen Accounts automatically limit who can contact teens online. (Meta)

    Meta Teen Accounts bring stronger safety tools

    Teen Accounts automatically apply safety limits, including:

    • Restrictions on who can send direct messages.
    • Filtering to reduce exposure to sensitive or harmful content.
    • Time management tools to encourage healthier app use.

    Meta says these measures address parents’ top concerns, giving teens more control while reassuring families that their online experiences are safer.

    Adam Mosseri, head of Instagram, emphasized the goal, saying, “We want parents to feel good about their teens using social media. … Teen Accounts are designed to give parents peace of mind.” 

    Critics and researchers question Meta’s teen safety tools

    However, not everyone agrees that these protections go far enough. Research regarding the effectiveness of Instagram’s teen safety features, as reported by child-safety advocacy groups and corroborated by researchers at Northeastern University (Sept. 25, 2025), paints a different picture. The study found that only eight of 47 safety features tested were fully effective, and internal documents suggest that Meta was aware of some shortcomings. Critics also argued that certain protections, like manual comment-hiding, place the burden on teens themselves rather than preventing harm upfront. They questioned whether time management tools were robust enough, giving some features middling grades despite functioning as described.

    “Misleading and dangerously speculative reports such as this one undermine the important conversation about teen safety,” Meta told CyberGuy, “This report repeatedly misrepresents our efforts to empower parents and protect teens, misstating how our safety tools work and how millions of parents and teens are using them today. 

    “Teen Accounts lead the industry because they provide automatic safety protections and straightforward parental controls. The reality is teens who were placed into these protections saw less sensitive content, experienced less unwanted contact and spent less time on Instagram at night. Parents also have robust tools at their fingertips, from limiting usage to monitoring interactions. We’ll continue improving our tools, and we welcome constructive feedback. But this report is not that.”

    INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS

    Parents say the built-in safety settings give them more peace of mind

    Parents have more peace of mind because they can add a guardian to the account. (Meta)

    Meta expands teen safety with school partnerships

    Meta is also extending protections to the classroom. The School Partnership Program is now available to every middle school and high school in the U.S. Through this program, educators can report issues such as bullying or unsafe content directly from Instagram.

    Reports receive prioritized review, typically within 48 hours. Schools that join also get:

    • Access to educational resources on online safety.
    • A banner on their profile signaling official partnership.
    • Faster escalation paths to address urgent safety concerns.

    Educators who piloted the program praised the improved response times and stronger protections for students. 

    Schools now get faster tools to report bullying and harmful content

    There are more protections for teens in the Teen Account than a normal account. (Meta)

    Meta launches online safety lessons for students

    Beyond apps and schools, Meta partnered with Childhelp to create a nationwide online safety curriculum tailored for middle schoolers. The lessons cover how to recognize online exploitation, what steps to take if a friend needs help and how to use reporting tools effectively.

    The program has already reached hundreds of thousands of students, with a goal of teaching one million middle school students in the coming year. A peer-led version, developed with LifeSmarts, empowers high school students to share the curriculum with younger peers, making the safety conversation more relatable.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Meta’s curriculum teaches middle schoolers how to stay safer online

    Meta’s curriculum includes settings for children to stay safer online. (Meta)

    What this means for you

    For parents, Teen Accounts mean extra protection is in place without needing a complicated setup. Your teen gets safer defaults by default, giving you peace of mind. For educators, the School Partnership Program provides a direct connection to Meta, ensuring reports of unsafe behavior get attention quickly. Students benefit too, with a curriculum designed to give them practical tools for navigating online life safely.

    At the same time, the pushback from critics highlights that there is still debate about whether these safeguards go far enough. While Meta insists its tools work as intended, watchdogs argue that protecting teens online requires even stronger measures.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

    Kurt’s key takeaways

    Meta’s expansion of Teen Accounts marks a major shift in how social platforms approach safety. By adding built-in protections, the company reduces risks for teens without requiring parents to manage every setting. At the same time, the School Partnership Program gives educators new tools to protect students in real time. The online safety curriculum goes one step further by teaching kids how to recognize threats and respond confidently. Still, advocacy groups and independent researchers question whether these efforts are enough, and Meta’s strong defense shows just how high the stakes are in the teen safety debate. As teens spend more of their lives online, the responsibility to protect them grows. The real test will be how well these tools hold up against evolving online threats.

    Do you think Meta’s new measures are enough to protect teens, or should tech companies do even more? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Meta account suspension scam hides FileFix malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals continue to find new ways to target social media users, and Meta accounts remain one of the most common lures. Losing access to Facebook or Instagram can have real consequences for both individuals and businesses, making people more likely to fall for urgent security warnings. Attackers exploit this by sending convincing notifications that pressure you into taking quick action without thinking. 

    That’s exactly what makes the new FileFix campaign so dangerous; it looks like routine account maintenance, but it’s really a trap.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    Cybercriminals are targeting Facebook and Instagram accounts by sending fake security warnings. (Fox News)

    How the FileFix attack works

    As reported by researchers at Acronis, a leading cybersecurity and data protection company, the attack begins with a phishing page that looks like a message from Meta’s support team, claiming that your account will be disabled in seven days unless you view an “incident report.” Instead of providing an actual document, the page disguises a malicious PowerShell command as a file path.

    Victims are instructed to copy it, open File Explorer, and paste it into the address bar. While it appears harmless, this action secretly runs code that starts the malware infection process.

    This method is part of a family of attacks known as ClickFix, where people are tricked into pasting commands into system dialogs. FileFix, created by Red Team researcher mr.d0x, builds on that idea by exploiting the File Explorer address bar instead. In this campaign, the attackers improved the trick by hiding the malicious command behind long strings of spaces, so only the fake file path is visible to the victim.

    A hidden script then downloads what looks like a JPG image from Bitbucket, but the file contains embedded code. Once executed, it extracts another script and decrypts the final payload, bypassing many security tools in the process.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A screenshot of a fake Facebook security alert

    FileFix sends out fake alerts urging users to review their account security. (Acronis)

    What StealC tries to steal

    The malware delivered by this campaign is StealC, an infostealer that collects a wide range of personal and organizational data. It is designed to grab browser credentials and authentication cookies from Chrome, Firefox, Opera, and other browsers.

    It also targets messaging apps like Discord, Telegram and Pidgin, along with cryptocurrency wallets such as Bitcoin, Ethereum and Exodus. StealC goes further by attempting to compromise cloud accounts from Amazon Web Services (AWS) and Azure, VPN services like ProtonVPN and even gaming accounts from Battle.net and Ubisoft. In addition, it can take screenshots of the victim’s desktop, giving attackers a live view of sensitive activity.

    Acronis reported that the campaign has already appeared in several different versions over a short period, with changes in payloads and infrastructure. This suggests that the attackers are actively testing and refining their methods to avoid detection and improve success rates.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Facebook on a phone

    StealC also targets VPN software and cryptocurrency wallets. (iStock)

    5 ways you can protect yourself from FileFix attacks

    To stay protected against attacks like FileFix and prevent malware such as StealC from stealing sensitive information, you need to combine caution with practical security measures. The following steps can help safeguard accounts, devices, and personal data.

    1) Be skeptical of urgent warnings

    Attackers rely on panic. Treat any message claiming your Meta account or other services will be disabled within days with caution. Verify the alert directly through official platforms rather than clicking links or following instructions from an email or web page.

    2) Avoid copying commands from unknown sources

    FileFix relies on convincing you to paste hidden PowerShell commands disguised as file paths. Never paste commands into system dialogs, File Explorer, or terminals unless you are absolutely certain of their origin.

    3) Invest in personal data removal services

    FileFix and StealC thrive on the information they can extract from a device or linked accounts. By using data removal services, you reduce the amount of sensitive personal information that can be found online or left exposed on old platforms. This minimizes what attackers can exploit if they manage to gain access.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Install reliable antivirus software

    A strong antivirus software can detect malware like StealC before it fully executes. Many solutions now include behavior-based detection that can flag suspicious scripts or hidden downloads, helping catch threats even when attackers try to disguise commands as harmless actions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    5) Use a password manager

    While FileFix targets stored credentials, using a reputable password manager reduces risk by creating unique passwords for every site. This way, even if one browser or app is compromised, attackers cannot access your accounts elsewhere.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals keep finding creative ways to trick social media users, and FileFix proves how convincing these scams can look. A fake Meta alert may feel urgent, but pausing before you click or copy anything is the best defense. Relying on strong habits and security tools gives you the upper hand. Data removal services, antivirus software, and password managers each reduce risk in different ways. When you combine them, you make it much harder for attackers to turn a scare tactic into a real threat.

    Should platforms like Meta do more to warn users about these evolving phishing tactics? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Windows 10 support ends: Upgrade to Windows 11 safely

    [ad_1]

    NEWYou can now listen to Fox News articles!

    With Microsoft ending support for Windows 10 this October, many people are racing to upgrade. Catherine, a longtime HP desktop user, shared her concerns with us: “I need to purchase a new/updated computer with Windows 11 pretty darn quick. I’ve utilized HP desktops for years and would prefer to continue to do so. My concern deals with transferring everything from one computer to another, made more interesting since my husband and I have separate setups and log-ins. I had a My Passport running, but now I believe a lot is in the cloud. We are concerned about losing our emails/contacts, etc. I also use various programs for a couple of groups I’m involved with (Word, PowerPoint, Excel, Adobe Acrobat, etc.), which I cannot afford to lose. Any guidance for a smooth transition would be great.”

    If this sounds familiar, you’re not alone. The good news: you can move everything to a new HP computer running Windows 11 with the right preparation and tools. Here’s a step-by-step guide.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    WHAT HAPPENS WHEN WINDOWS 10 SUPPORT ENDS IN 2025?

    Microsoft will end support for Windows 10 this month. (Microsoft)

    What to prepare before you buy a new computer

    Before you switch to a new Windows 11 PC, take these steps to organize your files, programs and accounts, so the move goes as smoothly as possible.

    1) Inventory what you have and make sure it’s backed up.

    • List the programs/software you use (Word, PowerPoint, Excel, Acrobat, etc.), including any license/activation info.
    • Find where your data is: local hard drive, external My Passport drive or cloud (OneDrive, Google Drive, etc.).
    • Make sure you have backups of anything that’s only local.

    2) Check how your email is set up.

    • If it’s a Microsoft/Outlook/Exchange account, a lot may already be stored in the cloud. Outlook contacts/calendars may sync automatically depending on how your accounts are configured.
    • If you use POP (email downloaded locally), or “local only” Outlook data (.pst files), you’ll need to move those manually.

    3) Have your login accounts ready.

    • Know your Microsoft account credentials (if you use one).
    • Know admin passwords for existing software.

    4) Gather license keys/software installers.

    • For paid apps (Adobe Acrobat etc.), make sure you have install files or know how to re-download, plus activation keys.
    • Make a note of any special settings or plugins you use so they get restored.

    Choosing the right computer for your needs 

    When choosing a new HP computer, confirm it runs Windows 11 out of the box. Pick a model with enough storage to hold all your files and plenty of RAM for multitasking. If you rely on external drives, make sure the new computer has the right ports, like USB-C or USB 3.0.

    You can browse CyberGuy’s best laptop picks or best desktop computers for solid options at Cyberguy.com. If you mainly use your computer for email, browsing, or video calls, a tablet, Chromebook, or iPad might be all you need. They’re low-maintenance, secure, and often more affordable than a new Windows laptop.

    WINDOWS 11 FLAW LETS HACKERS BYPASS SECURE BOOT PROTECTIONS

    Windows 11 and Windows 10

    Windows 11 and Windows 10 operating system logos are displayed on laptop screens. Krakow, Poland, on Feb. 3, 2022.  (Beata Zawrzel/NurPhoto)

    Step-by-step: Migrating to the new Windows 11 computer 

    Moving to a new PC takes planning, but following these steps will help you transfer your files, programs and settings safely. This is especially important if you and your spouse use separate logins.

    Back up everything

    Start by backing up your personal files, documents, pictures and desktop to both your external drive and a cloud service like OneDrive. If you use Outlook, export your email, contacts, and calendar if needed.

    • For POP or local .pst files, go to File → Open & Export → Export → Outlook Data File (.pst) and make a copy.
    • For IMAP or Exchange accounts, confirm that everything has synced properly online.

    Back up Windows and settings

    Use Windows Backup or the built-in tools to save your settings and user folders. Apply the latest Windows updates on the old PC before making the switch.

    Set up the new PC

    When you turn on your new computer, sign in with your Microsoft account if you have one. This helps sync certain settings automatically. Reinstall your Office apps, Adobe Acrobat, and any other software using your license keys or installers.

    Transfer data and settings

    If both PCs are connected and supported, you can use Windows Backup’s “Transfer information to a new PC” option. Simply pair them and choose what to move. If that’s not an option, copy backups from your external drive or cloud storage onto the new computer. Restore email by importing your .pst file if required.

    Verify everything works

    Open your key programs to confirm licensing is valid. Check that your email, contacts and calendar are functioning correctly. Go through your files to make sure nothing is missing.

    Set up backup and ongoing sync

    Once you’re up and running, turn on OneDrive or your preferred cloud service to sync important folders like Documents and Desktop. Finally, create a regular backup plan using either your external drive or the cloud, so your new PC stays protected.

    Common problems to avoid

    Some users run out of space on their new PC because they underestimated how much data they had. Others lose email when they forget to export .pst files. License activation can also cause headaches if the software is tied to the old machine, so always deactivate before reinstalling. And remember that older programs may not work perfectly on Windows 11, so check compatibility in advance.

    Tools that can help

    • 3rd party software: Transfers files, settings and some installed apps automatically. For our picks, search “First 10 things to do if you got a new PC” on Cyberguy.com
    • Windows Backup and Transfer: Free but may require reinstalling programs manually.

    External hard drive backup: Still the simplest safety net for keeping copies of your important files. Copy everything important to your external drive as a safety measure before migrating.

    MICROSOFT AUTHENTICATOR IS DELETING YOUR PASSWORDS

    A person typing on a laptop

    Experts recommend backing up your files to an external hard drive or a cloud service before making the switch. (Kurt “CyberGuy” Knutsson)

    How long the process takes

    Upgrading to a new computer isn’t instant, but knowing the timeline helps you plan your day. On average, you can expect the transition to take most of an afternoon. Here’s what it looks like step by step:

    Choose and order your new PC: Browsing, comparing models and making the purchase usually takes one to two hours.

    Initial setup and Windows updates: When the new computer arrives, the first startup and applying all current Windows updates can take another one to two hours.

    Install key programs: Installing Microsoft Office apps and Adobe Acrobat typically requires about one hour, depending on download speed and license activation.

    Back up data on your old PC: Creating backups of your documents, photos and email accounts usually takes one to three hours. The exact time depends on how much data you have and whether you use an external drive or the cloud.

    Transfer data and settings: Moving files, Outlook .pst backups and Windows settings to the new computer often takes one to two hours.

    Verify that everything works: Allow about an hour to test your programs, check your email and contacts, and confirm that none of your files were left behind.

    Reconnect devices and tweak settings: Finally, plan for 30 to 60 minutes to reconnect printers, set up Bluetooth accessories and customize your desktop and preferences.

    When you add it all together, the full migration can take anywhere from six to ten hours spread over a day. While it requires patience, completing each step carefully ensures that your new Windows 11 computer runs smoothly without losing important data.

    Pro tip: Once your new PC is ready, don’t forget security. Install strong antivirus software right away. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    What to do with your old PC

    Once you’ve finished moving everything over to your new Windows 11 computer and confirmed it’s working, don’t forget about your old PC. Leaving files on it could expose your personal data if the computer is ever donated, recycled or resold.

    Before repurposing, always perform a secure wipe to erase all personal information. This step ensures that sensitive files, passwords and documents can’t be recovered later. After wiping, you can safely recycle the device, donate it or set it up for light use elsewhere in your home.

    For step-by-step instructions, check out how to securely get rid of your old computer before recycling, selling or donating it.  

    CLICK HERE TO GET THE FOX NEWS APP

    What if you’re not ready to upgrade?

    Not everyone wants to switch right away. The good news is that Microsoft recently added two ways to extend Windows 10 support until October 13, 2026.

    • Use Microsoft Rewards: Redeem 1,000 points to keep your Windows 10 system covered.
    • Back up with OneDrive: Sync your files through Windows Backup and get extended support for free.

    These options buy you more time, but remember: Windows 11 is the future. Planning now ensures you won’t be caught off guard when the final end date arrives.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    Upgrading from Windows 10 to Windows 11 may feel overwhelming, but it doesn’t have to be. With the right preparation, backups and tools, you can make the switch smoothly and protect everything that matters.

    Are you ready to upgrade before Windows 10 support runs out, or will you risk sticking with an outdated system? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The Secret Reason Delta’s Partnership with YouTube Is Smarter Than You Think

    [ad_1]

    In an email to SkyMiles members, Delta just announced a partnership with YouTube that will let passengers stream ad-free videos on flights and unlock a free two-week trial of YouTube Premium simply by logging in with their account. On the surface, it looks like just another in-flight entertainment perk. But the more you think about it, the clearer it becomes that this isn’t about watching cat videos at 35,000 feet—it’s about turning YouTube into Delta’s secret weapon.

    Look, for the most part, the thing you want to do on an airplane is pass the time by checking your brain out while you get to wherever you’re going. Maybe that means taking a nap or reading a book. For some people, it means watching a movie or live TV. For others, it’s endlessly scrolling on their phone until the pilot announces the descent.

    That said, there is probably no better platform for wasting a large amount of time than YouTube. If you’ve ever gone down the rabbit hole of suggested videos, you know how easy it is to lose an hour—or three. YouTube isn’t just the world’s largest video platform, it’s basically the most effective time machine on the internet. Blink once, and your flight is halfway over.

    Now, to be clear, no one buys a plane ticket because you can watch YouTube. That’s not how people choose airlines. You buy a plane ticket because of price, or schedule, or loyalty points. Entertainment is just a bonus. Besides, if you’re on a flight with Delta’s free Wi-Fi, you can already watch YouTube from your phone or laptop.

    So, if that’s true, why would Delta announce a big partnership with YouTube? Why does it matter?

    It turns out, it’s not about watching YouTube. Sure, there’s a curated collection of YouTube content available on the seatback experience. But the real move here is about YouTube Premium. Delta is offering passengers a two-week free trial of YouTube Premium if they sign in with their SkyMiles account. If you’re already a member, you unlock it just by logging in. If you’re not a member, you can become one right there on the plane.

    That’s the real play.

    Think about it: for Delta, whatever it’s paying YouTube to give away free Premium is basically just a customer acquisition cost. It’s a way to get people to sign up for SkyMiles. After all, airlines make more profit on their loyalty programs than on flying planes. Getting people to join SkyMiles isn’t just about keeping them on Delta flights—it’s about getting them into Delta’s entire ecosystem, from credit cards to co-branded offers to upgrades and perks. Every new member is long-term value.

    What better way to get someone to sign up than to offer them the single most universal entertainment perk? Everyone loves YouTube. Almost everyone uses it. And yet, once you experience YouTube Premium, you realize it’s infinitely better.

    I think you could make the case that YouTube Premium is the most no-brainer entertainment subscription there is. If you made me give up one of the services I pay for, I’d cancel all of them before I gave up Premium. Not because YouTube’s content is inherently better than Netflix, Disney+, or Spotify, but because there are no ads.

    That’s it. That’s the whole thing. No ads. Okay, technically, YouTube Premium includes other benefits like YouTube Music, but the no ads thing is the reason it’s worth paying for.

    It changes the experience so dramatically that it’s hard to go back once you’ve tried it. Ads on YouTube are relentless—sometimes three in a row before your video even starts. Once they’re gone, you realize how much brain space you were wasting on interruptions. Premium is less about adding features and more about taking away the one thing that drives people crazy.

    Delta is banking on exactly that. The free trial onboard is a taste test. You’re sitting in your seat, you log into Wi-Fi, you click on YouTube, and suddenly you’re in the ad-free world. If you’ve never tried it before, you’ll wonder why you waited this long. That’s when YouTube—and by extension, Delta—wins.

    Because here’s the thing: once you associate that premium, uninterrupted experience with signing into SkyMiles, you’ve just built a connection in the customer’s mind. Delta isn’t just an airline; it’s the company that gave you better YouTube.

    From Delta’s perspective, the cost of subsidizing YouTube Premium trials is probably negligible compared to the lifetime value of a SkyMiles member. And for YouTube, it’s a distribution play. It’s hard to think of a better way to put YouTube Premium in front of millions of people than during a captive moment at 35,000 feet?

    That’s why this is so smart. Delta figured out how to turn downtime into a loyalty engine. Airlines spend a lot of time trying to differentiate themselves in ways most passengers don’t notice. But the smartest moves are the ones that connect convenience with loyalty in a way that feels obvious. This is one of those moves.

    Delta didn’t invent YouTube. It didn’t invent Premium. But it figured out how to use both to make SkyMiles more valuable, and to make flying Delta feel a little less painful. That’s a win for the airline, a win for YouTube, and—at least for a few hours in the air—a win for passengers.

    The opinions expressed here by Inc.com columnists are their own, not those of Inc.com.

    [ad_2]

    Jason Aten

    Source link

  • Tesla vehicle sales made a comeback last quarter. Will a lost EV tax credit end the rebound? | Fortune

    [ad_1]

    During a rough week for electric-vehicle makers in the U.S., Tesla investors got at least one piece of good news on Thursday. The EV maker reported a pronounced increase in sales—better numbers than Wall Street had predicted, and a respite from the lagging deliveries Tesla has been reporting over the last two quarters.

    While analysts had expected Tesla to sell around 450,000 EVs over the three months ending in September, Tesla ended up delivering more than 497,000—about 100,000 more than the previous quarter, and a 7.5% increase from this time last year. Dan Ives, one of Tesla’s most notorious bulls, blasted out an analyst note that same morning, describing the numbers as a “massive bounceback” for Tesla—a turnaround for a company that has been battered over the first half of this year in several key markets as CEO Elon Musk tried his hand in a brief yet chaotic stint in American politics.

    The key question is this: Will it last? 

    After all, Tesla’s short-term sales surge was closely related to its looming longer-term challenge. One of the key reasons for Tesla’s strong sales figures, investors and analysts noted, was the temporary rush of consumers purchasing an EV right before the elimination of the $7,500 electric vehicle tax credit. That incentive—which officially ended on Tuesday—had been in place for 17 years and had helped narrow the price gap between electric and gas vehicles for U.S. buyers. Tesla on Wednesday went ahead and increased the cost of leasing its vehicles, as its first move reflecting the change.

    With the tax credits no longer available, the change is expected to take a significant toll on consumer demand—at least in the near term. 

    Tesla is well aware of this. It added risk disclosures in its latest quarterly filings about the potential impact of the loss of the consumer incentive as well as another now-non-existent sales booster, carbon offset incentives for manufacturers. The EV maker acknowledged the possibility that their removal could harm both demand from Tesla customers and the company’s future financial returns. 

    Musk himself has opined on the topic, too. “Yeah, we probably could have a few rough quarters,” he said in July on Tesla’s last earnings call, in response to an analyst’s question. “I’m not saying we will, but we could. Q4, Q1, maybe Q2.”

    Andrew Rocco, a stock strategist with Zacks Investment Research and an investor in Tesla shares, said in an interview that he’s anticipating a drop off in sales for the next two quarters or so. 

    But the long-term impact may be contingent on several other factors: whether Tesla can absorb some of the lost credit in order to keep prices down; whether it can continue to regain market share in markets like Europe and China where its reputation has suffered over the last eight months; and whether the EV maker can deliver on the timelines it has furnished for a more-affordable Model Y.

    “If they can come out with that cheaper model Y… That would be a huge catalyst to help them offset that EV tax credit sunsetting,” Rocco says.

    Last time around

    It’s worth doing a quick history lesson when considering how Tesla may respond to the elimination of the $7,500 tax credit. After all, this isn’t the first time it’s had to do so.

    If you recall, when the incentive was first put in place via bipartisan legislation in the late 2000s, there was a cap: After a vehicle manufacturer sold a total of 200,000 eligible vehicles, the tax credit would slowly phase out until it was eliminated altogether. Both Tesla and General Motors ended up hitting that threshold, and their tax credits were halved twice before dissolving completely. The cap was removed under the Inflation Reduction Act of 2022, allowing Tesla and GM to take advantage of it again.

    Back in 2018, Tesla sold 200,000 EVs, becoming the first EV maker to hit said cap. As a result, in January 2019, Tesla customers had their rebates cut in half to $3,750. To respond to the change, Tesla rolled out a $2,000 price cut for the Model S, Model X, and Model 3 the very next day, absorbing a large chunk of the lost incentive.

    Because of Tesla’s strong margins, Rocco pointed out that Tesla could be in a position to do the same today if it chooses.

    So far, Tesla hasn’t committed one way or another. The company has committed to releasing a lower-cost Tesla Y model later this year, however. Musk said that the new vehicle would be “available to everyone” before the end of 2025. 

    That model has been rumored to cost somewhere around $39,990—which would be approximately $5,000 cheaper than the most affordable Model Y currently available. But there hasn’t been a firm price announcement. Rocco said that it will be “critical” for Tesla to meet Musk’s fourth-quarter deadline. 

    Cost savings

    It seems that all EV-makers are on the hunt for potential cost savings right now that they can ultimately pass down to the customer in lieu of the bygone tax credit. 

    Chris Barman, CEO of Slate Auto, the startup that plans to start selling its low-cost customizable trucks to customers next year, told Fortune in an interview on Tuesday that there’s at least one upside to the loss of the tax credit. Because the company is no longer subject to all the supplier restrictions required under the Inflation Reduction Act to secure customers the tax credit, Slate has more options for battery suppliers that it can work with. “It would give us the opportunity to pass lower costs along to the consumer in a different way,” Barman said.

    That being said, don’t expect those cost savings to add up to $7,500. While Barman wouldn’t provide a specific figure, she acknowledged, “It’ll be a significant cost reduction, but it won’t offset the full amount of credit itself.”

    Another thing to keep in mind: There are still state-level incentives, too, as Barman pointed out—with the potential for more. A handful of states, including California, Colorado, Vermont, and Connecticut, currently offer their residents an EV tax credit. And states including Pennsylvania, Minnesota, and Texas are looking at incorporating their own incentives, too.

    Tesla, meanwhile, is hoping that its impending autonomous capabilities will give the company an edge, even as its vehicles suddenly become more expensive for customers. Tesla is expected to roll out the 14th iteration of its “full self-driving” software shortly, and has already started doing so with select influencers this week.

    “Once you get to autonomy at scale in the second half of next year, certainly by the end of next year, I think the—I would be surprised if Tesla’s economics are not very compelling,” Musk said during the Q2 earnings call.

    Wall Street thus far doesn’t seem quite as optimistic. On Thursday, even after Tesla reported its strong sales figures, shares fell more than 5%.

    [ad_2]

    Jessica Mathews

    Source link

  • New exoskeleton built to boost endurance and cut fatigue

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you have ever wanted to walk longer, hike farther, climb more challenging trails or cycle with less strain, the Hypershell X Ultra is ready to assist you in all of those activities. 

    This latest exoskeleton improves on earlier models and shows how wearable tech can unlock new levels of outdoor performance.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST

    Hypershell X exoskeleton aims to improve outdoor performance in running, hiking and other activities. (Hypershell)

    Power that pushes you forward

    The Hypershell X Ultra features the M-One Ultra motor system, which delivers up to 1000W of power. That is about 1.3 horsepower attached directly to your hips. The range has been extended to 18.6 miles, meaning you can travel longer on a single charge. With efficiency above 90% and AI algorithms that adjust in real time, the exoskeleton feels like part of your body. 

    Smarter movement across terrain

    The Hypershell X Ultra is designed to adapt automatically. A new descent mode protects your knees by reducing impact on joints and boosting support when walking downhill. The exoskeleton also provides smarter assistance when you accelerate, start a ride or pick up the pace on a run. With 12 terrain modes to choose from, it adjusts to almost any environment. These modes include Cycling+, Running+, Snow, Dune, Walking, Speed Walking, Uphill, Downhill, Mountain, Gravel, Up Stairs and Down Stairs.

    NEW CAPSULE DEVICE LETS YOU CONTROL ROBOTS WITH YOUR ENTIRE BODY

    A woman hiking while wearing the Hypershell X Ultra exoskeleton

    Hypershell X Ultra features an improved motor system, allowing the user to travel longer on a single charge. (Hypershell)

    Built tough for real adventures

    At under 4 pounds, the X Ultra is lightweight but strong. It uses carbon fiber and titanium alloy for aerospace-level durability. With an IP54 rating, it resists dust, rain and snow. The Hypershell+ app, available for Android, iOS and Apple Watch, gives you easy access to settings and performance data. At $1,999, it is an investment, but one that could transform the way you move outdoors. For anyone looking to extend endurance and take on new challenges, it represents the future of adventure.

    Proven performance you can trust

    Independent testing from SGS in Switzerland verified the X Ultra’s performance. In trials, users reduced exertion by up to 22% while walking, and 39% while cycling. Heart rates dropped as much as 40%, showing the impact this suit can make. These results confirm that the X Ultra is more than marketing talk.

    CLICK HERE TO GET THE FOX NEWS APP

    Cyclists wearing the Hypershell X Ultra exoskeleton while on a ride

    Hypershell X Ultra uses carbon fiber and titanium alloy for aerospace-level durability. (Hypershell)

    What this means for you

    Whether you are training for an endurance event, keeping pace with your kids on a hike or exploring places once out of reach, the Hypershell X Ultra provides extra support and reduces fatigue. It helps you go farther while protecting your body from strain.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    The Hypershell X Ultra takes the strain out of steep climbs, long hikes and even tough bike rides. It helps you conserve energy, protects your joints and gives you that extra push when you need it most. Whether you are hiking mountain trails, cycling longer distances or exploring new terrain like snow and sand, this exoskeleton makes the journey feel easier and more exciting. For anyone ready to push past limits, it could be the future of outdoor adventure.

    Would you wear an exoskeleton to boost your outdoor performance, or would you rather stick to your natural limits? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Trump’s YouTube-Insurrection Settlement Will Fund Golden White House Ballroom

    [ad_1]

    Over the summer, the Trump administration announced that it would construct a 90,000-square-foot ballroom at the White House, which press secretary Karoline Leavitt described to reporters as a “much-needed and exquisite addition.” Not surprisingly, a rendering looks very Versailles-esque and includes an unrestrained use of the color gold; though the room was initially expected to have a seating capacity for 650 people, Trump later said it would hold 900.) In a statement that she may or may not have been contractually obligated to release, White House chief of staff Susie Wiles told the public: “President Trump is a builder at heart and has an extraordinary eye for detail.” Following the announcement, Senate minority leader Chuck Schumer wondered aloud. “Where’d this money come from? Did Congress appropriate it? I don’t think so. It’s almost like DOGE was never about waste.” In September, CBS reported that a collection of individual and corporate donors—including Google, Booz Allen Hamilton, Lockheed Martin, and Palantir—had pledged to donate nearly $200 million for construction costs.

    Last month, when a reporter asked how he was “holding up” in the wake of the death of Charlie Kirk, Trump responded, “I think very good,” before quickly shifting focus to the ballroom. “And by the way,” he said, “right there, you see all the trucks. They just started construction of the new ballroom for the White House, which is something they’ve been trying to get, as you know, for about 150 years. And it’s gonna be a beauty. It’ll be an absolutely magnificent structure.”

    *Will Jimmy Kimmel file a similar lawsuit over his show having been temporarily suspended following comments by Trump’s FCC chair about doing things “the easy way or the hard way”? Stay tuned!

    [ad_2]

    Bess Levin

    Source link

  • AI godfather warns humanity risks extinction by hyperintelligent machines with their own ‘preservation goals’ within 10 years | Fortune

    [ad_1]

    The so-called “godfather of AI”, Yoshua Bengio, claims tech companies racing for AI dominance could be bringing us closer to our own extinction through the creation of machines with ‘preservation goals’ of their own. 

    Bengio, a professor at the Université de Montréal known for his foundational work related to deep learning, has for years warned about the threats posed by a hyperintelligent AI, but the rapid pace of development has continued despite his warnings. In the past six months, OpenAI, Anthropic, Elon Musk’s xAI, and Google’s Gemini, have all released new models or upgrades as they try to win the AI race. OpenAI CEO Sam Altman even predicted AI will surpass human intelligence by the end of the decade, while other tech leaders have said that day could come even sooner. 

    Yet, Bengio claims this rapid development is a potential threat. 

    “If we build machines that are way smarter than us and have their own preservation goals, that’s dangerous. It’s like creating a competitor to humanity that is smarter than us,” Bengio told the Wall Street Journal.

    Because they are trained on human language and behavior, these advanced models could potentially persuade and even manipulate humans to achieve their goals. Yet, AI models’ goals may not always align with human goals, said Bengio. 

    “Recent experiments show that in some circumstances where the AI has no choice but between its preservation, which means the goals that it was given, and doing something that causes the death of a human, they might choose the death of the human to preserve their goals,” he claimed. 

    Call for AI safety

    Several examples over the past few years show AI can convince humans to believe nonrealities, even those with no history of mental illness. On the flipside, some evidence exists that AI can also be convinced, using persuasion techniques for humans, to give responses it would usually be prohibited from giving. 

    For Bengio, all this adds up to is more proof that independent third parties need to take a closer look at AI companies’ safety methodologies. In June, Bengio also launched nonprofit LawZero with $30 million in funding to create a safe “non-agentic” AI that can help ensure the safety of other systems created by big tech companies.

    Otherwise, Bengio predicts we could start seeing major risks from AI models in five to ten years, but he cautioned humans should prepare in case those risks crop up earlier than expected. 

    “The thing with catastrophic events like extinction, and even less radical events that are still catastrophic like destroying our democracies, is that they’re so bad that even if there was only a 1% chance it could happen, it’s not acceptable,” he said.

    Fortune Global Forum returns Oct. 26–27, 2025 in Riyadh. CEOs and global leaders will gather for a dynamic, invitation-only event shaping the future of business. Apply for an invitation.

    [ad_2]

    Marco Quiroz-Gutierrez

    Source link

  • Inside a scammer’s day and how they target you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’re sipping your morning coffee when your phone rings. It’s a number you don’t recognize. On the other end is someone claiming to be from your bank, asking you to “confirm a recent charge.” Sound familiar?

    Scammers don’t operate on luck. They don’t just throw darts at the phone book and hope to hit a target. Their calls, texts and emails are carefully planned. They already know things about you before they ever reach out, enough to make their pitch sound convincing.

    So, what does a scammer’s day actually look like? Let’s step into their shoes for a moment.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    Hacker looking up the information stolen from an unsuspecting victim. (Kurt “Cyberguy” Knutsson)

    Step 1: Morning scroll: Where scammers find your data

    Scammers don’t need to hack into top-secret databases. They start their day by tapping into data broker sites, those shady online directories that trade your personal information like baseball cards.

    Here’s what they can instantly see about you (yes, you):

    • Full name and age
    • Current and past addresses
    • Phone numbers (landline and mobile)
    • Relatives’ names
    • Property records and estimated home value.

    Some sites even list email addresses, voter registrations and criminal histories (whether accurate or not.) Imagine starting your morning with a full profile of someone, where they live, who their spouse is and what car they drive. For scammers, this is their to-do list.

    Step 2: Building the perfect scam story

    With your profile in hand, scammers craft a story that sounds tailor-made just for you.

    • If you’ve recently moved (public real estate records show this), they’ll call pretending to be from a “utilities department” asking for deposits.
    • If you’re retired, they might pose as Medicare reps offering “free benefits.”
    • If you’ve recently lost a loved one (obituaries are public), they’ll offer fake “bereavement services.”

    Scammers don’t invent details; they borrow them from your life. That’s why their calls are so believable.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Man on the phone

    A man receiving a fake scam phone call. (Kurt “CyberGuy” Knutsson)

    Step 3: Dialing for dollars

    Once the story is ready, it’s time to call, text, or email. Scammers often use auto-dialing software, blasting out thousands of calls a day. They acquire your personal and contact details from various data brokers. Imagine hundreds of scammers scraping the same databases and finding your profile. That’s why you get repeated calls. That’s why the scammer “knows” who you are when you pick up. And even if you hang up or reject the call without picking up, they log your number as “active.” Which means you’ve just made their list for the next round of calls. 

    Step 4: Afternoon profit: Cashing in on stolen trust

    Scammers don’t actually need every target to fall for the trick. They only need a small percentage. Here’s what happens when someone gives in:

    • Banking info stolen: Fake “fraud department” calls trick people into reading out card numbers.
    • Identity theft: A scammer collects your Social Security number and date of birth, then opens accounts in your name.
    • Wire transfers: Many victims are convinced to “verify funds” by wiring money, which is gone forever.

    It’s a numbers game, and personal data tilts the odds heavily in the scammers’ favor. 

    Step 5: Evening: Expanding the list

    At the end of the day, scammers aren’t done. They feed the information they’ve gathered back into the data cycle:

    • New phone numbers? Added to calling lists.
    • Addresses confirmed during a call? Updated in their files.
    • Relatives mentioned? Added as next targets.

    And the cycle continues tomorrow, with an even bigger pool of potential victims.

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    (Kurt “CyberGuy” Knutsson)

    Why removing your data makes scams harder

    Now, imagine if scammers couldn’t find your data online in the first place.

    • No name connected to your phone number.
    • No recent address tied to your age and relatives.
    • No property value or real estate history to suggest you’re “cash-rich.”

    Scammers would have no storyline, no details to exploit and, most importantly, no way to personalize their attack. When you remove your data from people-search sites and data broker databases, you don’t just “clean up the internet.” You slam the door shut on scammers’ playbooks. You could spend hours (or days) going site by site, filling out opt-out forms, sending emails and keeping track of who complied. The problem? Data brokers don’t stop. New ones pop up every week, and old ones often sneak your data back in.

    That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Scammers don’t stumble on your phone number by accident. They map out your life, one data point at a time. That’s why protecting your information online is the single most powerful step you can take to cut down on scam calls, phishing emails and identity theft risks. Remember: every piece of personal data you remove is one less tool in a scammer’s kit.

    What’s the most convincing scam attempt you’ve ever received? Let us know in the comments below. Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link