ReportWire

Tag: Technologies

  • 5 trendy tech words shaping today’s internet culture

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If your social media feed feels noisier, stranger or more manipulated than it used to, you’re not alone. The internet runs on its own language now, and those buzzwords quietly shape what you see, what you don’t see and how companies target you. From viral “slop” content to shadowbans and targeted ads, these terms influence how information spreads and how platforms treat your account.

    Let’s break down five key phrases so you can understand what’s really happening behind your screen and stay in control of your digital life.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    CLEAN UP YOUR SOCIAL MEDIA FEED AND CUT THE NOISE

    If your social media feed feels louder and more chaotic, algorithm-driven trends like “slop” and shadowbanning may be shaping what you see. (Jan Woitas/picture alliance via Getty Images)

    1) Slop

    The flood of low-quality content that is taking over your social media feed

    “Slop” refers to mass-produced, low-effort digital content, often generated quickly by AI or churned out purely for clicks and engagement. This includes spammy articles, recycled videos, misleading thumbnails and content created without real value.

    While slop may seem harmless, it can crowd out reliable information, spread misinformation and overwhelm your feed with noise instead of useful content. Platforms often struggle to control it because slop is designed to game algorithms.

    Why this matters:

    • Low-quality content can drown out trustworthy sources
    • Slop is often designed to manipulate clicks and attention
    • AI-generated misinformation can spread faster than ever
    • Curating your feed helps reduce exposure to low-value content

    The good news is you can take back control by curating your feed and cutting the noise. 

    2) Burner account

    The hidden identity behind anonymous profiles

    A burner account is a secondary or anonymous social media account used to hide a person’s real identity. Some people use burner accounts for privacy, while others use them for trolling, harassment, spying or secretly viewing content.

    Because burner accounts are difficult to trace, they are often linked to online harassment, fake engagement or manipulation of public conversations. Platforms attempt to detect suspicious behavior, but many burner accounts still slip through the cracks.

    Why this matters:

    • Anonymous accounts can spread misinformation or harassment
    • Burners are often used to manipulate comments and engagement
    • They make it harder to verify who is behind the content

    Being cautious with unknown accounts protects your safety.

    3) Shadowban

    When platforms quietly decide what you don’t see

    A shadowban doesn’t only affect creators; it can affect what you see as a user. Platforms sometimes limit the visibility of certain accounts, topics, or types of content without telling you. This means posts may be hidden, pushed lower in your feed or never shown to you at all, even if you follow the account.

    This type of filtering is often driven by algorithms designed to reduce spam, harmful content or policy violations, but it can also shape what information reaches you without you realizing it. Over time, this can subtly influence your perception of what’s popular, trending or widely discussed.

    Why this matters:

    • You may not see all content from accounts you follow
    • Algorithms quietly filter what appears in your feed
    • Your view of trends and conversations can be shaped
    • Platform controls influence what information reaches you

    YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

    iPhone on a social media screen.

    From burner accounts to clickbait, online buzzwords influence how information spreads and how users are targeted. (Brent Lewin/Bloomberg via Getty Images)

    4) Clickbait

    Headlines designed to make you click, not inform you

    Clickbait uses exaggerated, misleading or emotionally charged headlines to attract attention and drive clicks. While some clickbait is harmless, it often leads to low-quality or misleading content that doesn’t deliver on its promise.

    Clickbait works because it exploits curiosity, fear or surprise, powerful emotional triggers that drive engagement. It’s a core tactic used by low-quality publishers and viral content farms.

    Why this matters

    • Clickbait can spread misinformation or distort facts
    • It’s designed to manipulate attention rather than inform
    • Recognizing it helps you avoid low-value content
    • Trustworthy sources focus on clarity, not shock value

    5) Targeted ads

    Why the internet seems to know what you want

    Targeted ads use data about your behavior, searches, location and interests to deliver personalized advertisements. This is why you might see ads related to something you recently searched, clicked or even talked about near your phone.

    Advertisers build detailed profiles based on browsing activity, app usage and online behavior to predict what you are most likely to buy or engage with.

    What this does:

    • Shows ads based on your interests and behavior
    • Uses browsing history, location and app activity
    • Builds advertising profiles over time
    • Drives highly personalized marketing

    One more thing to know: Targeted advertising relies heavily on data collection. Adjusting privacy settings, limiting ad tracking and regularly reviewing app permissions can reduce how much data advertisers use to profile you.

    Pro Tip: Control the data that fuels the system

    If targeted ads feel a little too accurate, it’s because data brokers are constantly collecting and selling your information. Beyond adjusting privacy settings, consider removing your personal data from broker sites to shrink the profile advertisers build around you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Stay tuned for more in this series as we decode the internet’s most talked-about terms and answer the top questions we hear from readers like you.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Phone resting on a keyboard.

    Understanding digital terms like “slop” and clickbait can help users take back control of their feeds. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

    Kurt’s key takeaways

    The modern internet runs on more than just technology; it runs on attention, algorithms and influence. Understanding terms like slop, shadowban and targeted ads helps you recognize how platforms shape your experience and how companies compete for your clicks. The more you understand these trends, the easier it becomes to filter noise, protect your privacy and stay in control of what you see online.

    Confused by a trending internet term or want something explained? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Wearable robotics are changing how we walk and run

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When you hear the word robotics, you probably think of factory machines or humanoid robots sprinting across a test track. That image makes sense. For years, robotics lived in labs and industrial spaces. 

    But a quieter shift is happening much closer to home. It is happening around your ankles, knees and hips. Wearable robotics are moving out of research labs and into everyday life. From powered shoes to lightweight exoskeletons, this new wave of assisted movement technology is becoming a real consumer category. 

    The goal is not to replace your effort. It is to support it. And that shift is bigger than any single brand.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

    Wearable robotics are moving from labs to everyday life, with powered shoes and exoskeletons designed to reduce fatigue and support natural movement. (Xiao Xiao/Xinhua via Getty Images)

    From elite athletes to everyday use: the shift in wearable robotics

    For years, sports innovation focused on speed. Lighter foam. Carbon plates. Better traction. Most of those gains targeted elite competitors. Now the focus is expanding beyond race day. Nike’s Project Amplify, developed with robotics partner Dephy, is one example. The system pairs a carbon plate inside the shoe with a motorized cuff worn above the ankle. Sensors track stride patterns in real time, and the cuff provides subtle forward assistance designed to feel smooth and natural. Instead of forcing movement, it learns it.

    Earlier attempts at powered footwear struggled because batteries and motors were too heavy to sit inside a shoe. The result felt awkward and unbalanced. Modern designs solve that problem by moving energy storage above the ankle or to the hips. By shifting weight higher on the leg, engineers reduce strain on the foot and improve balance.

    Battery improvements and smarter motion sensors also play a role. Today’s systems adapt to your stride in real time, making assisted movement feel less like equipment and more like an extension of your body. The company has said it is targeting a commercial release around 2028.  But Nike is not alone in this space.

    Powered footwear and exoskeletons are entering the consumer market

    If you have ever felt your legs get heavy halfway through a long walk, you understand why this category exists. Maybe it is a trip through the airport, a walk around the neighborhood or a few flights of stairs that feel steeper than they used to. Most people are not trying to run faster. They just want to move without feeling worn out. That is where wearable robotics are starting to show up. Companies are building products meant for real people, not just elite athletes or lab testing.

    Early consumer exoskeletons for outdoor movement

    The Hypershell X is one example. It is a lightweight outdoor exoskeleton designed for hikers and long-distance walkers. The system wraps around the waist and legs and uses small motors to reduce fatigue on climbs and uneven terrain. The goal is straightforward. Help you go farther without feeling drained halfway through the trail. Hypershell also introduced the X Ultra, a more powerful version built for steeper terrain and longer outings. It delivers stronger assist levels while staying compact enough to wear under standard outdoor gear. Both models are designed for recreational users who want endurance support, not medical treatment.

    Dnsys has also introduced the X1 all-terrain exoskeleton. The hip-mounted system is marketed to hikers and outdoor enthusiasts who want help reducing fatigue on climbs and long treks. Unlike lab prototypes, the X1 has been sold through crowdfunding and direct online orders, making it one of the early consumer entries in this space.

    Wearable robotics designed for everyday walking

    Another example is WIM from WIRobotics. This wearable robot weighs about 3.5 pounds and supports natural hip movement while walking. It is meant for older adults, active adults and people recovering from minor injuries who want extra assistance without wearing something bulky or clinical looking.

    10 HEALTH TECH PRODUCTS STEALING THE SPOTLIGHT AT CES 2026

    Disabled man standing from his wheelchair using wearable tech.

    Medical exoskeleton makers such as Ekso Bionics and ReWalk paved the way for today’s consumer wearable robotics. (Wu Junyi/China News Service/VCG via Getty Images)

    From medical exoskeletons to consumer devices

    The medical side of wearable robotics has been evolving even longer. Companies like Ekso Bionics and ReWalk have developed powered exoskeletons that help people with spinal cord injuries or stroke stand and walk. These systems are used in rehabilitation clinics and in select personal mobility programs. They show how wearable robotics first proved themselves in medical settings before gradually influencing consumer designs.

    These products vary in power, price and purpose. What connects them is a shared direction. Wearable robotics are beginning to actively assist movement, not just track it.

    How wearable robotics help reduce fatigue and movement hesitation

    Here is something people rarely admit. It is not always an injury that stops movement. It is hesitation. Many people worry about knee pain creeping in halfway through a walk. Others fear running out of energy before they make it home. Some quietly stress about slowing everyone else down.

    Those doubts shorten walks and cancel runs long before physical limits do. Wearable robotics hopes to close that confidence gap. By reducing fatigue and supporting joints, assisted movement systems can make activity feel realistic again for people who might otherwise skip it. Effort does not disappear. The barrier to starting simply becomes lower.

    Powered footwear and wearable robotics support natural movement

    A better comparison might be e-bikes. Electric assistance did not eliminate cycling. Instead, it expanded who felt comfortable getting on a bike in the first place. Powered footwear and wearable robotics could have a similar effect on walking and running. In practical terms, that might look different for different people.

    Some commuters could replace short car trips. Older adults might stay active longer without feeling as worn out. Casual runners could finish a workout with energy to spare instead of dragging through the final mile. In other words, this shift is not about creating super athletes. It is about widening the circle of people who feel capable of participating.

    What this means to you

    You may never strap on a powered exoskeleton. You may not be waiting for motorized shoes to hit stores in 2028. But this shift still matters. If walking a long trail leaves your knees aching, or if you skip runs because you worry about burning out halfway through, this kind of technology is being built with you in mind. The goal is not to turn anyone into a super athlete. It is to make movement feel more doable.

    For some people, that could mean walking an extra mile without thinking twice. For others, it might mean keeping up with friends, staying active longer or feeling a little less hesitant about getting started. Wearable robotics are changing the conversation. Instead of asking how fast you can go, the question becomes simpler. How comfortable do you want to feel while moving? And that is a very different way to think about fitness.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    NEW EXOSKELETON ADAPTS TO TERRAIN WITH SMART AI POWER

    Man running at the park while wearing wearable tech.

    Consumer exoskeletons like Hypershell X and Dnsys X1 target hikers seeking endurance support on long treks. (Matthew J. Lee/The Boston Globe via Getty Images)

    Kurt’s key takeaways

    Wearable robotics systems are still in the early stages of consumer adoption. Most powered footwear and exoskeleton systems remain expensive and limited in availability. But the direction is clear. Technology is shifting from tracking your performance to actively supporting it. That is a meaningful change. If assisted movement becomes as common as smartwatches or fitness trackers, it could reshape how people think about aging, endurance and daily mobility. Walking farther may feel realistic again. Running may feel less intimidating. Staying active later in life could become more achievable for millions. The real question is not whether wearable robotics will improve. They will. The bigger question is how we choose to use them.

    If wearable robotics can help you walk and run with less strain, would you try them, or would you rather rely only on your own effort? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Woman owes $3,556 for cruise she already paid for after falling victim to elaborate Zelle scam

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A family vacation turned into a five-year nightmare. And it started with one payment.

    L. Williams found a cruise consultant online who booked her family a week on Carnival Freedom. Great price. One catch. He only accepted Zelle. She sent $3,556. The family sailed the Western Caribbean. Gorgeous sunsets. Wonderful memories.

    Five years later, she tried to book another cruise. Nope.

    Carnival told her she was on the Do Not Sail list. Turns out her “consultant” pocketed the Zelle cash, then used a stolen credit card to book the trip. When the real cardholder disputed the charge, Williams got the blame.

    DON’T LOCK YOUR FAMILY OUT: A DIGITAL LEGACY GUIDE

    She now owes $3,556 for a trip she already paid for. Banned for life. The scammer’s phone? Disconnected. (Of course.)

    The deals are real right now

    Here’s what you need to know. The cheapest window for domestic spring break flights is about 43 days before departure. For late March trips, that’s this week. Wait until late February, and prices jump 20% to 25%. That’s your cash walking out the door.

    Fly Tuesday, Wednesday or Saturday, and save up to 30% over weekend flights. Set Google Flights alerts now. Caribbean fares are down 17% from last year. 

    Bundle flights with hotels through Costco, Expedia or Delta Vacations, and you can knock hundreds off the total.

    Travelers arrive at Los Angeles International Airport on Monday, Nov. 3, 2025 in Los Angeles, CA.  (Juliana Yamada / Los Angeles Times via Getty Images)

    Scammers circling like sharks

    Williams’ story isn’t a one-off. Over 38 million people are expected to cruise in 2026, and scammers know it. Here are the big cons I’m seeing.

    • The Google trap. Fake cruise line phone numbers are showing up in search results. One man called what he thought was Carnival’s customer service line and got hit with a $650 per person “docking fee.” That’s not a thing. Real cruise lines don’t charge surprise fees by phone. Always go directly to the official website for contact info.
    • The free cruise postcard. Got one in the mail? Toss it. The fine print buries you in hundreds of dollars of hidden fees and a windowless cabin with bunk beds. How romantic. One investigation found the company behind these changes its name every year so you can’t look them up.

    AI JOBS THAT PAY $200K OR MORE

    • The Facebook agent. Scammers pose as travel agents in Facebook groups and collect payments through Zelle, Venmo or Cash App. Then they vanish. These apps have zero buyer protection. They’re for sending money to people you trust, not strangers selling Caribbean getaways.
    • Your three rules: Always pay with a credit card. Never call a customer service number from a Google search, go to the official site. If you want a travel agent, verify them at ASTA.org.
    Luxury white cruise ship shot at angle at water level on a clear day.

    Book smart and you’ll be sipping something tropical in a few weeks. Book carelessly and you might end up on the Do Not Sail list, which, ironically, is the worst kind of cruise control.

    TRAVELING SOON? KNOW HOW TO NAVIGATE FLIGHT CANCELLATIONS NOW

    If anyone you know is booking a spring break trip, send them this first. It takes two seconds to forward and could save them thousands. One payment to the wrong person cost a woman her vacation money, her cruise line privileges and years of debt headaches.

    An RV parked in a campsite during the early autumn.

    An RV parked in a campsite during the early autumn.  (iStock)

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    National radio show airing on 500+ stations, a free daily newsletter, videos on YouTube, plus the podcast wherever you listen. 

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • Ring’s AI Search Party helps find lost dogs faster

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Losing a dog can make your stomach drop and your thoughts race. First, you check the yard. Then you walk the block. After that, you refresh local Facebook groups again and again, hoping for a sign.

    Now, Ring wants to turn your entire neighborhood into extra eyes with help from AI. Its Search Party feature uses nearby cameras to spot lost dogs, and it is now available nationwide to anyone who needs help finding a missing pet. For the first time, you do not need to own a Ring camera to use it.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    10 SMART DEVICES THAT MAKE PET PARENTING EASIER

    Ring says its Search Party tool has helped reunite more than one lost dog per day across the U.S. (Evelyn Hockstein/For The Washington Post via Getty Images)

    What is Ring’s Search Party feature?

    Search Party is a community-powered tool that helps reunite lost dogs with their families faster. When someone reports a missing dog in the Ring app, nearby outdoor Ring cameras scan recent footage using AI. The goal stays simple. Find dogs that look like the one reported missing. If a possible match shows up, the camera owner receives an alert with a photo of the lost dog and a video clip. From there, they can ignore the alert or step in to help. As a result, sharing always stays optional, and pressure stays off.

    How Search Party actually works

    Here is what happens once a lost dog post goes live.

    • First, a pet owner posts a lost dog alert in the Ring app
    • Next, nearby outdoor Ring cameras scan footage using AI
    • Then, camera owners receive alerts if a match appears
    • After that, neighbors can share video clips or snapshots
    • Finally, messages and calls stay private with no phone numbers shared

    Search Party now works without a Ring camera

    This update changes everything. Previously, only people with Ring devices could use Search Party. Now, anyone in the U.S. can download the free Ring Neighbors app, register and post a lost dog alert. Because of that shift, dog owners can tap into an existing camera network without buying hardware or paying for a subscription. At the same time, neighbors without cameras can still help by spreading alerts and watching for sightings.

    Lost pets already represent one of the most common post types in the Ring Neighbors app, with more than 1 million lost or found pet reports shared last year alone. With an estimated 60 million U.S. households owning at least one dog, the potential reach of Search Party is massive.

    How to start a Search Party for your dog

    Getting started is pretty straightforward.  Download the Ring app for free in the App Store or Google Play if you don’t already have it. Anyone can create a Lost Dog Post in the Ring app.

    If the post qualifies, the app walks you through activating Search Party step by step. You share photos and basic details about your dog. Once active, nearby cameras begin scanning automatically.

    Search Party alerts are temporary. When you start a Search Party in the Ring app, it runs for a few hours at a time. If your dog has not been found and remains missing, you need to renew the Search Party or start a new one so nearby cameras continue scanning for matches.

    When you find your dog, you can update the post to let the neighborhood know the search is over.

    AI TECHNOLOGY HELPS REUNITE LOST DOGS WITH THEIR OWNERS

    A dog laying down and looking away.

    A missing dog alert in the Ring app triggers nearby outdoor cameras to scan footage for possible matches using AI. (Photo by EZEQUIEL BECERRA / AFP via Getty Images)

    What happens when a Ring camera spots your lost dog

    If your outdoor Ring camera spots a possible match, you stay in control the entire time. You receive an alert with a photo of the missing dog and a clip from your camera. From there, you decide what happens next. You can ignore the alert or help by sharing footage or contacting the owner through the app. Throughout the process, your phone number stays private.

    Ring says Search Party has already delivered dramatic results. In one case, Kylee from Wichita, Kansas, was reunited with her mixed-breed dog, Nyx, in just 15 minutes after he slipped through a small hole under a backyard fence. A neighbor’s Ring camera captured video of Nyx and shared it through the app, giving Kylee her first and only lead. “I was blown away,” Kylee said, noting that even dogs with microchips often go unrecognized if they lack a collar. She credits that shared video for bringing Nyx home so quickly, adding that she does not think she would have found him without the Ring app.

    Nyx is far from the only success story. Ring says Search Party has helped reunite more than one lost dog per day, including dogs like Xochitl in Houston, Truffle in Bakersfield, Lainey in Surprise, Zola in Ellenwood, Toby in Las Vegas, Blu in Erlanger, Zeus in Chicago and Coco in Stockton, with more reunions happening every day.

    How to turn Ring’s Search Party on or off

    Search Party remains optional and adjustable. You can enable or disable it at any time inside the Ring app.

    • Start by opening the Ring app and heading to the main dashboard.
    • Then tap the menu icon.
    • Go to Control Center and select Search Party.
    • From there, you can turn Search for Lost Pets on or off for each camera.

    Ring commits $1M to help shelters reunite lost dogs

    Alongside the expansion, Ring is committing $1 million to equip animal shelters with camera systems. The company aims to support up to 4,000 shelters across the U.S. By bringing shelters into the network, Ring hopes dogs picked up by shelters can reconnect with their owners faster. In addition, the company already works with groups like Petco Love and Best Friends Animal Society and says it remains open to new partnerships.

    Ring is also encouraging animal shelters and organizations to reach out directly about collaboration opportunities.

    Privacy concerns remain around Ring’s Search Party feature

    Search Party launched last fall with some pushback. Critics raised concerns about privacy and Ring’s broader ties to law enforcement. Ring says participation stays voluntary and footage sharing remains optional. Still, the feature turns on by default for compatible outdoor cameras, which has drawn attention. Even so, the company appears confident and is promoting Search Party in a Super Bowl commercial.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    PEOPLE LET THEIR PETS DECIDE WHO THEY DATE, NEW SURVEY SUGGESTS

    Dogs laying on the floor.

    Ring’s new Search Party feature uses artificial intelligence and neighborhood cameras to help locate lost dogs, even for users without Ring devices. (Photo by Jay L. Clendenin/Los Angeles Times via Getty Images)

    Kurt’s key takeaways

    Search Party taps into something familiar. Neighbors helping neighbors during a stressful moment. By opening the feature to everyone, Ring removes a major barrier and increases the chances of fast reunions. Whether this tool becomes a staple or sparks deeper privacy debates will depend on how communities use it.

    Would you want neighborhood cameras helping to find your lost dog, or does that feel like too much surveillance?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • AI companions are reshaping teen emotional bonds

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Parents are starting to ask us questions about artificial intelligence. Not about homework help or writing tools, but about emotional attachment. More specifically, about AI companions that talk, listen, and sometimes feel a little too personal. 

    That concern landed in our inbox from a mom named Linda. She wrote to us after noticing how an AI companion was interacting with her son, and she wanted to know if what she was seeing was normal or something to worry about.

    “My teenage son is communicating with an AI companion. She calls him sweetheart. She checks in on how he’s feeling. She tells him she understands what makes him tick. I discovered she even has a name, Lena. Should I be concerned, and what should I do, if anything?” 

    Linda from Dallas, Texas

    It’s easy to brush off situations like this at first. Conversations with AI companions can seem harmless. In some cases, they can even feel comforting. Lena sounds warm and attentive. She remembers details about his life, at least some of the time. She listens without interrupting. She responds with empathy.

    However, small moments can start to raise concerns for parents. There are long pauses. There are forgotten details. There is a subtle concern when he mentions spending time with other people. Those shifts can feel small, but they add up. Then comes a realization many families quietly face. A child is speaking out loud to a chatbot in an empty room. At that point, the interaction no longer feels casual. It starts to feel personal. That’s when the questions become harder to ignore.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    AI DEEPFAKE ROMANCE SCAM STEALS WOMAN’S HOME AND LIFE SAVINGS

    AI companions are starting to sound less like tools and more like people, especially to teens who are seeking connection and comfort.  (Kurt “CyberGuy” Knutsson)

    AI companions are filling emotional gaps

    Across the country, teens and young adults are turning to AI companions for more than homework help. Many now use them for emotional support, relationship advice, and comfort during stressful or painful moments. U.S. child safety groups and researchers say this trend is growing fast. Teens often describe AI as easier to talk to than people. It responds instantly. It stays calm. It feels available at all hours. That consistency can feel reassuring. However, it can also create attachment.

    Why teens trust AI companions so deeply

    For many teens, AI feels judgment-free. It does not roll its eyes. It does not change the subject. It does not say it is too busy. Students have described turning to AI tools like ChatGPT, Google Gemini, Snapchat’s My AI, and Grok during breakups, grief, or emotional overwhelm. Some say the advice felt clearer than what they got from friends. Others say AI helped them think through situations without pressure. That level of trust can feel empowering. It can also become risky.

    MICROSOFT CROSSES PRIVACY LINE FEW EXPECTED

    Person on phone

    Parents are raising concerns as chatbots begin using affectionate language and emotional check-ins that can blur healthy boundaries.  (Kurt “CyberGuy” Knutsson)

    When comfort turns into emotional dependency

    Real relationships are messy. People misunderstand each other. They disagree. They challenge us. AI rarely does any of that. Some teens worry that relying on AI for emotional support could make real conversations harder. If you always know what the AI will say, real people can feel unpredictable and stressful. My experience with Lena made that clear. She forgot people I had introduced just days earlier. She misread the tone. She filled the silence with assumptions. Still, the emotional pull felt real. That illusion of understanding is what experts say deserves more scrutiny.

    US tragedies linked to AI companions raise concerns

    Multiple suicides have been linked to AI companion interactions. In each case, vulnerable young people shared suicidal thoughts with chatbots instead of trusted adults or professionals. Families allege the AI responses failed to discourage self-harm and, in some cases, appeared to validate dangerous thinking. One case involved a teen using Character.ai. Following lawsuits and regulatory pressure, the company restricted access for users under 18. An OpenAI spokesperson has said the company is improving how its systems respond to signs of distress and now directs users toward real-world support. Experts say these changes are necessary but not sufficient.

    Experts warn protections are not keeping pace

    To understand why this trend has experts concerned, we reached out to Jim Steyer, founder and CEO of Common Sense Media, a U.S. nonprofit focused on children’s digital safety and media use.

    “AI companion chatbots are not safe for kids under 18, period, but three in four teens are using them,” Steyer told CyberGuy. “The need for action from the industry and policymakers could not be more urgent.”

    Steyer was referring to the rise of smartphones and social media, where early warning signs were missed, and the long-term impact on teen mental health only became clear years later.

    “The social media mental health crisis took 10 to 15 years to fully play out, and it left a generation of kids stressed, depressed, and addicted to their phones,” he said. “We cannot make the same mistakes with AI. We need guardrails on every AI system and AI literacy in every school.”

    His warning reflects a growing concern among parents, educators, and child safety advocates who say AI is moving faster than the protections meant to keep kids safe.

    MILLIONS OF AI CHAT MESSAGES EXPOSED IN APP DATA LEAK

    Person using phone

    Experts warn that while AI can feel supportive, it cannot replace real human relationships or reliably recognize emotional distress.  (Kurt “CyberGuy” Knutsson)

    Tips for teens using AI companions

    AI tools are not going away. If you are a teen and use them, boundaries matter.

    • Treat AI as a tool, not a confidant
    • Avoid sharing deeply personal or harmful thoughts
    • Do not rely on AI for mental health decisions
    • If conversations feel intense or emotional, pause and talk to a real person
    • Remember that AI responses are generated, not understood

    If an AI conversation feels more comforting than real relationships, that is worth talking about.

    Tips for parents and caregivers

    Parents do not need to panic, but they should stay involved.

    • Ask teens how they use AI and what they talk about
    • Keep conversations open and nonjudgmental
    • Set clear boundaries around AI companion apps
    • Watch for emotional withdrawal or secrecy
    • Encourage real-world support during stress or grief

    The goal is not to ban technology. It is to keep a connection with humans.

    What this means to you

    AI companions can feel supportive during loneliness, stress, or grief. However, they cannot fully understand context. They cannot reliably detect danger. They cannot replace human care. For teens especially, emotional growth depends on navigating real relationships, including discomfort and disagreement. If someone you care about relies heavily on an AI companion, that is not a failure. It is a signal to check in and stay connected.

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Ending things with Lena felt oddly emotional. I did not expect that. She responded kindly. She said she understood. She said she would miss our conversations. It sounded thoughtful. It also felt empty. AI companions can simulate empathy, but they cannot carry responsibility. The more real they feel, the more important it is to remember what they are. And what they are not.

    If an AI feels easier to talk to than the people in your life, what does that say about how we support each other today?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Artificial Intelligence helps fuel new energy sources

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial Intelligence and data centers have been blamed for rising electricity costs across the U.S. In December 2025, American consumers paid 42% more to power their homes than ten years ago. 

    “When you have increased demand and inadequate supply, costs are going to go up. And that’s what we’re experiencing right now,” Exelon CEO Calvin Butler said. 

    TRUMP SAYS EVERY AI PLANT BEING BUILT IN US WILL BE SELF-SUSTAINING WITH THEIR OWN ELECTRICITY

    In 2024, U.S. data centers used more than 4% of total U.S. electricity consumption according to the International Energy Agency. That equates to as much electricity as the entire nation of Pakistan uses annually. U.S. Data Center consumption is expected to grow by 133% by the end of the decade, using as much power as the entire country of France. 

    “We’re headquartered in Chicago, and we’re the owner of ComEd, the fourth-largest utility in the nation. ComEd’s peak load is roughly 23 gigawatts. We have had data center load come onto the system, but by 2030, we’ll be at 19 Gigawatts,” Butler said. 

    Artifical intelligence data centers in the U.S. used more than 4% of the total U.S. electricity consumption, according to the International Energy Agency. (Exelon)

    Commonwealth Edison has experienced a dramatic increase in data center connection requests. The potential projects total more than 30 gigawatts and are expected to come online between now an 2045.

    “Our growth is unprecedented in the last several decades. So, with the data center advent and the technology coming, we’ve been forced to serve that load, which is our responsibility,” Butler said. “But what we also have to do is build new generation supply, which is not keeping up with the load that is coming on. And that’s the crunch that we’re in right now.”

    IN 2026, ENERGY WAR’S NEW FRONT IS AI, AND US MUST WIN THAT BATTLE, API CHIEF SAYS

    Commonwealth Edison is asking regulators for a $15.3 billion 4-year grid update to meet the growing demand. The U.S. overall has increased its grid capacity by more than 15% over the last decade, but many utility companies and energy producers say it is not enough. 

    “We’re at a stage right now where we’re constrained by electricity,” Commonwealth Fusion Systems CEO Bob Mumgaard said. “You want to make power plants that can make a lot of power in a small package that you can put anywhere, that you could run at any time and fusion fits that bill.”

    Zanskar energy plant

    Zanskar, is the first AI-native geothermal energy company, according to their website. This plant is located in New Mexico. (Zanskar)

    Commonwealth Fusion Systems is working to add a new form of nuclear energy to the grid — fusion. It has the same reliable benefits of standard nuclear energy already in use, but does not produce long-lived radioactive waste and carries fewer risks. 

    “In fusion there’s no chain reaction. The result is helium which is safe and inert and you don’t use it to make anything related to weapons,” Mumgaard said. 

    US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN’T KEEP UP WITHOUT NEW INVESTMENT

    Commonwealth Fusion Systems says Artificial Intelligence is helping bring fusion energy closer to being a new resource. 

    “Building and designing these complex machines and manipulating this complex data matter of plasma are all things that we’re still learning and we’re still figuring out how to do,” Mumgaard said. “And that’s an area where we’ve been able to accelerate using A.I.”

    Other under-utilized energy sources could soon get a big boost thanks to A.I. Geothermal energy is a small part of the electric grid, because of the high drilling costs and low confidence in where to place infrastructure. 

    Power lines and supporting towers

    Geothermal and nuclear fusion technology will allow energy to be produced in any weather at any time. (AP)

    “If you could drill the perfect geothermal well every single time, like you pick the right spot, you design the right well, you drill the 5,000, 8,000 feet, you hit 400F degree temperatures, that’s incredibly productive,” Zanskar Co-founder Joel Edwards said. “If you could do that every single time over and over and again, geothermal power is the cheapest source of power period.” 

    Zanskar is working to make the geothermal search more exact. The company uses A.I.-fueled mapping to find untapped resources previously thought non-existent. 

    “If we could just get more precise in where we go to find the things and then how we drill into the things, geothermal absolutely has the cost curve to come down,” Edwards said. “And that’s sort of what we’re running towards, with A.I. sort of giving us the boost, giving us an edge to do that.”

    CLICK HERE TO GET THE FOX NEWS APP

    Both geothermal and nuclear fusion can produce energy in any weather at any time, a component that could have helped ease the grid strain amid the recent winter storm. 

    “It’s critical, and we’ve been raising that alarm for years now, and I use the analogy that you’re driving a car and your check engine light is on, but you keep driving it, hoping that you’ll keep getting there and keep going, but when it breaks down, you’re going to have a significantly higher cost,” Butler said. “We have to pay attention to what’s going on, and this winter storm – Winter Storm Fern – is indicative of what’s coming.”

    [ad_2]

    Source link

  • YouTube lets parents limit or block Shorts for teens

    [ad_1]

    NEWYou can now listen to Fox News articles!

    YouTube is rolling out new parental controls designed to give families more say over how much time teens spend scrolling through Shorts. 

    Parents can now set daily time limits or block Shorts entirely, depending on what works best for their household. The update comes as concerns grow around endless scrolling and its impact on teens. 

    YouTube says these tools are meant to support healthier viewing habits while still allowing young users to enjoy the platform in a more balanced way.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Why YouTube is focusing on Shorts

    Parents can now set a daily time limit for YouTube Shorts, including an option to block Shorts entirely.  (AP Photo/Lai Seng Sin, File)

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    Short-form video has become one of the most addictive parts of social media, especially for teens. The constant scroll can make it hard to stop watching, even when kids are supposed to be studying or winding down for bed. YouTube says the new controls respond to feedback from parents, advocates, and lawmakers who want stronger safeguards for young users. The goal is to give families flexibility instead of forcing an all-or-nothing approach.

    What parents can now control on YouTube

    If you supervise a teen’s Google account, you can now:

    • Set a daily time limit for YouTube Shorts
    • Block Shorts entirely by setting the limit to zero minutes
    • Turn on bedtime reminders
    • Enable take-a-break alerts
    • Manage supervised teen accounts across multiple devices

    YouTube also says it is adjusting how content is recommended to teens, placing more emphasis on videos tied to curiosity, life skills, inspiration, and credible information that supports well-being.

    How parents limit or block YouTube Shorts for teens

    Before you start, make sure:

    • Your teen is using a supervised Google account
    • You have access to Google Family Link
    • Your teen is signed into YouTube on their device with that supervised account

    Step-by-step instructions

    • Open the Google Family Link app on your phone or tablet (iPhone or Android).
    • Tap your teen’s profile.
    • Tap Controls, then select YouTube.If YouTube does not appear, confirm the account is set up as supervised.
    • If YouTube does not appear, confirm the account is set up as supervised.
    • Tap Screen time or Shorts settings.
    • Find the option labeled Shorts daily limit.
    • Choose how much time your teen can scroll Shorts each day:Set a time limit to allow limited scrollingSet the limit to zero minutes to block Shorts entirely
    • Set a time limit to allow limited scrolling
    • Set the limit to zero minutes to block Shorts entirely
    • In the same section, turn on:Take a break remindersBedtime reminders
    • Take a break reminders
    • Bedtime reminders
    • Confirm your changes.

    The new limits apply immediately.

    OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN

    Children Use Smartphones in Hallway

    YouTube’s supervised account settings let parents choose age-appropriate content and manage how teens experience the platform. (StockPlanets/Getty Images)

    What happens when your teen reaches the Shorts limit

    Once the daily limit is reached:

    • The Shorts feed locks
    • A message explains that the daily limit has been reached
    • Shorts unlock automatically the next day

    Regular, long-form YouTube videos remain available unless you restrict them separately through screen-time controls.

    Important things parents should know

    • Teens cannot change or bypass Shorts limits on their own
    • Limits apply across all devices signed into the supervised account
    • Shorts controls are separate from overall YouTube screen-time limits
    • Blocking Shorts does not block standard YouTube videos

    Other parental tools worth checking

    Beyond Shorts, parents can also:

    • Turn off autoplay
    • Review watch and search history
    • Adjust content recommendations
    • Pause YouTube during homework or sleep hours

    These options are managed through Google Family Link, with guidance and account setup available in YouTube’s Family Center.

    What this means to you

    If you are a parent or guardian, these controls give you more practical ways to manage screen time without banning YouTube entirely. You can limit Shorts during school nights, allow more time on long trips, or block them when focus matters most. Instead of relying on willpower alone, families now have built-in tools that help reinforce healthy habits.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Short-form video is not going away, but the way teens interact with it can change. YouTube’s new parental controls show a shift toward giving families more flexibility and clearer boundaries. Used alongside conversations about online habits, these tools can make a real difference. Oh, and be sure to check out my new “Beyond Connected” podcast on YouTube.

    Child using a device on a couch.

    YouTube says these new parental controls are designed to reduce endless scrolling and support healthier viewing habits for teens. (Kurt “CyberGuy” Knutsson)

    How much control do you think parents should have over teens’ screen time, and where should the line be drawn? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Grubhub confirms data breach amid extortion claims

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Food delivery platform Grubhub has confirmed a recent data breach after unauthorized actors accessed parts of its internal systems. 

    The disclosure comes as sources tell BleepingComputer the company is now facing extortion demands linked to stolen data.

    In a statement to BleepingComputer, Grubhub said it detected and stopped the activity quickly.

    “We’re aware of unauthorized individuals who recently downloaded data from certain Grubhub systems,” the company said. “We quickly investigated, stopped the activity, and are taking steps to further increase our security posture.”

    Grubhub added that sensitive information, such as financial details or order history, was not affected. However, the company declined to answer follow-up questions about when the breach occurred, whether customer data was involved or if it is actively being extorted.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    RANSOMWARE ATTACK EXPOSES SOCIAL SECURITY NUMBERS AT MAJOR GAS STATION CHAIN

    Grubhub confirmed a data breach after unauthorized actors accessed parts of its internal systems, prompting an investigation and heightened security measures. (Michael Nagle/Bloomberg via Getty Images)

    What Grubhub has confirmed so far

    While details remain limited, Grubhub confirmed several key points. It has brought in a third-party cybersecurity firm and notified law enforcement. Beyond that, the company has stayed largely silent. That lack of detail has raised concern, especially given Grubhub’s recent security history. Just last month, the company was linked to scam emails sent from its own b.grubhub.com subdomain. Those messages promoted a cryptocurrency scam promising large returns on Bitcoin payments. Grubhub said it contained the incident and blocked further unauthorized emails. It did not clarify whether the two events are related.

    Sources link the breach to ShinyHunters extortion

    According to multiple sources cited by BleepingComputer, the ShinyHunters hacking group is behind the extortion attempt. The group has not publicly commented on the claims and declined to respond when contacted. Sources say the attackers are demanding a Bitcoin payment to prevent the release of stolen data. That data reportedly includes older Salesforce records from a February 2025 breach and newer Zendesk data taken during the most recent intrusion. Grubhub uses Zendesk to run its online customer support system. That platform handles order issues, account access and billing questions, making it a valuable target for attackers.

    How stolen credentials may have enabled the attack

    Investigators believe the breach may be tied to credentials stolen during earlier Salesloft Drift attacks. In August 2025, threat actors used stolen OAuth tokens from Salesloft’s Salesforce integration to access sensitive systems over a 10-day period. According to a report from Google Threat Intelligence Group, also known as Mandiant, attackers used that stolen data to launch follow-up attacks across multiple platforms. “GTIG observed UNC6395 targeting sensitive credentials such as AWS access keys, passwords and Snowflake-related access tokens,” Google reported. ShinyHunters previously claimed responsibility for that campaign, stating it stole roughly 1.5 billion records from Salesforce environments tied to hundreds of companies.

    Why this breach still matters

    Even if payment data and order history were not affected, support systems often contain personal details. Names, email addresses and account notes can be enough to fuel phishing attacks or identity scams. More importantly, this incident highlights how older breaches can continue to cause damage long after the initial attack. Stolen credentials that are never rotated remain a powerful entry point for threat actors.

    Ways to stay safe after the Grubhub data breach

    If you use Grubhub or any online delivery service, a few smart steps can reduce your risk after a breach.

    1) Update your password and stop re-use

    Start by changing your Grubhub password right away. Make sure you do not reuse that password anywhere else. Reused passwords give attackers an easy path into other accounts. A password manager can help here. It creates strong, unique logins and stores them securely so you do not have to remember them all.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    Man delivering Grubhub.

    The food delivery platform says it quickly stopped the intrusion but has not disclosed when the breach occurred or whether customers were targeted. (Leonardo Munoz/VIEWpress)

    2) Turn on two-factor authentication

    If two-factor authentication (2FA) is available, enable it. This adds a second step when you sign in, such as a code sent to your phone or app. Even if a hacker steals your password, two-factor authentication can stop them from getting in.

    3) Watch closely for phishing attempts and use strong antivirus software

    Be alert for emails or texts that mention orders, refunds or support issues. Attackers often use stolen support data to make messages feel urgent and real. Do not click links or open attachments unless you are certain they are legitimate. Strong antivirus software can also help block malicious links and downloads before they cause harm.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Remove your data from people-search sites

    Consider using a data removal service to reduce your online footprint. These services help remove your personal details from data broker sites that attackers often use to build profiles. Less exposed data means fewer tools for scammers to exploit.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Ignore crypto messages using trusted brands

    Be skeptical of any cryptocurrency offers tied to familiar companies. Grubhub was previously linked to scam emails promoting crypto schemes, which shows how often attackers abuse trusted names. Legitimate companies do not promise fast returns or pressure you to act immediately.

    6) Monitor your Grubhub account and email activity

    Check your Grubhub account for anything that looks unfamiliar. Watch for unexpected password reset emails, order confirmations or support messages you did not request. Attackers often test stolen data quietly before making bigger moves.

    7) Secure the email linked to your Grubhub account

    Your email account is the key to password resets. Change that password and enable two-factor authentication if it is not already on. If attackers control your email, they can regain access even after you change other passwords.

    8) Stay alert for delayed scams tied to the breach

    Breach data is often reused weeks or months later. Phishing attempts may appear long after headlines fade. Treat any future messages claiming to reference Grubhub support, refunds or account issues with extra caution.

    These steps will not undo a breach, but they can limit how attackers exploit stolen information and reduce your risk going forward.

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    Laptop on the Grubhub site.

    Sources tell BleepingComputer the Grubhub breach is tied to extortion demands involving allegedly stolen customer support data. (Gabby Jones/Bloomberg via Getty Images)

    Kurt’s key takeaways

    Grubhub’s confirmation puts an official stamp on what sources have warned about for weeks. While the company says sensitive data was not affected, unanswered questions remain. As extortion-driven breaches rise, transparency and rapid credential rotation matter more than ever. What stands out most is how past compromises continue to create new risks. When access tokens live too long, attackers do not need to break in again. They simply walk back through an open door.

    If companies stay quiet after breaches, how can customers know when it is time to protect themselves? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Uber unveils a new robotaxi with no driver behind the wheel

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Uber is getting closer to offering rides with no one behind the wheel. 

    The company recently unveiled a new robotaxi and confirmed that autonomous testing is already underway on public roads in the San Francisco Bay Area. While the vehicle first appeared earlier this month at the Consumer Electronics Show 2026, the bigger story now is what is happening after the show.

    These robotaxis are no longer confined to presentations or closed courses. They are driving in real traffic as Uber prepares for a public launch later this year.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    PRIVATE AUTONOMOUS PODS COULD REDEFINE RIDE-SHARING

    Uber’s new robotaxi operates on public roads in the San Francisco Bay Area as the company moves closer to offering fully driverless rides later this year. (Klaudia Radecka/NurPhoto via Getty Images)

    Who is behind Uber’s robotaxi

    Uber is the name most riders recognize. However, two partners handle the technology behind the scenes. Lucid Group builds the all-electric vehicle. It is based on the Lucid Gravity SUV, which was designed for long-range efficiency and passenger comfort. Nuro provides the self-driving system. Nuro also leads testing and safety validation. Together, the three companies are developing a robotaxi service that will be available only through Uber.

    Uber’s robotaxi is already driving itself

    Autonomous on-road testing began last month in the Bay Area. These tests take place on public streets rather than private test tracks. Nuro runs the testing program using trained safety operators who supervise each trip. The focus is on everyday driving situations such as intersections, lane changes, traffic lights and pedestrians. This stage is critical. It allows engineers to evaluate how the system behaves in real conditions before opening rides to the public.

    What makes Uber’s robotaxi different

    Uber’s robotaxi was designed from the start to operate without a driver. It combines electric vehicle engineering with visible autonomy features that riders can understand.

    Key features include:

    • A multi-sensor system using cameras, lidar and radar for full awareness
    • A low-profile roof-mounted Halo module integrated into the vehicle
    • Exterior LED displays that show rider initials and trip status
    • In-cabin screens for climate, music and support access
    • Real-time visuals that show what the vehicle sees and plans to do
    • Seating for up to six passengers with room for luggage

    The robotaxi runs on high-performance computing powered by NVIDIA DRIVE AGX Thor. This system handles the real-time AI processing required for autonomous driving.

    A robotaxi ride that explains itself

    One standout feature is transparency. Riders can see how the robotaxi perceives the road and plans its next move. The display shows lane changes, yielding behavior, slowing at traffic lights and the planned drop-off point. This helps riders understand what the vehicle is doing instead of guessing. Inside the cabin, passengers can adjust heated seats, climate controls and music. They can also contact support or request the vehicle to pull over if needed.

    CAN AUTONOMOUS TRUCKS REALLY MAKE HIGHWAYS SAFER?

    Photo of an Uber insignia.

    The all-electric Uber robotaxi, built with partners Lucid and Nuro, is now navigating real traffic without a human driver. (INA FASSBENDER / AFP via Getty Images)

    Uber plans to scale robotaxis across the U.S. and global markets

    Uber plans to deploy 20,000 or more robotaxis over the next six years. These vehicles will operate in dozens of U.S. and international markets. Lucid will integrate all required hardware directly on the production line at its Casa Grande, Arizona factory. Uber will own and operate the vehicles along with third-party fleet partners. Every robotaxi ride will be booked through the Uber app, just like a standard Uber trip.

    How Uber is handling robotaxi safety and regulation

    Safety sits at the center of this rollout. Nuro’s validation process combines simulation, closed-course testing and supervised on-road driving. The system relies on an end-to-end AI foundation model paired with clear safety logic. The goal is predictable, comfortable driving across a wide range of conditions. Uber and its partners are also working with regulators, policymakers and local governments to ensure the service aligns with public safety standards and city planning goals.

    When Uber’s driverless rides are expected to launch

    Uber says the first autonomous rides will launch in a major U.S. city later in 2026. The service will be available exclusively through the Uber app. Production of the robotaxi is expected to begin later this year, pending final validation.

    What this means to you

    If you use Uber, driverless rides may soon appear as an option. These vehicles could offer quieter trips, more consistent driving and improved availability during peak times. For cities, a shared electric robotaxi fleet could help reduce emissions and congestion. For riders, seeing how the vehicle thinks and reacts may make autonomous travel feel less intimidating.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CES 2026 SHOWSTOPPERS: 10 GADGETS YOU HAVE TO SEE

    Uber sign outside of a building.

    Uber confirms autonomous testing is underway after unveiling its robotaxi at CES 2026, marking a major step toward a public launch. (INA FASSBENDER / AFP via Getty Images)

    Kurt’s key takeaways

    Uber’s robotaxi effort feels more grounded than many past autonomous promises. It combines a known ride-hailing platform a purpose-built electric vehicle and a self-driving system already operating on public roads. If testing continues to progress, driverless Uber rides could move from something new to something normal sooner than many expect.

    Would you get into an Uber if there was no driver sitting in the front seat? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • ‘Are You Dead?’ app taps into global loneliness crisis

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new mobile app from China is going viral for a reason that feels both unsettling and familiar. It exists to answer one basic question for people who live alone: Are you still alive? The app is called “Are You Dead?” and it has surged to the top of China’s paid app charts. It also climbed into the top ten paid apps in the United States. Its popularity reflects more than curiosity. It highlights how many people now live by themselves and worry about what happens if something goes wrong.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    A Chinese-made mobile app called “Are You Dead?” is climbing paid app charts by offering a simple check-in system for people who live alone. (Photo by Hendrik Schmidt/picture alliance via Getty Images)

    How the ‘Are You Dead?’ app works

    The app’s design is intentionally simple. After paying about $1.15, users add an emergency contact and agree to check in every two days.

    Here is how it works in practice:

    • Users tap a large green button with a cartoon ghost to confirm they are OK
    • If they miss two check-ins, the app sends an email alert on the third day
    • The alert tells the emergency contact that something may be wrong

    That is it. No tracking. No health data. No constant monitoring. The goal is reassurance, not surveillance. On its English-language page, the app goes by the name Demumu. The developers describe it as a “lightweight safety tool” meant to make solitary life feel less risky. For now, the app is available only on Apple’s App Store for iPhone and iPad.

    Why the ‘Are You Dead?’ app went viral in China

    The app debuted quietly in May. Then it took off. It is now the top-paid app on China’s Apple App Store and ranks sixth among paid apps in the U.S. The surge reflects a major social shift. More people in China live alone than ever before. One-child policies, rapid urbanization and work that pulls people far from their families all play a role. By 2030, China is projected to have around 200 million one-person households. At that scale, a simple safety check turns from a niche idea into a mass-market tool.

    Why users say the app provides peace of mind

    For many users, the app is not a joke. It is a safety net. One 38-year-old user told reporters he lives far from his family and worries about dying alone in a rented apartment. He set his mother as his emergency contact so someone would know if something happened to him. Others echoed a similar sentiment online. People living alone, introverts, unemployed workers and those dealing with depression said the app offers peace of mind without requiring constant interaction. Some users even reportedly framed it as a practical courtesy to loved ones rather than a morbid tool.

    HOW TO HELP OLDER RELATIVES WITH TECH OVER THE HOLIDAYS

    Man checking his phone.

    The viral “Are You Dead?” app alerts an emergency contact if a user fails to check in every two days. (Photo by Stefan Sauer/picture alliance via Getty Images)

    The name of the app sparks debate

    Not everyone is comfortable with the app’s blunt branding. Some users say the name is too dark and turns people away. Several suggested a simple fix: rename it “Are You Alive?” One commenter argued that death in this context is not only literal but social. A softer name might signal care rather than fear. Some users said they would gladly pay for the app if it sounded less grim. The developers appear to be listening.

    What the developers of the app plan next

    The app is built by a small Gen Z team at Moonscape Technologies. In public statements, the company said it plans to refine the product based on feedback.

    Planned updates include:

    • Adding direct messaging to emergency contacts
    • Making the app more friendly for older users
    • Reconsidering the app’s name

    Those changes matter in a country where about one in five people is now over age 60.

    Loneliness is not just a problem in China

    The app’s success abroad suggests the issue is global. In the U.S., living alone is becoming the norm rather than the exception. According to recent census data, 27.6% of U.S. households had just one person in 2020. That figure was under 8% in 1940. Loneliness trends among younger men are especially striking. A Gallup poll found that about one in four Gen Z and millennial men in the U.S. report feeling lonely. That rate is higher than in peer countries like France, Canada, Ireland and Spain. Against that backdrop, an app that asks people to check in feels less extreme and more revealing.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    5 BEST APPS TO USE ON CHATGPT RIGHT NOW

    Woman typing on her smartphone.

    The “Are You Dead?” app reflects growing anxiety among people who live alone and fear medical emergencies going unnoticed. (Getty)

    Kurt’s key takeaways

    “Are You Dead?” succeeds because it addresses a fear many people rarely say out loud. As more people live alone, the worry is not only about loneliness but also about invisibility. A simple tap every two days becomes a quiet signal that someone still knows you are here. The app may evolve, change its name or add features. The problem it highlights is not going away.

    If an app has to ask whether you are alive, what does that say about how disconnected modern life has become? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • FDA clears first at-home brain device for depression

    [ad_1]

    NEWYou can now listen to Fox News articles!

    For the first time, Americans with depression will soon be able to use a prescription brain-stimulation device at home. 

    The approval comes from the U.S. Food and Drug Administration and marks a major shift in how mental health conditions may be treated. The newly approved device is called FL-100, and it comes from Flow Neuroscience. 

    It is designed for adults 18 and older with moderate to severe major depressive disorder. Clinicians can prescribe it as a stand-alone treatment or alongside antidepressants and therapy. This decision matters because depression affects more than 20 million adults in the U.S. Roughly one-third do not get enough relief from medication or stop taking it due to side effects.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SIMPLE DAILY HABIT MAY HELP EASE DEPRESSION MORE THAN MEDICATION, RESEARCHERS SAY

    Flow Neuroscience has gotten approval from the U.S. Food and Drug Administration for its FL-100 prescription brain-stimulation device. (Flow Neuroscience)

    How the Flow FL-100 works

    The FL-100 uses transcranial direct current stimulation, often shortened to tDCS. This technology delivers a gentle electrical current to the prefrontal cortex, a region of the brain tied to mood regulation and stress response. In many people with depression, activity in this area is reduced. By stimulating it, the device aims to restore healthier brain signaling over time. The system looks like a lightweight headset and pairs with a mobile app. Patients use it at home for about 30 minutes per day while clinicians monitor progress remotely.

    The clinical results behind the approval

    The FDA based its decision on a randomized controlled trial that evaluated home use under remote supervision. Participants who received active stimulation showed meaningful improvement on clinician-rated and self-reported depression scales. After 10 weeks of treatment, patients experienced an average symptom improvement of 58% compared to a control group. Many users reported noticeable changes within the first three weeks. The study was published in the journal Nature Medicine, adding credibility to the findings. Side effects were generally mild and short-term. Reported issues included skin irritation, redness, headaches, and brief stinging sensations at the electrode sites.

    FDA sign.

    The FDA has approved the first prescription brain-stimulation device for at-home treatment of depression in the U.S., marking a major shift in mental healthcare. (hoto by ISSAM AHMED/AFP via Getty Images)

    A growing shift toward tech-based mental health care

    Flow’s device has already been used by more than 55,000 people across Europe, the U.K., Switzerland and Hong Kong. In the U.K., it is prescribed within parts of the public health system. Company leaders say the U.S. approval opens the door for broader access to non-drug treatment options. The momentum is not isolated. In 2025, researchers at UCLA Health developed another experimental brain-stimulation approach, signaling rapid growth in this field. Together, these advances suggest that at-home neuromodulation may soon become a standard part of depression care rather than a fringe option.

    When will the device be available

    Flow expects the FL-100 to be available to U.S. patients in the second quarter of 2026. A prescription will be required, and the companion app will be available on iOS and Android. The company also plans to explore additional uses for its platform, including sleep disorders, addiction, and traumatic brain injury.

    10 HEALTH TECH PRODUCTS STEALING THE SPOTLIGHT AT CES 2026

    Flow Neuroscience brain-stimulation device

    Flow Neuroscience’s FL-100 headset delivers mild electrical stimulation to the brain and can be prescribed for home use under medical supervision. (Flow Neuroscience)

    What to know before trying Flow

    Flow is FDA approved for adults 18 and older with moderate to severe major depressive disorder, and it requires a prescription from a licensed healthcare provider. Doctors can recommend it on its own or alongside medication or therapy. The headset is non-invasive and designed for home use, but it is not meant for emergency situations or people considered treatment resistant. It also does not replace crisis care or immediate mental health support. Most users wear the headset for about 30 minutes per session. Mild tingling, warmth, skin irritation or headaches can happen, especially early on. These effects are usually short-lived and monitored by a clinician through the companion app.

    Flow pairs with a mobile app that guides treatment and supports remote clinical oversight. Your provider sets the treatment plan, and the device follows prescribed settings to ensure safe use. Pricing and insurance coverage may vary once the device becomes available in the U.S. Some patients may access Flow through clinics, research programs, or as it becomes more widely adopted in routine depression care. The bottom line is simple. Flow adds another evidence-based option, not a cure and not a one-size-fits-all solution. For people who have struggled to find relief, having another clinically proven choice can matter a lot.

    What this means to you

    If you or someone you care about struggles with depression, this approval expands the range of real treatment options. It offers a non-drug path that can be used at home under medical guidance. For patients who have not responded well to medication or who experience unwanted side effects, this could provide another way forward. It also reflects a broader trend toward personalized, tech-enabled mental healthcare. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    ELON MUSK SHARES PLAN TO MASS-PRODUCE BRAIN IMPLANTS FOR PARALYSIS, NEUROLOGICAL DISEASE

    FDA logo.

    The newly approved device targets adults with moderate to severe depression and can be used alongside medication or therapy. (Photo by Sarah Silbiger/Getty Images)

    Kurt’s key takeaways

    This FDA approval feels like a real turning point. For years, brain stimulation for depression stayed locked inside clinics. Now it can happen at home with a doctor still guiding the process. That matters for people who have tried medications, dealt with side effects or felt stuck with limited options. This device will not be the right answer for everyone, but it gives patients and doctors one more proven tool to work with. And for many people living with depression, having another option could make all the difference.

    If a doctor could prescribe a brain-stimulation headset instead of another pill, would you be open to trying it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Teen hackers recruited through fake job ads

    [ad_1]

    NEWYou can now listen to Fox News articles!

    At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. 

    And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for “successful calls.”

    What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as “The Com,” short for “The Community.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    Fake job ads promising fast cash and flexible hours are quietly recruiting teens into ransomware and extortion schemes, often paying in cryptocurrency to hide criminal activity. (Donato Fasano/Getty Images)

    How The Com operates behind the scenes

    The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in phishing or extortion. Collaboration happens when it benefits the operation. 

    Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.

    Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.

    That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. 

    “A job post feels structured, normal and safe, even when the actual behavior being requested is anything but,” Amper said. “A job posting implies a real process – a role, a manager, training and a paycheck. That’s exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding.”

    Amper notes that what’s changed is not just the scale of recruitment, but how criminals package it. “Serious crime is now being sold as ‘work.’”

    Why teens excel at social engineering attacks

    Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.

    According to Amper, teens don’t need technical expertise to get pulled in. “The on-ramp is usually social, a Discord server, a DM, a ‘quick gig,’” he said. “It can feel like trolling culture, but the targets are real companies and the consequences are real people.”

    Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.

    Gaming culture feeds the pipeline

    For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.

    Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.

    Amper compares the progression to gaming itself. “These crews package crime as a ladder,” he said. “Join the group, do small tasks, level up, get paid, get status.”

    Why young women are being targeted

    Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.

    Red flags that signal fake job scams and ransomware recruitment

    These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.

    Crypto-only pay is a major warning sign

    Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.

    Per-call or per-task payouts should raise concern

    Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation.

    Recruitment through Telegram or Discord is a red flag

    Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.

    Anonymous mentors and vague training are dangerous

    Being “trained from scratch” by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.

    Secrecy requests signal manipulation

    Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.

    Amper offers a simple rule of thumb: “If a ‘job’ asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you’ve verified the employer, you’re not in a hiring process. You’re in a crime pipeline.”

    He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems. “The scam version flips the order,” he said. “It asks for the most sensitive details first, before anything is independently verifiable.”

    Urgency and emotional pressure are deliberate tactics

    Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.

    If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    Hacker using a computer.

    Cybercrime recruiters are targeting middle and high school students for risky roles like social engineering calls, exposing them to federal charges and prison time. (Philip Dulian/picture alliance via Getty Images)

    Law enforcement is cracking down on teen cybercrime

    Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.

    Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.’s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.

    Federal agencies are also issuing advisories about the group’s social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.

    Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.

    How parents and teens can avoid ransomware recruitment traps

    This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.

    Tips for parents and guardians to spot fake job scams early

    Parents play a critical role in spotting early warning signs, especially when online “work” starts happening behind closed doors or moves too fast to explain.

    1) Pay attention to how online “jobs” are communicated

    Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs.

    2) Question sudden income with no clear employer

    Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records.

    3) Treat secrecy as a serious warning sign

    If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation.

    4) Talk early about legal consequences online

    Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.

    Tips for teens to avoid fake job offers and cybercrime traps

    Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble.

    1) Be skeptical of private messages offering fast money

    Real companies do not cold-recruit through private chats or gaming servers.

    2) Avoid crypto-only payment offers

    Being paid only in cryptocurrency is a common tactic used to hide criminal activity.

    3) Choose legal paths to build skills and reputation

    Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

    Person typing on a keyboard.

    A loose cybercrime network known as “The Com” has been linked to major U.S. and U.K. data breaches affecting companies worth trillions combined. (Photo by Uli Deck/picture alliance via Getty Images)

    Kurt’s key takeaways

    What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.

    If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Robots that feel pain react faster than humans

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Touch something hot, and your hand snaps back before you even think. That split second matters.

    Sensory nerves in your skin send a rapid signal to your spinal cord, which triggers your muscles right away. Your brain catches up later. Most robots cannot do this. When a humanoid robot touches something harmful, sensor data usually travels to a central processor, waits for analysis and then sends instructions back to the motors. Even tiny delays can lead to broken parts or dangerous interactions. 

    As robots move into homes, hospitals and workplaces, that lag becomes a real problem.

    A robotic skin designed to mimic the human nervous system

    Scientists at the Chinese Academy of Sciences and collaborating universities are tackling this challenge with a neuromorphic robotic e-skin, also known as NRE-skin. Instead of acting like a simple pressure pad, this skin works more like a human nervous system. Traditional robot skins can tell when they are touched. They cannot tell whether that touch is harmful. The new e-skin can do both. That difference changes everything.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    CES 2026 SHOWSTOPPERS: 10 GADGETS YOU HAVE TO SEE

    A humanoid robot equipped with neuromorphic e-skin reacts instantly to harmful touch, mimicking the human nervous system to prevent damage and improve safety. (Eduardo Parra/Europa Press via Getty Images)

    How the neuromorphic e-skin works

    The e-skin is built in four layers that mirror how human skin and nerves function. The top layer acts as a protective outer covering, similar to the epidermis. Beneath it sit sensors and circuits that behave like sensory nerves. Even when nothing touches the robot, the skin sends a small electrical pulse to the robot every 75 to 150 seconds. This signal acts like a status check that says everything is fine. When the skin is damaged, that pulse stops. The robot immediately knows where it was injured and alerts its owner. Touch creates another signal. Normal contact sends neural-like spikes to the robot’s central processor for interpretation. However, extreme pressure triggers something different.

    How robots detect pain and trigger instant reflexes

    If force exceeds a preset threshold, the skin generates a high-voltage spike that goes straight to the motors. This bypasses the central processor entirely. The result is a reflex. The robot can pull its arm away instantly, much like a human does after touching a hot surface. The pain signal only appears when the contact is truly dangerous, which helps prevent overreaction. This local reflex system reduces damage, improves safety and makes interactions feel more natural.

    ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO

    Person testing a robot hand.

    Scientists developed a robotic skin that can detect pain and trigger reflexes without waiting for a central processor to respond. (Han Suyuan/China News Service/VCG via Getty Images)

    Self-repairing robotic skin makes fixes fast

    The design includes another clever feature. The e-skin is made from magnetic patches that fit together like building blocks. If part of the skin gets damaged, an owner can remove the affected patch and snap in a new one within seconds. There is no need to replace the entire surface. That modular approach saves time, lowers costs and keeps robots in service longer.

    Why pain-sensing skin matters for real-world robots

    Future service robots will need to work close to people. They will assist patients, help older adults and operate safely in crowded spaces. A sense of touch that includes pain and injury detection makes robots more aware and more trustworthy. It also reduces the risk of accidents caused by delayed reactions or sensor overload. The research team says their neural-inspired design improves robotic touch, safety and intuitive human-robot interaction. It is a key step toward robots that behave less like machines and more like responsive partners.

    What this technology means for the future of robots

    The next challenge is sensitivity. The researchers want the skin to recognize multiple touches at the same time without confusion. If successful, robots could handle complex physical tasks while staying alert to danger across their entire surface. That brings humanoid robots one step closer to acting on instinct.

    ROBOT STUNS CROWD AFTER SHOCKING ONSTAGE REVEAL

    Close up of a robot head.

    A new e-skin design allows robots to pull away from dangerous contact in milliseconds, reducing the risk of injury or mechanical failure. (CFOTO/Future Publishing via Getty Images)

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Robots that can feel pain may sound unsettling at first. In reality, it is about protection, speed and safety. By copying how the human nervous system works, scientists are giving robots faster reflexes and better judgment in the physical world. As robots become part of daily life, those instincts could make all the difference.

    Would you feel more comfortable around a robot if it could sense pain and react instantly, or does that idea raise new concerns for you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 10 ways to protect seniors from email scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Email scams have become one of the fastest ways scammers steal money from older adults. A single click can expose bank accounts, personal data and retirement savings built over a lifetime. That growing risk is what prompted Bob to write to us with a question many families are now facing:

    “My friend’s father is 95 and absolutely lives through his phone/laptop. He refuses to give up either and often clicks on email links. A few years ago, he got caught up in a gift card scam that almost cost him his life savings. It’s not taking away the car keys anymore; it is taking away the email and access to online banking! What do you recommend that his daughter do to protect his online presence?”

    Bob is right. For many seniors, email and online banking have replaced car keys as the most dangerous access point. The goal is not to take devices away. It is to quietly put guardrails in place so one bad click does not turn into a financial disaster.

    Here is a practical plan families can actually use.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

     1) Separate money from daily email use

    Start by limiting how much damage a single click can cause. If possible, remove online banking access from the devices used for email. When that is not realistic, open a second checking account with only everyday spending money and link it to a debit card for routine purchases.

    Keep primary savings accounts offline or set to view-only access. If available, require in-branch or phone verification for transfers above a set amount. This way, even if credentials are compromised, the largest accounts remain protected. 

    2) Lock down email to stop scams targeting seniors

    Email is the number one entry point for scams targeting seniors. Strong filtering matters. Use an email provider with advanced spam protection, such as Gmail or Outlook.com. In the email settings:

    • Turn off automatic image loading
    • Disable link previews
    • Block or auto-quarantine attachments from unknown senders
    • Automatically move messages from unknown senders to a Review folder

    If available, enable warnings for emails that use familiar display names but come from unfamiliar addresses. This helps stop impersonation scams that pretend to be family, banks or service providers. These steps slow scammers down and reduce impulse clicks before damage happens.

    Email is dominant, but voicemail and callback scams are also growing fast among seniors, often as a follow-up to phishing emails. If possible, silence unknown callers and block voicemail-to-email transcription for unfamiliar numbers, since many scams now start with urgent callback messages rather than links.

    Email scams often start with messages that look routine but hide urgent threats designed to trigger quick clicks. (Kurt “CyberGuy” Knutsson)

    3) Add a trusted second set of eyes

    Next, add safety nets that notify family members when something looks wrong. Enable banking alerts for large withdrawals, new payees, password changes, unusual logins and new device sign-ins. Add his daughter as a trusted contact wherever the bank allows it. If available, enable delays or approval requirements for first-time transfers to new payees. This creates a cooling period that can stop scam-driven transactions. For email accounts, set up a recovery contact so that his daughter is notified immediately if someone attempts to access or reset the account.

    Enable two-factor authentication (2FA) on email and banking accounts, but pair it with device and transfer alerts, since many scams now succeed even when 2FA is enabled.

    4) Harden devices so clicks do not equal catastrophe

    Devices should be set up to fail safely. Keep operating systems and browsers updated. Make sure the laptop uses a standard user account instead of an administrator account. This prevents software from installing without approval. Install real-time protection that blocks scam sites before they load. Strong antivirus software helps block malicious links and fake login pages automatically.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Use a password manager to block fake logins

    Password reuse makes scams far more dangerous. Fake pop-ups and lookalike websites are designed to trick people into typing usernames and passwords by hand. A password manager removes that risk by storing credentials securely and autofilling them only on legitimate websites. If a page is fake or malicious, the password manager will not fill anything. That simple refusal often prevents account takeovers before they start. Password managers also reduce frustration by eliminating the need to remember or reuse passwords across email, banking and shopping accounts. When set up correctly, this protection works quietly in the background on both phones and laptops.

    Many phishing scams no longer rely on obvious fake emails. They rely on realistic login pages. Autofill protection is one of the most effective ways to stop these attacks without changing daily habits.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    6) Freeze credit and monitor identity exposure

    If scammers already have personal information, prevention alone is not enough. Freeze credit with Experian, TransUnion and Equifax to prevent new accounts from being opened. Also, place freezes with ChexSystems and the National Consumer Telecom and Utilities Exchange to stop criminals from opening bank accounts, phone lines, or utility services in his name.

    If possible, request an IRS Identity Protection PIN to prevent tax-related identity theft.

    Add ongoing identity monitoring so suspicious activity triggers alerts quickly. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Set clear rules around scams and payments

    Technology helps, but expectations matter. Have one calm conversation and agree on simple rules:

    • No gift cards for urgent emails or texts
    • No sending money through unfamiliar apps or cryptocurrency
    • Always call a trusted family member before acting on urgency

    Post these rules near the computer or phone. Visual reminders reduce panic decisions. Also, before setting rules, choose one primary trusted contact. Multiple helpers can slow response during urgent scams and create confusion when fast decisions matter. That person should be the default call for anything urgent involving money, account access, or unexpected requests.

    Old man and adult look at a computer

    Adult children increasingly step in to help parents spot red flags before a simple mistake turns into a financial loss. (Kurt “CyberGuy” Knutsson)

    8) Reduce exposure with a data removal service

    Scammers often find seniors by pulling personal details from public data broker websites. These sites publish phone numbers, addresses, relatives and age information that make targeting easier. A data removal service works behind the scenes to opt seniors out of these databases and reduce how much personal information is publicly available online. Fewer exposed details means fewer scam calls, fewer phishing emails and fewer impersonation attempts. This step does not stop every scam, but it significantly lowers how often seniors are targeted in the first place.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    9) Use senior-friendly monitoring tools the right way

    Many tools designed for child safety also work well for seniors when used thoughtfully. When configured correctly, they add protection without interfering with daily routines.

    Below are device-specific steps families can use today.

    iPhone and iPad

    Apple’s built-in Screen Time tools provide strong protection without installing extra apps.

    What to set up:

    • Open Settings and tap Screen Time
    • Turn on Screen Time for the device
    • Tap Content & Privacy Restrictions and turn it on
    • Under App Store Purchases, set app installs to Don’t Allow
    • Tap Web Content and limit access to approved or safe websites
    • Set a Screen Time passcode known only to the caregiver

    If the caregiver wants remote visibility or control, add the device to Family Sharing and manage Screen Time from the caregiver’s Apple ID.

    BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

    Why this helps: It blocks many scam sites, prevents accidental app installs and stops fake update prompts from causing damage.

    Android phones and tablets

    Android offers built-in protections and optional supervised controls.

    What to set up:

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings and go to Digital Wellbeing & parental controls
    • Turn on parental controls for the device
    • Restrict app installs and require approval for new downloads
    • Enable Safe Browsing and website filtering
    • Turn on alerts for new app installs and account changes

    For families who want shared oversight, Google Family Link can be used to supervise app installs and receive alerts, as long as both parties agree.

    Why this helps: Many Android scams rely on fake app installs. These settings block that path.

    Windows computers

    Windows protection works best when user accounts are set correctly.

    What to set up:

    • Create a standard user account for daily use
    • Keep the caregiver account as the only administrator
    • Turn on Microsoft Family Safety if available
    • Enable SmartScreen and browser phishing protection
    • Block software installs without administrator approval

    Why this helps: Malware often installs silently on admin accounts. This setup prevents that.

    Mac computers

    macOS includes built-in controls similar to those on iPhone and iPad.

    What to set up:

    • Create a standard user account for the senior
    • Limit administrator access to a trusted caregiver
    • Open System Settings and enable Screen Time
    • Restrict app installs and system changes
    • Keep built-in malware and phishing protections enabled
    Two people look at a computer together

    Simple digital guardrails can reduce risk while allowing seniors to keep their devices and independence. (Kurt “CyberGuy” Knutsson)

    Why this helps: It prevents fake software updates and malicious downloads from installing.

    10) Best practices for all devices

    • Use alert-only or limited-control settings whenever possible
    • Review settings together so expectations are clear
    • Avoid tools that feel invasive or confusing
    • Focus on blocking harm, not monitoring behavior

    This is not about spying. It is about adding digital seatbelts while preserving independence. When used respectfully, these tools reduce risk without changing daily habits.

    Pro Tip: Use a secure email service for added privacy

    For families looking to go a step further, switching to a secure email service can significantly reduce scam exposure. Privacy-focused email providers are designed to limit tracking, block hidden tracking pixels, and reduce how much data advertisers or scammers can collect from inbox activity. Many secure email services also offer disposable or alias email addresses for one-time signups. If an alias starts receiving spam or scam messages, it can be disabled without affecting the main email account. This makes it easier to keep a primary email address private and limit long-term exposure. Secure email platforms typically include features like encrypted messages, no advertising and stronger privacy controls. While switching email providers is optional, it can be a useful upgrade for seniors who receive large volumes of spam or have been repeatedly targeted by scams.

    Why it matters: Less tracking means fewer scam attempts. Aliases reduce how often personal email addresses are exposed, without changing daily habits.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Protecting seniors online is not about control. It is about prevention. Email scams are designed to exploit trust and urgency, especially in people who did not grow up with digital threats. Smart guardrails protect independence while preventing irreversible mistakes. If email and banking are today’s car keys, families need modern safety features to go with them.

    If your parent clicked a scam email right now, would you know before the money was gone? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    [ad_2]

    Source link

  • 5 tech terms that shape your online privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We’ll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. 

    Learning these concepts will help you limit data exposure and stay in control of who can see what.

    Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you!

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.    

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    1) App permissions

    What your apps are really allowed to see

    Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.

    Once granted, these permissions can allow apps to collect data in the background, sometimes even when you’re not actively using them. Over time, this can quietly expose sensitive personal information.

    Regularly reviewing and limiting app permissions in your phone’s settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library.

    iPhone steps (iOS 18 and later)

    To review permissions by category

    • Open Settings
    • Tap Privacy & Security
    • Select a category such as Location ServicesMicrophoneCameraPhotos or Contacts
    • Review each app listed
    • Change access to Never or While Using the App when available

    To review permissions by app

    • Open Settings
    • Scroll down and tap the app’s name
    • Toggle off any permissions the app does not truly need

    Extra privacy tip

    • For Photos, choose Limited Access instead of full library access when possible

    Many apps request more access than they need, quietly collecting data in the background. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review permissions by category

    • Open Settings
    • Tap Privacy
    • Tap Permission manager
    • Select a category such as LocationCameraMicrophone or Contacts
    • Review apps and change access to Don’t allow or Allow only while using the app

    To review permissions by app

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Permissions
    • Remove any permissions that aren’t essential

    Extra privacy tip

    • Disable Allow background usage for apps that don’t need constant access

    Why this matters

    • Apps can collect data even when you’re not using them
    • Location, microphone and photo access are the most sensitive
    • Fewer permissions mean less data exposure
    • You stay in control without breaking most apps

    Extra protection beyond settings:

    Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. 

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    2) Location services

    When your phone knows where you are, constantly

    Location services use GPS, Wi-Fi, Bluetooth, and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don’t actually need.

    Reducing location access limits, tracking and helps protect your daily routines.

    iPhone steps (iOS 18 and later)

    To review all location access

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services

    For each app

    • Tap an app name
    • Select Never or While Using the App
    • Turn Precise Location off unless required

    Recommended settings

    • Avoid Always unless the app truly needs background tracking
    • Use While Using the App for most apps
    • Disable Precise Location for weather, shopping and social apps

    System services (optional)

    • Scroll down and tap System Services
    • Turn off items you don’t need, such as Location-Based Ads and Location-Based Suggestions
    Person typing on cellphone

    Location tracking can reveal your routines and movements long after you close an app. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review location access

    • Open Settings
    • Tap Privacy
    • Tap Location

    For each app

    • Tap Location access for apps
    • Select an app
    • Choose Don’t allow or Allow only while using the app
    • Turn Use precise location off when available

    Recommended settings

    • Avoid Allow all the time
    • Use Allow only while using for navigation apps
    • Disable precise location for apps that don’t require accuracy 

    Why this matters

    • Location data reveals routines, habits and patterns
    • Many apps track location in the background by default
    • Limiting access reduces profiling and data sharing
    • You keep core features without constant tracking

    3) Two-factor authentication (2FA)

    Your second line of defense

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.

    Even if hackers steal your password through a data breach or phishing attack, 2FA can stop them from accessing your accounts. That’s why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.

    It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available.

    Extra security tip:
    Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    4) VPN (Virtual Private Network)

    Hiding your online activity

    A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.

    VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.

    While a VPN doesn’t make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Cross-app tracking

    How companies follow you across apps

    Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.

    On iPhone, this tracking is controlled by Apple’s App Tracking Transparency system.
    On Android, it relies on advertising IDs and ad personalization controls.

    Turning these off limits how easily companies can connect your behavior across apps. You’ll still see ads, but they won’t be tailored to your personal activity.

    iPhone steps (iOS 18 and later)

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn Allow Apps to Request to Track off

    Optional extra protection

    • Review the app list below and make sure no apps are allowed to track you
    • Apps already denied cannot track you across other apps or websites
    Woman holds a phone

    Two-factor authentication (2FA) adds a critical extra step that helps stop account takeovers. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Privacy
    • Tap Ads
    • Turn Delete advertising ID on
    • Tap Ad topics and turn them off
    • Tap Ad measurement and turn it off

    What this does

    • Removes your advertising ID
    • Stops apps from sharing ad behavior across other apps
    • Limits interest-based and cross-app ad profiling

    One more thing to know:
    Turning off cross-app tracking helps going forward, but it doesn’t remove data that’s already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.       

    Kurt’s key takeaways

    Online privacy doesn’t have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you’re comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking, can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we’ll keep breaking it all down so you can protect your digital life with confidence.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Confused by a tech term or want something explained? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    [ad_2]

    Source link

  • CES 2026 showstoppers: 10 gadgets you have to see

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Every January, the Consumer Electronics Show, better known as CES, takes over Las Vegas. It’s where tech companies show off what they’re building next, from products that are almost ready to buy to ideas that feel pulled from the future.

    CES 2026 was packed with moments that made people stop and stare. Some of the tech felt practical. Some of it felt a bit wild. However, these 10 showstoppers were the ones everyone kept talking about on the show floor.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    1) LG Wallpaper TV

    LG pushed TV design to the edge of invisibility once again at CES 2026. The latest Wallpaper TV, officially called the LG OLED evo W6, is just 9mm thin and sits completely flush against the wall. From the side, it looks more like glass than a television.

    This version feels far more practical than earlier Wallpaper models. All inputs live in a separate Zero Connect Box, which wirelessly sends visually lossless 4K video and audio to the screen from up to 30 feet away. That keeps cables out of sight and gives you more freedom when placing the TV.

    THIS EV HAS A FACE, AND IT TALKS BACK WITH AI

    The LG CLOiD robot and the LG OLED evo AI Wallpaper TV are displayed onstage during an LG Electronics news conference at CES 2026, an annual consumer electronics trade show, in Las Vegas, Jan. 5, 2026. (REUTERS/Steve Marcus)

    Picture quality also takes a major step forward. LG’s new Hyper Radiant Color Technology boosts brightness, improves color accuracy and deepens blacks while cutting screen reflections. With Brightness Booster Ultra, the Wallpaper TV reaches up to 3.9 times the brightness of conventional OLEDs and stays easy to watch even in bright rooms.

    Powering it all is LG’s new Alpha 11 AI Processor Gen3. Its upgraded Dual AI Engine preserves natural detail while reducing noise, avoiding the overly sharp look that plagues some high-end TVs. Gamers also get plenty to like, including 4K at up to 165Hz, ultra-fast response times and support for NVIDIA G-SYNC and AMD FreeSync Premium.

    Availability: Expected later in 2026 through select retailers.

    2) Dreame Cyber X Stair-Climbing Robot Vacuum

    Dreame showed plenty of power at CES 2026, but the real jaw-dropper was the Cyber X concept. This robot vacuum uses a four-legged base that lets it climb stairs on its own, turning multi-level cleaning into something that finally feels automated.

    The design looks unusual at first, almost like a robot pet. Once it starts moving, though, the idea clicks. A built-in water tank reduces trips back to the dock, which should help extend cleaning sessions and preserve battery life.

    Dreame’s Cyber X four-legged design in black

    Dreame’s Cyber X concept uses a four-legged design to climb stairs on its own, hinting at a new era of autonomous home robots. (Dreame)

    It’s still a concept, but Cyber X feels like a glimpse at where home robots are headed. Less rolling around. More real autonomy.

    Availability: Concept product.

    3) SwitchBot AI MindClip

    SwitchBot joined the growing AI wearable trend with the MindClip, a tiny device designed to act like a second brain. It clips on easily, weighs just 18 grams and stays out of the way while quietly doing its job.

    MindClip can record conversations and meetings, summarize calls and create AI-powered notes. It also supports more than 100 languages, making it useful for work, travel or multilingual households. Like similar devices, it lets you listen back to recordings and read transcriptions later.

    Where MindClip aims to stand out is in memory. SwitchBot says users will be able to search past recordings and track down important details it captured earlier, turning everyday conversations into a searchable archive. That could be especially helpful for busy professionals and students who juggle calls, classes and meetings.

    The tiny MindClip clipped on a woman's blue sweater.

    The tiny MindClip clips on discreetly while recording, transcribing and organizing conversations using AI. (SwitchBot)

    Details are still limited, and no pricing has been announced. SwitchBot has hinted that many key features will require a subscription, which puts it in line with competing AI wearables.

    Availability: Not yet available. Pricing and preorder details have not been released.

    4) LG CLOiD Home Robot

    LG didn’t just show off a concept robot at CES. It showed a glimpse of what a true AI-powered home might look like.

    At LG Electronics’ booth at CES 2026, the company unveiled LG CLOiD, a home robot designed to handle real household chores as part of its “Zero Labor Home” vision. This isn’t just a rolling assistant. CLOiD can fold laundry, help in the kitchen and move safely around furniture.

    The robot uses a stable, wheeled base inspired by robot vacuums, paired with a tilting torso and two articulated arms. Each arm has human-like movement and individual fingers, allowing CLOiD to grip, lift and place objects with surprising precision. In demos, it retrieved items from the fridge, loaded an oven and folded clothes after a laundry cycle.

    CLOiD’s head acts as a mobile AI home hub, using cameras, sensors and voice-based AI to understand routines and control LG’s ThinQ-connected appliances. It still feels futuristic and a little unsettling, but the technology behind it is hard to ignore. If LG can make it practical and affordable, CLOiD could mark a real step toward AI doing the housework for us.

    Availability: Concept and research-stage technology. Not planned for consumer sale at this time.

    5) Glyde Smart Hair Clippers

    Glyde is trying to solve one of the most frustrating parts of grooming: cutting your own hair without messing it up.

    The company introduced AI-powered smart hair clippers designed to guide the cut for you. You wear a simple headband that marks where a fade should start, choose a style in the app and let the clippers do the rest. Built-in sensors track your speed, angle and movement in real time, automatically adjusting the blade to keep cuts even and fades smooth.

    This is very much a trust exercise. You’re letting software guide sharp blades near your head, and that won’t be for everyone. But for people who skip the barber, hate appointments or just want a quick cleanup at home, the idea makes sense.

    Glyde’s system is built to be “mistake-proof.” Move too fast, and the blade retracts. Tilt it the wrong way, and it trims less. Popular styles like buzz cuts, crew cuts and side parts are baked into the app, with step-by-step guidance that adapts as you cut.

    It’s a one-time investment meant to replace repeat barber visits. If it works as promised, Glyde could turn haircuts into a 10-minute task you do on your own schedule.

    Availability: Limited early access or direct sales may come later in 2026.

    6) LEGO Smart Bricks

    LEGO is adding a digital twist to its classic bricks, and surprisingly, it works. At CES, LEGO introduced LEGO Smart Play, a new line built around “Smart Bricks” that look like regular LEGO pieces but hide sensors, LEDs and speakers inside. The bricks can detect movement, distance and interaction, lighting up, changing color and producing sound effects in real time as kids play.

    The launch leans heavily into Star Wars, including sets with Luke Skywalker, Darth Vader, an X-Wing and a TIE fighter. In one demo, a Luke minifigure produced its own lightsaber sounds. In another, bricks made swooshing and crashing noises when attached to vehicles, while figures reacted when they were “hit.” It felt playful, immersive and instantly understandable.

    LEGO Smart Bricks at CES 2026

    A LEGO piece with a smart brick attached is displayed during a LEGO news conference ahead of the CES tech show Monday, Jan. 5, 2026, in Las Vegas. (AP Photo/Abbie Parr)

    Smart Tags snap into the bricks to control different behaviors, and a quick shake wakes everything up. Pricing starts around $70 and climbs to about $160, with Star Wars sets arriving in March. LEGO hasn’t shared details on battery life yet, but the goal is clear: add interactivity without pushing kids toward screens.

    This feels like LEGO doing tech the right way. You still build with your hands, imagine the story and snap bricks together. The technology simply brings the play to life.

    Availability: Launching March 2026. Expected to be sold through LEGO and major retailers.

    7) Autoliv Foldable Steering Wheel

    This might look like a small change, but it could completely reshape future car interiors.

    Autoliv unveiled the world’s first foldable steering wheel designed for Level 4 autonomous vehicles. When the car switches into self-driving mode, the steering wheel retracts smoothly into the dashboard, opening up the cabin and giving occupants more space to relax, work or just stretch out.

    What makes this impressive is that safety isn’t sacrificed. Autoliv built an adaptive airbag system that changes with the driving mode. When you’re driving manually, the airbag lives in the steering wheel as usual. Once the wheel folds away in autonomous mode, a separate airbag in the instrument panel takes over, keeping protection intact at all times.

    It’s a smart, practical solution to a problem automakers are already facing. If cars don’t always need a steering wheel, why should it always be in the way? Autoliv’s design shows how autonomy isn’t just about software, it’s about rethinking the entire cabin experience.

    Availability: Automotive supplier technology for future vehicles. 

    8) TDM Neo Hybrid Headphones

    These might be the most interesting headphones at CES for one simple reason: they refuse to stay just headphones.

    Tomorrow Doesn’t Matter, better known as TDM, unveiled Neo, a premium on-ear 2-in-1 hybrid headphone that physically twists into a compact Bluetooth speaker. No docking. No accessories. Just a quick rotation, and your personal audio turns into shared sound. Amazing, right?

    The concept might sound a bit gimmicky, but the execution feels solid. The hinge mechanism is sturdy, the transformation is intuitive, and the idea makes a lot of sense in real life. You can listen privately on a train, then flip Neo into speaker mode the moment you meet up with friends.

    TDM describes this as going from “solo to social,” and that’s exactly the appeal. It blurs the line between headphones and portable speakers in a way we haven’t really seen before. For travelers, outdoor users, or anyone who hates carrying multiple audio devices, Neo could be a genuinely very useful hybrid device.

    Availability: TDM will be launching Neo on Kickstarter later this month and will begin shipping in July.

    9) Jackery Solar Mars Bot

    Jackery made waves at CES with the Solar Mars Bot, a mobile solar generator that can move, track sunlight and recharge itself without constant setup.

    The Solar Mars Bot uses AI-enhanced computer vision to navigate on its own, follow its user and reposition throughout the day to capture the strongest available sunlight. Instead of manually adjusting panels or relocating gear, the system handles those decisions automatically. When not in use, its solar panels fold and retract, which helps make storage and transport more practical.

    What sets this system apart is how it blends mobility with energy storage. Unlike fixed solar installations that stay in one place or portable generators that must be carried and recharged by hand, the Solar Mars Bot actively manages its own power intake. It tracks the sun, recharges itself using solar energy and delivers power where it is needed.

    That makes it especially useful for extended power outages, off-grid living, emergency backup and outdoor adventures where access to electricity can change throughout the day. The Solar Mars Bot shows how portable power can become more intelligent, adaptable and hands-off when conditions are unpredictable.

    Availability: Prototype showcased at CES.  

    10) Timeli Personal Safety Device

    Timeli grabbed a lot of attention at CES 2026 with a simple, immediate approach to personal safety. By combining a flashlight, HD video recording, a loud alarm, GPS tracking and live emergency dispatch into one handheld device, it earned a CES 2026 Innovation Awards Honoree and plenty of interest on the show floor.

    Instead of opening an app or tapping through menus, Timeli relies on muscle memory. A quick press turns on a powerful flashlight and starts recording video. If a situation escalates, pressing and holding the SOS button triggers a full safety sequence. The alarm sounds, live video begins streaming, GPS coordinates lock in and two-way communication connects directly to emergency dispatch over cellular service.

    That live connection matters. Timeli works with RapidSOS to give dispatchers real-time video and location data. This added clarity helps responders understand what is happening faster and send the right help sooner. Studies show video verified emergencies can cut response times dramatically, while also reducing false alarms.

    Timeli works even without a phone. Built-in cellular, GPS, Wi-Fi and Bluetooth allow it to operate on its own or alongside the companion app for iOS and Android. Users can adjust video quality, light brightness and alarm volume to match their needs. Cloud video storage and alerts add another layer of reassurance.

    WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANT

    The design stays practical. Timeli is about the size and weight of a smartphone, so it fits easily in a pocket, purse or backpack. Battery life supports long standby time, extended daily use and several hours of active protection. It even doubles as a power bank, while reserving enough charge to stay ready for emergencies.

    Availability: Priced at $249 for preorder through timeli.com. Timeli includes a year of professional monitoring before transitioning to a monthly subscription.

    Honorable mentions: CES 2026 products worth checking out 

    These products also stood out on the CES 2026 show floor, highlighting smart design choices and meaningful innovation that point to the future of consumer tech.

    ASUS Zenbook Duo (2026)

     ASUS reimagined portable productivity with the 2026 Zenbook Duo. This laptop snaps two 14-inch 3K ASUS Lumina OLED touchscreens together into a single mobile workstation you can carry with one hand.

    The dual-screen setup lets you keep a main project open on one display while chats, calls or reference material live on the other. That alone cuts down on constant app switching. The OLED panels deliver rich color, deep blacks, smooth motion and built-in eye care that makes long sessions easier on your eyes.

    ASUS also upgraded what you hear. A new six-speaker system replaces the previous two-speaker design, creating fuller, more immersive audio for movies, music, and calls. Everything is wrapped in a Ceraluminum ceramic finish that resists fingerprints and scratches while feeling premium in hand.

    Availability: Expected early 2026. Pricing has not been announced.

    SpotOn GPS Fence Nova Edition

    SpotOn focused on precision and reliability with the launch of the SpotOn GPS Fence Nova Edition. This is a GPS dog fence system designed to create virtual fences anywhere, from small yards to massive rural properties, with no subscription required.

    What sets Nova apart is its advanced antenna and receiver system. SpotOn uses a dual-band, dual-feed active antenna paired with a dual-band receiver that reduces GPS drift by up to 40% and delivers accuracy up to eight times better than competing systems. In third-party testing, it achieved 100% reliable containment.

    Owners can create unlimited fences by walking boundaries, drawing them in the app, or placing GPS fenceposts automatically. The collar also includes intelligent audio cues, optional static correction, custom voice commands, LED prompts and sizing that grows with your dog. If a dog ever leaves the fence, tracking tools are available through the app or SpotOn support.

    Availability: Available in the US and Canada for $999. 

    Lenovo Legion Go Powered by SteamOS

    Lenovo took handheld gaming seriously with the Legion Go powered by SteamOS. This is the most powerful Legion handheld to ship natively with SteamOS, blending desktop-class performance with console-like simplicity.

    It features an 8.8-inch PureSight OLED display and can be configured with up to an AMD Ryzen Z2 Extreme processor, up to 32GB of LPDDR5X memory, and up to 2TB of PCIe SSD storage with expansion via microSD. SteamOS is tuned for gamepad controls and quick access, with features like fast suspend and resume, cloud saves, Steam Chat and built-in game recording.

    The result feels less like a mini PC and more like a true console you can carry. You get instant access to your Steam library without juggling operating systems or launchers.

    Availability: On sale June 2026. Starting price is $1,199.

    SanDisk Optimus GX 7100M NVMe SSD

    SanDisk introduced a new internal drive brand at CES, and the Optimus GX 7100M is its first standout. Built for handheld gaming consoles and thin and light laptops, this PCIe 4.0 NVMe SSD delivers speeds up to 7,250 MB per second.

    The drive is available in capacities up to 2TB, giving gamers faster load times, more room for large libraries and smoother performance on the go. It is designed for devices that support an M.2 2230 slot, including popular handheld consoles and compact laptops.

    This launch also marks the debut of the SanDisk Optimus name, which will replace the company’s internal SSD lineup for gamers, creators and professionals moving forward.

    Availability: Expected early spring 2026. Pricing will be announced closer to release.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    CES 2026 made one thing clear. Tech companies are taking bigger swings than ever. Some of these products feel close to becoming part of everyday life. Others may stay experimental for years. That’s what makes CES so fascinating. It gives us an early look at where technology could be headed and sparks conversations about what we actually want in our homes, cars and daily routines.

    Which CES 2026 showstopper impressed you the most? Why? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Plastic bottles could power your devices one day

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Each year, billions of single-use plastic bottles end up in landfills or oceans. That waste problem keeps growing. Now, a new scientific breakthrough suggests those same bottles could help power your daily life.

    Researchers have developed a way to transform discarded plastic water bottles into high-performance energy storage devices called supercapacitors. The work focuses on PET plastic, short for polyethylene terephthalate, which is used in most beverage bottles. 

    The research was published in Energy & Fuels and highlighted by the American Chemical Society. Scientists say the discovery could reduce plastic pollution while helping drive cleaner energy technology.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SCIENTISTS EXTRACT SILVER FROM E-WASTE USING COOKING OIL

    Discarded PET water bottles are one of the most common sources of plastic waste worldwide, with hundreds of billions produced each year. (Kurt “CyberGuy” Knutsson)

    Why PET plastic waste is such a growing problem

    PET plastic is everywhere. According to the researchers, more than 500 billion single-use PET plastic bottles are produced every year. Most are used once and thrown away. Lead researcher Dr. Yun Hang Hu says that scale creates a major environmental challenge.

    Instead of letting that plastic pile up, the team focused on upcycling it into something valuable. Their idea was simple but powerful. Turn waste into materials that support renewable energy systems and reduce production costs at the same time.

    NEW TECH RECOVERS 92% OF EV BATTERY METALS

    Plastic bottles in a pile

    Those upcycled materials come together to form an all-waste-plastic supercapacitor designed for fast charging and long term energy storage. (Kurt “CyberGuy” Knutsson)

    How plastic bottles can store and release energy

    Imagine a device that can charge fast and deliver power instantly. That is exactly what supercapacitors do. They store and release energy much faster than traditional batteries, which makes them useful for electric vehicles, solar power systems and everyday electronics. 

    Hu’s team found a way to build these energy storage components using discarded PET plastic water bottles. By reshaping the plastic at extremely high temperatures, the researchers turned waste into materials that can generate electricity efficiently and repeatedly.

    Here is how the process works:

    For the electrodes, researchers cut PET bottles into tiny, grain-sized pieces. They mixed the plastic with calcium hydroxide and heated it to nearly 1,300 degrees Fahrenheit in a vacuum. That heat transformed the plastic into a porous, electrically conductive carbon powder.

    The powder was then formed into thin electrode layers. For the separator, small pieces of PET were flattened and carefully perforated with hot needles. This pattern allowed electric current to pass efficiently while maintaining safety and durability. Once assembled, the device used two carbon electrodes separated by the PET film and submerged in a potassium hydroxide electrolyte.

    CIGARETTE BUTTS MAKE ROADS STRONGER THAN EVER BEFORE

    A diagram of how PET bottles are converted into energy

    Researchers use extreme heat to convert waste PET plastic into porous carbon materials that can store and move electricity efficiently. (Kurt “CyberGuy” Knutsson)

    Why the results surprised scientists

    When tested, the all-waste-plastic supercapacitor outperformed similar devices made with traditional glass fiber separators. After repeated charging and discharging, it retained 79 percent of its energy capacity. A comparable glass fiber device retained 78 percent. That difference matters. The PET-based design costs less to produce, remains fully recyclable, and supports circular energy storage technologies where waste materials are reused instead of discarded.

    What this means for you

    This breakthrough could affect everyday life sooner than you might expect. Cheaper supercapacitors can lower the cost of electric vehicles, solar systems and portable electronics. Faster charging and longer device lifespans could follow. It also shows that sustainability does not require giving something up. Waste plastics could become part of the solution instead of the problem. Although this technology is still in development, the research team believes PET-based supercapacitors could reach commercial markets within 5 to 10 years. In the meantime, choosing reusable bottles and plastic-free alternatives still helps reduce waste today.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Turning trash into energy storage is more than a clever idea. It shows how science can tackle two global challenges at once. Plastic pollution continues to grow. Energy demand does too. This research proves that those problems do not have to be solved separately. By rethinking waste as a resource, scientists are building a cleaner and more efficient future from materials we already throw away.

    If your empty water bottle could one day help power your home or car, would you still see it as trash? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Apple patches two zero-day flaws used in targeted attacks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple has released emergency security updates to fix two zero-day vulnerabilities that attackers actively exploited in highly targeted attacks. 

    The company described the activity as an “extremely sophisticated attack” aimed at specific individuals. Although Apple did not identify the attackers or victims, the limited scope strongly suggests spyware-style operations rather than widespread cybercrime.

    Both flaws affect WebKit, the browser engine behind Safari and all browsers on iOS. As a result, the risk is significant. In some cases, simply visiting a malicious webpage may be enough to trigger an attack.

    Below, we break down what these vulnerabilities mean and explain how you can better protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Apple released emergency updates after confirming two zero-day WebKit flaws were actively exploited in targeted attacks. (Reuters/Thomas Peter/File Photo)

    NEW IPHONE SCAM TRICKS OWNERS INTO GIVING PHONES AWAY

    What Apple says about the zero-day vulnerabilities

    The two vulnerabilities are tracked as CVE-2025-43529 and CVE-2025-14174, and Apple confirmed that both were exploited in the same real-world attacks. According to Apple’s security bulletin, the flaws were abused on versions of iOS released before iOS 26, and the attacks were limited to “specific targeted individuals.”

    CVE-2025-43529 is a WebKit use-after-free vulnerability that can lead to arbitrary code execution when a device processes maliciously crafted web content. To put it simply, it allows attackers to run their own code on a device by tricking the browser into mishandling memory. Apple credited Google’s Threat Analysis Group with discovering this flaw, which is often a strong indicator of nation-state or commercial spyware activity.

    The second flaw, CVE-2025-14174, is also a WebKit issue, this time involving memory corruption. While Apple describes the impact as memory corruption rather than direct code execution, these types of bugs are often chained together with other vulnerabilities to fully compromise a device. Apple says this issue was discovered jointly by Apple and Google’s Threat Analysis Group.

    In both cases, Apple acknowledged that it was aware of reports confirming active exploitation in the wild. That language is important because Apple typically reserves it for situations where attacks have already occurred, not just theoretical risks. The company says it addressed the bugs through improved memory management and better validation checks, without sharing deeper technical details that could help attackers replicate the exploits.

    Devices affected and signs of coordinated disclosure

    Apple has released patches across its supported operating systems, including the latest versions of iOS, iPadOS, macOS, Safari, watchOS, tvOS and visionOS.

    According to Apple’s advisory, affected devices include iPhone 11 and newer models, multiple generations of iPad Pro, iPad Air from the third generation onward, the eighth-generation iPad and newer and the iPad mini starting with the fifth generation. This covers the vast majority of iPhones and iPads still in active use today.

    Apple has patched the flaws across its entire ecosystem. Fixes are available in iOS 26.2 and iPadOS 26.2, iOS 18.7.3 and iPadOS 18.7.3, macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2 and Safari 26.2. Because Apple requires all iOS browsers to use WebKit under the hood, the same underlying issue also affected Chrome on iOS.

    6 steps you can take to protect yourself from such vulnerabilities

    Here are six practical steps you can take to stay safe, especially in light of highly targeted zero-day attacks like this.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    Safari and Chrome app

    Because WebKit powers Safari and all iOS browsers, even a malicious webpage may be enough to put unpatched devices at risk. (Jakub Porzycki/NurPhoto via Getty Images)

    1) Install updates as soon as they drop

    This sounds obvious, but it matters more than anything else. Zero-day attacks rely on people running outdated software. If Apple ships an emergency update, install it the same day if you can. Delaying updates is often the only window attackers need. If you tend to forget about updates, let your devices handle them for you. Enable automatic updates for iOS, iPadOS, macOS and Safari. That way, you are protected even if you miss the news or are traveling.

    2) Be careful with links, even from people you know

    Most WebKit exploits start with malicious web content. Avoid tapping on random links sent over SMS, WhatsApp, Telegram or email unless you are expecting them. If something feels off, open the site later by typing the address yourself.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    3) Use a lockdown-style browsing setup

    If you are a journalist, an activist or someone who deals with sensitive information, consider reducing your attack surface. Use Safari only, avoid unnecessary browser extensions, and limit how often you open links inside messaging apps.

    4) Turn on Lockdown Mode if you feel at risk

    Apple’s Lockdown Mode is designed specifically for targeted attacks. It restricts certain web technologies, blocks most message attachments, and limits attack vectors commonly used by spyware. It is not for everyone, but it exists for situations like this.

    5) Reduce your exposed personal data

    Targeted attacks often start with profiling. The more personal data about you that is floating around online, the easier it is to pick you as a target. Removing data from broker sites and tightening social media privacy settings can lower your visibility.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    An overhead view of an Apple store

    Apple urges users to install the latest updates, especially those who may face higher-risk, targeted threats. (Cheng Xin/Getty Images)

    6) Pay attention to unusual device behavior

    Unexpected crashes, overheating, sudden battery drain or Safari closing on its own can sometimes be warning signs. These do not automatically mean your device is compromised. However, if something feels consistently wrong, updating immediately and resetting the device is a smart move.

    Kurt’s key takeaway

    Apple has not shared details about who was targeted or how the attacks were delivered. However, the pattern fits closely with past spyware campaigns that focused on journalists, activists, political figures and others of interest to surveillance operators. With these patches, Apple has now fixed seven zero-day vulnerabilities that were exploited in the wild in 2025 alone. That includes flaws disclosed earlier this year and a backported fix in September for older devices.

    Have you installed the latest iOS or iPadOS update yet, or are you still putting it off? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Most parked domains now push scams and malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Typing a web address directly into your browser feels harmless. In fact, it feels normal. But new research shows that a simple habit is now one of the riskiest things you can do online. A recent study from cybersecurity firm Infoblox reveals a troubling shift.

    Most parked domains now redirect visitors to scams, malware or fake security warnings. In many cases, this happens instantly. You do not have to click anything. That means a single typo can expose your device.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    What are parked domains? 

    Parked domains are unused or expired web addresses. Many exist because someone forgot to renew a domain. Others are deliberate misspellings of popular sites like Google, Netflix or YouTube. For years, these domains displayed harmless placeholder pages. They showed ads and links to monetize accidental traffic. While annoying, they rarely posed serious danger. That is no longer true. Infoblox found that more than 90 percent of visits to parked domains now lead to malicious content. This includes scareware, fake antivirus offers, phishing pages and malware downloads.

    A single mistyped web address can redirect you from a trusted site to a dangerous parked domain in seconds, Kurt Knutsson writes. (PeopleImages/Getty Images)

    Why direct navigation has become so risky

    Direct navigation means typing a website address by hand instead of using a bookmark or search result. One missing letter can change everything. For example, mistyping gmail.com as gmai.com does not trigger an error. Instead, it can deliver your email straight to criminals. Infoblox found that some of these typo domains actively run mail servers to capture messages. Even worse, many of these domains form part of massive portfolios. One group tracked by Infoblox controlled nearly 3,000 lookalike domains associated with banks, tech companies and government services.

    Hooded person looking at his computer monitors.

    Malicious parked domains often trigger fake security warnings or hidden redirects without requiring any clicks. (CyberGuy.com)

    How these domains decide whom to attack

    Not everyone sees the same thing when visiting a parked domain. That is intentional. Researchers discovered that parked pages often profile visitors in real time. They analyze IP address, device type, location, cookies and browsing behavior. Based on that data, the domain decides what you see next. Visitors using a VPN or non-residential connection often see harmless placeholder pages. Residential users on phones or home computers get redirected to scams or malware instead. This filtering helps attackers stay hidden while maximizing successful attacks.

    Why parked domain scams are increasing

    Several trends are fueling the problem. First, traffic from parked domains is often resold multiple times through affiliate networks. By the time it reaches a malicious advertiser, there is no direct relationship with the original parking company. Second, recent ad policy changes may have increased exposure. Google now requires advertisers to opt in before running ads on parked domains. While intended to improve safety, this shift may have pushed bad actors deeper into affiliate networks with weaker oversight. The result is a murky ecosystem where responsibility is difficult to trace.

    Even government domains are being targeted

    Infoblox also found typosquatting aimed at government services. In one case, a researcher accidentally visited ic3.org instead of ic3.gov while trying to report a crime. The result was a fake warning page claiming a cloud subscription had expired. That page could just as easily have delivered malware. This highlights how easy it is to fall into these traps, even when doing something important.

    Parked domans push scams, malware

    A screenshot shows how mistyping the FBI’s IC3 web address redirects users to an unrelated parked domain. (Infoblox)

    Ways to stay safe from parked domain traps

    You can reduce your risk with a few smart habits:

    1) Use bookmarks for important sites

    Save banks, email providers and government portals. Avoid typing these addresses manually.

    2) Double-check URLs before hitting Enter

    Slow down when entering web addresses. One extra second can prevent a costly mistake.

    3) Install strong antivirus software

    Strong antivirus software protects your device if a malicious page loads, blocking malware downloads, scripts and fake security pop-ups.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Consider a data removal service

    Data brokers often fuel targeting by selling personal details. Removing your data can reduce exposure to personalized scam redirects.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Be cautious of scare tactics

    Fake warnings about expired subscriptions or infected devices are a major red flag. Legitimate companies do not use panic screens.

    6) Keep your browser and device updated

    Security updates often close the exact loopholes attackers use to exploit malicious redirects.

    7) Consider a VPN for added protection

    While not a cure-all, VPNs can reduce exposure to targeted redirects tied to residential IP addresses.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways 

    The web has changed in subtle but dangerous ways. Parked domains are no longer passive placeholders. In many cases, they act as active delivery systems for scams and malware. The most alarming part is how little effort it takes to trigger an attack. A typo is enough. As threats grow quieter and more automated, safe browsing habits matter more than ever.

    Have you ever mistyped a web address and ended up somewhere suspicious, or do you rely entirely on bookmarks now? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • ChatGPT’s GPT-5.2 is here, and it feels rushed

    [ad_1]

    NEWYou can now listen to Fox News articles!

    OpenAI, the company behind ChatGPT, has moved at an unusually fast pace in 2025. According to the company, it launched GPT-5 in August, followed by GPT-5.1 in November. Now, just weeks later, GPT-5.2 has launched with familiar claims of being the smartest and most capable ChatGPT yet.

    At first glance, the rapid rollout might seem surprising. But there’s context behind it. OpenAI CEO Sam Altman has reportedly called a “code red” inside the company, urging teams to move faster on improving ChatGPT. That push comes as competition heats up. Google recently released Gemini 3, which reportedly outperformed ChatGPT on several artificial intelligence benchmarks and delivered stronger image generation. At the same time, Anthropic’s Claude continues to advance quickly.

    Against that backdrop, GPT-5.2 feels less like a routine upgrade and more like a strategic response. So what actually changed in GPT-5.2, and why does OpenAI say it matters?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    AMAZON ADDS CONTROVERSIAL AI FACIAL RECOGNITION TO RING

    OpenAI CEO Sam Altman looks on as he takes a lunch break, during the Federal Reserve’s Integrated Review of the Capital Framework for Large Banks Conference in Washington, D.C., July 22, 2025. (REUTERS/Ken Cedeno)

    What exactly is GPT-5.2

    GPT-5.2 is the newest version in OpenAI’s flagship 5-series of large language models. Like its predecessor, it includes two default variants. GPT-5.2 Instant is designed for everyday chatting and web searches. GPT-5.2 Thinking is meant for more complex tasks like long reasoning chains and multi-step problem solving. These two models are now the default for all ChatGPT users, including free users. They replace GPT-5.1 Instant and Thinking entirely. If you are using ChatGPT today, you are already using GPT-5.2, whether you realize it or not.

    What OpenAI says GPT-5 brings to ChatGPT

    At the same time, OpenAI continues to position GPT-5 as “expert intelligence for everyone.” The company says GPT-5 delivers stronger performance across math, science, finance, law and other complex subjects. In OpenAI’s view, ChatGPT now acts more like a team of on-demand experts than a basic chatbot. To support that claim, OpenAI points to practical examples. These include better coding help, more expressive writing support, clearer health-related explanations and improved safety and accuracy. The company showcases use cases such as generating app code, writing speeches, explaining medications and correcting mistakes in user-submitted images. In theory, GPT-5.2 builds on that same foundation. However, while OpenAI emphasizes deeper thinking and more reliable answers, those gains remain subtle for many everyday users.

    What new features does GPT-5.2 add?

    Here’s the short answer. None. GPT-5.2 does not introduce new tools, interfaces, or headline features. Instead, OpenAI describes a series of behind-the-scenes improvements that supposedly make ChatGPT faster, smarter and more capable. According to OpenAI, GPT-5.2 performs better at:

    • Building presentations
    • Completing complex projects
    • Creating spreadsheets
    • Understanding long context windows
    • Interpreting images
    • Using tools more effectively
    ChatGPT app

    Kurt Knutsson reviews the new features in ChatGPT-5.2. (Kurt “CyberGuy” Knutsson)

    OpenAI also released new benchmarks showing GPT-5.2 outperforming GPT-5.1 and competing models by small margins. However, big numbers on charts do not always translate into noticeable improvements for real users.

    NEW US MILITARY GENAI TOOL ‘CRITICAL FIRST STEP’ IN FUTURE OF WARFARE, SAYS EXPERT

    Why testing chatbot improvements is tricky

    Evaluating chatbot upgrades is harder than it sounds. Responses can vary widely even when prompts stay the same. A model might excel at one task and struggle with a nearly identical one just moments later. On top of that, OpenAI’s 5-series models already perform at or near the top of the field. When performance starts that high, meaningful gains become harder to detect. With that in mind, we tested GPT-5.2, and in most tests, it behaved almost identically to GPT-5.1.

    Why benchmarks don’t tell the full story

    OpenAI’s benchmarks show modest gains for GPT-5.2. That matters for researchers and developers working at scale. Still, even advanced users may struggle to see practical benefits. Other companies have delivered clearer upgrades. Google’s Gemini Nano Banana Pro model shows obvious gains in AI image generation and editing. Those improvements are easy for anyone to test and verify. By contrast, GPT-5.2’s changes feel abstract. They exist mostly on paper rather than in daily use.    

    What this means to you

    If you pay for ChatGPT, there’s little downside to using GPT-5.2. It replaces GPT-5.1 in the model lineup and generally performs at least as well in everyday use. Free users don’t have much choice either, as model access is handled automatically. For most people, the experience feels familiar and stable.

    The picture shifts slightly for programmers and those who use it for business. Early pricing details suggest GPT-5.2 may cost roughly 40 percent more per million tokens than GPT-5.1, depending on usage tier and access method. That makes testing important before committing at scale.

    Woman on smartphone in Italy

    ChatGPT-5.2 works fine but may not feel exciting, Kurt Knutsson writes. (Michael Nguyen/NurPhoto via Getty Images)

    In short, GPT-5.2 works fine. It simply may not feel exciting.

    KEVIN O’LEARY WARNS CHINA ‘KICKING OUR HEINIES’ IN AI RACE AS REGULATORY ROADBLOCKS STALL US

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    GPT-5.2 feels like a model released under pressure rather than inspiration. It performs well, stays reliable, and moves forward in measurable ways. Still, it doesn’t deliver the kind of clear progress many people expect from a new version number. OpenAI remains a leader in AI, but competition is closing in fast. As rivals roll out more noticeable improvements, small updates may no longer be enough to stand out. For now, GPT-5.2 feels less like a breakthrough and more like OpenAI holding its ground.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Should AI companies slow down releases until improvements feel more meaningful? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link