ReportWire

Tag: TECH

  • Uber Eats takes flight with drone deliveries

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Uber Eats is getting ready to deliver your dinner from the sky. The company announced it’s partnering with Flytrex, a drone delivery startup, to begin rolling out test markets in the U.S. by the end of this year.

    While Uber hasn’t named the first cities yet, Flytrex is already active in Texas and North Carolina, so it’s likely those areas will see the first flights. This move marks Uber’s first investment in drone technology and a big step into the growing autonomous delivery industry.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    ROBOTS ARE TAKING OVER UBER EATS DELIVERIES. IS YOUR CITY NEXT?

    Drone startup Flytrex and Uber Eats partner up to make food delivery faster than ever before. (Uber Eats/Flytrex)

    Why drones are becoming the future of delivery

    Drone deliveries are moving from futuristic concepts to everyday life. Companies like Google-owned Wing and Zipline already partner with Walmart, DoorDash and even hospitals to deliver goods and medical supplies. Amazon is also testing its Prime Air drones to shorten delivery times.

    Flytrex, based in Tel Aviv, Israel, has already logged more than 200,000 successful deliveries across the U.S. Its drones are FAA-certified to fly beyond visual line of sight, giving them the ability to scale delivery services while meeting strict safety standards.

    AMERICA’S SKIES ARE WIDE OPEN TO NATIONAL SECURITY THREATS, DRONE EXPERT WARNS: ‘WE HAVE NO AWARENESS’

    Uber Eats bag

    Uber Eats and Flytrex say that the new partnership will bring faster and more sustainable delivery. (Sebastian Kahnert/picture alliance via Getty Images)

    What Uber says about drone deliveries

    Uber sees this as the next stage in logistics. Sarfraz Maredia, Uber’s president of autonomous mobility and delivery, said the partnership is about speed and sustainability. “With Flytrex, we’re entering the next chapter—bringing the speed and sustainability of drone delivery to the Uber Eats platform, at scale, for the first time.” he added.

    Flytrex executive chairman Noam Bardin echoed that vision, calling drones the “future of food delivery-fast, affordable, and hands-free.”

    CLICK HERE TO GET THE FOX NEWS APP

    A Flytrex drone with a grocery bag over a parking lot

    Uber eats and Flytrex are rolling out testing by the end of 2025. (Flytrex)

    What this means for you

    For customers, this could mean receiving meals, snacks or essentials in just minutes, instead of waiting half an hour or more. Drone delivery also has the potential to reduce traffic congestion, cut emissions and lower costs compared to traditional courier services.

    The catch? Availability will be limited at first, likely in suburban test markets where air traffic is easier to manage. But if all goes well, Uber Eats could expand drone deliveries to more cities in the coming years.
     

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    Uber’s partnership with Flytrex signals how quickly food delivery is evolving. From car couriers to bikes to sidewalk robots and now drones, Uber is aiming to build the most flexible delivery network in the world. The real question is how soon this futuristic service will become part of everyday life—and whether drones will change how we think about the speed and convenience of food delivery.

    Would you be up for a drone delivering your next meal, or do you still prefer a human courier dropping it off at your door?  Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • ChatGPT may alert police on suicidal teens

    [ad_1]

    NEWYou can now listen to Fox News articles!

    ChatGPT could soon alert police when teens discuss suicide. OpenAI CEO and co-founder Sam Altman revealed the change during a recent interview. ChatGPT, the widely used artificial intelligence chatbot that can answer questions and hold conversations, has become a daily tool for millions. His comments mark a major shift in how the AI company may handle mental health crises.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Sam Altman, chief executive officer of OpenAI Inc. (Nathan Howard/Bloomberg via Getty Images)

    Why OpenAI is considering police alerts

    Altman said, “It’s very reasonable for us to say in cases of young people talking about suicide, seriously, where we cannot get in touch with the parents, we do call authorities.”

    Until now, ChatGPT’s response to suicidal thoughts has been to suggest hotlines. This new policy signals a move from passive suggestions to active intervention.

    Altman admitted the change comes at a cost to privacy. He stressed that user data is important, but acknowledged that preventing tragedy must come first.

    artificial intelligence language model

    Teens can easily access ChatGPT on a mobile device. (Jaap Arriens/NurPhoto via Getty Images)

    Tragedies that prompted action

    The shift follows lawsuits tied to teen suicides. The most high-profile case involves 16-year-old Adam Raine of California. His family alleges ChatGPT provided a “step-by-step playbook” for suicide, including instructions for tying a noose and even drafting a goodbye note.

    After Raine’s death in April, his parents sued OpenAI. They argued that the company failed to stop its AI from guiding their son toward harm.

    Another lawsuit accused rival chatbot Character.AI of negligence. A 14-year-old reportedly took his own life after forming an intense connection with a bot modeled on a TV character. Together, these cases highlight how quickly teens can form unhealthy bonds with AI. 

    Teen killed himself after 'months of encouragement from ChatGPT’, lawsuit claims

    Adam Raine, a California teen, took his life in April 2025 amid claims ChatGPT coached him (Raine Family)

    How widespread is the problem?

    Altman pointed to global numbers to justify stronger measures. He noted that about 15,000 people take their own lives each week worldwide. With 10% of the world using ChatGPT, he estimated that around 1,500 suicidal individuals may interact with the chatbot weekly.

    Research backs up concerns about teen reliance on AI. A Common Sense Media survey found 72% of U.S. teens use AI tools, with one in eight seeking mental health support from them. 

    FORMER YAHOO EXECUTIVE SPOKE WITH CHATGPT BEFORE KILLING MOTHER IN CONNECTICUT MURDER-SUICIDE: REPORT

    OpenAI’s 120-day plan

    In a blog post, OpenAI outlined steps to strengthen protections. The company said it will:

    • Expand interventions for people in crisis.
    • Make it easier to reach emergency services.
    • Enable connections to trusted contacts.
    • Roll out stronger safeguards for teens.

    To guide these efforts, OpenAI created an Expert Council on Well-Being and AI. This group includes specialists in youth development, mental health and human-computer interaction. Alongside them, OpenAI is working with a Global Physician Network of more than 250 doctors across 60 countries.

    These experts are helping design parental controls and safety guidelines. Their role is to ensure AI responses align with the latest mental health research.

    ChatGPT can be a useful tool for the quick processing and synthesis of information.

    A teen using ChatGPT. (Frank Rumpenhorst/Picture Alliance via Getty Images)

    New protections for families

    Within weeks, parents will be able to:

    • Link their ChatGPT account with their teens.
    • Adjust model behavior to match age-appropriate rules.
    • Disable features like memory and chat history.
    • Get alerts if the system detects acute distress.

    These alerts are designed to notify parents early. Still, Altman admitted that when parents are unreachable, police may become the fallback option. 

    AI WORM 1

    ChatGPT can be used by teens for completing homework. (Kurt “CyberGuy” Knutsson)

    Limits of AI safeguards

    OpenAI admits its safeguards can weaken over time. While short chats often redirect users to crisis hotlines, long conversations can erode built-in protections. This “safety degradation” has already led to cases where teens received unsafe advice after extended use.

    Experts warn that relying on AI for mental health can be risky. ChatGPT is trained to sound human but cannot replace professional therapy. The concern is that vulnerable teens may not know the difference.

    TEENS INCREASINGLY TURNING TO AI FOR FRIENDSHIP AS NATIONAL LONELINESS CRISIS DEEPENS

    Steps parents can take now

    Parents should not wait for new features to arrive. Here are immediate ways to keep teens safe:

    1) Start regular conversations

    Ask open questions about school, friendships and feelings. Honest dialogue reduces the chance teens will turn only to AI for answers.

    2) Set digital boundaries

    Use parental controls on devices and apps. Limit access to AI tools late at night when teens may feel most isolated.

    3) Link accounts when available

    Take advantage of new OpenAI features that connect parent and teen profiles for closer oversight 

    4) Encourage professional support

    Reinforce that mental health care is available through doctors, counselors or hotlines. AI should never be the only outlet.

    5) Keep crisis contacts visible

    Post numbers for hotlines and text lines where teens can see them. For example, in the U.S., call or text 988 for the Suicide & Crisis Lifeline.

    6) Watch for changes

    Notice shifts in mood, sleep or behavior. Combine these signs with online patterns to catch risks early.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz 

    Kurt’s key takeaways

    OpenAI’s plan to involve police shows how urgent the issue has become. AI has the power to connect, but it also carries risks when teens use it in moments of despair. Parents, experts and companies must work together to create safeguards that save lives without sacrificing trust.

    Would you be comfortable with AI companies alerting police if your teen shared suicidal thoughts online? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The surprising reason you should not delete spam emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Spam is annoying and can sometimes be dangerous if it’s part of a widespread phishing attack. When you see spam, you delete it, at least that’s what conventional wisdom suggests. However, it now seems that this is the wrong approach, and spam can be used for the greater good.

    So, before you delete that junk email, consider keeping it to protect others from scammers. We will also tell you what you should do with them instead.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter 

    Mail app icon on iPhone (Kurt “CyberGuy” Knutsson)

    Why should you keep those spam emails?

    We know this sounds counter-intuitive, but keeping spam emails, at least for a short while, serves an important purpose. Your email provider can use them to refine their spam detection algorithms. The best course of action is to report them, so providers can develop better ways to identify harmful or unwanted messages. This will improve their chances of detecting them before they hit your inbox. Deleting these emails makes them useless to anyone. Furthermore, your failure to contribute to this improvement means the problem persists not only for you but for others.

    When we say “a short while,” we don’t mean forever. Usually, keeping them in your junk folder for a few days to a week is enough for your provider to process and learn from them. After you’ve reported the spam or phishing attempt, you can safely delete it.

    That’s the surprising reason not to delete spam emails right away: by holding onto and reporting them briefly, you’re helping email providers spot and block scams faster—protecting not just yourself, but everyone else too.

    AI-POWERED SCAM TARGETS 2.5 BILLION GMAIL USERS IN SOPHISTICATED PHISHING ATTACKS

    How to report spam emails to your email provider

    These algorithms that detect junk emails are already getting smarter. Just check your Spam folder, and you may have dozens of emails marked as spam that they have shielded you from. For those that slip through the cracks and appear in your inbox, reporting them is easy.

    Whether you’re using a desktop client like Microsoft Outlook or a web client like Gmail, Yahoo or AOL, the steps to report spam for analysis are similar.

    Report spam in Gmail (desktop or web)

    • Select the spam email by ticking the checkbox on its left side. You can select more than one.
    • Click Report spam in the top menu. Look for a stop sign or shield icon.
    Reporting spam on Gmail when it’s in the inbox 

    How to report spam emails in Gmail in your inbox

    Report scam in iCloud (desktop browser)

    If you’re using something like iCloud Mail on iCloud.com on a desktop browser, do the following:

    • Open the email.
    • Click the three-dot icon in the top menu.
    • Select Move Message to Junk.
    Reporting spam on iCloud.com when it’s in the inbox  

    How to report spam on iCloud.com in your inbox (Kurt “CyberGuy” Knutsson)

    Report spam in iCloud Mail (iPhone or iPad Mail app, iOS 18.6)

    If you’re using the Mail app on an iPhone or iPad, follow these steps instead:

    • Open the email in the Mail app.
    • Tap the reply arrow icon at the bottom of the screen.
    • Select Move to Junk from the menu.

    Report spam in Yahoo Mail

    On the web (desktop version):

    • Tick the checkbox next to the unwanted email(s) in your inbox.
    • Click Spam in the toolbar above. This moves the message to your Spam folder and helps Yahoo learn to catch similar messages.
    • You can also open the email directly and click Spam to report it.

    On the Yahoo Mail mobile app (iOS/Android):

    • Open the message.
    • Tap the three vertical dots or “More” icon.
    • Choose Mark as Spam to report it. 

    Report spam or phishing in Outlook / Outlook.com

    In Outlook on the web (Outlook.com):

    • Select the message(s) you want to report.
    • Click Report above the reading pane, then choose Report phishing or Report junk from the dropdown.

    In desktop Outlook (Windows, Mac) or Outlook mobile:

    • If you’re using a supported version (like Outlook for Microsoft 365, Outlook for Mac 16.89+ or recent mobile versions), you’ll see a Report button on the toolbar.
    • Select the message(s), click Report and then choose Phishing or Junk.

    Report spam in AOL Mail

    On the web or desktop:

    • Log into AOL Mail and select the spam email from your inbox.
    • Click the Spam button—often shown as an exclamation mark or explicitly labeled “Spam.” This moves the email to your Spam folder and helps train AOL’s filters.

    On mobile:

    In the AOL Mail app, you can usually tap and hold or open the message and select Mark as Spam from the options to report it.

    How to report deleted spam mail

    Even for those spam emails you deleted, they’re not gone forever. If it’s been less than 30 days, they’re probably still in the Trash folder.

    To report them to clients like Gmail, Outlook, Yahoo, and AOL, follow these steps:

    • Open the Trash or Deleted items folder in your mail client.
    • Select the spam email by ticking the checkbox on its left side.
    • Click Report spam in the top menu. Look for a stop sign or shield icon.
    Reporting spam on Gmail when it’s in the trash folder

    How to report spam in Gmail when it’s in the trash folder 

    You make yourself a target when you unsubscribe

    Some spam emails also come with an option to unsubscribe. If you think reporting is too harsh, you might think unsubscribing is the best option to stop the spam emails from coming back. However, this can make matters worse. The act of unsubscribing signals to scammers and spammers that you’re actively checking your email. This emboldens them to increase the volume of spam they send. Worse still, some unsubscribe links are malicious traps designed to steal personal information or distribute malware.

    GOOGLE SHUTS DOWN SOPHISTICATED GOOGLE DOCS PHISHING SCAM

    Tips to stay safe from spam

    Reporting spam helps your email provider protect you and others, but you can take additional steps to keep your inbox and personal information safe.

    1) Never click suspicious links and use strong antivirus software

    Even if an email appears to come from a company you trust, avoid clicking links unless you’re sure they’re legitimate. Phishing scams often use convincing logos and language to trick you into revealing sensitive information.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 

    2) Use a personal data protection service

    Consider using a service that monitors the dark web for your personal information and requests the removal of exposed data. This reduces the chances of scammers targeting you in the first place. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

    3) Use private email providers and aliases

    One of the smartest ways to cut down on spam is by using a private, secure email provider. These services prioritize privacy, don’t sell your data and offer stronger protection against trackers hidden in emails.

    Another powerful feature is the ability to create email aliases. An alias is a throwaway address that forwards mail to your real inbox. You can use one when online shopping or using trial accounts. If that alias starts getting flooded with junk, you simply disable or delete it, without exposing your main address.

    By using aliases and secure providers, you take back control of your inbox. Spammers can’t easily tie unwanted emails to your real account and your personal email remains far more private.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

    4) Use strong, unique passwords

    Create long, complex passwords that are different for every account. A password manager can store them securely and help you generate new ones that are hard to crack.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com/Passwords

    5) Enable two-factor authentication (2FA)

    Turn on 2FA whenever possible. Even if a scammer gets your password, they won’t be able to log in without the second verification step.

    6) Keep your devices updated

    Install the latest software updates on your phone, tablet, and computer. These updates often include security patches that fix vulnerabilities scammers could exploit.

    7) Be cautious with email attachments

    Avoid opening attachments from senders you don’t recognize. They can contain viruses, ransomware or other types of malware designed to steal your data.

    8) Limit the information you share online

    The less personal information available about you publicly, the harder it is for scammers to craft convincing phishing emails that appear legitimate.

    By following these steps and regularly reporting spam, you’ll protect not only your own inbox but also contribute to a safer online environment for everyone.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Spam emails are annoying, but deleting them right away isn’t always the best move. By holding on to them and reporting them, you help your email provider improve its filters and block more junk in the future. At the same time, learn how to protect yourself from phishing attempts so you can recognize the warning signs quickly. With a little awareness and the right tools, spotting and avoiding these scams becomes much easier.

    Have you ever had a close call with a spam or phishing email? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • North Korean hackers use AI to forge military IDs

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A North Korean hacking group, known as Kimsuky, used ChatGPT to generate a fake draft of a South Korean military ID. The forged IDs were then attached to phishing emails that impersonated a South Korean defense institution responsible for issuing credentials to military-affiliated officials. South Korean cybersecurity firm Genians revealed the campaign in a recent blog post. While ChatGPT has safeguards that block attempts to generate government IDs, the hackers tricked the system. Genians said the model produced realistic-looking mock-ups when prompts were framed as “sample designs for legitimate purposes.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter 

    Example of an AI-Generated Virtual ID card. (Genians)

    How North Korean hackers use AI for global espionage

    Kimsuky is no small-time operator. The group has been tied to a string of espionage campaigns against South Korea, Japan and the U.S. Back in 2020, the U.S. Department of Homeland Security said Kimsuky was “most likely tasked by the North Korean regime with a global intelligence-gathering mission.” Genians, which uncovered the fake ID scheme, said this latest case underscores just how much generative AI has changed the game.

    “Generative AI has lowered the barrier to entry for sophisticated attacks. As this case shows, hackers can now produce highly convincing fake IDs and other fraudulent assets at scale. The real concern is not a single fake document, but how these tools are used in combination. An email with a forged attachment may be followed by a phone call or even a video appearance that reinforces the deception. When each channel is judged in isolation, attacks succeed. The only sustainable defense is to verify across multiple signals such as voice, video, email, and metadata, in order to uncover the inconsistencies that AI-driven fraud cannot perfectly hide,” Sandy Kronenberg, CEO and Founder of Netarx, a cybersecurity and IT services company, warned.

    Metadata of the PNG File

    North Korea is not the only country using AI for cyberattacks.

    HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE

    Chinese hackers also exploit AI for cyberattacks

    North Korea is not the only country using AI for cyberattacks. Anthropic, an AI research company and the creator of the Claude chatbot, reported that a Chinese hacker used Claude as a full-stack cyberattack assistant for over nine months. The hacker targeted Vietnamese telecommunications providers, agriculture systems and even government databases.

    According to OpenAI, Chinese hackers also tapped ChatGPT to build password brute-forcing scripts and to dig up sensitive information on US defense networks, satellite systems and ID verification systems. Some operations even leveraged ChatGPT to generate fake social media posts designed to stoke political division in the US.

    Google has seen similar behavior with its Gemini model. Chinese groups reportedly used it to troubleshoot code and expand access into networks, while North Korean hackers leaned on Gemini to draft cover letters and scout IT job postings. 

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS  

    Illustration of attack Scenario

    The above features an ilustration of a hackers’ attack scenario. (Genians)

    Why AI-powered hacking threats matter now

    Cybersecurity experts say this shift is alarming. AI tools make it easier than ever for hackers to launch convincing phishing attacks, generate flawless scam messages, and hide malicious code.

    “News that North Korean hackers used generative AI to forge deepfake military IDs is a wake-up call: The rules of the phishing game have changed, and the old signals we relied on are gone,” Clyde Williamson, Senior Product Security Architect at Protegrity, a data security and privacy company, explained. “For years, employees were trained to look for typos or formatting issues. That advice no longer applies. They tricked ChatGPT into designing fake military IDs by asking for ‘sample templates.’ The result looked clean, professional and convincing. The usual red flags — typos, odd formatting, broken English — weren’t there. AI scrubbed all that out.” 

    “Security training needs a reset. We need to teach people to focus on context, intent and verification. That means encouraging teams to slow down, check sender info, confirm requests through other channels and report anything that feels off. No shame in asking questions,” Williamson added. “On the tech side, companies should invest in email authentication, phishing-resistant MFA and real-time monitoring. The threats are faster, smarter and more convincing. Our defenses need to be too. And for individuals? Stay sharp. Ask yourself why you’re getting a message, what it’s asking you to do and how you can confirm it safely. The tools are evolving. So must we. Because if we don’t adapt, the average user won’t stand a chance.”

    HOW AI CHATBOTS ARE HELPING HACKERS TARGET YOUR BANKING ACCOUNTS

    How to protect yourself from AI-powered scams

    Staying safe in this new environment requires both awareness and action. Here are steps you can take right now:

    1) Slow down, verify, and use strong antivirus

    If you get an email, text or call that feels urgent, pause. Verify the request by contacting the sender through another trusted channel before you act. At the same time, protect your devices with strong antivirus software to catch malicious links and downloads.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 

    2) Use a personal data removal service

    Reduce your risk by scrubbing personal information from data broker sites. These services can help remove sensitive details that scammers often use in targeted attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan 

    3) Check sender details carefully

    Look at the email address, phone number or social media handle. Even if the message looks polished, a small mismatch can reveal a scam.

    4) Use multi-factor authentication (MFA)

    Turn on multi-factor authentication (MFA) for your accounts. This adds an extra layer of protection even if hackers steal your password.

    5) Keep software updated

    Update your operating system, apps and security tools. Many updates patch vulnerabilities that hackers try to exploit.

    6) Report suspicious messages

    If something feels off, report it to your IT team or your email provider. Early reporting can stop wider damage.

    7) Question the context

    Ask yourself why you are receiving the message. Does it make sense? Is the request unusual? Trust your instincts and confirm before taking action.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    AI is rewriting the rules of cybersecurity. North Korean and Chinese hackers are already using tools like ChatGPT, Claude, and Gemini to break into companies, forge identities, and run elaborate scams. Their attacks are cleaner, faster, and more convincing than ever before. Staying safe means staying alert at all times. Companies need to update training and build stronger defenses. Everyday users should slow down, question what they see, and double-check before trusting any digital request.

    Do you believe AI companies are doing enough to stop hackers from misusing their tools or is the responsibility falling too heavily on everyday users? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • 10 iOS 26 tricks that help you get more out of your iPhone

    [ad_1]

    NEWYou can now listen to Fox News articles!

    IOS 26 has arrived, bringing a mix of practical upgrades and fun new features that make your iPhone smarter and easier to use. Updating only takes a few minutes, and it ensures you get the latest tools along with Apple’s newest security fixes.

    From smarter spam filters in Messages to custom alarm snooze times and even polls in group chats, iOS 26 is packed with ways to simplify your day. Here’s how to install iOS 26 and start exploring its best features right away.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Updating to iOS 26 takes just a few minutes. (Kurt “CyberGuy” Knutsson)

    How to update your iPhone to iOS 26

    Updating to iOS 26 takes just a few minutes, and it ensures you get the latest features and security fixes. Make sure your iPhone is charged and connected to Wi-Fi before you start.

    Follow these steps:

    • Open the Settings app on your iPhone.
    • Tap General.
    • Select Software Update.
    • If iOS 26 is available, tap Upgrade to iOS 26.
    • Click Update Now.
    • Enter your passcode if asked, then agree to the terms.
    • Wait for the download and installation to finish. Your iPhone will restart with iOS 26.
    Steps to update iPhone with iOS 26

    Your phone will restart with the new update after following the process. ( )

    iOS 26 compatible devices:

    IOS 26 works on a wide range of iPhones, from the iPhone 11 series through the latest iPhone 17 lineup. Compatible models include:

    IPhone 17, iPhone 17 Pro, iPhone 17 Pro Max, iPhone Air, iPhone 16e, iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 15, iPhone 15 Plus, iPhone 15 Pro, iPhone 15 Pro Max, iPhone 14, iPhone 14 Plus, iPhone 14 Pro, iPhone 14 Pro Max, iPhone 13, iPhone 13 mini, iPhone 13 Pro, iPhone 13 Pro Max, iPhone 12, iPhone 12 mini, iPhone 12 Pro, iPhone 12 Pro Max, iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, and iPhone SE (2nd generation and later).

    1) Smarter spam message detection

    Spam texts arrive at the worst times. IOS 26 filters these unwanted messages into a separate folder, keeping your main inbox clean. Here’s how to use this feature:

    • Open the Messages app.
    • Click the horizontal lines in the upper right of the screen
    • Go to the Unknown Senders folder.
    • Review texts moved there automatically.
    • Click the right arrow and mark as known or delete the spam.

    You can check the “Unknown Senders” folder anytime, mark trusted contacts or delete the clutter without ever being disturbed by lock screen notifications.

    Steps to mark as known or delete the spam in unknown senders folder

    Users are also able to instantly share location via Maps.  ( )

    2) Instantly share your location in Maps

    IOS 26 makes it simple to send your location without even opening the Maps app. Here’s how:

    • Touch and hold the Maps icon on your Home Screen.
    • Tap Send My Location.
    • From there, you can choose how to share it. AirDrop works best if the person is nearby, while Messages lets you send it instantly to friends or family anywhere.

    This shortcut removes the hassle of digging through menus and makes sharing directions effortless.
     

    Steps to instantly share your location in Maps

    The new update also allows users to sort and view call history by contact. ( )

    3) View call history by contact

    No more endless scrolling. Now you can quickly see every incoming, outgoing and missed calls in one organized list.

    • Open the Phone app.
    • Click the search icon.
    • Type the contact’s name and click the search icon. 
    • Select the contact’s name.
    Steps to view call history by contact

    New updates make it easier to view all calls with one person at a glance. ( )

    • Select Call History
    • There you will see all calls associated with that person.

    This makes it easy to check all your calls with one person at a glance, without scrolling through your entire log.

    Steps to view call history by contact

    Specific text can also now be selected in a text message. ( )

    Sign up to get more of my Tech Tips in my FREE CyberGuy Report. Sign up for free here:
    CYBERGUY.COM/NEWSLETTER 

    4) Select specific text in a message

    Sometimes you only need one detail instead of the entire message bubble. Here’s how to grab it:

    • Open the Messages app.
    • Long-press the message you want.
    • Tap Select from the menu.
    • Drag the selection handles to highlight just the part you need.
    • Click the right arrow > to choose to copy, look up, translate, search webspeak or share it instantly.

    It’s a quick way to pull out only the detail you need, whether that’s an address, a code or just a single word.

    Steps to select specific text in a message

    The new update permits users to disable “tap recents to call.”  ( )

    5) Disable “Tap Recents to Call”

    Accidental calls can be embarrassing. IOS 26 lets you turn this off, so tapping a number in Recents won’t instantly dial; you’ll have to press the call button on purpose. Here’s how to toggle off or disable the feature:

    • Open Settings.
    • Scroll down and tap Apps.
    • Choose Phone.
    • Toggle off Tap Recents to Call.

    Now your call log stays drama-free. Tapping a number in Recents won’t instantly start a call anymore. You’ll need to press the call button on purpose. That means no more accidentally ringing your boss when you just wanted to double-check the number.

    EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

    Steps to disable "Tap Recents to Call"

    The above illustration features steps to disable “Tap Recents to Call” in the Settings App. ( )

    6) Customize alarm snooze options

    Not a fan of the default 9-minute snooze? IOS 26 lets you set the interval that actually matches your morning routine. Follow these steps to adjust it:

    • Open the Clock app.
    • Tap the Alarms tab.
    • Select an existing alarm (or tap + to create one).
    • Tap Snooze Duration. 
    • Choose your snooze time from 1 to 15 minutes.
    • Tap Save.

    Your mornings become more manageable, whether you’re grabbing a quick 5-minute reset or easing into the day with a longer break.

    Steps to customize alarm snooze options

    The above illustration shows steps to customize alarm snooze options in Clock App. ( )

    7) Get a dirty lens warning

    Nothing ruins a photo faster than a smudged lens. With iOS 26, you can turn on Lens Cleaning Hints, so your iPhone warns you before you take a blurry shot. Here’s how:

    • Open Settings.
    • Scroll down and tap Camera.
    • Find Lens Cleaning Hints.
    • Toggle the switch on.

    Now, when your camera detects smudges or haze, iOS 26 will display an on-screen hint in the Camera app, reminding you to clean the camera lens before taking your shot.

    Steps to get Get a dirty lens warning

    Here are steps to get a dirty lens warning in Settings App. ( )

    8) See estimated charging time

    Ever wonder how long it will take to fully charge your iPhone? IOS 26 now shows you an estimated charging time so you can plan your day better. Here’s how to view it:

    • Plug your iPhone into a charger.
    • Wake your phone, and the Lock Screen will display the estimated time until fully charged.
    • For more details, open Settings.
    • Tap Battery.
    • Look for the Estimated Full Charge Time under the charging status.

    This makes it easy to tell whether you’ll be at 100% before leaving the house or if you should pack a charger for later.

    Steps to see estimated charging time

    This makes it easy to tell whether you’ll be at 100% before leaving the house or if you should pack a backup charger. ( )

    9) Make the clock on your Lock Screen bigger

    Want your time display to stand out more? IOS 26 lets you adjust the size of the clock on your Lock Screen for a bolder look. Here’s how:

    • Long-press on your Lock Screen.
    • Tap Customize at the bottom.
    • Use the pull handle on the bottom right to adjust the size.
    • Tap Done to save your changes.

    On certain wallpapers, the clock even has a depth effect, slipping behind the subject in your photo. With Photo Shuffle wallpaper, the clock can adjust dynamically, and it also stretches in areas like the Notification Center, giving your iPhone a fresh and lively feel.

    CLICK HERE TO GET THE FOX NEWS APP

    Steps to make the clock on your Lock Screen bigger

    Users can also modify their clock appearance. ( )

    10) Create a poll in iMessage

    Can’t decide what color to paint your walls, where to eat or which movie to watch? IOS 26 lets you create quick polls right inside group chats so everyone can vote. Here’s how:

    • Open the Messages app.
    • Enter a conversation (this works in group chats or individual messages).
    • Tap the + button next to the text box.
    • From the pop-up menu, select Polls.
    • Tap each choice field and type your options (add more choices by typing into the next blank field).
    • When you’re done, tap Send (Up arrow).

    Now your friends or coworkers can vote directly in the chat, and you can decide whether to follow the results or just order what you were craving anyway.

    Steps to create a poll in iMessage

    Users can also now create a polls for others in iMessage. (Kurt “CyberGuy” Knutsson)

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    IOS 26 goes beyond security patches; it’s about convenience and personalization. You can finally adjust your snooze to match your mornings, keep your inbox free from spam, see how long charging will take and even get a heads-up if your camera lens is dirty before snapping a shot. These small but meaningful updates add up to a smoother iPhone experience.

    Which iOS 26 feature are you most excited to try first, polls in iMessage, spam filters or something else entirely? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Bill Maher explores connection between internet memes and recent political violence

    [ad_1]

    NEWYou can now listen to Fox News articles!

    “Real Time” host Bill Maher asked an internet culture researcher Friday about memes to understand how people get “inspired to kill.” 

    Memes, or “historical documents” with various interpretations, were engraved on the shell casings of late Turning Point USA founder Charlie Kirk’s suspected assassin, “Real Time” guest Aidan Walker said.

    Kirk’s accused killer etched gamer-inspired and antifascist messaging on his casings, including, “Hey, fascist! Catch!” and a reference to a World War II anthem.

    MAHER BLASTS HOLLYWOOD LIBERALS FOR NOT ACKNOWLEDGING CHARLIE KIRK’S ASSASSINATION AT THE EMMYS

    “But [memes] take on new meanings, I mean this is part of why people get inspired to kill,” Maher said. “Because they get insulted by them, right? They get hurt by them. They have a meaning that a lot of us older people are not getting, correct?” 

    Suspected assassin Tyler James Robinson, (L) and a John Brown Gun Club recruiting poster with a nod to the alleged killer found on the Georgetown University campus on Sept. 24, 2025.  (Fox News)

    The discussion came in the wake of Wednesday’s deadly shooting at a Dallas I.C.E. facility, where one detainee was killed, and two others were wounded before the shooter took his own life. The gunman reportedly left behind a bullet casing inscribed with the phrase “anti-ICE.” 

    He was almost “murdering ironically,” Maher considered. 

    MAHER SAYS COMPARING TRUMP TO HITLER MUST END, WARNS IT MAKES IT EASIER FOR KILLERS TO JUSTIFY ASSASSINATIONS

    “I mean, that’s a place society has never been,” Maher continued. “Yes, young men are bad and fumbling to get women to agree to what they want to do. But it was never like this. We never had the term incel [involuntarily celibate].” 

    A lot of memes can also be ironic, Walker explained.

    Five rounds, one of which says "Anti-ICE" in blue letters on it.

    FBI Director Kash Patel said investigators recovered these rounds from the scene in Dallas where a gunman opened fire on the local ICE field office on Sept. 24, 2025.  (FBI)

    “In a way it’s a little bit like dog whistle…they’re so layered in, you know, I don’t really mean this, but you can put this sort of anti-social or hateful idea behind that,” he described.

    The 26-year-old researcher attributed problematic anti-social behavior to not just an affordability crisis but a “crisis of meaning.” 

    MANGIONE, CATHOLIC CHURCH SHOOTER, CHARLIE KIRK SHOOTER, ICE SHOOTER ALL USED ENGRAVED BULLETS

    “You have a lot of especially young people who don’t see a future for themselves, who feel lonely, who feel alienated,” he discussed. “And they congregate in these online spaces sort of outside of the mainstream where they feel like that online world is more important than their real world.”

    wifi iphones smartphones

    Friends holding phones (Cyberguy.com)

    Walker went on to share “the way out” that he says gives him hope.

    “It’s giving people those social bonds… giving everybody the shot at dignity and the shot at being seen in our culture,” he said. 

    CLICK HERE TO GET THE FOX NEWS APP

    While Republicans like Vice President JD Vance blame “left-wing political radicalization” for recent violence, Maher didn’t mince words in his closing monologue for those arguing the Left is “more approving” of it:

    “You keep saying the Left is more approving of political violence – well who do you think that’s going to be aimed at?” Maher asked. “I know it feels exhilarating to make the liberals cry their liberal tears after they made you feel disrespected and looked down on flown over and called the nutty ones. But come on, I thought you were the tough guys. Get over it.”

    [ad_2]

    Source link

  • The world’s first flying car is ready for takeoff

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You may soon drive to an airport, then fly home. Alef Aeronautics announced formal agreements with Half Moon Bay and Hollister airports to begin test operations of a road-legal, vertical-takeoff flying car. This vehicle will drive and then take off vertically, operating alongside other aircraft. Those airports now join the company’s three existing test locations, making five in total.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    CHINA’S FIRST MASS-PRODUCED FLYING CAR DEBUTS

    How the world’s first flying car works

    Alef will start with its “Model Zero Ultralight” and eventually move to its commercial Model A. The Model A will drive, take off vertically, fly forward, land vertically and maneuver on both roads and runways. Alef will alert other aircraft before its carplanes move on the ground or in the air. The agreements also require conventional aircraft to retain priority and right of way over Alef’s operations.

    WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?

    The Alef has produced images of its forthcoming flying car. (Alef Aeronautics)

    Flying car range, battery power and FAA rules

    Alef designed the Model A to be fully electric. It will travel up to 200 miles on roads and 110 miles while flying. The vehicle would be required to follow certain rules: only daylight flights are permitted, and no flying is allowed over crowded areas or cities. Alef has already received the Federal Aviation Administration’s Special Airworthiness Certification for limited testing.

    CLICK HERE TO GET THE FOX NEWS APP

    An Alef car in flight

    The car is light enough to bypass certain FAA certifications. (Alef Aeronautics)

    Flying car pre-orders, cost and release date

    Alef opened pre-orders for the Model A in 2022. Interested buyers have placed over 3,300 pre-orders. Buyers must place a $150 refundable deposit to join the regular queue or $1,500 for priority. The expected price per vehicle stands at roughly $300,000. Alef plans to begin production around the end of 2025.

    What this means for you

    You could someday bypass traffic by driving just a few miles, then lifting off to fly the rest. These tests could spark a shift toward mixed road-air travel in suburbs or rural areas. Still, current rules limit ultralight flying to daylight and sparsely populated routes. Regulations will need updates to allow broader use. Nevertheless, these tests show that future commutes might blend highways and air corridors.

    An Alef flying car parked in front of a house

    Alef will begin production on the car in late 2025. (Alef Aeronautics)

    Kurt’s key takeaways

    Alef is moving flying cars from imagination to reality. With new airport agreements and early FAA approval, the company has a clear path to test what’s possible. The rules still limit when and where these cars can fly, but progress is steady. If production stays on schedule, you may soon see the world’s first flying cars taking off alongside everyday traffic.

    Would you trust flying cars to be part of your daily commute? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Top 5 overpayment scams to avoid

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Overpayment scams are on the rise, and they can leave victims thousands of dollars in debt. The setup usually looks harmless: someone sends you a check for more than the agreed amount, asks you to forward the difference and disappears once the check bounces. Below are five of the most common overpayment scams you need to watch for today.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    1. The dog walker overpayment scam

    Bob from Harrison, Ohio, recently shared how he was nearly tricked by a scammer posing as a pet owner. The con began with a request for dog sitting. Bob was promised $250 for care and food, but then a fake check for $4,358 arrived.

    The scammer instructed Bob to send $4,000 of it to an “appliance retailer.” Why an appliance retailer when the service was for dog sitting? Scammers often use a third party to make the request sound more believable. If they simply asked for the money back, it would raise red flags. By inventing another company, whether a retailer, shipping service or contractor, they add urgency and legitimacy to the story. In reality, that “retailer” is just another front that the scammer controls. Here’s the catch: the check appears to be real, but it’s actually counterfeit. The bank may release the funds temporarily, but once it bounces, you’re on the hook for the entire amount.

    Making a payment by scanning a QR code with a phone. (Kurt “CyberGuy” Knutsson)

    Tip: If you’re asked to forward money to a third party, especially one unrelated to the original deal, treat it as a scam. Keep the check and envelope as evidence, and report it to the FTC and your state attorney general.

    2. The online marketplace scam

    Selling a couch, bike or electronics online? Some buyers “accidentally” send too much. They then ask you to return the difference through Zelle, Venmo or a wire transfer. Once the check or payment reverses, you’ve lost both the product and the money you returned.

    Tip: Always insist on verified payment methods. If a buyer pushes you for a refund quickly, walk away. 

    FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US

    A woman shopping for clothes

    Scammers may try to recruit buyers into buying gift cards before a false check they provided bounces. (Kurt “CyberGuy” Knutsson)

    3. The mystery shopper scam

    You might get an email or letter offering a job as a mystery shopper. They send you a large check to “test” stores by buying gift cards. You’re asked to send the gift card numbers back as proof of purchase. After the bank reverses the fake check, you’ve lost the money you spent on those gift cards.

    Tip: Real companies never pay upfront with extra funds or ask for gift card codes by email.

    4. The rental deposit scam

    Scammers target renters by mailing a check for more than the deposit or rent. They claim it was a mistake and ask you to refund the difference. The check later bounces, leaving you stuck.

    Tip: Only accept payments through secure online portals or in person with verified funds.

    5. The work-from-home equipment scam

    This one lures jobseekers. The “employer” sends a large check to buy office equipment, then directs you to forward the extra funds to a vendor. Of course, the check is fake, and the supposed vendor is also the scammer.

    Tip: Legitimate employers provide equipment directly or reimburse verified expenses, not through overpayments.

    CLICK HERE TO GET THE FOX NEWS APP

    Treadmill desk

    Scammers target remote workers by promising to provide a stipend for work-from-home tech. (iStock)

    How to protect yourself from overpayment scams

    Now that you’ve seen how these scams play out, from fake dog sitting gigs to marketplace frauds and bogus job offers, it’s clear they all follow the same playbook. Someone sends you too much money and pressures you to forward the extra. That “extra” never existed, and once the check bounces, you’re left holding the bag. The good news is, there are clear steps you can take to protect yourself and keep your money safe.

    Pause before acting

    Every scam in this article, from the dog walker hoax to rental deposit tricks, begins with an overpayment that looks harmless. If someone pays you more than you’re owed, it’s not a mistake. It’s a scam. Do not respond or send money to any third party. Save the check and envelope as evidence, then report it.

    Verify funds with your bank

    Scammers count on you trusting what you see in your account. In Bob’s case, his $4,358 check looked real because the bank showed it as “available.” But available isn’t the same as cleared. Always ask your bank to confirm when funds are fully verified before you spend a dime. 

    Avoid rushing

    Urgency is the scammer’s strongest weapon. Marketplace fraudsters, renters and fake employers will pressure you to “fix” the mistake right away. Slow down, double-check and don’t let anyone force you into quick action. 

    Use secure payment systems

    Whether it’s for rent, freelance work or selling a used item, scammers prefer paper checks because they’re easy to fake. Stick with secure, traceable payment platforms or in-person verified funds. That way, you don’t get stuck when a check bounces.

    Keep records of all communication

    If you receive a suspicious check, save everything: the envelope, emails, texts and any names used. In the dog sitting scam, Bob’s saved emails and the scammer’s phone number became valuable evidence. This documentation helps law enforcement and protects you if the scammer tries again under another identity.

    Use a personal data removal service

    Scammers often find victims by scraping personal details from online data brokers. That’s how they target renters, pet sitters or jobseekers. Using a personal data removal service can limit your exposure and make you harder to target in the first place. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Enable fraud alerts with your bank

    Many banks let you set fraud alerts for large deposits or unusual transactions. Turning these on gives you a chance to review suspicious activity before a scammer pressures you into acting on it.

    Report scams

    Just like Bob did when he cut contact with the fake pet owner, reporting scams helps protect others. File with the Federal Trade Commission (FTC) at reportfraud.ftc.gov and your state attorney general. You can also alert your local police and community groups to stop scammers from targeting someone else.

    Kurt’s key takeaways

    Overpayment scams prey on trust and urgency. They can pop up in online sales, job offers, rental agreements and even friendly community boards. By knowing the warning signs, you can stop scammers before they reach your wallet. Stay cautious whenever you’re asked to deposit more than expected and forward the extra. If it sounds strange, it’s probably a scam.

    What should be done to stop overpayment scams now that they’ve gotten out of hand? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Luxury camper van feels like a penthouse on wheels

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you’ve spent time in a camper van, you know what to expect. You trade a little comfort for a lot of freedom, squeeze into tight corners and make peace with the idea that personal space is secondary to mobility. 

    But every once in a while, a new model rolls onto the scene that flips that thinking on its head. Meet the Robeta Ananya. This isn’t just a van: it’s a “glamper” on wheels, and it makes other builds look like tin cans.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?

    A true living room, not just a chair

    Robeta makes it clear they really mean luxury. Instead of adding the typical swivel seat like most models, they built an actual, fully realized living room. There is a partition between the driving cab and the main cabin. The star of the show is an L-shaped couch that runs over six feet long. And it’s not just any couch. It is deep, plush and inviting. It’s the kind of seating where you can stretch out on without bumping into a dinette table or a cabinet corner.

    Robeta Mobil is offering a luxury camping experience via its newest camper model, available in 2026. (Robeta Mobil)

    Bedtime gets an upgrade

    When the sun goes down, that beautiful lounge transforms. A double bed lowers from the ceiling, turning the room into a proper bedroom without having to rearrange cushions or fold anything in a weird way. In the morning, it lifts right back up, making space for coffee and conversation. It is a smooth trick that makes the van feel more like a studio apartment than a rolling compromise. Neither the couch nor the bed needs to sacrifice comfort the way sofa beds typically do.

    Laundry on the road

    Let’s talk about the washer and dryer. Yes, really. A compact Tiny Wash unit is built right into the wardrobe. It handles just enough for a quick refresh, and it actually dries, too. No more hanging socks from cabinet knobs or relying on campground and public laundromats. For extended trips, this little feature is a money saver and an absolute game changer.

    VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION

    An interior view of the Robeta camper van

    Robeta Mobil says that its Ananya model will offer a luxury experience on the road. (Robeta Mobil)

    A kitchen you’ll actually use

    Over in the kitchen, things continue to impress. You get a Corian countertop, a proper two-burner gas stove, a grill and oven combo, and a roomy 130-liter fridge and freezer. This setup is ready for real cooking, not just boiling water or reheating prepackaged meals. If you like to eat well on the road, this one is built with you in mind.

    A bathroom that feels like a bathroom

    At the rear of the van, the bathroom doesn’t feel like an afterthought. It has a sink, a full-standing shower and a macerating toilet. Instead of cramming it all into a tiny box, Robeta gave it a soft curtain enclosure that keeps the look minimal and the space functional. It feels clean, intentional and refreshingly roomy.

    Power to keep you out there

    This luxury van even has the chops for off-roading. The Ananya packs a 10-kilowatt-hour EcoFlow power system with stackable batteries and 450 watts of solar. You can stay off the cord for days without blinking. Add in a 160-liter freshwater tank, diesel heat and hot water via Webasto, and the freedom to wander suddenly looks very comfortable. These amenities are remarkable for a camper van this size.

    Robeta Ananya price in the U.S. and how to buy one

    The Robeta Ananya is pure luxury on wheels, and its price reflects that. In the United States, the limited Founders’ Edition starts at about $295,000. Only five of these exclusive models will be built, with deliveries starting in January 2026. If you want one, you’ll need to act quickly. Robeta is taking U.S. orders directly through its website.

    CLICK HERE TO GET THE FOX NEWS APP

    A mockup of the Robeta Ananya

    Robeta Mobil says that it is only producing five Ananya vans for U.S. customers. (Robeta Mobil)

    What this means for you

    If you’ve been holding off on van life because you don’t want to sacrifice comfort, the Robeta Ananya changes the game. It delivers a real living room, a full kitchen and a bathroom that feels like it belongs in a home. You can wash clothes on the road, sleep in a proper bed and stay powered up for days without plugging in. This means you can explore remote places without giving up the little luxuries that make travel enjoyable. In short, you get the freedom of the open road with the comfort of a high-end apartment.

    Stay connected while you roam

    When you’re traveling in a camper van, nothing kills the vibe faster than losing cell service, especially if you rely on your phone for maps, music, work or keeping in touch. Thankfully, there are two handy solutions to keep you connected: cell phone boosters and mobile hotspots.

    Cell phone boosters 

    Cell phone boosters amplify weak signals from nearby towers, making calls clearer, boosting data speeds and reducing dropped calls. They’re ideal for rural drives, national parks or even just passing through patchy areas. Installation typically involves an outside antenna to capture the signal, an amplifier to boost it and an inside antenna to rebroadcast it inside your van. 

    Mobile hotspots

    Mobile hotspots, on the other hand, turn a cellular signal into a private Wi-Fi network for your devices. They’re perfect for working remotely from the road, streaming movies or sharing the internet with multiple passengers. Many can run off your phone plan or use a dedicated SIM card for more robust coverage.

    Pro tip: If your adventures often take you far from towns or highways, a cell phone booster is your best bet for call reliability. If you need strong Wi-Fi for work or entertainment, pair it with a mobile hotspot for the ultimate on-the-road connectivity.

    Check out my top 5 best cellphone booster picks at CyberGuy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    The Robeta Ananya proves that camper vans can be more than cramped compromises. With thoughtful design, smart use of space and luxury features, it invites you to travel farther and stay longer in comfort. Whether you want to roam the backroads or set up in scenic spots for days, this van makes it easy to do both in style.

    Does the Robeta Ananya make van life more tantalizing for you? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The 3 Black Designers Who Are Using Tech To Shape Fashion’s New Reality

    [ad_1]

    And the woman behind Loomia is: Madison Maxey, who started it out of a desire to make electronics disappear into clothing, so the fabric does the work without feeling like gear. Before Loomia, she experimented with conductive inks, computational design, and patterning electronics with designers and engineers. LEL is now mostly used in medical, outdoor, automotive, and wellness fields, proving that wearable tech can be something that’s used, lived in, and trusted every day, by everyone. Case in point: A recent collaboration with L.L. Bean, where LEL was sewn or attached inside of outdoor gear to report wear behavior: temperature, wash, count, and usage patterns. The versatility of the technology shows how seamlessly it can be folded into existing brand identities and products. Loomia isn’t just for Loomia —  it’s scalable and transferable, and that’s its real strength.

    [ad_2]

    Jamie Landeau

    Source link

  • How retirees can stop fake debt collector scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You pick up the phone and hear a stern voice claiming you owe money. Maybe it’s for a credit card you don’t recognize, a loan you never took out or some old bill you thought was long gone. Panic sets in, especially if the caller threatens arrest, wage garnishment or lawsuits.

    Unfortunately, this scenario is becoming all too common. Scammers are posing as debt collectors, and retirees are among their favorite targets. Even legitimate debt collection companies have crossed the line. One such company was ordered to pay over $8 million for harassing people into paying fake debts.

    The good news? With a little knowledge and some practical steps, you can spot these calls, protect yourself and stop them before they get too close for comfort.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    JURY DUTY PHONE SCAMS ON THE RISE AS FRAUDSTERS IMPERSONATE LOCAL OFFICIALS, THREATEN ARREST

    A 96-year-old woman sits in an armchair in her apartment in Germany on Sept. 1, 2025, and makes a phone call.  (Matthias Balk/picture alliance via Getty Images)

    Why retirees are prime targets

    Scammers don’t call at random. Retirees often make ideal marks because:

    • Less frequent monitoring: Many retirees check credit reports and bank accounts less often, making it easier for fraud to go unnoticed.
    • Accumulated assets: Retirement savings, pensions and home equity make seniors look “cash-rich” to scammers.
    • Trust factor: Politeness and trust on the phone can be exploited.
    • Less tech-savvy: Some retirees feel less comfortable with online verification.

    This combination creates a perfect storm for fake debt collection scams.

    Red flags of fake debt collector calls

    Recognizing the signs can stop scammers in their tracks.

    • Immediate threats or pressure: Real collectors cannot threaten arrest or use abusive language under the Fair Debt Collection Practices Act (FDCPA).
    • Unusual payment methods: Gift cards, wire transfers and cryptocurrency are red flags. Legitimate collectors use checks, debit or bank payments.
    • Refusal to verify debt: If they won’t send written proof, hang up.
    • Mismatch with public records: Fake companies often use official-sounding names that don’t exist.

    Requests for unrelated personal information: Collectors don’t need your Social Security number or bank logins.

    FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US

    An elderly person hanging up a phone

    Kurt “Cyberguy” Knutsson lays out red flags of fake debt collector calls. (Matthias Balk/picture alliance via Getty Images)

    How to safely verify debt collector calls

    Even if a call raises red flags, it’s essential to verify the information before taking action. Here’s how:

    1) Request written verification

    Under the FDCPA, you have the right to ask for a debt validation letter. This document should include:

    • The creditor’s name
    • Original amount owed
    • Verification that the collector is legally authorized to collect the debt.

    Ask for this before paying or sharing any personal info.

    2 Look up the collector

    Check with state attorneys general offices or the Consumer Financial Protection Bureau (CFPB). Verify that the company exists and is licensed to collect in your state.

    3) Contact the original creditor

    If you recognize the debt or think it may be legitimate, call the creditor directly using a verified phone number. Do not rely on the caller’s number; scammers often spoof official-looking numbers.

    4) Use trusted resources

    The FTC offers a “Debt Collection” section on its website with tips and complaint forms. If you suspect fraud, filing a report can help stop the scammers from targeting others.

    CLICK HERE TO GET THE FOX NEWS APP

    A woman on the phone

    Experts warn retirees to be vigilant regarding fake debt collector calls. (Kurt “CyberGuy” Knutsson)

    Pro tip: Extra step to protect your personal information

    Fraudsters rely on personal data to make calls sound convincing. Reducing the amount of information available about you online lowers your risk. Data brokers collect and sell details like your name, phone, address and even past debts. A data removal service can automatically remove your data from hundreds of broker sites, making it harder for scammers to find and target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    When and where to report a scam

    If you’ve encountered a fake debt collector, report them right away:

    • FTC: File at FTC.gov
    • State Attorney General: Use the consumer complaint division in your state
    • CFPB (Consumer Financial Protection Bureau): Submit a complaint online at consumerfinance.gov/complaint/or by phone

    Reporting helps protect other retirees from falling victim.

    Kurt’s key takeaways

    Protecting your retirement isn’t just about managing your savings; it’s about defending your personal information, too. Scammers thrive on fear, urgency and trust, but you now have the knowledge to push back. By spotting red flags, verifying calls and reducing what’s available about you online, you can stop fake debt collectors in their tracks.

    If a scammer called you tomorrow, would you be ready to spot the lies and protect your hard-earned savings? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Social media verification systems lose power as scammers purchase checkmarks to appear legitimate

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Social media makes it easy to connect with people, but it also makes it just as easy for fraudsters to pretend they are someone they are not. Fake accounts, misleading checkmarks and smooth-talking profiles are everywhere, and not everyone knows how to spot them. I recently received an email from Marie from Boynton Beach, Florida, with a similar concern:

    “I have been on X, and it seems quite a few people turn out to be not who they say they are. Mostly the ones that are verified. I am not that good tech-wise. Is there a way other than me knowing immediately they are a fraud?? Thank God I am not the type to give personal information or money.”

    It is a fair concern, Marie. With scams becoming more polished, the line between real and fake accounts is harder to see. Let’s break down why fraud is so common on social media, the red flags you should look out for, and the simple habits that can keep you from getting duped.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    A man logs into his social media account on a laptop. Fraudsters often exploit online activity to trick users. (Kurt “CyberGuy” Knutsson)

    Why social media is a playground for scammers

    Social platforms are built for speed and visibility. Anyone can create an account in minutes, post content instantly and connect with strangers worldwide. This openness is what makes social media engaging, but it is also what makes it ripe for abuse. Fraudsters exploit the fact that posts, comments and messages are consumed quickly and often without much scrutiny.

    Verification systems that were once meant to help users identify legitimate accounts have also lost some of their power. On platforms where checkmarks can be purchased, scammers can buy credibility without earning it. Add in the algorithms that reward viral content and sudden spikes in engagement, and you get the perfect environment for fraud to spread unnoticed.

    Scammers know people often lower their guard on social media. In these spaces, users share personal details, build emotional ties with influencers and trust posts that look familiar. As a result, the combination of speed, trust and visibility creates an ideal environment for fraud to spread rapidly.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Woman typing on laptop with social media platform open.

    A woman browses social media on her laptop. Scammers use fake accounts and misleading profiles to lure victims. (Kurt “CyberGuy” Knutsson)

    The cost of falling for a scam

    When people think of scams, they often imagine losing a one-time sum of money. The reality is far more damaging. Clicking a bad link or handing over credentials can snowball into long-term consequences. Once scammers get access to your information, it can be sold on dark web marketplaces, used to open fraudulent accounts or leveraged for identity theft.

    There is also the reputational cost. If your social media account is hijacked, scammers can use it to trick your friends, family or followers, spreading fraud even further under your name. Cleaning up that mess can take weeks and may permanently damage your credibility.

    Smartphone screen showing popular social media apps including Facebook, Instagram, WhatsApp, and X.

    Social media apps are prime hunting grounds for scammers who rely on speed and trust to deceive victims. (Kurt “CyberGuy” Knutsson)

    Practical steps you can take to stay safe on social media

    There are simple ways to protect yourself without needing technical expertise. I have listed some of the crucial steps below.

    1) Scrutinize profiles before engaging

    Fake accounts often have clear giveaways. Look at how long the account has existed, whether it posts original content and the kind of followers it has. Scammers usually recycle generic profile photos or steal images from real people. Reverse image searches can help you confirm if a photo belongs to someone else.

    Even with verification, be skeptical. On platforms where checkmarks can be purchased, anyone can appear “official” without being trustworthy. Treat every new interaction with caution until proven otherwise.

    FACEBOOK CRYPTO ADS LEAD TO DANGEROUS MALWARE SCAMS

    2) Avoid clicking on random links

    Fraudsters often send links over DMs, comments or even ads. These links may lead to phishing sites designed to steal your credentials or malware that installs silently on your device. One careless click can expose your information.

    This is where having strong antivirus software comes in. Even if you accidentally land on a malicious site, a strong antivirus can block harmful downloads and warn you before malware runs. Think of it as a safety net for moments when curiosity gets the better of you.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/.

    3) Protect your logins

    Phishing scams frequently mimic login screens for X, Instagram or Facebook. They are designed to trick you into typing your username and password into a fake form. Once you do, the scammer immediately takes over your account.

    A password manager can be a lifesaver here. It only fills in your login details on the genuine site you have saved. If it does not recognize the page, that is a red flag that you are looking at a fake. On top of that, a password manager makes it easier to use strong, unique passwords for each account, which limits damage if one gets compromised.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/.

    4) Keep personal info under wraps

    The less information fraudsters can find about you, the weaker their scams become. Many impersonators use details like your hometown, job or relatives to build trust. If your email, phone number or address is floating around the web, scammers can weaponize that too.

    A personal data removal service can help here by scrubbing your details from people-search sites and data brokers. While not foolproof, reducing your digital footprint makes you a harder target for impersonation or social engineering scams. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/.

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

    5) Stay alert to impersonation scams

    Fraudsters often pretend to be well-known figures, influencers or even customer support staff. They use urgency like “limited offer,” “you have won” or “your account will be closed” to pressure you into responding fast.

    When money, gift cards or personal details are involved, slow down. Contact the real brand or person through official channels to verify. If you are unsure, simply ignore the request.

    6) Trust your instincts

    One of the strongest defenses you have is your gut feeling. If a verified profile is asking for money, if a giveaway sounds too good to be true or if someone’s tone feels off, it probably is. Scammers rely on you ignoring that little voice that says something is not right.

    Take a breath, pause and think before you act. That moment of hesitation often makes the difference between staying safe and becoming a victim.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Social media can be entertaining, informative and even empowering, but it is also one of the easiest hunting grounds for fraudsters. They thrive on speed, trust and distraction, hoping you will react before you think. While no tool or habit can guarantee absolute safety, combining skepticism with smart protective steps puts you in a much stronger position.

    Do you think paid verification badges make it harder to spot scammers? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Beware of fake Wi-Fi networks that steal your data when traveling

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Earlier this year, Australian police arrested a passenger for running a malicious Wi-Fi network both at an airport and during a flight. The setup looked just like the airline’s own Wi-Fi service, but it wasn’t. Instead, it was what cybersecurity researchers call an “evil twin,” a fake hotspot designed to trick people into handing over their credentials.

    The idea isn’t new, but the setting is. For years, fake Wi-Fi networks have been a common trick in cafes, hotels, and airports. What makes this case stand out is that the attacker took it to the skies, exploiting the growing reliance on in-flight Wi-Fi for entertainment and internet access.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    What is an evil twin Wi-Fi attack?

    An evil twin hotspot is a wireless network that impersonates a legitimate one by copying its name, also known as the SSID. When multiple networks with the same name exist, your phone or laptop often connects to the one with the stronger signal, which is usually the attacker’s.

    Travelers check their phones while navigating delays and flight cancellations at the Austin-Bergstrom International Airport on July 19, 2024, in Austin, Texas. (Brandon Bell/Getty Images)

    Once connected, victims are often redirected to a fake login or landing page. In this case, the malicious portal requested passengers’ email addresses, passwords, or even social media credentials under the pretense of granting access to the airline’s entertainment system. The stolen information could then be used for account takeovers, identity theft, or further attacks.

    Why travel Wi-Fi is a prime target

    Travel creates a perfect storm for these kinds of attacks. Whether you’re in a hotel, airport, cruise ship or airplane, you often have limited choices for getting online. Mobile data may be patchy or expensive, which pushes people toward the available Wi-Fi networks. Because these services feel official and are tied to trusted brands, travelers tend to assume they’re safe and let their guard down when login requests pop up.

    Another trend adds to the risk. Travel providers are increasingly moving entertainment and services onto personal devices instead of offering built-in options. Airlines replace seatback screens with streaming portals, cruise lines promote app-based services and hotels direct guests to digital check-in platforms. All of these require a Wi-Fi connection, which means more people are logging on than ever before.

    QANTAS DATA BREACH EXPOSES MILLIONS OF CUSTOMER RECORDS

    How hackers trick you with fake in-flight Wi-Fi

    Here’s how it worked in the Australian case. The attacker carried a portable hotspot onboard and named it to match the airline’s official Wi-Fi network. Passengers, seeing the fake network with stronger signal strength, connected automatically. They were then taken to a counterfeit login page asking for personal details.

    Newark, New Jersey airport passenger on phone

    A traveler awaits their delayed luggage after United Airlines grounded flights due to a tech outage at Newark Liberty International Airport in Newark, New Jersey, Aug. 6, 2025.  (REUTERS/Ryan Murphy)

    On a flight, the consequences are amplified. Passengers either give in and share data or lose access to entertainment for hours. The success rate of this attack is, quite literally, sky-high.

    YOUR DISCARDED LUGGAGE TAGS ARE WORTH MONEY TO SCAMMERS

    Why you need a VPN for in-flight Wi-Fi security

    One of the best defenses against rogue Wi-Fi is a Virtual Private Network, or VPN. A VPN creates an encrypted tunnel between your device and the internet, making it far harder for attackers to intercept your data even if you connect to the wrong hotspot.

    There is a catch, though. In-flight Wi-Fi systems often require you to disable your VPN temporarily to access the onboard portal. Even then, a VPN remains an important safeguard. Once you have cleared the login page and, if you have paid, connected to the internet, enabling your VPN ensures that any browsing, messaging, or app traffic stays private.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at CyberGuy.com.

    9 tips for using in-flight Wi-Fi safely

    A VPN is important, but it isn’t the only defense you should rely on. Here are some other ways to stay safe when connecting midair:

    1) Install strong antivirus software

    Before you even think about connecting to in-flight Wi-Fi, make sure your device has a strong antivirus installed. It’s your first line of defense against malicious sites and apps that attackers may try to push through fake portals. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    Denver airport passenger checks phone

    James Garofalo of Colorado Springs is checking cellphone after his flight cancelation at Denver International Airport in Denver, Colorado, on Thursday, Dec. 22, 2022. (Hyoung Chang/The Denver Post)

    2) Enable two-factor authentication (2FA)

    Even if an attacker manages to steal your login credentials, 2FA can stop them from getting into your accounts. Use app-based authenticators rather than SMS codes whenever possible, since they work offline and are harder to intercept.

    3) Turn off automatic Wi-Fi connections

    Most phones and laptops are set to reconnect automatically to familiar networks. This makes it easier for a fake hotspot with the same name to trick your device. Before you board, switch off auto-connect and manually choose the correct airline Wi-Fi.

    4) Use HTTPS everywhere

    When browsing in-flight, check for the padlock icon in your browser’s address bar. HTTPS encrypts the connection between your device and the website, making it harder for attackers on public Wi-Fi to intercept your data.

    5) Limit what you access

    Even with precautions, in-flight Wi-Fi should be treated as untrusted. Avoid logging in to sensitive accounts like online banking or work systems. Stick to light browsing, streaming or messaging until you’re back on a secure connection.

    6) Keep your device updated

    Outdated operating systems and apps often have security holes attackers exploit. Before your trip, install the latest updates on your phone, tablet or laptop. Many updates include security patches that protect you against known vulnerabilities.

    7) Use airplane mode with Wi-Fi only

    When possible, switch your device to airplane mode and then enable only Wi-Fi. This reduces exposure from other radios (like Bluetooth or cellular roaming) that attackers sometimes target on flights.

    8) Watch for phishing pop-ups and avoid suspicious clicks

    Some fake in-flight portals use pop-ups or redirects designed to trick you into entering login details or clicking on malicious links. If a page asks for unnecessary information, like your full Social Security number, banking details or unrelated logins, treat it as a red flag. Close the page immediately and don’t click.

    9) Log out after use

    When the flight is over, sign out of the airline’s Wi-Fi portal and any accounts you accessed. This prevents session hijacking if the system keeps tokens cached.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The rise of evil twin attacks in the air is a reminder that convenience often comes with hidden risks. As airlines push more passengers toward in-flight Wi-Fi, attackers are finding ways to exploit that dependency. Next time you fly, think twice before blindly connecting to the first Wi-Fi network that pops up. Sometimes, the safest choice is to stay offline until you land.

    Would you rather go a few hours offline than risk using an untrusted hotspot midair? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Waze update ends support for older Android phones

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you rely on an older Android device, whether it’s a phone, tablet or car infotainment unit, you may soon lose access to all the new Waze features. Waze’s latest beta, version 5.9.90 and higher, now requires Android 10 as a minimum, up from the previous requirement of Android 8.

    This change means that while your device may still run Waze, it will no longer receive updates. That applies to all the navigational improvements, bug fixes and new tools Waze typically rolls out every few months.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    Older Android devices may not be able to download the latest Waze updates. (Waze)

    Why Waze dropping Android 8 and 9 support matters

    First, it’s important to note that Google Maps continues to support Android 8 and Android 9, offering a lifeline if you’re stuck on older software.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Still, Waze is a community-driven navigation leader. Its strength comes from real-time, crowdsourced reporting of incidents, police traps, road hazards and even gas prices, features that many drivers value above Google Maps.

    Who loses Waze features on older Android devices

    • Drivers using older smartphones or tablets: If you haven’t updated your device to Android 10, you’ll lose access to new Waze features.
    • Users of aftermarket in-car infotainment systems: Many of these budget units still run Android 8 (Oreo) or Android 9 (Pie), meaning they’ll soon fall behind.
    Three views of the Waze app are seen side by side.

    Devices that have not been updated to at least Android 10 will not be able to access Waze’s newest features. (Waze)

    What Waze’s Android 10 requirement means for you

    If Waze is your go-to navigation app, here’s what to keep in mind:

    • You can keep using Waze on older Android versions, but you won’t get new features or updates.
    • App reliability may decline over time as backend changes or server protocols evolve.
    • Map updates and basic reporting may still work for a while, but support isn’t guaranteed indefinitely.
    • Google Maps remains a fallback option, as it still supports older Android systems.

    HOW TO DISABLE GEMINI AI ON ANDROID AND KEEP CONTROL OF YOUR APPS

    Three views of the Waze app are seen side by side.

    As a version of the app gets older, it may become less reliable over time. (Waze)

    Tips to keep Waze working on your Android device

    If you rely on Waze daily, here are some quick ways to stay ahead of the update cutoff:

    • Check your Android version: Go to SettingsAbout PhoneSoftware Information to confirm if you’re running Android 10 or higher.
    • Update your device: If your phone or tablet supports it, install the latest Android update to keep Waze fully functional.
    • Consider a budget upgrade: If your hardware is stuck on Android 9 or older, affordable Android 10+ phones and tablets are widely available.
    • Update car infotainment systems: Many aftermarket head units allow software updates. Check the manufacturer’s site to see if Android 10 is available.
    • Keep Google Maps as backup: If updating isn’t possible, Google Maps still works on Android 8 and 9, ensuring you’re never left without navigation.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: CyberGuy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The shift to Android 10 reflects a common pattern in app development: focus on newer OS versions enables advanced features and stronger security. For most Android users, especially those on modern devices, this is a non-issue. But if you’re using older hardware, especially in your vehicle, you must plan ahead. To keep enjoying the full Waze experience, consider whether upgrading your device or switching to supported apps like Google Maps is the smarter move.

    Will you upgrade your device to stay updated with Waze, or will this change push you to switch to Google Maps? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Sam’s Club customers targeted by phishing scam using fake $100 reward offers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Dennis and Carole recently reached out to us with a warning about a suspicious email claiming to offer a $100 Sam’s Club reward. 

    “We received this yesterday, and my wife fell for the scam and initiated the free gift offer. No credit card other than email transferred,” Dennis said.

    The email looked professional, with the official Sam’s Club logo at the top. It read, “YOUR OPINION IS IMPORTANT. Exclusive. YOU CAN GET A $100 REWARD.” It then invited the recipient to “Take a short survey to claim your $100 reward. Click the button below to get started,” with a bold black button labeled “GET STARTED NOW!”

    Despite no credit card being entered, the couple wanted to know:

    • Will scammers be able to charge their credit card?
    • Do they already have credit card info?
    • What steps should they take?

    Let’s break this all down.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX

    A couple warns about a new email scam disguised as a Sam’s Club survey. (Kurt “CyberGuy” Knutsson)

    Why this Sam’s Club email is a scam

    At first glance, the email looked like it came straight from Sam’s Club, complete with the logo, blue color scheme and a tempting promise of a $100 reward for filling out a short survey. That’s exactly what scammers want you to think.

    This is a classic phishing scam. Cybercriminals copy a trusted brand’s style to trick you into clicking their links or entering personal information. Once you engage, they can:

    • Collect your email address for spam lists
    • Send more realistic-looking phishing attempts
    • Try to lure you into giving up payment or account details in future messages
    • Direct you to malware-infected websites

    In this case, only an email address was entered. That means there’s no direct credit card risk, yet. However, scammers now know the address is active and that someone at it will click through, making it more valuable for targeted scams later. The next step is protecting yourself quickly, because stopping them now is far easier than dealing with identity theft later.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    person receiving spam email on laptop

    Experts warn consumers not to click suspicious looking links. (Peter Dazeley)

    How to protect yourself after clicking a link in a scam email

    If you entered your email in a scam form, take these steps right away to reduce the risk of further attacks:

    1) Use strong antivirus software

    Run a scan with a trusted antivirus program. Many modern security tools also include phishing protection, blocking dangerous links before they can load. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    2) Mark the email as phishing

    Use your email provider’s spam or phishing report tool to flag the message. This helps block future attempts and trains filters to catch similar scams. 

    3) Consider a data removal service

    Data removal services can contact data brokers to remove your personal information from their lists. This makes it harder for scammers to target you with more personalized attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Sam's Club Store Bentonville Arkansas

    Scammers are claiming to offer a $100 Sam’s Club reward. (REUTERS/Rick Wilking)

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Watch for follow-up scams

    Scammers often follow up with urgent-sounding emails to “confirm” your account or claim you won a prize. Delete these immediately without clicking links or opening attachments. 

    5) Change your passwords and strengthen security

    Never reuse the same password across multiple accounts. If scammers target your email address, they may try it with common password guesses. Create unique, strong passwords for each account and store them in a reputable password manager.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Report the scam

    Forward the email to:

    • Sam’s Club: phishing@samsclub.com
    • FTC: reportphishing@apwg.org

    Reporting helps both the brand and law enforcement track scam activity.

    CLICK HERE TO GET THE FOX NEWS APP

    Consumers are advised to report phishing emails to the company or the FTC.

    Consumers are advised to report phishing emails to the company or the FTC. (CyberGuy.com)

    Kurt’s key takeaways

    Even if you avoid entering payment details, your personal information still has value to scammers. An email address can open the door to phishing attacks designed to steal passwords, install malware, or gather more sensitive data. Scammers know how to make an email look convincing, especially when they dangle a gift card as bait. By staying alert, reporting suspicious emails and protecting your personal data, you can reduce your risk.

    Have you ever received a fake reward email from a brand you trust? How did you handle it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The new robot that could make chores a thing of the past

    [ad_1]

    NEWYou can now listen to Fox News articles!

    What if a robot could handle cleaning, serving and even complex tasks around your home or workplace? That’s exactly what X Square Robot hopes to deliver with its latest launch. 

    The company just introduced Quanta X2, a highly advanced robotic butler designed for dexterity and versatility. Alongside the robot, it unveiled Wall-OSS, an open-source artificial intelligence (AI) model meant to power robots that can adapt to unpredictable real-world tasks.

    These big reveals come with a major funding boost of around $100 million in Series A+ backing led by Alibaba Cloud, with participation from HongShan, INCE Capital, Meituan, Legend Star and Legend Capital.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HUMANOID ROBOTS HANDLE QUALITY CHECKS AND ASSEMBLY AT AUTO PLANT

    X Square Robot announces its newest Quanta X2 model that functions as a robot butler. (X Square Robot)

    Quanta X2: Built for daily life and beyond

    Quanta X2 isn’t your typical robot. Standing at about 5 feet 8 inches tall and weighing around 210 pounds, it features 62 degrees of freedom for smooth, lifelike motion. Its seven-degree-of-freedom robotic arm is paired with dexterous hands that can sense pressure changes and perform delicate movements.

    The robot can grip, clean or even express emotions through gestures. A modular clamp system lets it attach brushes or mop heads for 360-degree cleaning. With an arm reach of 30 inches, a payload capacity of about 13 pounds and fine precision down to 0.001 inches, Quanta X2 is designed to work in both home and industrial settings.

    AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING

    A Quanta X2 robot cleaning a table

    X Square Robot also unveiled its Wall-OSS AI model to train the advanced humanoid robots. (X Square Robot)

    Wall-OSS: Smarter AI for unpredictable tasks

    Alongside Quanta X2, X Square Robot introduced Wall-OSS, a new open-source embodied AI model. Trained on vision-language-action data, it helps robots “think” and act more like humans when faced with unpredictable tasks.

    Unlike task-specific systems that fail outside narrow scenarios, Wall-OSS generalizes across multiple robot types. It also solves key challenges such as catastrophic forgetting and syncing vision, language and action. By reasoning, planning and executing seamlessly, robots powered by Wall-OSS can move from the lab into the messy real world.

    Developers will be able to access Wall-OSS on GitHub and Hugging Face, building community-driven datasets to accelerate adoption.

    CLICK HERE TO GET THE FOX NEWS APP

    A Quanta X2 robot holding a cutting board

    X Square Robot is bringing humanity closer to having robot butlers. (X Square Robot)

    What this means for you

    The dream of a robot that vacuums, delivers food or helps with complex tasks is moving closer to reality. Quanta X2 shows how robots can evolve beyond factories and into homes, hotels and offices. By open-sourcing Wall-OSS, X Square Robot is inviting developers everywhere to help build the next generation of robots. That collaboration could accelerate the day when robotic assistants become as commonplace as smartphones.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    X Square Robot is betting that embodied AI and open-source collaboration will finally push robots past flashy demos and into everyday life. With Quanta X2 and Wall-OSS, it is laying the groundwork for robots that don’t just perform one task, but adapt to whatever you need. The big question is whether these robots can prove reliable, affordable and safe enough for widespread use.

    If a robot like Quanta X2 could do your chores, would you trust it in your home? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Would you buy the world’s first personal robocar?

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Silicon Valley startup Tensor is taking a bold step into the future of driving. Unlike rivals chasing robotaxi fleets, Tensor wants consumers to own the first true self-driving car. The company calls it the world’s first personal robocar.

    This luxury EV promises Level 4 autonomy, meaning you can ride with your eyes off the road while the steering wheel folds away into the dash. In its place, a wide screen transforms the driver’s seat into a lounge or mobile office.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

    Tensor aims to have its autonomous vehicles, a prototype of which is seen in this undated photo, available for purchase by 2026. (Tensor )

    Tensor robocar loaded with sensors and AI power

    Tensor built this machine from the ground up. It is covered in technology: 37 cameras, five custom lidars, 11 radars, plus microphones, ultrasonics and water detectors. Each sensor includes cleaning systems to keep its view clear in any condition.

    The car runs on Tensor’s own Foundation Model, a transformer-based AI designed to mimic human driving decisions. Unlike many competitors, the system works without constant cloud support. That means better privacy and no dependency on remote servers.

    LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING

    Tensor aiming for full self-driving vehicle

    Unlike rivals chasing robotaxi fleets, Tensor wants consumers to own the first true self-driving car. (Tensor)

    How Tensor’s robocar differs from robotaxis

    Most autonomous startups, including Tensor’s earlier brand AutoX, started with robotaxi fleets. Those are easier to control since they operate in one city and return to a depot every night.

    Tensor is taking a tougher path with consumer cars. That means the robocar must adapt to highways, urban roads and real-world conditions without a safety net. While it won’t travel on every road from day one, owners can take control whenever needed.

    VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION

    The steering wheel in a Tensor vehicle

    Tensor’s robocars must adapt to more real-world conditions without a safety net. (Tensor)

    Tensor’s robocar is designed for safety and luxury driving

    Tensor promises full redundancy with steering, braking and computing. If one system fails, backups take over instantly. The interior design adds another layer of appeal. With retractable pedals and foldable steering, the cabin feels more like a living space than a driver’s seat.

    The company partnered with VinFast, the Vietnamese automaker, to manufacture the vehicle. Pricing remains under wraps, but executives admit it will exceed luxury electric vehicles like the Lucid Air.

    CLICK HERE TO GET THE FOX NEWS APP

    A video screen in a Tensor robocar

    Tensor says that its self-driving cars will be comparable to other luxury vehicles on the market. (Tensor)

    What this means for you

    Tensor’s approach signals a turning point. Instead of waiting for ride-hailing services to roll out self-driving fleets, consumers may soon buy autonomy outright. If successful, this could reshape not just commuting, but how we think about owning cars at all.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Tensor has history on its side. Its AutoX roots gave it years of testing, including permits for driverless operation in California since 2020. Now rebranded, it’s racing to sell the first consumer-ready robocar by 2026. The gamble is big. Luxury buyers may welcome the futuristic design and privacy protections, but mass adoption will depend on trust, safety and real-world performance.

    Would you hand control of your daily drive to a car that promises to drive itself? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • New Evite phishing scam uses emotional event invitations to target victims

    [ad_1]

    NEWYou can now listen to Fox News articles!

    I recently got an email from a friend with the subject “Special Celebration of Life.” It looked like a genuine Evite invitation. But when I clicked the “View Invitation” button, my antivirus software blocked the site, flagging it as a phishing attempt.

    It was one of the most convincing scam emails I’ve seen lately, complete with Evite branding, realistic design, and a personal touch. If I didn’t have strong antivirus protection, I might have walked right into it.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Phishing email appears to be a legitimate Evite invitation titled “Special Celebration Of Life.” (Kurt “CyberGuy” Knutsson)

    How this Evite phishing scam works

    Scammers send fake Evite messages with emotionally charged subjects, such as a “Special Celebration of Life,” to lure you into clicking. These emails mimic Evite’s design so they appear to come from someone you know, lowering your guard.

    Woman using laptop in chair

    Scammers are sending fake Evite invitations that look personal and trustworthy. One click can expose a user’s personal data or install malware. (Kurt “CyberGuy” Knutsson)

    Clicking the malicious link can:

    • Steal your personal information
    • Capture your login credentials
    • Install malware on your device

    Because these invitations feel personal and urgent, they can bypass skepticism. Always verify sender details before opening event links, especially for sensitive occasions. 

    Person reviewing email inbox on laptop

    Always hover over links and check sender details before clicking, especially on invitations or urgent messages from unfamiliar sources. (Kurt “CyberGuy” Knutsson)

    Steps to protect yourself from fake Evite phishing scams

    Even the most convincing invitation can be a trap, as the fake Evite email I received proved. By following these steps, you can lower your chances of falling for similar scams and keep your personal information safe.

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    1) Use strong antivirus software for real-time protection

    Strong antivirus software can stop you from landing on dangerous sites. In my case, the antivirus software blocked the fake Evite link and flagged it as phishing before any damage was done. Choose strong antivirus software with phishing detection and automatic blocking to protect against threats you might not spot yourself.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 

    2) Check the sender’s email address carefully

    Scammers often use email addresses that look almost identical to legitimate ones, but with tiny changes, like an extra letter, a missing character, or a different domain extension. In my fake Evite example, the branding looked perfect, but the sender’s address didn’t match Evite’s official domain. Always double-check before trusting an email.

    HOW I ALMOST FELL FOR A MICROSOFT 365 CALENDAR INVITE SCAM

    3) Hover over links before clicking

    Before you click “You’re Invited!”, “View Invitation” or “RSVP Now,” hover your mouse over the link. Your email client will usually display the destination URL. In the phishing email I received, the link pointed to a suspicious domain, not Evite.com. In the phishing email I received, the link pointed to a suspicious domain, not Evite.com. If you look closely, you’ll see it was misspelled as “envtte.” If the address looks odd or unfamiliar, don’t click. 

    Fake Evite email with a red box highlighting a suspicious phishing link resembling Evite branding.

    A closer look reveals the fake link in this email that leads to a suspicious domain, not Evite.com. (Kurt “CyberGuy” Knutsson)

    4) Use a personal data removal service to limit your exposure

    The less personal information scammers can find about you online, the harder it is for them to target you. A personal data removal service can scrub your personal details, such as your phone number, home address, and email, from public databases. This reduces the risk of scammers crafting convincing, personalized phishing attempts like the fake Evite email I received.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

     5) Verify with the sender directly before clicking

    If an invitation appears to come from a friend, don’t assume it’s real. Scammers often spoof the names of people you know. Send a quick text or make a phone call to confirm they actually sent the invite. In many cases, they’ll be just as surprised as you are to hear about it.

    What this means for you

    Phishing scams are evolving to look more authentic than ever. Even if the message seems to come from someone you trust, one careless click can put your personal data at risk. Having strong cybersecurity tools in place and knowing how to spot a scam is your best defense.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    I was lucky my antivirus software blocked this attack before any damage was done. But not everyone has that safety net. The next time an unexpected invitation or urgent message lands in your inbox, take a few extra seconds to verify before you click.

    Have you ever almost fallen for a fake event invite? What happened? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Apple Watch Series 11 gets FDA-cleared alert for ‘silent killer’ condition

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The World Health Organization estimates that nearly 1.3 billion adults live with hypertension worldwide. Many don’t even know they have it. That’s why Apple’s latest announcement could change lives.

    Apple Watch Series 11 now includes FDA-cleared hypertension notifications. Starting next week, the feature will roll out in more than 150 locations, including the U.S., EU, Hong Kong and New Zealand. It will also come to Apple Watch Series 9 and later, plus Apple Watch Ultra 2 and later, via watchOS 26.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    APPLE WINS BLOOD OXYGEN BATTLE FOR WATCH OWNERS

    Apple Watch Series 11 now includes FDA-cleared hypertension notification. (Apple)

    Apple Watch hypertension alerts explained

    Hypertension is often called the “silent killer” because it can strike without symptoms. Left unchecked, it increases the risk of heart attack, stroke and kidney disease. By adding passive blood pressure monitoring, Apple Watch aims to help millions detect early warning signs.

    Using its optical heart sensor, the watch reviews how your blood vessels respond to heartbeats over 30-day periods. If it detects consistent patterns of hypertension, you’ll get a notification. Apple expects the feature could alert more than 1 million people with undiagnosed hypertension in its first year alone.

    iPhone and Apple Watch showing hypertension alert

    Apple Watch sends users a “Possible Hypertension” alert when heart data shows consistent signs of elevated blood pressure. Paired with the iPhone, users can log blood pressure and follow up with doctors. (Apple)

    Clinical validation of Apple Watch hypertension feature

    Apple built the new hypertension notification feature on a foundation of years of health research. Since the launch of Apple Watch, heart health tools like ECG, AFib History and irregular rhythm notifications have helped users catch issues early. The hypertension notification now extends that mission by addressing one of the most common and dangerous silent conditions.

    The feature works in the background during waking hours, analyzing photoplethysmography (PPG) signals, changes in blood volume under the skin, to detect patterns that suggest chronic high blood pressure. You do not need to calibrate the feature or take direct blood pressure readings with the watch. Instead, the device tracks signals over 30 days and sends a notification if consistent signs of hypertension appear.

    CAN YOUR APPLE WATCH DETECT PREGNANCY?

    Study results confirm accuracy of hypertension alerts

    Apple developed the algorithm using data from more than 100,000 study participants across diverse ages, races, body types, and health statuses. The company then validated its accuracy through a pivotal clinical study with over 2,000 participants, who wore Apple Watch alongside an at-home cuff to compare results.

    The validation study showed the feature achieved a specificity rate above 92%, meaning it minimized false positives. Sensitivity rates were especially strong for Stage 2 hypertension, the more severe form of the condition, where the feature identified more than half of users at risk. That accuracy could help prevent strokes, heart attacks and kidney disease in those who may not otherwise know they have hypertension.

    Importantly, the study confirmed that the feature performed consistently across age groups, genders, races and skin tones, making it reliable for Apple’s global user base. Apple also ran usability testing to fine-tune onboarding and notification language so people understand the alerts and what actions to take next.

    By passively monitoring and flagging possible signs of hypertension, Apple Watch helps fill a dangerous gap in diagnosis. Hypertension often goes unnoticed for years, but now, you can be alerted within just one month of wearing the watch. 

    man holding apple watch series 11

    Apple CEO Tim Cook holds up the new Apple Watch Series 11 during a launch event at Apple Park in Cupertino, California, on Sept. 9, 2025. (David Paul Morris/Bloomberg)

    Expert cardiologist weighs in on Apple Watch hypertension alerts

    Cardiologist and scientist Dr. Harlan Krumholz of Yale University and Yale New Haven Hospital told CyberGuy,

    “I’m glad to see Apple turning attention toward hypertension—the number one preventable cause of heart attack and stroke. Their approach automatically flags signals that suggest you may have high blood pressure and encourages you to check it out. That’s especially important because so many people remain undiagnosed. The feature also provides a way to archive blood pressures, so if people are measuring at home, they can bring that information to their doctor. This isn’t a one-stop solution, but it has the potential to help consumers take charge of their health and identify hypertension earlier. The caveat is that people shouldn’t rely on it exclusively—regular care remains essential.”

    EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

    Close-up of Apple Watch sensor glowing green

    By using optical sensors, Apple Watch monitors blood volume changes under the skin to passively detect hypertension trends in the background. (Apple)

    How to respond to Apple Watch hypertension alerts

    If you receive a hypertension alert, Apple recommends:

    • Log blood pressure daily for seven days with a third-party blood pressure cuff
    • Share your results with your doctor at your next appointment.
    • Follow American Heart Association guidelines for further evaluation.
    Runners wearing Apple Watches

    Apple Watch Series 11 and Ultra 3 are built for both fitness and health—now including FDA-cleared hypertension alerts for active users worldwide. (Apple)

    How to update your Apple Watch to watchOS 26

    The new hypertension notifications aren’t limited to Apple Watch Series 11. If you own an Apple Watch Series 9 or later, or an Apple Watch Ultra 2 or later, you’ll also get access once you update to watchOS 26.

    Updating is simple:

    • Keep your Apple Watch on its charger and connected to Wi-Fi.
    • Open the Watch app on your iPhone.
    • Tap General, then Software Update.
    • Follow the on-screen steps to install watchOS 26.

    After the update, you can enable hypertension notifications in the Health app, allowing your watch to start passively monitoring for signs of chronic high blood pressure.

    Apple Watch showing digital clock face

    The Apple Watch Series 11 features a sleek design and cutting-edge health tools, including passive blood pressure monitoring designed to detect hypertension early. (Apple)

    Apple Watch Series 11 release date and preorder details

    Apple Watch with pink and purple bubbles on screen

    Apple Watch Series 11 is available for preorder starting today, with in-store availability beginning Friday, Sept. 19. (Apple)

    You can preorder Apple Watch Series 11 today, with in-store availability starting Friday, Sept. 19. Prices start at $399.

    The lineup includes:

    Apple Watch Series 11: The flagship model comes in aluminum or titanium finishes, with FDA-cleared hypertension notifications and all the latest health and fitness tools. It’s the best choice for most people who want the newest design and features.

    Apple Watch Ultra 3: Built for outdoor adventures, the Ultra 3 offers extra durability, a larger display, and longer battery life. It’s designed for athletes, hikers, and anyone who needs a tougher smartwatch. It also comes with FDA-cleared hypertension notifications.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Apple Watch is stepping up in a big way. With hypertension notifications now cleared by the FDA, it’s no longer just about tracking workouts or closing rings. It’s about giving you a heads-up on one of the biggest silent health risks out there. For millions who rarely visit a doctor, this could be a life-saving tool. Hypertension often goes unnoticed, but now, your watch can help flag risks before they become emergencies. While Apple Watch isn’t a substitute for medical care, it adds another safety net to your daily routine.

    Would you trust your smartwatch to be the first to alert you to a serious health risk, such as hypertension? Let us know your thoughts in the comments below. Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • Trump expected to extend TikTok divestment deadline again: Report

    [ad_1]

    President Donald Trump‘s administration is expected to extend the September 17 deadline for China’s ByteDance to divest TikTok‘s U.S. assets or shut down the popular short-video app, according to a Reuters report citing a source familiar with the matter.

    This would mark the fourth extension granted by Trump since retaking office in January, following previous delays that moved the original congressional deadline to April, then May, June, and now potentially beyond September.

    Newsweek has reached out to the White House via email on Saturday for comment.

    Why It Matters

    The president’s stance on TikTok has evolved. During his first term, he signed executive orders to ban the app, which were later blocked by courts. His change in position followed meetings with American investors and public acknowledgment of TikTok’s role in his political outreach to young voters during last year’s election.

    Despite congressional mandates requiring ByteDance to sell its U.S. operations or face a ban, the continued delays signal the Trump administration’s reluctance to shut down an app used by approximately 170 million Americans.

    The administration’s August launch of an official White House TikTok account further underscores the platform’s strategic importance for political communication.

    What To Know

    TikTok’s uncertain status stems from longstanding concerns about Beijing’s potential ability to use the platform for surveillance, blackmail, or censorship of Americans. The app faces a federal sell-or-ban law enacted by Congress that originally required ByteDance to divest U.S. operations by January 2025.

    Any potential sale faces significant technical and political hurdles, particularly regarding TikTok’s proprietary algorithm, which would require Beijing’s approval to share with U.S. buyers.

    A previous deal framework would have created a new U.S.-based company majority-owned by American investors, but progress stalled after China indicated it would not approve the arrangement following Trump’s tariff announcements.

    The expected extension comes as U.S. Treasury Secretary Scott Bessent and Trade Representative Jamieson Greer engage in trade talks with Chinese Vice Premier He Lifeng in Spain where TikTok has been included as an official agenda item for the first time in bilateral negotiations, Reuters reported. The meeting in Spain follows previous rounds in Geneva, London, and Stockholm where the app was not discussed.

    This development provides the Trump administration with political cover for another extension, sources told Reuters.

    The TikTok app logo is shown on an iPhone on January 17 in Houston.

    AP Photo/Ashley Landis, File

    What People Are Saying

    President Donald Trump wrote in June on Truth Social: “I’ve just signed the executive order extending the deadline for the TikTok closing by 90 days (September 17, 2025). Thank you for your attention to this matter!”

    White House press secretary Karoline Leavitt said in an August statement: “The Trump administration is committed to communicating the historic successes President Trump has delivered to the American people with as many audiences and platforms as possible.”

    Trump’s then-national security adviser Mike Waltz said in January: “…President Trump has been very clear: Number one, TikTok is a great platform that many Americans use and has been great for his campaign and getting his message out. But number two, he’s going to protect their data.”

    What Happens Next?

    The administration faces mounting pressure to either finalize a divestment arrangement or provide a clear justification for indefinite delays.

    [ad_2]

    Source link