ReportWire

Tag: TECH

  • This Chrome VPN extension secretly spies on you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Browser extensions promise convenience, but some take far more than they give. A new report from Koi Security says that FreeVPN.One, a Chrome extension with more than 100,000 installs and even a “Featured” badge, has been secretly taking screenshots of users’ browsing sessions.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

    Google Chrome extension FreeVPN.One has allegedly taken screenshots of users’ sensitive information. (Kurt “CyberGuy” Knutsson)

    How FreeVPN.One secretly captured your browsing

    Once installed, FreeVPN.One didn’t just handle VPN traffic. It silently captured screenshots of every website you visited, bank logins, private photos, sensitive documents, and sent them to servers controlled by the developer.

    Even worse, the extension added permissions step by step, disguising its activity as “AI Threat Detection.” What looked like a useful feature became a tool for constant background surveillance.

    Why this Chrome extension threat is so dangerous

    People install VPNs to protect their privacy. Instead, this extension flipped that expectation on its head. By using Chrome’s and scripting permissions, FreeVPN.One gained access to every page you opened.

    Koi Security researchers tested the extension and confirmed it captured screenshots even on trusted sites like Google Photos and Google Sheets. The developer claimed these images were not stored, but offered no proof.

    MALICIOUS BROWSER EXTENSIONS CAUGHT SPYING ON 2 MILLION USERS

    Person looking at their computer screen.

    The screenshots were allegedly sent to the extension’s developer. (Kurt “CyberGuy” Knutsson)

    Warning signs of unsafe free VPN extensions

    There were red flags all along:

    • Awkward grammar and poorly written descriptions.
    • A generic Wix page as the only developer “contact.”
    • A promise of unlimited, free VPN service with no clear business model.

    While some free VPNs may work responsibly, most need a way to profit. If it isn’t by charging you, it may be by selling your data.

    FreeVPN.One developer’s response and Google’s removal

    When Koi Security published its findings, the developer behind FreeVPN.One offered a partial explanation. He claimed the automatic screenshot captures were part of a “Background Scanning” feature, intended only for suspicious domains. He also said the images weren’t stored, only briefly analyzed for threats.

    But researchers observed screenshots taken on trusted sites like Google Photos and Google Sheets, which don’t fit that explanation. When asked to provide proof of legitimacy, such as a company profile, GitHub repository, or professional contact, the developer stopped responding. The only public link tied to the extension led to a basic Wix starter page.

    FreeVPN.One has been removed from the Chrome Web Store. Attempts to visit its page now return the message: “This item is not available.”

    While the removal reduces the risk of new downloads, it also highlights a troubling gap. The extension spent months with spyware behavior while still carrying a verified label, raising questions about how thoroughly Chrome reviews updates to featured extensions.

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    A screenshot of the Microsoft Edge store

    FreeVPN.one is not available in the Microsoft Edge store (Koi Security)

    Steps to protect yourself from VPN extension spyware

    If you’ve installed FreeVPN.One or any suspicious Chrome VPN extension, take these steps if you are concerned for your cybersecurity:

    1) Uninstall immediately

    Go to ChromeWindowExtensions and click remove.

    2) Use a trusted VPN

    Stick to reliable VPN providers that have proven track records, audited policies, and transparent operations. By choosing a legitimate VPN, you take control of your privacy instead of handing it over to an anonymous developer. A reliable VPN is also essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN 

    3) Scan your device with strong antivirus software

    Run a trusted antivirus tool to check for hidden malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    4) Change your passwords

    Assume anything typed or viewed could have been logged. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your passwords have been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Use a personal data removal service

    Extensions like FreeVPN.One show how easily your private details can be collected and exploited. Even after uninstalling spyware, your personal information may already be circulating on data broker sites that sell your identity to marketers, scammers, and even cybercriminals. A personal data removal service can scan for your information across hundreds of broker sites and automatically request its removal. This limits how much of your data can be weaponized if it’s ever exposed through an extension like this.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    6) Check permissions

    Before adding any extension, review what it requests. If a VPN wants access to “all websites,” that’s a red flag.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    FreeVPN.One is a reminder that “free” often comes at a hidden cost; your data. Don’t assume an extension is safe just because it looks popular or carries a badge. Be critical, vet carefully, and use privacy tools backed by real companies.

    Would you trade your browsing privacy for a free tool, or is it time to rethink the cost of “free”?  Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Scientists extract silver from e-waste using cooking oil

    [ad_1]

    NEWYou can now listen to Fox News articles!

    What if your old bottle of cooking oil could help save the planet and your smartphone? That’s the big idea behind a groundbreaking discovery by researchers in Finland. 

    Scientists from the University of Helsinki and the University of Jyväskylä have found that you can recover silver from electronic waste using common kitchen ingredients like vegetable oil and hydrogen peroxide. This sustainable, scalable method published in the Chemical Engineering Journal could change how we mine precious metals from our growing piles of electronic junk.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    OLD SMARTPHONES ARE BEING TURNED INTO TINY DATA CENTERS

    Scientists have discovered a new method of silver extraction from electronics by using cooking oil. (Bloomberg via Getty Images)

    How cooking oil recovers silver from electronic waste

    Here’s how it works. Fatty acids found in oils like sunflower or olive oil are mixed with hydrogen peroxide. When heated slightly, this combo safely dissolves silver from old circuit boards, wires or keyboard connectors. Then, using ethyl acetate, a far less toxic alternative to industrial solvents, researchers pull out the silver in a solid form. Unlike traditional methods that rely on harsh acids or cyanide-based solutions, this technique avoids toxic runoff and air pollution. Think of it as salad dressing meets science lab, without the environmental mess.

    Why recycling silver from e-waste is urgently needed

    Silver powers the devices you use every day, such as phones, solar panels, electric vehicles and even medical tech. But less than 20% of it gets recycled. As demand rises and natural resources shrink, finding clean ways to reclaim silver isn’t just smart, it’s necessary. Silver prices have surged sixfold in the last 25 years. At the same time, supply has lagged. That makes e-waste a goldmine, literally, for anyone who can unlock its hidden metals without poisoning the environment.

    NEW TECH RECOVERS 92% OF EV BATTERY METALS

    Cell phone waste

    Fatty acids found in cooking oil can stabilize silver ions for easier extraction. (Smith Collection/Gado/Getty Images)

    How scientists extract silver using fatty acids and light

    To figure out exactly how this all works, researchers used advanced computer models to study how fatty acids interact with silver ions. The process not only stabilizes the silver but also allows for easy recovery using light and simple solvents. Better still, the ingredients can be reused, and there’s no chemical waste or massive cost. And it’s highly selective. The method targets silver while leaving other metals behind, a major step forward in urban mining. In testing, even silver-coated keyboard connectors were cleanly processed into pure elemental silver powder using this system.

    A pile of cell phone waste

    Indian laborers sift through a heap of pre-owned mobile phones in an electronic waste workshop Dec. 5, 2023, in New Delhi, India.  (Yawar Nazir/Getty Images)

    What this means for you

    This research brings us closer to safe, at-home or small-scale recycling kits that could recover silver from old gadgets. Recyclers and manufacturers could adopt this method to reduce chemical waste and operating costs, while protecting workers and the environment. This method supports a future where nothing goes to waste. It keeps valuable materials in use, cutting down the need for mining and pollution. Silver is vital for making many of the tech items we use every day. Reusing it responsibly means cleaner energy at a lower cost and less reliance on mined resources.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    We’ve long known that waste is a problem. Now, it might also be the solution. By turning everyday ingredients into powerful recycling tools, scientists are showing us what’s possible when chemistry and sustainability meet. The process is still being refined, but the promise is clear: a greener future where reclaiming valuable metals doesn’t cost the earth, or our health.

    CLICK HERE TO GET THE FOX NEWS APP

    If you could extract silver from your old gadgets with tools in your kitchen, would you do it? Or should this be left to the pros? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
     

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Hacker exploits AI chatbot in cybercrime spree

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A hacker has pulled off one of the most alarming AI-powered cyberattacks ever documented. According to Anthropic, the company behind Claude, a hacker used its artificial intelligence chatbot to research, hack, and extort at least 17 organizations. This marks the first public case where a leading AI system automated nearly every stage of a cybercrime campaign, an evolution that experts now call “vibe hacking.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW AI CHATBOTS ARE HELPING HACKERS TARGET YOUR BANKING ACCOUNTS

    Simulated ransom guidance created by Anthropic’s threat intelligence team for research and demonstration purposes. (Anthropic)

    How a hacker used an AI chatbot to strike 17 targets

    Anthropic’s investigation revealed how the attacker convinced Claude Code, a coding-focused AI agent, to identify vulnerable companies. Once inside, the hacker:

    • Built malware to steal sensitive files.
    • Extracted and organized stolen data to find high-value information.
    • Calculated ransom demands based on victims’ finances.
    • Generated tailored extortion notes and emails.

    Targets included a defense contractor, a financial institution and multiple healthcare providers. The stolen data included Social Security numbers, financial records and government-regulated defense files. Ransom demands ranged from $75,000 to over $500,000.

    Why AI cybercrime is more dangerous than ever

    Cyber extortion is not new. But this case shows how AI transforms it. Instead of acting as an assistant, Claude became an active operator scanning networks, crafting malware and even analyzing stolen data. AI lowers the barrier to entry. In the past, such operations required years of training. Now, a single hacker with limited skills can launch attacks that once took a full criminal team. This is the frightening power of agentic AI systems.

    HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

    Webpage of AI generated ransom note

    A simulated ransom note template that hackers could use to scam victims. (Anthropic)

    What vibe hacking reveals about AI-powered threats

    Security researchers refer to this approach as vibe hacking. It describes how hackers embed AI into every phase of an operation.

    • Reconnaissance: Claude scanned thousands of systems and identified weak points.
    • Credential theft: It extracted login details and escalated privileges.
    • Malware development: Claude generated new code and disguised it as trusted software.
    • Data analysis: It sorted stolen information to identify the most damaging details.
    • Extortion: Claude created alarming ransom notes with victim-specific threats.

    This systematic use of AI marks a shift in cybercrime tactics. Attackers no longer just ask AI for tips; they use it as a full-fledged partner.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    A dark web page selling ransomware services

    A cybercriminal’s initial sales offering on the dark web seen in January 2025. (Anthropic)

    How Anthropic is responding to AI abuse

    Anthropic says it has banned the accounts linked to this campaign and developed new detection methods. Its threat intelligence team continues to investigate misuse cases and share findings with industry and government partners. The company admits, however, that determined actors can still bypass safeguards. And experts warn that these patterns are not unique to Claude; similar risks exist across all advanced AI models.

    How to protect yourself from AI cyberattacks

    Here’s how to defend against hackers now using AI tools to their advantage:

    1. Use strong, unique passwords everywhere

    Hackers who break into one account often attempt to use the same password across your other logins. This tactic becomes even more dangerous when AI is involved because a chatbot can quickly test stolen credentials across hundreds of sites. The best defense is to create long, unique passwords for every account you have. Treat your passwords like digital keys and never reuse the same one in more than one lock.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2. Protect your identity and use a data removal service

    The hacker who abused Claude didn’t just steal files; they organized and analyzed them to find the most damaging details. That illustrates the value of your personal information in the wrong hands. The less data criminals can find about you online, the safer you are. Review your digital footprint, lock down privacy settings, and reduce what’s available on public databases and broker sites.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    Chinese hackers target US telecoms: What you need to know to protect your data

    Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

    3. Turn on two-factor authentication (2FA)

    Even if a hacker obtains your password, 2FA can stop them in their tracks. AI tools now help criminals generate highly realistic phishing attempts designed to trick you into handing over logins. By enabling 2FA, you add an extra layer of protection that they cannot easily bypass. Choose app-based codes or a physical key whenever possible, as these are more secure than text messages, which are easier for attackers to intercept.

    4. Keep devices and software updated

    AI-driven attacks often exploit the most basic weaknesses, such as outdated software. Once a hacker knows which companies or individuals are running old systems, they can use automated scripts to break in within minutes. Regular updates close those gaps before they can be targeted. Setting your devices and apps to update automatically removes one of the easiest entry points that criminals rely on.

    5. Be suspicious of urgent messages

    One of the most alarming details in the Anthropic report was how the hacker used AI to craft convincing extortion notes. The same tactics are being applied to phishing emails and texts sent to everyday users. If you receive a message demanding immediate action, such as clicking a link, transferring money or downloading a file, treat it with suspicion. Stop, check the source and verify before you act.

    6. Use a strong antivirus software

    The hacker in this case built custom malware with the help of AI. That means malicious software is getting smarter, faster and harder to detect. Strong antivirus software that constantly scans for suspicious activity provides a critical safety net. It can identify phishing emails and detect ransomware before it spreads, which is vital now that AI tools make these attacks more adaptive and persistent.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    Hacker typing code.

    Over 40,000 Americans were previously exposed in a massive OnTrac security breach, leaking sensitive medical and financial records. (Jakub Porzycki/NurPhoto via Getty Images)

    7. Stay private online with a VPN

    AI isn’t only being used to break into companies; it’s also being used to analyze patterns of behavior and track individuals. A VPN encrypts your online activity, making it much harder for criminals to connect your browsing to your identity. By keeping your internet traffic private, you add another layer of protection for hackers trying to gather information they can later exploit.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    CLICK HERE TO GET THE FOX NEWS APP  

    Kurt’s key takeaways

    AI isn’t just powering helpful tools; it’s also arming hackers. This case proves that cybercriminals can now automate attacks in ways once thought impossible. The good news is, you can take practical steps today to reduce your risk. By making smart moves, such as enabling two-factor authentication (2FA), updating devices, and using protective tools, you can stay one step ahead.

    Do you think AI chatbots should be more tightly regulated to prevent abuse? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Lawmakers call to remove Charlie Kirk assassination videos

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When conservative activist Charlie Kirk was shot and killed during a speaking event at Utah Valley University, videos of the attack spread almost instantly across social media. Within minutes, graphic clips appeared on TikTok, X, Instagram, Facebook and YouTube.

    Lawmakers quickly demanded that the platforms take action. Rep. Anna Paulina Luna (R-Fla.) publicly called on Elon Musk, Mark Zuckerberg and TikTok to remove the footage. Luna wrote on X, “He has a family, young children, and no one should be forced to relive this tragedy online.” Rep. Lauren Boebert (R-Colo.) echoed the plea, saying, “I agree completely! I NEVER want to see that again!! I hate that I saw it at all.”

    That outrage quickly shifted the spotlight to the platforms themselves, with TikTok, Meta and YouTube outlining their responses while X remained largely silent.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    CHARLIE KIRK ASSASSINATION ROCKS CAPITOL HILL, HEIGHTENS LAWMAKERS’ SECURITY FEARS

    Turning Point USA Founder Charlie Kirk speaks during a campaign rally for then-Republican presidential nominee Donald Trump at Desert Diamond Arena on August 23, 2024, in Glendale, Arizona  (Rebecca Noble/Getty Images)

    TikTok responds with removals and safeguards

    TikTok confirmed it is removing videos of Charlie Kirk’s assassination and outlined the steps it is taking to prevent harmful clips from spreading further. The company also issued a statement to CyberGuy expressing condolences to Kirk’s family. A TikTok spokesperson said, “We are saddened by the assassination of Charlie Kirk and send our deepest condolences to his wife Erika, their two young children and their family and friends. These horrific, violent acts have no place in our society. We remain committed to proactively enforcing our Community Guidelines and have implemented additional safeguards to prevent people from unexpectedly viewing footage that violates our rules.”

    Beyond the statement, TikTok pointed to its broader Community Guidelines. The platform explained that all content is first reviewed by automated moderation tools before it appears in feeds. This system helps catch large volumes of content that may violate rules or require age restrictions.

    TikTok prohibits gory, gruesome or extremely violent clips. The company also restricts content showing human or animal blood, extreme fighting or graphic footage. When footage may be in the public interest, TikTok applies safeguards like age restrictions, warning screens, or “opt-in” labels. These measures are designed to reduce exposure, especially for younger users.

    TikTok said that teen accounts cannot access graphic or potentially distressing content, even when the videos are tied to major news events. Clips flagged under this rule are blocked from the “For You” feed and cannot be recommended to underage users.

    TikTok also emphasized that it removes posts that harass victims or degrade people involved in tragedies. Statements that belittle or deny an experience, such as claiming a victim “deserved it,” are banned. The platform also prohibits violent threats, incitement to violence or promotion of criminal activity.

    WATCH: BIPARTISAN GROUP OF LAWMAKERS EXPRESS SHOCK, GRIEF AFTER CHARLIE KIRK’S KILLING

    Charlie Kirk before he was shot hands out hats to the crowd

    Charlie Kirk hands out hats before speaking at Utah Valley University in Orem, Utah, Wednesday, Sept. 10, 2025. (Tess Crowley/The Deseret News via AP)

    Meta removes glorifying content and restricts Charlie Kirk shooting videos to 18+

    Meta, which owns Facebook, Instagram and Threads, confirmed that its Violent and Graphic Content policies apply to the footage of Charlie Kirk’s assassination.   In a statement to CyberGuy, a Meta spokesperson said,

    “We are removing content that glorifies or supports this tragic incident or the perpetrator, while applying warning screens over videos of the incident and restricting their view to people 18 and over.”

    All clips of the shooting are now flagged with a “Mark as Sensitive” warning label. These videos are age-gated to 18 and older and cannot appear in the feeds of underage accounts.

    Meta’s approach includes warning screens, sensitivity filters and age restrictions. When users encounter sensitive videos, they must opt in before they can view the footage. This system is designed to protect people from unexpectedly seeing graphic imagery.

    In this case, the videos are permitted under a public interest exception, but only with restrictions.

    ANTI-TRUMP VOICES PRAISE CHARLIE KIRK’S LEGACY AFTER ASSASSINATION, SAY HE WAS DOING POLITICS ‘THE RIGHT WAY’

    Charlie Kirk speaks at an event at Ohio State University

    Charlie Kirk speaks at Culture War Turning Point USA event at the Ohio State University in Columbus, Ohio on October 29, 2019.  (Megan Jelinger/AFP/Getty Images)

    YouTube restricts Charlie Kirk shooting videos and elevates news sources

    YouTube confirmed it is removing graphic videos of Charlie Kirk’s assassination while also boosting authoritative news coverage of the tragedy. The company said in a statement, “Our hearts are with Charlie Kirk’s family following his tragic death. We are closely monitoring our platform and prominently elevating news content on the homepage, in search and in recommendations to help people stay informed.”

    YouTube explained that it is removing highly graphic videos of the attack, especially those that lack sufficient context for viewers. Clips that remain online may be age-restricted, meaning they are not viewable to anyone signed out or under 18. Some of these videos also include an interstitial warning screen, which requires users to click “Continue” before the footage plays.

    The company added that it will continue to monitor the platform and may remove additional content that violates its Community Guidelines. YouTube’s policies specifically prohibit content that revels in or mocks the death or serious injury of an identifiable individual.

    CLICK HERE TO GET THE FOX NEWS APP 

    Charlie Kirk speaking

    Charlie Kirk, Turning Point USA founder, speaks during the first day of the Republican National Convention. (Jasper Colt/USA TODAY)

    X faces criticism over Charlie Kirk shooting video policies

    On X, formerly Twitter, videos of the shooting remain available as long as they follow the platform’s graphic media policy. X requires that such clips be labeled appropriately, not prominently displayed and not “excessively gory.”

    However, users reported seeing the footage in their feeds without consent. Some said the autoplay feature exposed them to the videos before they could turn it off. Researchers also noted that clips were quickly reposted and continued to spread across the platform.

    X allows users to share graphic media if it is properly tagged. The platform bans content that glorifies violence, incites harm or celebrates attacks. Still, videos may remain online if they are considered newsworthy or tied to current events.

    The platform warns users that content labeled “sensitive” should not be displayed automatically. But in practice, researchers observed the Kirk video surfacing through algorithmic feeds, even when people had not searched for it.

    X did not respond to our request for comment before publication.

    Social media gatekeeping fails with Charlie Kirk shooting video

    For decades, news organizations made editorial decisions about whether to publish violent imagery, often avoiding explicit content to protect audiences. Today, that gatekeeping power has diminished.

    Smartphones and instant uploads mean graphic events can spread before any newsroom responds. Social media algorithms often amplify the most shocking clips, making it nearly impossible to shield viewers from disturbing footage.

    Lawmakers increase pressure on social media moderation

    Luna and Boebert’s statements underscore growing political pressure on tech companies to better enforce content rules. Researchers also warn that unchecked circulation of graphic violence can desensitize viewers and, in some cases, encourage extremist responses.

    At the same time, major platforms have scaled back human moderation teams, relying more on AI detection systems. Experts say those systems often miss context, leaving dangerous gaps in enforcement. 

    Parent safety tips to protect kids from graphic videos

    Parents worried about their children encountering violent clips can take proactive steps:

    • Enable parental controls: Both iOS and Android offer built-in screen time and content filters that limit what apps and media kids can access. You can also take advantage of new protections rolled out by major platforms.
    • Use app-specific settings: TikTok, YouTube and Instagram all provide parental restriction tools, including content filters, restricted mode and family pairing. Meta’s teen safety features on Instagram and Facebook are designed to give parents and teens more tools to stay safe online. Through TikTok’s Family Pairing, parents can see or adjust more than 20 settings for their teens. X does not currently offer the same parental controls, which makes it harder for parents to limit what their children see on that platform.
    • Turn off autoplay: Prevent videos from automatically playing, reducing the chance of graphic clips starting without warning.
    • Talk openly: Explain why some content is harmful and encourage kids to come to you if they see something disturbing.
    • Stay involved: Regularly review app activity and check which accounts your child follows.

    These steps won’t block everything, but they give families more control in a world where disturbing videos can spread fast.

    Kurt’s key takeaways

    The calls to remove videos of Charlie Kirk’s death highlight the challenges of moderating violence online. Platforms promise safeguards, but in practice, graphic clips often spread faster than moderation systems can react. As social media continues to replace traditional gatekeepers, both companies and users share responsibility for what circulates online. Adjusting your settings and being cautious about sharing content can make a difference.

    Should platforms be required to take down all graphic videos of real-world violence or should users decide what they see? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • A Secret Room, a $160K Longevity Chamber, Breathing Lamps, and Brain Wave States: Inside Elite Athletes’ Recovery Tricks

    [ad_1]

    “A dysregulated nervous system is when the athlete gets stuck in the sympathetic overdrive state and can’t properly downregulate into the parasympathetic recovery state,” says Christopherson, who has worked with professional athletes for decades. A dysregulated nervous system looks like trouble sleeping, inability to recover fully, chronic stress, and increased risk of injury from adrenaline masking pain and fatigue. It’s also the root of burnout.

    While all of this technology is new, regulating the nervous system has always been a skill related to the professional athlete’s mindset. Oswald says, “These athletes are here because they’re able to manage the nerves and the nervous system. Everyone gets nervous, and they’ve found strategies.” Breathing techniques, thought processes, positive affirmation, and having rituals are how champions do it on their own. Still, Oswald says younger players are losing self-awareness.

    Biometric Data

    The rise of neuroscience in professional sports comes with the use of performance optimization driven by data. Top players get their metrics, like heart rate variability, cortisol, and VO2 max, checked daily (some every morning and night), and their teams use the information to optimize training and recovery protocols. Ultimately, biometrics don’t predict performance and only highlight risk of injury or fatigue. Many players avoid looking at the data.

    “At this level, they are really often in the red zone, and we can’t do too much,” says Ryszczuk, who, along with every coach interviewed for this piece, says restorative sleep is better than any device. Ryszczuk notes that many younger athletes would rather use advanced recovery tools when all they need to do is get a massage for 15 to 20 minutes and go to sleep.

    “Players need to connect to their bodies,” adds Stacy, who coaches athletes to find moments throughout the day to practice internal regulation. For example, focusing on your exhale to activate the parasympathetic nervous system in social settings. Then it shows up on the court.

    The pros also travel across all 24 global time zones each year, and for every hour of time zone change, it takes one full day to adjust and regulate. Some arrive at tournaments a week early to acclimate, but for lower-ranked players who can’t afford extra days in a hotel, access to a decked-out recovery room may level the playing field.

    The Future of Tennis

    Ultimately, the neuroscience of tennis reveals that the next generation of tennis players must return to the basics before depending on a $160k recovery chamber. Like in all sports, the physical demands of tennis are increasing and requiring stronger physicality. But relying on external data and recovery tools won’t produce champions who can keep up, says Akin Akman, a pro athlete favorite for mindset coaching. When in New York, players visit Akman to get a dose of old-school champion mindset conditioning that trains the nervous system in the process.

    “All athletes, and not just tennis players, limit themselves in the same ways,” Akman says, explaining that it takes learning and shifting thought patterns about the body itself. Akman was trained by the late Hall of Fame legend Nick Bollettieri. After embodying the most winning philosophy in the game, Akman became a coach on Bollettieri’s team. Now, Akman has his own facility and a method for the next generation of champions, where nervous system regulation is taught through mindset mastery.

    “The real frontier is mindset,” says Akman, who cautions that relying on technology outsources awareness. “We have to believe our bodies and nervous systems are finely tuned instruments that guide us if we learn to listen. Data is great, but relying on external tools to regulate our state takes away our certainty. Excellence lies in understanding and harnessing our own physiological responses.”

    Akman coaches athletes to manage their fight-or-flight reactions as they undergo physical intensity, complete with high-pressure moments designed to simulate playing in a Grand Slam. Over time, the athlete’s brain adjusts its sensitivity to repeated stimuli, building resilience and allowing the nervous system to conserve energy and adapt faster. “The real evolution,” he says, “is learning by being, by doing, by feeling.”

    The Open’s pioneering efforts in recovery, coupled with the increasing focus on the nervous system by top teams, are leading a quiet revolution toward a new understanding of athlete performance and longevity. The challenge for this era of champions lies in using the benefits of advanced technology without giving up on the pursuit of inner mastery. And that should go for all of us.

    [ad_2]

    Vera Papisova

    Source link

  • Shamos malware tricks Mac users with fake fixes

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A dangerous new malware campaign is targeting Mac users worldwide. Security researchers at CrowdStrike uncovered Shamos, a new variant of the Atomic macOS Stealer (AMOS), developed by a cybercriminal group called COOKIE SPIDER.

    The attack relies on ClickFix tactics, where victims searching for Mac troubleshooting help are lured to fake websites or GitHub repositories. These spoofed sites trick users into copying and pasting a one-line command in Terminal, supposedly to fix an error. Instead, the command silently downloads Shamos, bypasses macOS Gatekeeper protections, and installs the malware.

    Once inside, Shamos searches for sensitive data, Apple Notes, Keychain items, browser passwords, and even cryptocurrency wallets. The stolen information is zipped and sent directly to attackers, often alongside additional malware like botnet modules or fake Ledger wallet apps.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Malicious sponsored results can be seen on Google search. (CrowdStrike)

    How Shamos malware spreads on macOS

    Cybercriminals distribute these fake “fixes” through so-called “malvertising” campaigns and spoofed tech help sites with names like mac-safer[.]com or rescue-mac[.]com. These pages pose as trusted troubleshooting guides and appear in search results for common Mac issues, such as “how to flush resolver cache.”

    The websites encourage victims to copy and paste commands that download malicious Bash scripts. These scripts grab the user’s password, remove file protections, and launch Shamos. With persistence tools installed, the malware can even restart alongside the system, keeping control long after the initial infection.

    CAPTCHAGEDDON SIGNALS A DANGEROUS SHIFT

    A fake Mac help page

    A fake help page provides victims with false instructions about how to fix problems with their Mac computer. (CrowdStrike)

    Tips to stay safe from Shamos malware

    You can avoid falling victim to Shamos and similar threats with these proactive steps:

    1) Never run commands you don’t understand

    Copy-pasting commands into Terminal may seem like an easy fix, but it’s also one of the easiest ways for attackers to bypass Apple’s built-in protections. If you see a command on a website, forum, or GitHub repository, don’t execute it unless you fully understand what it does. Instead, confirm with Apple’s official support site or the Apple Community forums, where experienced users and moderators can verify safe troubleshooting steps.

    2) Avoid sponsored results

    Hackers know that when your Mac has a problem, you’ll search for a quick solution. That’s why they buy sponsored ads like the one below to push fake troubleshooting websites higher in search results. Clicking the top link may feel natural, but it could be a trap. Stick with trusted sources like Apple Support, or scroll past the ads to find legitimate guides.

    CLICK HERE TO GET THE FOX NEWS APP 

    A fake webpage on how to fix a printer

    Fake instructions on how to fix printer issues on macOS. (CrowdStrike)

    3) Be wary of GitHub projects

    GitHub is an amazing resource for developers, but it’s also become a hotspot for malicious repositories that mimic legitimate software. Attackers often clone popular apps or tools, then hide malware inside. Before downloading anything, check the publisher’s name, stars, and activity history. If the account looks suspicious, inactive, or brand-new, avoid it.

    4) Use strong antivirus protection

    Mac malware is evolving fast, and Apple’s built-in security features can’t catch everything. A strong antivirus adds another layer of defense by scanning downloads, blocking malicious scripts, and detecting suspicious behavior in real time. Some security tools can even spot the one-line Terminal commands used by Shamos before they cause harm.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    5) Use a personal data removal service

    Since Shamos is designed to steal personal information and send it to cybercriminals, reducing your online footprint can help limit the fallout. A personal data removal service scans data broker sites and removes your exposed information, making it harder for attackers to resell or exploit it after a breach. While this won’t stop malware from stealing what’s on your Mac, it adds another layer of protection by minimizing the data criminals can use against you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan 

    6) Keep macOS updated

    Apple regularly patches vulnerabilities in macOS that malware tries to exploit. By keeping your system up to date, you close the doors that attackers rely on. Enable automatic updates, so your Mac receives the latest patches as soon as they’re available. Pairing this with good digital hygiene, like avoiding shady downloads, dramatically lowers your risk of infection.

    Kurt’s key takeaways

    Cybercriminals know that when your Mac breaks, you’ll look for quick answers. Shamos takes advantage of that urgency by disguising itself as help. Staying safe means slowing down before you copy, paste, or download anything. If something feels off, it probably is.

    Should Apple be doing more to protect Mac users from evolving threats like Shamos? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Amazon backs AI startup that lets you make TV shows

    [ad_1]

    NEWYou can now listen to Fox News articles!

    What if you could write your own episode of a hit show without a crew or cameras, only a prompt? That’s exactly what a San Francisco startup called Fable is aiming to do with its new artificial intelligence platform, Showrunner. 

    Now it has Amazon’s backing through the Alexa Fund. While the exact amount of the investment hasn’t been disclosed, Amazon’s involvement signals growing interest in AI-powered entertainment. Fable describes Showrunner as the “Netflix of AI,” a place where anyone can type in a few words and instantly generate an episode.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    HOLLYWOOD TURNS TO AI TOOLS TO REWIRE MOVIE MAGIC

    Fable’s Showrnunner harnesses the power of AI to generate new TV episodes without needing a full production crew. (iStock)

     A new era of user-generated entertainment

    Instead of passively watching shows, Showrunner invites users to co-create them. You can build an episode from scratch or jump into a world someone else started. It’s all done through text: just describe the scene or story, and the AI gets to work. The company officially launched with Exit Valley, a satirical, animated series set in a fictional tech hub called Sim Francisco. Think Family Guy, but aimed at Silicon Valley titans like Elon Musk and Sam Altman. It’s edgy, funny, and powered entirely by AI. If you’re curious, head to the Showrunner website, and you’ll be directed to their Discord server, where episodes are streamed, and new ones are made in real-time.

    BILL MAHER BLASTS AI TECHNOLOGY FOR ‘A– KISSING’ ITS ‘EXTREMELY NEEDY’ HUMAN USERS

    A shot of the Amazon spheres and headquarters

    Amazon is backing the project through its Alexa Fund.   (Chloe Collyer/Bloomberg via Getty Images)

    Backed by big tech, led by a VR veteran

    Fable’s CEO, Edward Saatchi, has a history of pushing boundaries. Before launching Fable, he co-founded Oculus Story Studios, a division of Oculus VR acquired by Meta. His latest mission: turn Hollywood from a one-way broadcast into a two-way conversation.

    “Hollywood streaming services are about to become two-way entertainment,” Saatchi told Variety. “Audiences will be able to make new episodes with a few words and become characters with a photo.”

    That vision has already started to take shape. Fable previously released nine AI-generated South Park episodes that racked up more than 80 million views. Those episodes were made with the company’s proprietary AI engine, fine-tuned for animated storytelling.

    CLICK HERE TO GET THE FOX NEWS APP 

    A person on a computer in an office

    Fable’s Showrunner software will give everyday users the power to create their own animated TV episodes from their computer. (Oliver Berg/picture alliance via Getty Images)

    Why animation comes first

    Right now, Showrunner is focused entirely on animated content and that’s no accident. According to Saatchi, animation is far easier for AI to handle than photorealistic video. While tech giants like Meta, OpenAI, and Google are racing to create lifelike AI videos, Fable is avoiding that battleground. Instead, the startup wants to give everyday users the tools to become writers, directors, and even stars of their own shows. All it takes is a bit of imagination and a few lines of text.

    What this means for you

    Whether you’re a writer, a fan of animation, or just someone who’s curious about AI, this shift opens the door to a whole new kind of entertainment. You no longer need a Hollywood budget to tell a story. If you’ve got a creative idea, you can bring it to life instantly, and share it with a community that’s doing the same. Showrunner gives you the power to shape pop culture, not just consume it. You could even remix existing episodes or jump into an AI-generated world with your own twist.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    Amazon’s support of Fable shows that generative AI appears to be the next evolution in how we create and experience entertainment. Tools like Showrunner are turning viewers into creators, and what we consider a “TV show” might soon be as personal as a playlist.

    If you could make your own animated series with a single prompt, what story would you tell? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Even with Trump’s tariff blessing, Apple hikes iPhone prices

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple’s big annual event on Tuesday delivered a polished and tightly produced showcase. The company’s CEO, Tim Cook, led the presentation with sweeping visuals, confident pacing and a clear message: Apple is still betting big on premium innovation. But the real headline wasn’t so much the tech; it was the prices.

    Earlier this year, President Donald Trump granted Apple a tariff break. Still, the company raised prices across its iPhone lineup. The new ultra-thin iPhone 17 Air, which Apple positioned as a reinvention of last year’s iPhone 16 Plus, jumps to $999. The iPhone 17 Pro begins at $1,099, while the Pro Max tops out at $1,199. The entry-level iPhone 17 starts at $799.

    Apple positioned the price hikes as a reflection of breakthrough innovation. The company spotlighted the iPhone Air’s sleek redesign, the powerful A19 chip and major camera upgrades. Yet the takeaway was clear: tariff relief didn’t lead to consumer savings. Instead, Apple leaned into its premium identity, signaling that cutting-edge tech now comes with a steeper price tag.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    GOOGLE PIXEL 10 EVENT BRINGS NEW PHONES, SMARTWATCH, EARBUDS AND AI

    Apple CEO Tim Cook holds an iPhone 17 Pro and an iPhone Air, on its campus in Cupertino, California, Sept. 9, 2025. (REUTERS/Manuel Orbegozo)

    iPhone 17 Air: the thinnest iPhone ever

    advertisement showing slim quality of iphone 17 pro

    Apple unveiled the iPhone 17 Air, its slimmest model yet at 5.6mm and 165 grams, built with recycled aluminum, glass and titanium. (Apple)

    Apple calls the iPhone 17 Air a game-changer. At just 5.6mm thin and weighing around 165 grams, it stands as the slimmest iPhone the company has ever made. The design uses recycled aluminum, glass and titanium to reduce weight while staying durable. Engineers reinforced the frame and applied new drop-test algorithms to make sure it holds up in daily use.

    The Air debuts silicon anode battery technology, which allows Apple to shrink the device without cutting power. During the presentation, Apple promised “all-day battery life,” but never gave an exact hour count. That vague description raised questions. Moments later, Apple introduced a new low-profile MagSafe battery accessory. When paired with the iPhone 17 Air, Apple says the combo delivers up to 40 hours of video playback. The timing of that announcement made it clear that battery life could still be a concern.

    Apple also pushed the Air forward with a new ultra-wide 48MP fusion camera system, which uses advanced image processing to improve detail and low-light performance. The display gained a ProMotion 120Hz refresh rate that makes scrolling and animations feel smoother. Outdoor use should also improve, thanks to 3,000 nits of peak brightness, making it easier to see in direct sunlight. On the durability side, the Air features Ceramic Shield 2 coating, which Apple claims resists scratches and accidental drops better than before.

    The iPhone 17 Air starts at $999 with 256GB of storage. That price is $100 higher than last year’s thinnest model, marking another step up in Apple’s pricing strategy.

    iPhone 17 Pro: design and performance overhaul

    close up of orange iphone 17 pro

    The iPhone 17 Pro starts at $1,099 and comes with 256GB of base storage. (Apple)

    The iPhone 17 Pro introduces a striking unibody design that relies on laser-welded vapor chamber cooling to keep performance steady even under heavy use. Apple gave the back a ceramic shield finish, while the front now features its upgraded seven-layer coating. That change reduces glare both indoors and outdoors, making the display easier on the eyes in all conditions.

    At the core of the Pro sits the new A19 Bionic chip built on 3nm architecture. Apple paired it with a 16-core Neural Engine and an updated display engine to push speed and efficiency even further. The company claims this is the most power-efficient iPhone yet and promises the longest battery life ever offered in a Pro model.

    Apple also turned its attention to the camera system. The Pro camera lineup includes a 48MP main sensor and a 12MP ultra-wide, with ProRes support for high-quality video recording. It even offers Genlock syncing, which professionals can use to line up multiple cameras in studio and live production setups.

    To complement the new design, Apple introduced TechWoven cases that feel more like premium accessories than traditional covers. Some versions include optional cross-body straps, a nod to the growing trend of blending technology with fashion.

    Apple also revealed three new finishes for the Pro models: deep blue, cosmic orange and silver, adding a fresh look to the lineup.

    The iPhone 17 Pro comes with 256GB of base storage and starts at $1,099, keeping its place as Apple’s most balanced high-end option between the Air and the Max.

    WWDC 2025: IOS 26, LIQUID GLASS DESIGN AND APPLE’S AI SHORTFALL

    iPhone 17 Pro Max: bigger, brighter, more expensive

    white, orange and dark iphone colors

    Apple unveiled the iPhone 17 Pro Max as its top model, featuring the biggest display ever on an iPhone. (Apple)

    Apple positioned the iPhone 17 Pro Max as the ultimate model in the lineup. It shares the same unibody design, ceramic shield finish and seven-layer front coating as the Pro, but it stretches everything to a larger scale. The Pro Max delivers the biggest display Apple has ever put on an iPhone, paired with enhanced brightness that makes it more usable outdoors and in direct sunlight.

    Inside, it runs on the same A19 Bionic chip with the 16-core Neural Engine, so performance and efficiency mirror the Pro. What sets the Max apart is its endurance. Apple claims it offers the best battery life of any iPhone to date, making it the go-to choice for people who rely heavily on their phone throughout the day.

    The Pro Max also carries the full Pro camera system, including the 48MP main sensor and advanced video features like ProRes and Genlock. With its extra size, it appeals most to creators, gamers and anyone who wants the biggest screen possible in an iPhone.

    Like the Pro, the Max is available in deep blue, cosmic orange and silver finishes.

    Pricing starts at $1,199 with 256GB of storage, marking the highest entry point yet for an iPhone and reinforcing Apple’s steady climb in premium pricing.

    iPhone 17: Apple’s new starting point

    different features displayed for iPhone 17

    iPhone 17 starts at $799 with 256GB of storage. (Apple)

    The standard iPhone 17 rounds out the lineup and now serves as Apple’s new baseline model. It starts at $799 with 256GB of storage.

    The iPhone 17 inherits many of the Pro’s features. It comes in five colors and has a thinner profile that feels more refined in hand. The display includes the upgraded coating to cut glare, and the front camera has a square AI-driven sensor with Center Stage for better video calls.

    The main camera system also makes a leap forward. The iPhone 17 now carries a 48MP main sensor, supported by Apple’s fusion technology to improve clarity and low-light results. Combined with the updated display engine and improved durability from Ceramic Shield 2, the iPhone 17 delivers a more polished experience than previous entry models.

    Beyond iPhones: Apple’s big updates for AirPods and Watch

    Apple didn’t stop with iPhones. The company used its event to refresh its wearables and audio lineup, bringing new features to AirPods and multiple Apple Watch models. Each product builds on familiar designs while adding functions aimed at health, fitness and convenience.

    AirPods Pro 3: smarter sound and live translation

    advertisement showing features of AirPods Pro 3

    The new AirPods Pro 3 deliver up to eight hours of listening time on a single charge. (Apple)

    Apple unveiled the third-generation AirPods Pro, priced at $249, and available starting Sept. 19. The design keeps the iconic stem but introduces foam-infused ear tips that come in five sizes. Apple said it studied 100,000 ear shapes to make them fit more securely.

    The new AirPods Pro 3 extend listening time, offering up to eight hours on a single charge, compared with six hours in the previous generation. With the charging case, total listening time stretches to 10 hours with hearing-AI features enabled.

    One of the standout additions is heart rate sensing, which turns the AirPods into another health-tracking accessory in Apple’s ecosystem. The earbuds also use AI-driven hearing enhancements to improve clarity in noisy environments. Apple said the AirPods Pro 3 now deliver up to four times stronger active noise cancellation (ANC) than the originals, making them far more effective in crowded or loud spaces.

    For workouts, users can also track over 50 activity types with the Fitness app on iPhone while wearing them. Perhaps most notably, Apple added live translation. When two people wear AirPods Pro 3 paired with iPhones, conversations can be translated in real time, breaking language barriers in a way that once seemed impossible.

    Apple Watch Series 11: health at the forefront

    advertisement showing features of Apple Watch Series 11

    Apple Watch Series 11 expands the company’s push into advanced health technology. (Apple)

    The Apple Watch Series 11 continues Apple’s push into health technology. It runs on watchOS 26 and introduces monitoring for possible hypertension and sleep apnea, with alerts designed to prompt users to seek medical care. Apple noted that FDA clearance is still pending for hypertension notifications, but the company clearly sees the watch as a serious medical tool.

    The watch also includes Sleep Score, which breaks down sleep stages such as core, deep and awake to give users a clearer picture of rest quality. Battery life reaches up to 24 hours, and the watch remains efficient even with 5G connectivity.

    Apple built the Series 11 with 100% recycled aluminum and titanium cases, expanding its sustainability pledge. Color options bring a refreshed look, while pricing starts around $399, depending on configuration.

    APPLE WINS BLOOD OXYGEN BATTLE FOR WATCH OWNERS 

    Apple Watch SE 3: affordable and fast

    Apple Watch SE 3 display showing girl in red sweater

    Apple Watch SE 3 remains the lowest-priced entry into the lineup at $249. (Apple)

    Apple also refreshed its budget-friendly model, the Apple Watch SE 3. At $249, it remains the lowest-priced entry into the lineup. The SE 3 uses the new S10 chip, giving it faster performance and support for Apple’s expanding gesture controls.

    It also delivers sleep apnea notifications, a feature previously limited to more expensive models. Charging is now up to two times faster, ensuring the watch is ready to go with less downtime. Apple added more health and convenience tools, including wrist temperature sensing for deeper insights in the Vitals app, retrospective ovulation estimates and an Always-On display. It also supports double-tap and wrist flick gestures, plus on-device Siri. Available in two colors, the SE 3 carries forward Apple’s strategy of making core health features more accessible.

    Apple Watch Ultra 3: the powerhouse upgrade

    Apple Watch Ultra 3 advertisement on features

    Apple Watch Ultra 3 debuts with the largest and brightest display ever on a Watch. (Apple)

    At the top end, Apple introduced the Apple Watch Ultra 3, starting at $799 and shipping September 19. This model pushes the limits of durability and outdoor performance. The Ultra 3 features the largest and brightest display ever put on an Apple Watch, making it easier to read data during workouts or in direct sunlight.

    It includes a redesigned radio and antenna system capable of connecting with satellites orbiting 800 miles above Earth. That means users can send messages or use Find My features even without cell service, making it a true companion for extreme adventures.

    The Ultra 3 packs a larger battery that runs up to 42 hours on a single charge. With Low Power Mode enabled, Apple says the battery can extend to as much as 72 hours, making it the longest-lasting Apple Watch to date. It also introduces new Workout Buddy tools for training and enhanced hypertension notifications, further pushing Apple’s reputation in health tech. Available in black or natural titanium, the Ultra 3 blends rugged design with cutting-edge features.

    iPhone 17 accessories: small add-ons with big impact

    different accessories displayed on iphones

    Apple showcased new accessories for its iPhones, including a low-profile MagSafe battery pack. (Apple)

    Apple used the event to highlight a series of accessories that show how the company expects people to use its new iPhones. The most talked about was the low-profile MagSafe battery pack, created to address the iPhone 17 Air’s biggest weakness: vague “all-day” battery claims. When attached, the Air can stretch to 40 hours of video playback, turning what could have been a limitation into a selling point for Apple’s ecosystem.

    To complement the Air’s slim profile, Apple also revealed a new translucent case and a lightweight bumper. The translucent case keeps the 5.6mm design visible while still protecting it, while the bumper adds shock resistance around the edges without adding bulk. Both aim to reassure buyers who worry that the thinnest iPhone yet might be more fragile.

    For the Pro and Pro Max models, Apple introduced TechWoven cases made from a durable fabric blend. What stood out was the addition of an optional cross-body strap, giving users a hands-free way to carry their phones. Apple leaned into the idea of the iPhone as not just a device but also a lifestyle accessory that blends technology with personal style.

    Together, the MagSafe battery, translucent Air case, protective bumper and fashion-forward TechWoven cases with cross-body straps showed Apple’s strategy clearly. Accessories are no longer secondary; they are central to how Apple expects customers to protect, power and personalize their iPhones.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Apple’s iPhone 17 lineup pushes innovation forward with a blend of sleek design and powerful features. The iPhone 17 Air impresses with its ultra-thin profile and new battery technology. Meanwhile, the Pro and Pro Max models deliver unmatched performance and durability for demanding users. Additionally, Apple enhances its ecosystem with upgraded AirPods and Apple Watch models that emphasize health and convenience. Overall, Apple continues to balance style, functionality and user experience, setting a strong foundation for the year ahead.

    Which Apple device are you most excited to buy, and why?

    [ad_2]

    Source link

  • Australia debuts first multi-story 3D printed home – built in just 5 months

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A major milestone in construction has arrived. This time from Western Australia. Contec Australia has completed the nation’s first multi-story 3D concrete printed home. Located in Tapping near Perth, the two-story residence was finished in just five months. Most impressive? The structural walls were 3D printed in only 18 hours of active printing time.

    This matters because it points to where housing might be heading here, too. With rising costs, labor shortages and a push for more sustainable building methods, this kind of breakthrough could shape the future of American neighborhoods.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SUSTAINABLE 3D-PRINTED HOME BUILT PRIMARILY FROM SOIL

    Why this build is a game-changer

    Contec’s project isn’t just a prototype. It demonstrates how 3D concrete printing can bring major benefits to everyday housing. Compared to traditional masonry construction, the Tapping home achieved:

    • 22% cost savings on structural walls
    • 3x the strength of brick (50MPa vs 15MPa)
    • Faster delivery, with the entire project completed in just five months

    Contec Australia prints the final wall of the second level of a multi-story 3D printed home in Perth. (Contec Australia)

    And it doesn’t cut corners on durability. The walls are fire-resistant, water-resistant, termite-proof and cyclone rated, features U.S. regions facing hurricanes, floods and wildfires could find especially appealing.

    AMERICA’S LESSONS FROM WORLD’S LARGEST 3D-PRINTED SCHOOLS

    exterior of a modern home

    Exterior of a multi-story 3D concrete printed home located in Tapping, Australia. (Contec Australia)

    How 3D concrete printing works

    Instead of stacking bricks, Contec’s robotic printer extrudes a specialized concrete mix based on a digital 3D model. The mix sets in under three minutes, allowing new layers to be stacked without scaffolding or formwork.

    The walls are printed in precise layers over the course of 18 hours of active machine time. Once the structural shell is complete, traditional crews step in to add the roof, wiring, windows, flooring and finishing touches.

    WORLD’S BIGGEST 3D-PRINTED SCHOOLS ARE UNDERWAY IN QATAR

    interior of a while bathroom

    Bathroom of a multi-story 3D concrete printed home located in Tapping, Australia. (Contec Australia)

    Benefits that could apply in the U.S.

    Speed: Structural walls finished in 18 hours; full build completed in five months.
    Cost efficiency: 22% cheaper than comparable masonry builds in WA.
    Design freedom: Complex shapes, curves and openings without added expense.
    Sustainability: 30% lower CO₂ emissions than conventional concrete and minimal waste.
    Durability: More than three times stronger than brick, fire- and water-resistant and able to withstand harsh weather.

    dining room next to kitchen in modern home

    Dining room of a multi-story 3D concrete printed home located in Tapping, Australia. (Contec Australia)

    How this compares to 3D printed homes in the U.S.

    You may have already heard of Icon, the Texas-based startup that has been pioneering 3D printed homes. Icon’s builds include entire neighborhoods of single-story houses in Austin, as well as experimental multi-level projects. However, most of Icon’s multi-story designs rely on a hybrid approach, with 3D printing for the ground floor and timber or steel frames for the upper levels.

    That’s what makes the Tapping project stand out. Contec printed the structural walls for both stories in just 18 hours of active printing time, something not yet widely seen in the U.S. This could signal the next step for American 3D printing: scaling beyond single-story housing into more complex multi-story designs.

    BRICKS MADE FROM RECYCLED COFFEE GROUNDS REDUCE EMISSIONS AND COSTS

    bed with white comforters in modern home

    Bedroom of a multi-story 3D concrete printed home located in Tapping, Australia.  (Contec Australia)

    How much does a 3D printed home cost?

    One of the biggest questions people have is price. Contec hasn’t shared the exact cost of the Tapping home, but the company says it delivered the structural walls 22% cheaper than a standard masonry build. That saving adds up when you consider how much of a home’s budget goes toward labor and materials.

    In the U.S., companies like Icon have priced 3D printed homes starting around $100,000 to $150,000, depending on size and finishes. While final costs vary by region, land and design, the potential savings from reduced labor and faster timelines make 3D printing an attractive option as housing costs continue to rise.

    VERTICAL TINY HOMES REDEFINE COMPACT LIVING

    interior view of dining area of home

    Kitchen and dining room of a multi-story 3D concrete printed home located in Tapping, Australia. (Contec Australia)

    What this means for you

    For American homeowners, builders and communities, the Tapping project shows how 3D concrete printing could offer faster, cheaper and more resilient housing. Imagine moving into a new home months earlier, with walls that are stronger, more sustainable and better able to handle extreme conditions.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    3D printed housing is moving from concept to reality. This home shows that walls can go up in just 18 hours, and a full build can be finished in only a few months. That kind of speed changes the way we think about construction. With rising costs and ongoing labor shortages, builders need new solutions. 3D concrete printing offers a path to faster, more affordable and more sustainable homes without cutting corners on strength or safety.

    The big question is, if a 3D-printed home became available in your area, would you move in? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • How to safeguard your credit score in retirement as fraud and identity theft rise among seniors

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’ve worked hard, saved smart, and now it’s time to enjoy your retirement years. But here’s the catch: your credit score still matters, even when you’re no longer applying for mortgages, car loans or new credit cards. Why? Scammers know many seniors don’t monitor their credit very often, and that makes retirees prime targets for identity theft. Due largely to increased scam attempts, financial losses for seniors reached $4.9 billion in 2024. And anyone can become a target. The good news is there are simple, powerful steps you can take right now to lock down your credit score and make sure your hard-earned nest egg is safe.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why your credit score matters in retirement

    A lot of people assume that once they stop working, their credit score doesn’t matter anymore. After all, you’re not buying a new house or car, right? Not so fast. Your credit score can still affect:

    • Insurance premiums. Some insurers factor your credit into your rates.
    • Retirement community applications. Senior housing and assisted living facilities often run credit checks.
    • Loan approvals. You may still need financing for medical bills, home repairs or emergencies.
    • Identity theft risk. A clean, unused credit file is like a blank check to a scammer.

    The hands of Karin Seelmann, a 70-year-old participant of a computer course for seniors, handle the keyboard of a laptop in Hanover, Germany, Feb. 21, 2017. (Peter Steffen/picture alliance)

    Keeping your credit score safe is about protecting both your financial reputation and your retirement savings.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Step 1: Monitor your credit regularly

    Even if you’re not applying for credit, you should know what’s in your file. Seniors are often the last to find out when a scammer has taken out a loan or opened a card in their name. The three big credit bureaus, Equifax, Experian and TransUnion, are required to give you a free report once a year. Here’s the trick: thanks to recent changes, you can now get a free weekly credit report at AnnualCreditReport.com. Set a calendar reminder to check your reports once a month. Look for accounts you don’t recognize, suspicious credit inquiries or sudden drops in your score.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    man writing in journal next to laptop while sittign at table

    A man looking into his retirement matters. (Kurt “CyberGuy” Knutsson)

    Step 2: Place a fraud alert

    If you suspect you’ve been targeted, a fraud alert makes it harder for identity thieves to open new accounts in your name. It tells creditors they need to take extra steps to verify your identity before approving anything.

    • A fraud alert is free.
    • It lasts for one year (you can renew it).
    • You only need to contact one bureau. They’ll notify the others.

    This is a great first line of defense if you’ve received scam calls, phishing emails or notice odd activity in your accounts. 

    woman types on laptop while sitting at table

    A woman looking up her credit score on a laptop. (Kurt “CyberGuy” Knutsson)

    Step 3: Freeze your credit (the gold standard)

    A credit freeze is the single most powerful tool retirees have to protect their credit score. Also, it’s completely free. Here’s why you should do it today:

    • It blocks anyone from opening new credit in your name.
    • It doesn’t affect your current accounts, score or benefits.
    • You can unfreeze it anytime if you need new credit.

    Since most retirees don’t apply for new loans often, a credit freeze is a “set it and forget it” safeguard. Think of it as putting your credit file in a vault.

    How to do it:

    • Contact Equifax, Experian and TransUnion individually (you’ll need to freeze your credit with each one).
    • Provide proof of identity (usually SSN, date of birth and address).
    • Keep the PIN or password they give you; you’ll need it if you ever want to lift the freeze.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    woman sitting on couch typing on laptop

    A woman looking into her retirement matters on her laptop. (Kurt “CyberGuy” Knutsson)

    Step 4: Lock down your personal data online

    Here’s something many seniors don’t realize: even if your credit is frozen, scammers can still target you through other leaks of personal information.

    Data brokers publish your name, address history, phone numbers, relatives and even property records online. Scammers use this information to:

    • Impersonate family members in “grandparent scams.”
    • Craft convincing phishing messages.
    • Trick banks or creditors with stolen details.

    That’s why removing your personal information from these sites is just as important as freezing your credit. Doing it manually means tracking down dozens (sometimes hundreds) of data broker websites and sending formal removal requests and repeating the process every few months as your info pops back up.

    Data removal services can handle this automatically, requesting removals from dozens of data brokers at a time and monitoring for re-uploads. It’s one of the simplest ways to cut off scammers at the source and keep your retirement profile off the web.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5 STEPS TO PROTECT YOUR FINANCES FROM FAMILY SCAMS

    Step 5: Watch for warning signs of identity theft

    Even with strong protections in place, it pays to stay alert. Here are a few red flags to watch for:

    • Bills or medical statements for services you never used
    • Collection calls about debts that aren’t yours
    • New credit cards or loans arriving in your mail
    • Denials for credit or insurance you didn’t apply for
    • A sudden, unexplained drop in your credit score.

    If you see any of these, act fast: file a report at IdentityTheft.gov, contact your bank or creditors and double-check that your credit freeze is active.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Retirement should be about peace of mind; you’ve earned your retirement. Protecting your credit score may not be the most exciting task on your to-do list, but it’s one of the smartest. By monitoring your credit, freezing your file, removing your data from broker sites and staying alert for red flags, you can keep scammers out of your finances and focus on enjoying the retirement you deserve. Want to take one major worry off your list? Start by having your personal information automatically pulled from the internet. It’s an easy way to reduce your digital footprint and keep your credit and your retirement fund safe.

    Should more be done to protect retirees from identity theft and financial scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • FBI warns of QR code scam disguised in mystery packages

    [ad_1]

    NEWYou can now listen to Fox News articles!

    QR codes that were once seen as a convenient shortcut for checking menus or paying bills have increasingly been turned into weapons. Fake delivery texts, counterfeit payment links and malicious codes pasted over legitimate ones have all become part of the modern fraud playbook.

    The latest warning from federal authorities shows just how far these tactics have gone. Criminals are now mailing out packages that people never ordered. Inside these boxes is a QR code that, when scanned, can lead to stolen personal details, drained bank accounts or malware running silently in the background of a phone.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    QR CODE SCAMS RISE AS 73% OF AMERICANS SCAN WITHOUT CHECKING

    What you need to know about the QR code scam

    The scheme is a twist on what is known as a brushing scam. Traditionally, brushing scams involved online sellers sending products to strangers and then using the recipient’s details to post fake reviews. It was more of a nuisance than a serious crime.

    An Amazon package with a QR code. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images)

    Now the practice has shifted from harmless free items to deliberate fraud. Instead of receiving a product, many victims find only a printed QR code. Once scanned, the code redirects them to fraudulent websites that ask for sensitive personal information, such as banking information, credit card numbers or login credentials. Some codes go a step further and install malicious software designed to track activity and steal data directly from the device.

    “The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone,” the agency said in a public notice. “To encourage the victim to scan the QR code, the criminals often ship the packages without sender information to entice the victim to scan the QR code.”

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    Why QR codes appeal to scammers

    QR codes have become common in everyday life. They are used in restaurants, stores, airports, on polls and payment systems and most people scan them without a second thought. Unlike suspicious links that can be spotted, a QR code reveals nothing until it is scanned.

    That makes it a perfect disguise for a scam. The setup is simple: a package arrives with no sender information and no explanation. The mystery sparks curiosity, and many people scan the code to figure out who sent it. That moment of curiosity is what the scammers rely on.

    A woman scanning a QR code on a building

    Taylor Swift fans gather outside a building where a mural featuring a large QR code was being painted to promote Swift’s latest album, “The Tortured Poets Department,” on April 17, 2024, in Chicago. (Scott Olson/Getty Images)

    The consequences can be serious. Fake websites may harvest names, addresses and financial details. Malware may silently monitor accounts, log keystrokes or even target cryptocurrency wallets. Victims often do not notice until they see unauthorized charges or suspicious withdrawals. By then, their information may already be in the hands of criminals.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    7 ways to stay safe from QR code scams

    Scammers rely on curiosity and convenience to trick people into scanning malicious QR codes. A few simple habits can help you avoid becoming a target. Here are seven ways to stay safe from QR code scams.

    1) Be cautious with unsolicited QR codes and use strong antivirus software

    Avoid scanning QR codes from mystery deliveries, random flyers or stickers on public signs. A QR code is just a disguised link, and until you know where it leads, it shouldn’t be trusted. To stay safe even if you accidentally scan a risky code, keep strong antivirus software on your phone. Mobile security apps can block fraudulent sites, warn you before downloads and protect against malicious QR code attacks.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Stick to trusted sources

    Only scan QR codes from businesses and organizations you already trust. Examples include your bank’s mobile app, an airline boarding pass or a known retailer’s checkout page. If you wouldn’t click a random link in a text message, don’t scan a random QR code either.

    3) Preview links before opening

    Most phones let you press and hold a QR code link to preview where it goes. If the URL looks suspicious, with misspellings, random numbers or shortened links, don’t open it. Taking a second to check can save you from a phishing trap. 

    A man holding a package

    Scammers are sending fake packages with QR codes that trick recipients into scanning and giving criminals access to their personal data. (Kurt “CyberGuy” Knutsson)

    4) Limit your digital footprint

    The less personal data available about you online, the harder it is for scammers to target you with convincing fraud attempts. Consider using data removal services that scrub your information from people-search sites and marketing databases. This reduces the chances that your address or phone number ends up in the wrong hands and is connected to a scam package.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Enable two-factor authentication (2FA)

    Even if your login details are stolen, 2FA makes it harder for criminals to access your accounts. By requiring a secondary code sent to your phone or generated through an authenticator app, 2FA helps prevent unauthorized logins to your banking, email and trading accounts.

    6) Keep your device updated

    Software updates often contain fixes for security vulnerabilities that scammers try to exploit. Running the latest version of your phone’s operating system, as well as updating apps regularly, gives you stronger protection against malware that can be delivered through a malicious QR code.

    7) Report suspicious activity

    If an unexpected package arrives at your door with a QR code inside, do not simply throw it away. Report it to local authorities and consider filing a complaint with the FBI’s Internet Crime Complaint Center. Reporting not only helps protect you, but it also gives law enforcement more information to track how these scams are spreading.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    This scam might not be everywhere yet, but it shows just how quickly criminals adapt to new technology. QR codes were meant to make life easier, and most of the time they do, but that same convenience can turn into a weakness when people let curiosity override caution. The lesson here is that a mystery package with a QR code is not some fun puzzle to figure out. It is a red flag. The safest move is to step back, resist the urge to scan and if something feels off, report it instead of interacting with it.

    Have you ever scanned a QR code without thinking twice about where it might lead? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • AI meeting notes are recording your private conversations

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence has slipped quietly into our meetings. Zoom, Google Meet and other platforms now offer AI notetakers that listen, record and share summaries. At first, it feels like a helpful assistant. No more scrambling to jot down every point. But there’s a catch. It records everything, including comments you never planned to share.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    When private conversations end up in recaps

    Many people are discovering that AI notetakers capture more than project updates and strategy points. Jokes, personal stories and even casual side comments often slip into the official meeting summaries.

    What might feel harmless in the moment, like teasing someone, chatting about lunch plans or venting about a frustrating errand, can suddenly reappear in a recap email sent to the whole group. In some cases, even affectionate nicknames or pet mishaps have shown up right alongside serious action items.

    Experts warn that AI note-taking tools integrated into Zoom and Google Meet could capture more than the meeting agenda. (Korea Pool/Getty Images)

    Examples of what could go wrong:

    • Jokes or sarcasm taken out of context
    • Personal errands or gossip appearing in a recap
    • Casual catch-ups mixed into meeting notes
    • Embarrassing slip-ups becoming part of official records

    These surprises can be funny in hindsight, but they highlight a bigger issue. AI notetakers don’t separate casual conversation from work-related discussion. And once your words are written down, they can be saved, forwarded or even archived in ways you didn’t intend. That means an offhand remark could live far longer than the meeting itself.

    AI AND LEARNING RETENTION: DOES CHATGPT HELP OR HURT?

    A Google Gemini webpage

    A Google Gemini generative artificial intelligence webpage. (Andrey Rudakov/Bloomberg via Getty Images)

    Why AI notetakers capture too much

    These tools work by recording conversations in real time and then generating automatic summaries. Zoom’s AI Companion flags its presence with a diamond icon. Google Meet’s version uses a pencil icon and an audio cue. Only meeting hosts can switch them on or off.

    That sounds transparent, but most people stop noticing the icons after a few minutes. Once the AI is running, it doesn’t separate “work talk” from “side chatter.” The result? Your casual remarks can end up in a summary sent to colleagues or even clients.

    And mistakes happen. An AI notetaker might mishear a joke, twist sarcasm into something serious or drop a casual remark into notes where it looks out of place. Stripped of tone and context, those words can come across very differently once they’re written down.

    META AI’S NEW CHATBOT RAISES PRIVACY ALARMS

    Google Gemini chat

    The Google Gemini AI interface seen on an iPhone browser. (Jaap Arriens/NurPhoto via Getty Images)

    Steps to protect your privacy from AI notetakers

    Even if you use these tools, you can take control of what they capture. A few simple habits will help you reduce the risks while still getting the benefits.

    1) Stay alert to indicators

    Always check for the flashing icon or audio cue that signals an AI notetaker is active.

    2) Control the settings

    If you’re the host, decide when AI should run. Limit its use to important meetings where notes are truly necessary.

    3) Choose recipients carefully

    Many platforms let you control who receives the notes. Make sure only the right people get access.

    4) Use private chats

    Need to share a side comment? Send it as a direct message rather than saying it out loud.

    5) Save personal talk for later

    Keep casual conversations off recorded calls. If you need to catch up, wait until the AI is off.

    6) Ask before enabling AI

    If you’re not the host, confirm that everyone is comfortable with AI note-taking. Setting expectations up front prevents awkward situations later.

    7) Review and edit recaps

    Check meeting notes before forwarding them. Edit or trim out personal chatter so only useful action items remain.

    8) Check where notes are stored

    Find out whether transcripts are saved in the cloud or on your device. Adjust retention settings, so private conversations don’t linger longer than necessary.

    9) Follow company guidelines

    If your workplace doesn’t yet have a policy on AI notetakers, suggest one. Clear rules protect both employees and clients.

    10) Keep software updated

    AI features improve quickly. Updating your platform reduces errors, misheard comments and accidental leaks.

    CLICK HERE TO GET THE FOX NEWS APP

    What this means for you

    AI notetakers offer convenience, but they also reshape how we communicate at work. Once, small talk in meetings faded into the background. Now, even lighthearted comments can be captured, summarized and circulated. That shift means you need to think twice before speaking casually in a recorded meeting.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    The rise of AI in meetings shows both its promise and its pitfalls. You gain productivity, but risk oversharing. By understanding how these tools work and taking a few precautions, you can get the benefits without the embarrassment.

    Would you trust an AI notetaker to record your next meeting, knowing it might repeat your private conversations word for word? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • Columbia University data breach hits 870,000 people

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Columbia University recently confirmed a major cyberattack that compromised personal, financial and health-related information tied to students, applicants and employees. The victims include current and former students, employees and applicants. Notifications to affected individuals began Aug. 7 and are continuing on a rolling basis.

    Columbia, one of the oldest Ivy League universities, discovered the breach after a network outage in June. According to Columbia, the disruption was caused by an unauthorized party that accessed its systems and stole sensitive data. Investigators are still assessing the full scope of the theft.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    Students on the campus of Columbia University April 14, 2025, in New York City. (Charly Triballeau/AFP via Getty Images)

    What information was stolen?

    According to a breach notification filed with the Maine Attorney General’s office, nearly 869,000 individuals were affected by the Columbia breach. This number includes students, employees, applicants and, in some cases, family members. Media outlets also reported that the threat actor claimed to have stolen approximately 460 gigabytes of data from Columbia’s systems.

    Columbia confirmed that the stolen information relates to admissions, enrollment and financial aid records, as well as certain employee data. The categories of exposed information include:

    • Names, dates of birth and Social Security numbers
    • Contact details and demographic information
    • Academic history and financial aid records
    • Insurance details and certain health information

    Columbia emphasized that patient records from Columbia University Irving Medical Center were not affected. Still, the breadth of stolen data poses serious risks of identity theft and fraud.

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    Columbia University campus

    Columbia University campus (Luiz C. Ribeiro for New York Daily News/Tribune News Service via Getty Images)

    Columbia University response

    Columbia has reported the incident to law enforcement and is working with cybersecurity experts. The university said it has strengthened its systems with new safeguards and enhanced protocols to prevent future incidents.

    Starting Aug. 7, Columbia began mailing letters to those affected, offering two years of complimentary credit monitoring, fraud consultation and identity theft restoration services.

    When contacted, Columbia referred CyberGuy to its official community updates, published June 24 and Aug. 5.

    While the university says there is no evidence that the stolen data has been misused so far, the risk remains high. Criminals often wait months before exploiting stolen data.

    NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK

    A computer with binary code

    Columbia University says a June network outage is to blame for the breach. (Silas Stein/picture alliance via Getty Images)

    Steps to protect yourself after the Columbia University breach

    If you are among those affected or simply want to safeguard your data, take these steps today:

    1) Monitor your credit reports

    Check your credit reports regularly through AnnualCreditReport.com. Look for accounts you did not open or changes you did not authorize. 

    2) Use a personal data removal service

    Since Columbia confirmed that stolen files may include names, addresses and demographic details, consider using a personal data removal service. These services help scrub your information from data brokers and people search sites, making it harder for criminals to exploit exposed details. This step reduces the chance that stolen Columbia records are linked to your broader online identity.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    3) Set up fraud alerts and freezes

    Placing a fraud alert makes it harder for identity thieves to open accounts in your name. A credit freeze offers even stronger protection by blocking new credit applications.

    4) Use strong and unique passwords

    Create long, complex passwords for each account. A password manager can help generate and securely store them.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Enable two-factor authentication

    Turn on two-factor authentication (2FA) wherever possible. This extra layer of security helps protect your accounts even if a password is stolen.

    6) Watch for phishing attempts and use strong antivirus software

    Scammers may try to exploit fear around the breach with fake emails or texts. Verify any message before clicking links or sharing personal information.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech 

    7) Consider identity theft protection services

    Beyond the free credit monitoring Columbia offers, additional paid services can help track your data across the dark web and provide extra safeguards.

    Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The Columbia University breach shows how even trusted institutions are vulnerable to cyberattacks. Because the investigation is ongoing and notifications will continue through the fall, individuals should remain on high alert. With so much personal, financial and health information exposed, staying alert long after the headlines fade is critical.

    What more should universities and large institutions be required to do to safeguard the personal data of the people who trust them? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • New AI apps help rental drivers avoid fake damage fees

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Rental car drivers are now turning to artificial intelligence to protect themselves from surprise damage fees. Major companies, such as Hertz and Sixt, have begun using automated inspection tools to detect scratches and dents. 

    While these scanners promise efficiency, they have sparked backlash from renters who say they were unfairly billed for minor blemishes.

    To level the playing field, new consumer-focused apps are stepping in. Proofr, which launched recently, gives renters the ability to generate secure, time-stamped before-and-after photos of their vehicles. The app uses AI to detect even subtle changes, then encrypts and stores the images so they cannot be altered.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    AI-POWERED SELF-DRIVING SOFTWARE IS DISRUPTING THE TRUCKING INDUSTRY

    AI-powered damage detection apps like Proofr could change the way rental car companies report vehicle damage. (Proofr)

    How the AI-powered damage detection app works

    Created by 21-year-old college student Eric Kuttner, founder and CEO of Proofr, the app helps drivers create tamper-proof evidence when renting a car. Proofr secures every scan with geotags and timestamps, while its AI automatically flags potential damage or changes. It then organizes everything into smart, exportable reports, giving renters strong leverage against unfair claims.

    Instead of juggling dozens of photos in your camera roll, Proofr streamlines the process. With just eight quick scans, you get a detailed before-and-after report in under a minute. You can also generate polished PDF reports instantly, which helps with rental agencies, landlords or insurance claims. Although cars are the main focus, people also use Proofr for Airbnbs, eBay listings, moving into apartments and even documenting valuables. About 85% rely on it for car rentals, while 15% use it to protect themselves in vacation homes.

    By combining secure evidence with AI-powered detection, Proofr positions itself as a must-have travel hack. More than a convenience, it can save travelers real money by preventing hidden fees and leveling the playing field against large agencies.

    The app is free to download, while full features require a Pro subscription: $2.89 weekly, $9.90 monthly or $89.90 annually. Pricing is standardized in the US, and Apple automatically adjusts it for local currencies, taxes, and exchange rates in other countries.

    Competition in the AI damage space

    Proofr is not the only player. Ravin AI originally worked with Avis and Hertz but shifted its focus toward insurers and dealerships. Still, the company now offers a free demo on its website, allowing drivers to scan its vehicles and compare damage before and after rentals.

    Ravin’s system has been trained on 2 billion images over ten years. However, like Proofr, it is not perfect. Testers have noted missed paint chips and false positives from reflections. Both companies admit that lighting, angles and photo quality remain challenges.

    LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING

    ProovStation webpage

    Some companies are implementing physical scanners to detect damage to rental vehicles. (ProovStation)

    Why rental companies are under fire

    The frustration comes as rental agencies roll out AI inspection systems from firms such as UVeye and ProovStation. Sixt, for example, has already installed ProovStation’s AI-powered scanners at several U.S. airport locations, including Fort Lauderdale, Atlanta, Charlotte, Miami and Maui, with more on the way in Orlando, Washington and Nashville. 

    These scanners automatically photograph vehicles at the start and end of each rental. The system then compares images to flag potential damage, which is later reviewed by staff before any claim is issued.

    Critics argue these automated tools can turn every small scratch into a profit source. Some even point to ProovStation’s own marketing, which describes routine inspections as “gold mines of untapped opportunities.” Industry experts stress that companies should only pursue claims for significant damage, not charge hundreds for tiny scuffs.

    CLICK HERE TO GET THE FOX NEWS APP

    A ProovStation scanner over a rental car

    Rental car company Sixt has already installed ProovStation scanners at several U.S. airports. (ProovStation)

    What this means for you

    If you rent cars regularly, AI is already shaping your experience. Rental companies are using automated inspections to justify new charges, sometimes for barely visible marks. Apps like Proofr and Ravin give you the same technology, but on your side. By scanning your car before and after your rental, you create a digital record that can help you challenge unfair claims.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    The rental car industry is in the middle of a technology shift. What was once a quick glance by an employee is now a machine-driven process that can generate steep charges. Consumer apps bring transparency, but they also highlight the growing need for fairness in damage claims.

    Would you trust an AI app to protect you from rental car fees, or do you think rental companies should change their policies first? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Don’t use your home Wi-Fi before fixing certain security risks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Home Wi-Fi networks are the backbone of how most people get online, connecting laptops, phones, smart TVs and more. When properly secured, they offer a convenient and private way to browse the internet, stream content and work from home. But “private” doesn’t always mean “safe.” Wi-Fi security can be easily compromised if you have weak settings or outdated equipment.

    I recently heard from Carol in Smithtown, New York, who asked, “Is it safe to browse the internet on your own laptop using only your home Wi-Fi?”

    Her question points to a bigger concern. Many of us rely on home networks every day without really knowing if they’re as secure as they should be.

    Let’s break down what makes a home Wi-Fi network secure, the risks you should know about and the steps you can take to protect your privacy.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my Cyberguy.com newsletter.

    A user troubleshoots an internet router. (Kurt “CyberGuy” Knutsson)

    Why home Wi-Fi security is important

    Your home Wi-Fi is not just a way to get online but also the gateway to your personal and professional life. Everything from online banking to work emails to video calls passes through it. If your network isn’t secure, that information could be intercepted or exposed.

    One of the biggest misconceptions is that a home network is safe simply because it’s private. In reality, hackers often target residential networks because they tend to have weaker defenses than corporate ones.

    Someone nearby could connect to your network if your password is weak or your encryption is outdated. This not only slows your internet but also lets them use your connection for illegal activities. Sensitive information like passwords, credit card numbers and personal documents can be intercepted if the network is compromised.

    11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

    Attackers can use an insecure network to push malicious software onto your devices, sometimes without you even realizing it. Smart devices such as security cameras, thermostats and speakers can be taken over and used for spying or as part of larger cyberattacks.

    Even if you trust everyone in your household, your network is still exposed to risks from outside. And with so many devices connected today, including laptops, phones, tablets, TVs and IoT gadgets, there are more entry points for an attacker than ever before. Securing your Wi-Fi closes those doors before someone decides to try them. 

    Illustration of a hacker at work

    A hacker executes cybercrime. (Kurt “CyberGuy” Knutsson)

    Choose the right router for Wi-Fi protection

    Every piece of Wi-Fi security advice ultimately comes back to the same foundation: your router. It is the gatekeeper for your entire home network. If it is old, poorly configured, or missing important updates, even the strongest passwords and best digital habits will not fully protect you.

    Investing in a good router is one of the most important steps you can take to secure your home Wi-Fi. A modern, well-supported router gives you stronger encryption, better control over connected devices and regular updates that patch security flaws.

    Don’t stop at the hardware itself. Check regularly for firmware updates from the manufacturer. Some new routers update automatically, but many require you to log in and install patches manually. Outdated firmware leaves known vulnerabilities wide open.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    Also, change the default router login password immediately. Most routers ship with basic credentials like “admin/admin.” Attackers know this and can easily hijack your settings if you never change them.

    If your router supports it, enable two-factor authentication (2FA) for logins. This extra step makes it much harder for attackers to gain control, even if they steal your password.

    If you are not sure where to begin, I have put together a list of some of the best and most secure routers you can buy right now by visiting Cyberguy.com.

    Enable strong Wi-Fi encryption

    Encryption ensures that the data flowing across your network is scrambled, making it useless to anyone who tries to intercept it. Without proper encryption, nearby attackers can capture and read your traffic.

    The current gold standard is WPA3, which provides the strongest protection. If your router doesn’t support it, WPA2 is still considered safe and widely used. Older options like WEP or an open, password-free network are highly insecure and should be avoided at all costs. It’s worth logging into your router’s settings just to confirm what level of encryption your network is using.

    Image of a home router in use

    Cables run out of an internet router. (Kurt “CyberGuy” Knutsson)

    Create a strong Wi-Fi password

    Your Wi-Fi password is the digital equivalent of the key to your home. A short or predictable password is like leaving a spare under the doormat, and anyone determined enough can find a way in. Instead, create a long passphrase that combines upper and lowercase letters, numbers and symbols. Aim for at least 12 to 16 characters.

    Consider using a password manager to generate and store complex passwords.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    Check who is connected to your network

    Even with a solid password, it’s smart to check who is actually connected to your network. Most routers allow you to view a list of active devices. If you spot something you don’t recognize, investigate. It could be a neighbor piggybacking on your connection or, in the worst case, an intruder.

    It also helps to disable Wi-Fi Protected Setup (WPS). This feature was designed to make connecting new devices easier, but it has security flaws that attackers can exploit. Some users go further by enabling MAC address filtering, which limits access to specific devices.

    To reduce risk even more, set up a separate guest network for smart devices and visitors. That way, if one device gets hacked, your laptops and phones remain protected.

    And remember, keep all your devices updated. From laptops and phones to smart bulbs and thermostats, every gadget is a potential entry point. A weak link in one device can put your entire network at risk.

    IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO

    Protect your privacy with a VPN

    A Virtual Private Network, or VPN, helps solve one of the biggest issues with online privacy, which is who can see what you’re doing. When you connect through a VPN, it creates an encrypted tunnel between your device and the websites or apps you use. Everything that travels through this tunnel is hidden from outsiders, including your internet provider.

    A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com. 

    Don’t overlook antivirus protection

    While your Wi-Fi settings form the first line of defense, you should also protect the devices connected to your network. Install strong antivirus software to block malware that could spread through downloads, emails, or malicious links. This extra step ensures that even if a threat slips past your router’s defenses, your devices stay protected.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    So, to return to Carol’s question: Is it safe to browse the internet on your home Wi-Fi? The answer is yes, but only if you take the time to secure it. Strong router settings, proper encryption and a solid password do most of the heavy lifting. Building habits such as checking who is connected, keeping devices updated and using tools like a VPN adds even greater peace of mind.

    When was the last time you checked your router settings or updated its firmware? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my Cyberguy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Navy solar drone soars nonstop for 3 days

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The Navy, working with Skydweller Aero, just reached a major milestone in clean-energy aviation. Its solar-powered drone, known as Skydweller, flew for 73 hours straight without needing fuel. The test happened at Stennis, Mississippi, under the leadership of the Naval Air Warfare Center Aircraft Division (NAWCAD).

    This breakthrough shows how renewable energy can power long-endurance missions while cutting costs and reducing reliance on fuel.

    AMERICA’S SKIES ARE WIDE OPEN TO NATIONAL SECURITY THREATS, DRONE EXPERT WARNS: ‘WE HAVE NO AWARENESS’

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The Navy flew a drone nonstop for over three days to test new long-endurance solar-powered autonomous aircraft technology. (Naval Air Warfare Center Aircraft Division)

    Navy solar drone proves nonstop endurance

    The three-day nonstop flight proved that solar-powered drones can store enough energy during daylight to keep flying through the night. Engineers confirmed that Skydweller not only stayed airborne but also handled real-time autonomous decisions, adapted to turbulent weather and maintained secure communications.

    AI DRONE FINDS MISSING HIKER’S REMAINS IN MOUNTAINS AFTER 10 MONTHS

    Officials say the drone’s wingspan matches that of a Boeing 747, yet it weighs about as much as a Ford F-150. With solar panels covering its massive wings, Skydweller powers four electric propeller engines during the day while storing extra energy in batteries for night flights.

    The solar powered Skydweller Aero drone soars through the sky.

    The Navy, in partnership with Skydweller Aero, recently achieved continuous solar-powered unmanned flight during a nonstop three-day test. (Naval Air Warfare Center Aircraft Division)

    Navy expands solar-powered surveillance

    NAWCAD leaders say Skydweller will fit into the Navy’s intelligence, surveillance and reconnaissance (ISR) network. Unlike expensive satellites or large drones such as the Global Hawk, Skydweller offers commanders a cheaper option for persistent monitoring. It can hover over an area in what experts call a “pseudo-satellite role,” freeing up more advanced systems for priority missions.

    For U.S. Southern Command, Skydweller could help track drug trafficking, border security threats and other maritime challenges. Longer tests are already planned for this summer in the SOUTHCOM region, which covers Latin America and the Caribbean and oversees U.S. military operations in that area.

    Skydweller is a solar-powered aircraft developed by Skydweller Aero, an Albacete-based developer of aircraft for the commercial and defense sectors, which announced the successful completion of autonomous flight tests in Castilla-La Mancha.

    A solar-powered aircraft sits at Skydweller’s facility at Albacete airport on April 3, 2023, in Albacete, Castilla-La Mancha, Spain. (Rey Sotolongo/Europa Press via Getty Images)

    Future of solar-powered flight for Navy missions

    While Skydweller has already logged nearly 220 flight hours, engineers believe it could stay airborne far longer. Weather and range limits kept this recent test at 73 hours, but in theory, the aircraft could remain aloft for weeks.

    The Department of Defense sees platforms like Skydweller as vital for future conflicts where fuel resupply may not be possible. Renewable-powered drones could solve logistics headaches, especially in contested environments, which essentially means operating in places where enemies can block supply lines and make traditional refueling too risky.

    What this means for you

    The Navy’s solar drone test is proof that renewable energy can support technologies once thought impossible. If solar power can keep an aircraft in the air for days, similar advances may eventually reach consumer tech, disaster relief and even commercial aviation. Imagine cheaper, cleaner systems that can operate nonstop without fuel.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaways

    The Navy’s solar-powered flight shows how far clean energy technology has come. By proving that drones can fly for days without fuel, the Navy highlights a future where endurance and efficiency go hand in hand. This milestone also points to practical uses beyond defense, from disaster response to global communications. As testing continues, the focus will shift from what is possible to how long these systems can stay airborne and how widely they can be deployed. The next step may redefine how we think about surveillance, security and renewable energy in the skies.

    Do you think solar-powered drones will soon replace satellites as the go-to tool for global surveillance? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Moving exposes your personal data to scammers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Downsizing should feel like a fresh start. A smaller home, less upkeep, maybe even a retirement community with new friends. In fact, more than 3 million elderly Americans move every year. Are you considering downsizing as well?

    One woman told the internet about moving her mother into an assisted living home. Before the boxes were even packed, her mother fell for two back-to-back scams. It wasn’t bad luck; scammers had picked up on her address and pounced.

    This isn’t rare. Researchers have found that over 70% of cybercrimes trace back to exposed personal data. And moving creates one of the biggest exposures of all. Real estate listings, moving companies and address changes get scooped up by data brokers and published online, the perfect setup for criminals to strike.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    PODS moving truck and employee outside residential home, Queens, New York. (Lindsey Nicholson/UCG/Universal Images Group via Getty Image)

    How moving puts your personal data at risk

    When you buy, sell, or even just change your address, your information spreads across multiple systems:

    • Real estate records (public by default)
    • Utility company logs
    • Postal forwarding data
    • Transaction history and home value.

    Data brokers scoop all this up. Then they bundle it, resell it and suddenly your new life stage is an open secret. That’s exactly what scammers look for.

    10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

    Front Door with Delivery Boxes

    Cybercriminals look into multiple databases to gain information about a move. (iStock)

    Common scams that target you when downsizing

    Here’s why moving makes seniors a hot target:

    • Identity theft: Pair your new address with your date of birth (easy to find online), and thieves can open accounts in your name.
    • Cash-rich scams: Selling a house can make you look like you’re sitting on cash. Fraudsters know this.
    • Phishing tricks: Fake “utility setup” calls asking for your Social Security number.
    • Harassment: A new address published online can attract unwanted attention.

    Think of it this way: while you’re busy unpacking boxes, criminals are unpacking your data.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    How to avoid becoming a moving scam victim

    Removing your data can protect you from cyber scams. (Kurt “CyberGuy” Knutsson)

    How to protect your personal data when you move

    While moving creates new opportunities, it also creates new risks. These simple steps will help you lock down your personal data before scammers can exploit it.

    1) Remove your info from data broker sites

    Data brokers automatically update your file when you move. That means your new address, phone number and even property transaction details can end up on people-search websites almost overnight. Once your profile is out there, scammers can buy or scrape it with ease.

    The good news: you don’t have to chase down every broker yourself. A personal data removal service does the legwork for you, contacting data brokers, demanding removal and following up to make sure your new details don’t creep back in. Think of it as hiring a moving company for your personal data.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    2) Use the official USPS form only

    When you change your address, always use the official USPS website or your local post office. Some third-party sites look like they’re offering a convenient service, but they often collect extra data about you and sometimes even resell it. Going straight to the source means your sensitive details don’t take unnecessary detours.

    3) Watch real estate disclosures

    When you sell your home, more than just the price gets published. Your name, past addresses and even photos of your home can become part of the public record. Ask your realtor what’s automatically disclosed and whether anything can be limited or redacted. It’s worth being picky here: the less of your personal footprint that’s tied to your property, the better.

    4) Shred old paperwork

    Moving is the perfect excuse to purge. But don’t just throw out old bills, medical statements, or financial records; shred them. Dumpster-diving for personal data may sound outdated, but it’s still a method scammers use. A good shredder ensures your sensitive history doesn’t end up in the wrong hands.

    5) Share moving news privately

    It’s tempting to post a “Goodbye, old house!” photo online, but resist the urge. Publicly announcing a move tells scammers exactly when your home is empty and what your new address might be. Instead, share the news directly with family and close friends. A little less buzz online means a lot more safety offline.

    6) Freeze your credit before and after moving

    One powerful way to stay ahead of scammers is to freeze your credit. A freeze blocks new credit accounts from being opened in your name, even if criminals have your address or other details. The good news is that you can do this for free with all three major credit bureaus: Equifax, Experian and TransUnion.

    It only takes a few minutes online or by phone, and you can lift the freeze anytime if you need to apply for a loan or credit card. By freezing your credit before and after your move, you create a strong barrier that keeps thieves from turning stolen data into financial damage.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Moving should feel like a new beginning, not an invitation for scammers to strike. With a few smart steps, you can stay ahead of data brokers and fraudsters. From shredding documents to freezing your credit, every action adds a layer of protection. By protecting your information before and after your move, you gain peace of mind and start your next chapter on solid ground. The effort is small compared to the security it brings.

    Should more be done to stop companies from exposing and selling our personal data? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • AI video tech fast-tracks humanoid robot training

    [ad_1]

    NEWYou can now listen to Fox News articles!

    One of the biggest hurdles in developing humanoid robots is the sheer amount of training data required. Teaching machines to act like humans demands massive video datasets. Collecting that data is expensive, time-consuming and difficult to scale. This challenge has slowed progress toward making robots useful in everyday environments such as homes, hospitals and offices.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    CHINA LAUNCHES CENTER TO TRAIN 100-PLUS HUMANOID ROBOTS SIMULTANEOUSLY

    Vidar says its training methods use video to program robots in 20 minutes. (Vidar)

    Vidar by ShengShu transforms humanoid robot training

    ShengShu Technology has introduced Vidar, short for Video Diffusion for Action Reasoning. Instead of relying solely on endless hours of physical-world data, Vidar generates synthetic training environments from just a small amount of real video. By blending real data with AI-generated video, Vidar makes training more efficient, scalable and affordable.

    A slide with information about how Vidar works

    Vidar uses video to train robots to perform real-world tasks. (Vidar)

    How Vidar uses AI video to speed up robot training

    Vidar works by decoupling perception from control. First, it uses ShengShu’s Vidu video model to learn from both real and synthetic videos. Then, a task-agnostic system called AnyPos translates that knowledge into motor commands for robots. This modular setup allows for faster training and easier deployment across different types of robots.

    Unlike traditional methods that require robots to physically interact with the world to learn, Vidar can simulate complex, lifelike scenarios virtually. Remarkably, it only needs about 20 minutes of training data, between 1/80 and 1/1200 of what leading models require. That efficiency makes it possible to scale robot training to levels never seen before.

    CHINESE TECH FIRM SHARES ROBOT TRAINING SECRETS WITH THE WORLD

    A slide with information on how Vidar works in real world applications

    Vidar’s real-world replay and deployment with video model. (Vidar)

    Real-world applications of Vidar in humanoid robots

    Vidar is more than just a research tool. Its design means robots can adapt quickly to new tasks and environments. That could unlock real-world applications in eldercare, home assistance, healthcare and smart manufacturing. By bridging the gap between simulation and reality, Vidar is positioning humanoid robots as practical helpers rather than futuristic concepts.

    HUMANOID ROBOT PERFORMS MEDICAL PROCEDURES VIA REMOTE CONTROL

    A slide showing Vidar tests

    Results of AnyPos-ATARA with video replay to accomplish various manipulation tasks. (Vidar)

    What this means for you

    For consumers, Vidar brings the idea of household or workplace robot helpers closer to reality. Instead of waiting decades for robots to mature, scalable training could speed up deployment in everyday settings. This could mean robots assisting you with chores, supporting eldercare or even helping in medical environments sooner than expected.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Vidar is a milestone in the race toward practical humanoid robots. By blending limited real data with generative video, ShengShu has created a smarter and faster way to train physical AI. The approach tackles cost, efficiency and scalability all at once, three factors that have long held robotics back.

    Would you welcome a humanoid robot in your home if it could help with daily tasks, or does the idea still feel too futuristic? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 10 ways to secure your older Mac from threats and malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple’s Mac computers are generally considered more secure than Windows PCs, thanks to the company’s tight control over hardware and software. Whether you use a MacBook, iMac, or Mac Mini, built-in protections help shield your device from common threats. But no system is completely immune. Hackers have repeatedly found ways to bypass Apple’s safeguards, especially on older Macs that no longer receive regular security updates.

    The good news: just because your Mac is aging doesn’t mean it has to be at risk. With a few smart precautions, you can keep it safe and running smoothly, even if it’s no longer eligible for the latest macOS version.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    1) Keep your older Mac up to date

    Even if your Mac no longer supports the latest macOS version, Apple often releases security patches for older versions. Make sure you’ve enabled automatic updates. Follow the steps below to do so:

    • Choose the Apple menu.
    • Select System Settings

    LONG-DORMANT MAC MALWARE RETURNS WITH ADVANCED CAPABILITIES

    Screenshot showing steps to enable automatic updates (Kurt “CyberGuy” Knutsson)

    • Then click General in the sidebar (you may need to scroll down).
    • Click Software Update.
    Screenshot of a Mac computer desktop

    Screenshot showing software update option on Mac (Kurt “CyberGuy” Knutsson)

    • Click the Info button next to Automatic Updates
    • Then turn on all the options.
    Screenshot of a Mac computer desktop

    Screenshot showing toggle options for Mac software updates (Kurt “CyberGuy” Knutsson)

    2) Update your apps and browsers

    Apps, especially web browsers, are a major target for attackers. If you’re using Chrome, Firefox, Brave or another browser, make sure it’s up to date. Most browsers have their own update systems independent of macOS, which is good news if you’re running an older OS.

    I’ll walk you through how to update Chrome on your Mac. If you’re using Safari, you can skip this step since it updates automatically alongside your device’s software.

    How to update your Chrome browser

    • Open Google Chrome browser
    • Select About Google Chrome from the Chrome menu
    Screenshot of a Google Chrome menu

    Screenshot showing steps to update Chrome (Kurt “CyberGuy” Knutsson)

    • Allow it to scan from a most recent update
    Screenshot of Google Chrome menu

    Screenshot showing steps to update Chrome (Kurt “CyberGuy” Knutsson)

    • Click Relaunch to complete the update

    Also check for updates for productivity apps, media players and email clients. Developers often patch vulnerabilities quietly, so it’s worth keeping everything current even if the Mac itself isn’t.

    3) Strengthen password protection

    A secure Mac starts with a strong password. Avoid simple combinations or anything that includes personal information. Use a passphrase if you have trouble remembering complex strings. Don’t reuse passwords across services. If one account is compromised, others will be too. Consider using a password manager to generate and store complex passwords.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    How to Change Your Mac Login Password (with current password)

    • Click the Apple menu in the top-left corner.
    • Select System Settings (called System Preferences in older macOS versions).
    • Navigate to Users & Groups or Login Password in newer versions.
    • Click the Info (i) button next to your user account.
    • In the pop-up that appears, click Change next to the password field.
    • Enter your old (current) password, then type your new password, verify it, and set a password hint (optional).
    • Click Change Password to finalize.

    4) Enable two-factor authentication (2FA)

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts. Even if someone guesses or steals your password, they won’t be able to log in without the second code, usually sent to your phone or generated by an app.

    TOP MULTI-FACTOR AUTHENTICATION APPS TO PROTECT YOUR ACCOUNTS

    Make sure 2FA is enabled on your Apple ID, Gmail, social media accounts, banking apps and any cloud services you use. It’s a simple step that significantly increases your account security.

    5) Install strong antivirus software

    While Macs have built-in security features like Gatekeeper and XProtect, older systems may not receive the latest threat definitions. Installing third-party antivirus software can help fill in the gaps.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    6) Turn on FileVault to encrypt your data

    Even if your Mac is older, FileVault can still encrypt your entire hard drive. This protects your data if your device is lost or stolen.

    How to turn on FileVault:

    • Go to System SettingsPrivacy & SecurityFileVault.
    • Click Turn On FileVault.
    • Choose to use your iCloud account or create a recovery key.
    • Restart your Mac to begin encryption.

    Pro tip: If your Mac is too old to support FileVault 2 (full-disk encryption), consider encrypting sensitive files manually using Disk Utility.

    A Mac computer on a table

    Cybersecurity experts recommend regularly updating older Mac computers to reduce the risk of security threats (Kurt “CyberGuy” Knutsson)

    7) Use a VPN

    Outdated macOS versions may be vulnerable to DNS hijacking or network-based attacks. Secure your internet traffic by enabling a VPN to encrypt your data in transit.  A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. Use a VPN with a no-logs policy for added privacy and protection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com.

    8) Remove unused apps and system extensions

    Older apps and background processes can introduce vulnerabilities if they’re no longer maintained.

    • Open FinderApplications and delete anything you don’t use.
    • Check System SettingsGeneralLogin Items for anything unfamiliar.
    • Review System Settings > Privacy & SecurityExtensions and disable outdated tools.

     9) Use a limited (non-admin) user account for everyday use

    Running as an admin all the time increases your risk. Creating a standard user account for everyday use limits what malware can do if it sneaks in.

    How to add a standard user:

    • Go to System Settings > Users & Groups.
    • Click Add Account (+).
    • Choose Standard instead of Admin.

     10) Back up your data regularly

    If malware does sneak in or your system crashes, a recent backup can save the day.

    • Use Time Machine (built into macOS) to back up to an external drive.
    • Or choose a cloud backup provider that supports macOS.

    Set it to back up automatically, at least weekly. Here are step-by-step instructions to back up your Mac.

    CLICK HERE TO GET THE FOX NEWS APP

    An overhead view of an Apple store

    An Apple Store on Aug. 29, 2025, in Chongqing, China. (Cheng Xin/Getty Images)

    Kurt’s key takeaway

    Just because your Mac is aging doesn’t mean it’s defenseless. With regular updates, strong passwords, and added layers like FileVault and antivirus protection, you can stay ahead of threats. Take the time now to lock things down, remove risky apps, and back up your data. These small actions make a big difference in keeping your older Mac secure.

    How often do you change your Mac? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Will autonomous trucks replace drivers by 2027?

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Self-driving trucks are moving closer to reality. PlusAI released its first half 2025 performance results, showing how far the company has come toward its goal of launching factory-built autonomous trucks in 2027.

    The numbers are clear. Safety case readiness reached 86 percent, with a goal of 100 percent by launch. Autonomous miles percentage climbed to 98 percent. Remote assistance free trips rose to 76 percent, with a target of more than 90 percent.

    These metrics may sound technical, but they show that PlusAI is moving steadily toward putting driverless freight trucks on the road within two years.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    159-YEAR-OLD COMPANY EMBRACES DRIVERLESS TRUCKS

    PlusAI reports that its driverless trucks could be ready to hit the road within the next two years. (PlusAI)

    Why PlusAI’s 2025 results matter for autonomous trucks

    Even if you never step into a truck, these results affect your daily life. Every product you buy travels by truck at some point, whether it’s groceries, clothing or furniture. The way those trucks operate influences cost, availability and safety on the road.

    The trucking industry faces three major challenges. There are not enough long-haul drivers to meet demand. Costs continue to rise due to labor shortages, tariffs and fuel prices. And safety is a concern because human drivers can get tired or distracted.

    Autonomous trucks could help address each of these issues. PlusAI’s vehicles are already hauling freight on Texas highways today, and they are also undergoing road testing in Sweden. The company has already logged more than five million autonomous miles across the United States, Europe and Asia. That real-world experience fuels the AI system with the data it needs to improve.

    LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING

    A graph showing data for self driving truck readiness

    The PlusAI Safety Case Framework. Data shows that self-driving trucks will roll out by 2027. (PlusAI)

    How PlusAI plans to launch autonomous trucks by 2027

    PlusAI has created a roadmap that sets it apart. Instead of retrofitting trucks with autonomous systems, it is working with major manufacturers like TRATON GROUP, Hyundai and IVECO to integrate the technology at the factory. This approach makes scaling production faster and ensures consistency.

    The initial launch is planned for the Texas Triangle, a major freight corridor connecting Dallas, Houston, San Antonio and Austin. From there, PlusAI plans to expand into other U.S. routes and eventually Europe.

    The company has also committed to publishing regular performance updates as it transitions to a public company. By sharing measurable results, PlusAI builds trust with regulators, the public, and businesses that may one day rely on its trucks to move goods.

    We have a clear roadmap to the commercial launch of SuperDrive,” said David Liu, CEO and co-founder of PlusAI. “By publicly sharing these performance metrics, we are showing our commitment to safety and scalability while bringing partners, customers, and regulators along on this journey.

    What’s next for PlusAI and driverless freight trucks?

    PlusAI still has milestones to meet. Safety readiness must rise from 86 percent to 100 percent. Remote Assistance Free Trips must surpass 90 percent. These are ambitious goals, but the progress so far suggests the company can achieve them.

    Fleet trials are scheduled to begin later this year, and PlusAI continues testing in both the United States and internationally. Each step adds to the case that driverless trucks will be ready for commercial launch in 2027.

    AI-POWERED SELF-DRIVING SOFTWARE IS DISRUPTING THE TRUCKING INDUSTRY

    American trucking industry

    A drone view shows a transport truck entering the United States from Canada, at a Canada-U.S. border crossing in Blaine, Washington, April 2, 2025. (REUTERS/David Ryder)

    What this means for you

    As a shopper, autonomous trucks could mean faster and more affordable deliveries. As a driver, you may soon share highways with self-driving freight haulers. As a business owner, this technology could reduce logistics costs and ease the impact of driver shortages.

    The bigger picture is that autonomous trucks are moving from testing to real use. They are no longer limited to pilot projects. You may see them alongside you on the road sooner than expected.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my quiz here: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Transportation is changing quickly. Just as ride-sharing apps transformed how people travel within cities, autonomous trucks may soon reshape how goods move across the country. The difference is that this shift is approaching within just a few years. The progress PlusAI reports today offers a glimpse of that future. If the company continues on this track, driverless trucks could become a normal part of daily life by the end of the decade.

    Would you feel comfortable seeing an 18-wheeler drive itself on the highway next to your car? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link