ReportWire

Tag: topics

  • Artificial Intelligence helps fuel new energy sources

    NEWYou can now listen to Fox News articles!

    Artificial Intelligence and data centers have been blamed for rising electricity costs across the U.S. In December 2025, American consumers paid 42% more to power their homes than ten years ago. 

    “When you have increased demand and inadequate supply, costs are going to go up. And that’s what we’re experiencing right now,” Exelon CEO Calvin Butler said. 

    TRUMP SAYS EVERY AI PLANT BEING BUILT IN US WILL BE SELF-SUSTAINING WITH THEIR OWN ELECTRICITY

    In 2024, U.S. data centers used more than 4% of total U.S. electricity consumption according to the International Energy Agency. That equates to as much electricity as the entire nation of Pakistan uses annually. U.S. Data Center consumption is expected to grow by 133% by the end of the decade, using as much power as the entire country of France. 

    “We’re headquartered in Chicago, and we’re the owner of ComEd, the fourth-largest utility in the nation. ComEd’s peak load is roughly 23 gigawatts. We have had data center load come onto the system, but by 2030, we’ll be at 19 Gigawatts,” Butler said. 

    Artifical intelligence data centers in the U.S. used more than 4% of the total U.S. electricity consumption, according to the International Energy Agency. (Exelon)

    Commonwealth Edison has experienced a dramatic increase in data center connection requests. The potential projects total more than 30 gigawatts and are expected to come online between now an 2045.

    “Our growth is unprecedented in the last several decades. So, with the data center advent and the technology coming, we’ve been forced to serve that load, which is our responsibility,” Butler said. “But what we also have to do is build new generation supply, which is not keeping up with the load that is coming on. And that’s the crunch that we’re in right now.”

    IN 2026, ENERGY WAR’S NEW FRONT IS AI, AND US MUST WIN THAT BATTLE, API CHIEF SAYS

    Commonwealth Edison is asking regulators for a $15.3 billion 4-year grid update to meet the growing demand. The U.S. overall has increased its grid capacity by more than 15% over the last decade, but many utility companies and energy producers say it is not enough. 

    “We’re at a stage right now where we’re constrained by electricity,” Commonwealth Fusion Systems CEO Bob Mumgaard said. “You want to make power plants that can make a lot of power in a small package that you can put anywhere, that you could run at any time and fusion fits that bill.”

    Zanskar energy plant

    Zanskar, is the first AI-native geothermal energy company, according to their website. This plant is located in New Mexico. (Zanskar)

    Commonwealth Fusion Systems is working to add a new form of nuclear energy to the grid — fusion. It has the same reliable benefits of standard nuclear energy already in use, but does not produce long-lived radioactive waste and carries fewer risks. 

    “In fusion there’s no chain reaction. The result is helium which is safe and inert and you don’t use it to make anything related to weapons,” Mumgaard said. 

    US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN’T KEEP UP WITHOUT NEW INVESTMENT

    Commonwealth Fusion Systems says Artificial Intelligence is helping bring fusion energy closer to being a new resource. 

    “Building and designing these complex machines and manipulating this complex data matter of plasma are all things that we’re still learning and we’re still figuring out how to do,” Mumgaard said. “And that’s an area where we’ve been able to accelerate using A.I.”

    Other under-utilized energy sources could soon get a big boost thanks to A.I. Geothermal energy is a small part of the electric grid, because of the high drilling costs and low confidence in where to place infrastructure. 

    Power lines and supporting towers

    Geothermal and nuclear fusion technology will allow energy to be produced in any weather at any time. (AP)

    “If you could drill the perfect geothermal well every single time, like you pick the right spot, you design the right well, you drill the 5,000, 8,000 feet, you hit 400F degree temperatures, that’s incredibly productive,” Zanskar Co-founder Joel Edwards said. “If you could do that every single time over and over and again, geothermal power is the cheapest source of power period.” 

    Zanskar is working to make the geothermal search more exact. The company uses A.I.-fueled mapping to find untapped resources previously thought non-existent. 

    “If we could just get more precise in where we go to find the things and then how we drill into the things, geothermal absolutely has the cost curve to come down,” Edwards said. “And that’s sort of what we’re running towards, with A.I. sort of giving us the boost, giving us an edge to do that.”

    CLICK HERE TO GET THE FOX NEWS APP

    Both geothermal and nuclear fusion can produce energy in any weather at any time, a component that could have helped ease the grid strain amid the recent winter storm. 

    “It’s critical, and we’ve been raising that alarm for years now, and I use the analogy that you’re driving a car and your check engine light is on, but you keep driving it, hoping that you’ll keep getting there and keep going, but when it breaks down, you’re going to have a significantly higher cost,” Butler said. “We have to pay attention to what’s going on, and this winter storm – Winter Storm Fern – is indicative of what’s coming.”

    Source link

  • YouTube lets parents limit or block Shorts for teens

    NEWYou can now listen to Fox News articles!

    YouTube is rolling out new parental controls designed to give families more say over how much time teens spend scrolling through Shorts. 

    Parents can now set daily time limits or block Shorts entirely, depending on what works best for their household. The update comes as concerns grow around endless scrolling and its impact on teens. 

    YouTube says these tools are meant to support healthier viewing habits while still allowing young users to enjoy the platform in a more balanced way.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Why YouTube is focusing on Shorts

    Parents can now set a daily time limit for YouTube Shorts, including an option to block Shorts entirely.  (AP Photo/Lai Seng Sin, File)

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    Short-form video has become one of the most addictive parts of social media, especially for teens. The constant scroll can make it hard to stop watching, even when kids are supposed to be studying or winding down for bed. YouTube says the new controls respond to feedback from parents, advocates, and lawmakers who want stronger safeguards for young users. The goal is to give families flexibility instead of forcing an all-or-nothing approach.

    What parents can now control on YouTube

    If you supervise a teen’s Google account, you can now:

    • Set a daily time limit for YouTube Shorts
    • Block Shorts entirely by setting the limit to zero minutes
    • Turn on bedtime reminders
    • Enable take-a-break alerts
    • Manage supervised teen accounts across multiple devices

    YouTube also says it is adjusting how content is recommended to teens, placing more emphasis on videos tied to curiosity, life skills, inspiration, and credible information that supports well-being.

    How parents limit or block YouTube Shorts for teens

    Before you start, make sure:

    • Your teen is using a supervised Google account
    • You have access to Google Family Link
    • Your teen is signed into YouTube on their device with that supervised account

    Step-by-step instructions

    • Open the Google Family Link app on your phone or tablet (iPhone or Android).
    • Tap your teen’s profile.
    • Tap Controls, then select YouTube.If YouTube does not appear, confirm the account is set up as supervised.
    • If YouTube does not appear, confirm the account is set up as supervised.
    • Tap Screen time or Shorts settings.
    • Find the option labeled Shorts daily limit.
    • Choose how much time your teen can scroll Shorts each day:Set a time limit to allow limited scrollingSet the limit to zero minutes to block Shorts entirely
    • Set a time limit to allow limited scrolling
    • Set the limit to zero minutes to block Shorts entirely
    • In the same section, turn on:Take a break remindersBedtime reminders
    • Take a break reminders
    • Bedtime reminders
    • Confirm your changes.

    The new limits apply immediately.

    OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN

    Children Use Smartphones in Hallway

    YouTube’s supervised account settings let parents choose age-appropriate content and manage how teens experience the platform. (StockPlanets/Getty Images)

    What happens when your teen reaches the Shorts limit

    Once the daily limit is reached:

    • The Shorts feed locks
    • A message explains that the daily limit has been reached
    • Shorts unlock automatically the next day

    Regular, long-form YouTube videos remain available unless you restrict them separately through screen-time controls.

    Important things parents should know

    • Teens cannot change or bypass Shorts limits on their own
    • Limits apply across all devices signed into the supervised account
    • Shorts controls are separate from overall YouTube screen-time limits
    • Blocking Shorts does not block standard YouTube videos

    Other parental tools worth checking

    Beyond Shorts, parents can also:

    • Turn off autoplay
    • Review watch and search history
    • Adjust content recommendations
    • Pause YouTube during homework or sleep hours

    These options are managed through Google Family Link, with guidance and account setup available in YouTube’s Family Center.

    What this means to you

    If you are a parent or guardian, these controls give you more practical ways to manage screen time without banning YouTube entirely. You can limit Shorts during school nights, allow more time on long trips, or block them when focus matters most. Instead of relying on willpower alone, families now have built-in tools that help reinforce healthy habits.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Short-form video is not going away, but the way teens interact with it can change. YouTube’s new parental controls show a shift toward giving families more flexibility and clearer boundaries. Used alongside conversations about online habits, these tools can make a real difference. Oh, and be sure to check out my new “Beyond Connected” podcast on YouTube.

    Child using a device on a couch.

    YouTube says these new parental controls are designed to reduce endless scrolling and support healthier viewing habits for teens. (Kurt “CyberGuy” Knutsson)

    How much control do you think parents should have over teens’ screen time, and where should the line be drawn? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    Source link

  • FDA clears first at-home brain device for depression

    NEWYou can now listen to Fox News articles!

    For the first time, Americans with depression will soon be able to use a prescription brain-stimulation device at home. 

    The approval comes from the U.S. Food and Drug Administration and marks a major shift in how mental health conditions may be treated. The newly approved device is called FL-100, and it comes from Flow Neuroscience. 

    It is designed for adults 18 and older with moderate to severe major depressive disorder. Clinicians can prescribe it as a stand-alone treatment or alongside antidepressants and therapy. This decision matters because depression affects more than 20 million adults in the U.S. Roughly one-third do not get enough relief from medication or stop taking it due to side effects.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SIMPLE DAILY HABIT MAY HELP EASE DEPRESSION MORE THAN MEDICATION, RESEARCHERS SAY

    Flow Neuroscience has gotten approval from the U.S. Food and Drug Administration for its FL-100 prescription brain-stimulation device. (Flow Neuroscience)

    How the Flow FL-100 works

    The FL-100 uses transcranial direct current stimulation, often shortened to tDCS. This technology delivers a gentle electrical current to the prefrontal cortex, a region of the brain tied to mood regulation and stress response. In many people with depression, activity in this area is reduced. By stimulating it, the device aims to restore healthier brain signaling over time. The system looks like a lightweight headset and pairs with a mobile app. Patients use it at home for about 30 minutes per day while clinicians monitor progress remotely.

    The clinical results behind the approval

    The FDA based its decision on a randomized controlled trial that evaluated home use under remote supervision. Participants who received active stimulation showed meaningful improvement on clinician-rated and self-reported depression scales. After 10 weeks of treatment, patients experienced an average symptom improvement of 58% compared to a control group. Many users reported noticeable changes within the first three weeks. The study was published in the journal Nature Medicine, adding credibility to the findings. Side effects were generally mild and short-term. Reported issues included skin irritation, redness, headaches, and brief stinging sensations at the electrode sites.

    FDA sign.

    The FDA has approved the first prescription brain-stimulation device for at-home treatment of depression in the U.S., marking a major shift in mental healthcare. (hoto by ISSAM AHMED/AFP via Getty Images)

    A growing shift toward tech-based mental health care

    Flow’s device has already been used by more than 55,000 people across Europe, the U.K., Switzerland and Hong Kong. In the U.K., it is prescribed within parts of the public health system. Company leaders say the U.S. approval opens the door for broader access to non-drug treatment options. The momentum is not isolated. In 2025, researchers at UCLA Health developed another experimental brain-stimulation approach, signaling rapid growth in this field. Together, these advances suggest that at-home neuromodulation may soon become a standard part of depression care rather than a fringe option.

    When will the device be available

    Flow expects the FL-100 to be available to U.S. patients in the second quarter of 2026. A prescription will be required, and the companion app will be available on iOS and Android. The company also plans to explore additional uses for its platform, including sleep disorders, addiction, and traumatic brain injury.

    10 HEALTH TECH PRODUCTS STEALING THE SPOTLIGHT AT CES 2026

    Flow Neuroscience brain-stimulation device

    Flow Neuroscience’s FL-100 headset delivers mild electrical stimulation to the brain and can be prescribed for home use under medical supervision. (Flow Neuroscience)

    What to know before trying Flow

    Flow is FDA approved for adults 18 and older with moderate to severe major depressive disorder, and it requires a prescription from a licensed healthcare provider. Doctors can recommend it on its own or alongside medication or therapy. The headset is non-invasive and designed for home use, but it is not meant for emergency situations or people considered treatment resistant. It also does not replace crisis care or immediate mental health support. Most users wear the headset for about 30 minutes per session. Mild tingling, warmth, skin irritation or headaches can happen, especially early on. These effects are usually short-lived and monitored by a clinician through the companion app.

    Flow pairs with a mobile app that guides treatment and supports remote clinical oversight. Your provider sets the treatment plan, and the device follows prescribed settings to ensure safe use. Pricing and insurance coverage may vary once the device becomes available in the U.S. Some patients may access Flow through clinics, research programs, or as it becomes more widely adopted in routine depression care. The bottom line is simple. Flow adds another evidence-based option, not a cure and not a one-size-fits-all solution. For people who have struggled to find relief, having another clinically proven choice can matter a lot.

    What this means to you

    If you or someone you care about struggles with depression, this approval expands the range of real treatment options. It offers a non-drug path that can be used at home under medical guidance. For patients who have not responded well to medication or who experience unwanted side effects, this could provide another way forward. It also reflects a broader trend toward personalized, tech-enabled mental healthcare. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    ELON MUSK SHARES PLAN TO MASS-PRODUCE BRAIN IMPLANTS FOR PARALYSIS, NEUROLOGICAL DISEASE

    FDA logo.

    The newly approved device targets adults with moderate to severe depression and can be used alongside medication or therapy. (Photo by Sarah Silbiger/Getty Images)

    Kurt’s key takeaways

    This FDA approval feels like a real turning point. For years, brain stimulation for depression stayed locked inside clinics. Now it can happen at home with a doctor still guiding the process. That matters for people who have tried medications, dealt with side effects or felt stuck with limited options. This device will not be the right answer for everyone, but it gives patients and doctors one more proven tool to work with. And for many people living with depression, having another option could make all the difference.

    If a doctor could prescribe a brain-stimulation headset instead of another pill, would you be open to trying it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    Source link

  • Teen hackers recruited through fake job ads

    NEWYou can now listen to Fox News articles!

    At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. 

    And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for “successful calls.”

    What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as “The Com,” short for “The Community.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    Fake job ads promising fast cash and flexible hours are quietly recruiting teens into ransomware and extortion schemes, often paying in cryptocurrency to hide criminal activity. (Donato Fasano/Getty Images)

    How The Com operates behind the scenes

    The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in phishing or extortion. Collaboration happens when it benefits the operation. 

    Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.

    Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.

    That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. 

    “A job post feels structured, normal and safe, even when the actual behavior being requested is anything but,” Amper said. “A job posting implies a real process – a role, a manager, training and a paycheck. That’s exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding.”

    Amper notes that what’s changed is not just the scale of recruitment, but how criminals package it. “Serious crime is now being sold as ‘work.’”

    Why teens excel at social engineering attacks

    Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.

    According to Amper, teens don’t need technical expertise to get pulled in. “The on-ramp is usually social, a Discord server, a DM, a ‘quick gig,’” he said. “It can feel like trolling culture, but the targets are real companies and the consequences are real people.”

    Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.

    Gaming culture feeds the pipeline

    For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.

    Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.

    Amper compares the progression to gaming itself. “These crews package crime as a ladder,” he said. “Join the group, do small tasks, level up, get paid, get status.”

    Why young women are being targeted

    Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.

    Red flags that signal fake job scams and ransomware recruitment

    These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.

    Crypto-only pay is a major warning sign

    Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.

    Per-call or per-task payouts should raise concern

    Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation.

    Recruitment through Telegram or Discord is a red flag

    Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.

    Anonymous mentors and vague training are dangerous

    Being “trained from scratch” by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.

    Secrecy requests signal manipulation

    Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.

    Amper offers a simple rule of thumb: “If a ‘job’ asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you’ve verified the employer, you’re not in a hiring process. You’re in a crime pipeline.”

    He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems. “The scam version flips the order,” he said. “It asks for the most sensitive details first, before anything is independently verifiable.”

    Urgency and emotional pressure are deliberate tactics

    Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.

    If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    Hacker using a computer.

    Cybercrime recruiters are targeting middle and high school students for risky roles like social engineering calls, exposing them to federal charges and prison time. (Philip Dulian/picture alliance via Getty Images)

    Law enforcement is cracking down on teen cybercrime

    Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.

    Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.’s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.

    Federal agencies are also issuing advisories about the group’s social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.

    Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.

    How parents and teens can avoid ransomware recruitment traps

    This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.

    Tips for parents and guardians to spot fake job scams early

    Parents play a critical role in spotting early warning signs, especially when online “work” starts happening behind closed doors or moves too fast to explain.

    1) Pay attention to how online “jobs” are communicated

    Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs.

    2) Question sudden income with no clear employer

    Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records.

    3) Treat secrecy as a serious warning sign

    If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation.

    4) Talk early about legal consequences online

    Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.

    Tips for teens to avoid fake job offers and cybercrime traps

    Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble.

    1) Be skeptical of private messages offering fast money

    Real companies do not cold-recruit through private chats or gaming servers.

    2) Avoid crypto-only payment offers

    Being paid only in cryptocurrency is a common tactic used to hide criminal activity.

    3) Choose legal paths to build skills and reputation

    Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

    Person typing on a keyboard.

    A loose cybercrime network known as “The Com” has been linked to major U.S. and U.K. data breaches affecting companies worth trillions combined. (Photo by Uli Deck/picture alliance via Getty Images)

    Kurt’s key takeaways

    What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.

    If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    Source link

  • 5 tech terms that shape your online privacy

    NEWYou can now listen to Fox News articles!

    Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We’ll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. 

    Learning these concepts will help you limit data exposure and stay in control of who can see what.

    Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you!

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.    

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    1) App permissions

    What your apps are really allowed to see

    Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.

    Once granted, these permissions can allow apps to collect data in the background, sometimes even when you’re not actively using them. Over time, this can quietly expose sensitive personal information.

    Regularly reviewing and limiting app permissions in your phone’s settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library.

    iPhone steps (iOS 18 and later)

    To review permissions by category

    • Open Settings
    • Tap Privacy & Security
    • Select a category such as Location ServicesMicrophoneCameraPhotos or Contacts
    • Review each app listed
    • Change access to Never or While Using the App when available

    To review permissions by app

    • Open Settings
    • Scroll down and tap the app’s name
    • Toggle off any permissions the app does not truly need

    Extra privacy tip

    • For Photos, choose Limited Access instead of full library access when possible

    Many apps request more access than they need, quietly collecting data in the background. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review permissions by category

    • Open Settings
    • Tap Privacy
    • Tap Permission manager
    • Select a category such as LocationCameraMicrophone or Contacts
    • Review apps and change access to Don’t allow or Allow only while using the app

    To review permissions by app

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Permissions
    • Remove any permissions that aren’t essential

    Extra privacy tip

    • Disable Allow background usage for apps that don’t need constant access

    Why this matters

    • Apps can collect data even when you’re not using them
    • Location, microphone and photo access are the most sensitive
    • Fewer permissions mean less data exposure
    • You stay in control without breaking most apps

    Extra protection beyond settings:

    Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. 

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    2) Location services

    When your phone knows where you are, constantly

    Location services use GPS, Wi-Fi, Bluetooth, and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don’t actually need.

    Reducing location access limits, tracking and helps protect your daily routines.

    iPhone steps (iOS 18 and later)

    To review all location access

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services

    For each app

    • Tap an app name
    • Select Never or While Using the App
    • Turn Precise Location off unless required

    Recommended settings

    • Avoid Always unless the app truly needs background tracking
    • Use While Using the App for most apps
    • Disable Precise Location for weather, shopping and social apps

    System services (optional)

    • Scroll down and tap System Services
    • Turn off items you don’t need, such as Location-Based Ads and Location-Based Suggestions
    Person typing on cellphone

    Location tracking can reveal your routines and movements long after you close an app. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review location access

    • Open Settings
    • Tap Privacy
    • Tap Location

    For each app

    • Tap Location access for apps
    • Select an app
    • Choose Don’t allow or Allow only while using the app
    • Turn Use precise location off when available

    Recommended settings

    • Avoid Allow all the time
    • Use Allow only while using for navigation apps
    • Disable precise location for apps that don’t require accuracy 

    Why this matters

    • Location data reveals routines, habits and patterns
    • Many apps track location in the background by default
    • Limiting access reduces profiling and data sharing
    • You keep core features without constant tracking

    3) Two-factor authentication (2FA)

    Your second line of defense

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.

    Even if hackers steal your password through a data breach or phishing attack, 2FA can stop them from accessing your accounts. That’s why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.

    It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available.

    Extra security tip:
    Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    4) VPN (Virtual Private Network)

    Hiding your online activity

    A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.

    VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.

    While a VPN doesn’t make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Cross-app tracking

    How companies follow you across apps

    Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.

    On iPhone, this tracking is controlled by Apple’s App Tracking Transparency system.
    On Android, it relies on advertising IDs and ad personalization controls.

    Turning these off limits how easily companies can connect your behavior across apps. You’ll still see ads, but they won’t be tailored to your personal activity.

    iPhone steps (iOS 18 and later)

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn Allow Apps to Request to Track off

    Optional extra protection

    • Review the app list below and make sure no apps are allowed to track you
    • Apps already denied cannot track you across other apps or websites
    Woman holds a phone

    Two-factor authentication (2FA) adds a critical extra step that helps stop account takeovers. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Privacy
    • Tap Ads
    • Turn Delete advertising ID on
    • Tap Ad topics and turn them off
    • Tap Ad measurement and turn it off

    What this does

    • Removes your advertising ID
    • Stops apps from sharing ad behavior across other apps
    • Limits interest-based and cross-app ad profiling

    One more thing to know:
    Turning off cross-app tracking helps going forward, but it doesn’t remove data that’s already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.       

    Kurt’s key takeaways

    Online privacy doesn’t have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you’re comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking, can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we’ll keep breaking it all down so you can protect your digital life with confidence.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Confused by a tech term or want something explained? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Source link

  • CES 2026 showstoppers: 10 gadgets you have to see

    NEWYou can now listen to Fox News articles!

    Every January, the Consumer Electronics Show, better known as CES, takes over Las Vegas. It’s where tech companies show off what they’re building next, from products that are almost ready to buy to ideas that feel pulled from the future.

    CES 2026 was packed with moments that made people stop and stare. Some of the tech felt practical. Some of it felt a bit wild. However, these 10 showstoppers were the ones everyone kept talking about on the show floor.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    1) LG Wallpaper TV

    LG pushed TV design to the edge of invisibility once again at CES 2026. The latest Wallpaper TV, officially called the LG OLED evo W6, is just 9mm thin and sits completely flush against the wall. From the side, it looks more like glass than a television.

    This version feels far more practical than earlier Wallpaper models. All inputs live in a separate Zero Connect Box, which wirelessly sends visually lossless 4K video and audio to the screen from up to 30 feet away. That keeps cables out of sight and gives you more freedom when placing the TV.

    THIS EV HAS A FACE, AND IT TALKS BACK WITH AI

    The LG CLOiD robot and the LG OLED evo AI Wallpaper TV are displayed onstage during an LG Electronics news conference at CES 2026, an annual consumer electronics trade show, in Las Vegas, Jan. 5, 2026. (REUTERS/Steve Marcus)

    Picture quality also takes a major step forward. LG’s new Hyper Radiant Color Technology boosts brightness, improves color accuracy and deepens blacks while cutting screen reflections. With Brightness Booster Ultra, the Wallpaper TV reaches up to 3.9 times the brightness of conventional OLEDs and stays easy to watch even in bright rooms.

    Powering it all is LG’s new Alpha 11 AI Processor Gen3. Its upgraded Dual AI Engine preserves natural detail while reducing noise, avoiding the overly sharp look that plagues some high-end TVs. Gamers also get plenty to like, including 4K at up to 165Hz, ultra-fast response times and support for NVIDIA G-SYNC and AMD FreeSync Premium.

    Availability: Expected later in 2026 through select retailers.

    2) Dreame Cyber X Stair-Climbing Robot Vacuum

    Dreame showed plenty of power at CES 2026, but the real jaw-dropper was the Cyber X concept. This robot vacuum uses a four-legged base that lets it climb stairs on its own, turning multi-level cleaning into something that finally feels automated.

    The design looks unusual at first, almost like a robot pet. Once it starts moving, though, the idea clicks. A built-in water tank reduces trips back to the dock, which should help extend cleaning sessions and preserve battery life.

    Dreame’s Cyber X four-legged design in black

    Dreame’s Cyber X concept uses a four-legged design to climb stairs on its own, hinting at a new era of autonomous home robots. (Dreame)

    It’s still a concept, but Cyber X feels like a glimpse at where home robots are headed. Less rolling around. More real autonomy.

    Availability: Concept product.

    3) SwitchBot AI MindClip

    SwitchBot joined the growing AI wearable trend with the MindClip, a tiny device designed to act like a second brain. It clips on easily, weighs just 18 grams and stays out of the way while quietly doing its job.

    MindClip can record conversations and meetings, summarize calls and create AI-powered notes. It also supports more than 100 languages, making it useful for work, travel or multilingual households. Like similar devices, it lets you listen back to recordings and read transcriptions later.

    Where MindClip aims to stand out is in memory. SwitchBot says users will be able to search past recordings and track down important details it captured earlier, turning everyday conversations into a searchable archive. That could be especially helpful for busy professionals and students who juggle calls, classes and meetings.

    The tiny MindClip clipped on a woman's blue sweater.

    The tiny MindClip clips on discreetly while recording, transcribing and organizing conversations using AI. (SwitchBot)

    Details are still limited, and no pricing has been announced. SwitchBot has hinted that many key features will require a subscription, which puts it in line with competing AI wearables.

    Availability: Not yet available. Pricing and preorder details have not been released.

    4) LG CLOiD Home Robot

    LG didn’t just show off a concept robot at CES. It showed a glimpse of what a true AI-powered home might look like.

    At LG Electronics’ booth at CES 2026, the company unveiled LG CLOiD, a home robot designed to handle real household chores as part of its “Zero Labor Home” vision. This isn’t just a rolling assistant. CLOiD can fold laundry, help in the kitchen and move safely around furniture.

    The robot uses a stable, wheeled base inspired by robot vacuums, paired with a tilting torso and two articulated arms. Each arm has human-like movement and individual fingers, allowing CLOiD to grip, lift and place objects with surprising precision. In demos, it retrieved items from the fridge, loaded an oven and folded clothes after a laundry cycle.

    CLOiD’s head acts as a mobile AI home hub, using cameras, sensors and voice-based AI to understand routines and control LG’s ThinQ-connected appliances. It still feels futuristic and a little unsettling, but the technology behind it is hard to ignore. If LG can make it practical and affordable, CLOiD could mark a real step toward AI doing the housework for us.

    Availability: Concept and research-stage technology. Not planned for consumer sale at this time.

    5) Glyde Smart Hair Clippers

    Glyde is trying to solve one of the most frustrating parts of grooming: cutting your own hair without messing it up.

    The company introduced AI-powered smart hair clippers designed to guide the cut for you. You wear a simple headband that marks where a fade should start, choose a style in the app and let the clippers do the rest. Built-in sensors track your speed, angle and movement in real time, automatically adjusting the blade to keep cuts even and fades smooth.

    This is very much a trust exercise. You’re letting software guide sharp blades near your head, and that won’t be for everyone. But for people who skip the barber, hate appointments or just want a quick cleanup at home, the idea makes sense.

    Glyde’s system is built to be “mistake-proof.” Move too fast, and the blade retracts. Tilt it the wrong way, and it trims less. Popular styles like buzz cuts, crew cuts and side parts are baked into the app, with step-by-step guidance that adapts as you cut.

    It’s a one-time investment meant to replace repeat barber visits. If it works as promised, Glyde could turn haircuts into a 10-minute task you do on your own schedule.

    Availability: Limited early access or direct sales may come later in 2026.

    6) LEGO Smart Bricks

    LEGO is adding a digital twist to its classic bricks, and surprisingly, it works. At CES, LEGO introduced LEGO Smart Play, a new line built around “Smart Bricks” that look like regular LEGO pieces but hide sensors, LEDs and speakers inside. The bricks can detect movement, distance and interaction, lighting up, changing color and producing sound effects in real time as kids play.

    The launch leans heavily into Star Wars, including sets with Luke Skywalker, Darth Vader, an X-Wing and a TIE fighter. In one demo, a Luke minifigure produced its own lightsaber sounds. In another, bricks made swooshing and crashing noises when attached to vehicles, while figures reacted when they were “hit.” It felt playful, immersive and instantly understandable.

    LEGO Smart Bricks at CES 2026

    A LEGO piece with a smart brick attached is displayed during a LEGO news conference ahead of the CES tech show Monday, Jan. 5, 2026, in Las Vegas. (AP Photo/Abbie Parr)

    Smart Tags snap into the bricks to control different behaviors, and a quick shake wakes everything up. Pricing starts around $70 and climbs to about $160, with Star Wars sets arriving in March. LEGO hasn’t shared details on battery life yet, but the goal is clear: add interactivity without pushing kids toward screens.

    This feels like LEGO doing tech the right way. You still build with your hands, imagine the story and snap bricks together. The technology simply brings the play to life.

    Availability: Launching March 2026. Expected to be sold through LEGO and major retailers.

    7) Autoliv Foldable Steering Wheel

    This might look like a small change, but it could completely reshape future car interiors.

    Autoliv unveiled the world’s first foldable steering wheel designed for Level 4 autonomous vehicles. When the car switches into self-driving mode, the steering wheel retracts smoothly into the dashboard, opening up the cabin and giving occupants more space to relax, work or just stretch out.

    What makes this impressive is that safety isn’t sacrificed. Autoliv built an adaptive airbag system that changes with the driving mode. When you’re driving manually, the airbag lives in the steering wheel as usual. Once the wheel folds away in autonomous mode, a separate airbag in the instrument panel takes over, keeping protection intact at all times.

    It’s a smart, practical solution to a problem automakers are already facing. If cars don’t always need a steering wheel, why should it always be in the way? Autoliv’s design shows how autonomy isn’t just about software, it’s about rethinking the entire cabin experience.

    Availability: Automotive supplier technology for future vehicles. 

    8) TDM Neo Hybrid Headphones

    These might be the most interesting headphones at CES for one simple reason: they refuse to stay just headphones.

    Tomorrow Doesn’t Matter, better known as TDM, unveiled Neo, a premium on-ear 2-in-1 hybrid headphone that physically twists into a compact Bluetooth speaker. No docking. No accessories. Just a quick rotation, and your personal audio turns into shared sound. Amazing, right?

    The concept might sound a bit gimmicky, but the execution feels solid. The hinge mechanism is sturdy, the transformation is intuitive, and the idea makes a lot of sense in real life. You can listen privately on a train, then flip Neo into speaker mode the moment you meet up with friends.

    TDM describes this as going from “solo to social,” and that’s exactly the appeal. It blurs the line between headphones and portable speakers in a way we haven’t really seen before. For travelers, outdoor users, or anyone who hates carrying multiple audio devices, Neo could be a genuinely very useful hybrid device.

    Availability: TDM will be launching Neo on Kickstarter later this month and will begin shipping in July.

    9) Jackery Solar Mars Bot

    Jackery made waves at CES with the Solar Mars Bot, a mobile solar generator that can move, track sunlight and recharge itself without constant setup.

    The Solar Mars Bot uses AI-enhanced computer vision to navigate on its own, follow its user and reposition throughout the day to capture the strongest available sunlight. Instead of manually adjusting panels or relocating gear, the system handles those decisions automatically. When not in use, its solar panels fold and retract, which helps make storage and transport more practical.

    What sets this system apart is how it blends mobility with energy storage. Unlike fixed solar installations that stay in one place or portable generators that must be carried and recharged by hand, the Solar Mars Bot actively manages its own power intake. It tracks the sun, recharges itself using solar energy and delivers power where it is needed.

    That makes it especially useful for extended power outages, off-grid living, emergency backup and outdoor adventures where access to electricity can change throughout the day. The Solar Mars Bot shows how portable power can become more intelligent, adaptable and hands-off when conditions are unpredictable.

    Availability: Prototype showcased at CES.  

    10) Timeli Personal Safety Device

    Timeli grabbed a lot of attention at CES 2026 with a simple, immediate approach to personal safety. By combining a flashlight, HD video recording, a loud alarm, GPS tracking and live emergency dispatch into one handheld device, it earned a CES 2026 Innovation Awards Honoree and plenty of interest on the show floor.

    Instead of opening an app or tapping through menus, Timeli relies on muscle memory. A quick press turns on a powerful flashlight and starts recording video. If a situation escalates, pressing and holding the SOS button triggers a full safety sequence. The alarm sounds, live video begins streaming, GPS coordinates lock in and two-way communication connects directly to emergency dispatch over cellular service.

    That live connection matters. Timeli works with RapidSOS to give dispatchers real-time video and location data. This added clarity helps responders understand what is happening faster and send the right help sooner. Studies show video verified emergencies can cut response times dramatically, while also reducing false alarms.

    Timeli works even without a phone. Built-in cellular, GPS, Wi-Fi and Bluetooth allow it to operate on its own or alongside the companion app for iOS and Android. Users can adjust video quality, light brightness and alarm volume to match their needs. Cloud video storage and alerts add another layer of reassurance.

    WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANT

    The design stays practical. Timeli is about the size and weight of a smartphone, so it fits easily in a pocket, purse or backpack. Battery life supports long standby time, extended daily use and several hours of active protection. It even doubles as a power bank, while reserving enough charge to stay ready for emergencies.

    Availability: Priced at $249 for preorder through timeli.com. Timeli includes a year of professional monitoring before transitioning to a monthly subscription.

    Honorable mentions: CES 2026 products worth checking out 

    These products also stood out on the CES 2026 show floor, highlighting smart design choices and meaningful innovation that point to the future of consumer tech.

    ASUS Zenbook Duo (2026)

     ASUS reimagined portable productivity with the 2026 Zenbook Duo. This laptop snaps two 14-inch 3K ASUS Lumina OLED touchscreens together into a single mobile workstation you can carry with one hand.

    The dual-screen setup lets you keep a main project open on one display while chats, calls or reference material live on the other. That alone cuts down on constant app switching. The OLED panels deliver rich color, deep blacks, smooth motion and built-in eye care that makes long sessions easier on your eyes.

    ASUS also upgraded what you hear. A new six-speaker system replaces the previous two-speaker design, creating fuller, more immersive audio for movies, music, and calls. Everything is wrapped in a Ceraluminum ceramic finish that resists fingerprints and scratches while feeling premium in hand.

    Availability: Expected early 2026. Pricing has not been announced.

    SpotOn GPS Fence Nova Edition

    SpotOn focused on precision and reliability with the launch of the SpotOn GPS Fence Nova Edition. This is a GPS dog fence system designed to create virtual fences anywhere, from small yards to massive rural properties, with no subscription required.

    What sets Nova apart is its advanced antenna and receiver system. SpotOn uses a dual-band, dual-feed active antenna paired with a dual-band receiver that reduces GPS drift by up to 40% and delivers accuracy up to eight times better than competing systems. In third-party testing, it achieved 100% reliable containment.

    Owners can create unlimited fences by walking boundaries, drawing them in the app, or placing GPS fenceposts automatically. The collar also includes intelligent audio cues, optional static correction, custom voice commands, LED prompts and sizing that grows with your dog. If a dog ever leaves the fence, tracking tools are available through the app or SpotOn support.

    Availability: Available in the US and Canada for $999. 

    Lenovo Legion Go Powered by SteamOS

    Lenovo took handheld gaming seriously with the Legion Go powered by SteamOS. This is the most powerful Legion handheld to ship natively with SteamOS, blending desktop-class performance with console-like simplicity.

    It features an 8.8-inch PureSight OLED display and can be configured with up to an AMD Ryzen Z2 Extreme processor, up to 32GB of LPDDR5X memory, and up to 2TB of PCIe SSD storage with expansion via microSD. SteamOS is tuned for gamepad controls and quick access, with features like fast suspend and resume, cloud saves, Steam Chat and built-in game recording.

    The result feels less like a mini PC and more like a true console you can carry. You get instant access to your Steam library without juggling operating systems or launchers.

    Availability: On sale June 2026. Starting price is $1,199.

    SanDisk Optimus GX 7100M NVMe SSD

    SanDisk introduced a new internal drive brand at CES, and the Optimus GX 7100M is its first standout. Built for handheld gaming consoles and thin and light laptops, this PCIe 4.0 NVMe SSD delivers speeds up to 7,250 MB per second.

    The drive is available in capacities up to 2TB, giving gamers faster load times, more room for large libraries and smoother performance on the go. It is designed for devices that support an M.2 2230 slot, including popular handheld consoles and compact laptops.

    This launch also marks the debut of the SanDisk Optimus name, which will replace the company’s internal SSD lineup for gamers, creators and professionals moving forward.

    Availability: Expected early spring 2026. Pricing will be announced closer to release.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    CES 2026 made one thing clear. Tech companies are taking bigger swings than ever. Some of these products feel close to becoming part of everyday life. Others may stay experimental for years. That’s what makes CES so fascinating. It gives us an early look at where technology could be headed and sparks conversations about what we actually want in our homes, cars and daily routines.

    Which CES 2026 showstopper impressed you the most? Why? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Apple patches two zero-day flaws used in targeted attacks

    NEWYou can now listen to Fox News articles!

    Apple has released emergency security updates to fix two zero-day vulnerabilities that attackers actively exploited in highly targeted attacks. 

    The company described the activity as an “extremely sophisticated attack” aimed at specific individuals. Although Apple did not identify the attackers or victims, the limited scope strongly suggests spyware-style operations rather than widespread cybercrime.

    Both flaws affect WebKit, the browser engine behind Safari and all browsers on iOS. As a result, the risk is significant. In some cases, simply visiting a malicious webpage may be enough to trigger an attack.

    Below, we break down what these vulnerabilities mean and explain how you can better protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Apple released emergency updates after confirming two zero-day WebKit flaws were actively exploited in targeted attacks. (Reuters/Thomas Peter/File Photo)

    NEW IPHONE SCAM TRICKS OWNERS INTO GIVING PHONES AWAY

    What Apple says about the zero-day vulnerabilities

    The two vulnerabilities are tracked as CVE-2025-43529 and CVE-2025-14174, and Apple confirmed that both were exploited in the same real-world attacks. According to Apple’s security bulletin, the flaws were abused on versions of iOS released before iOS 26, and the attacks were limited to “specific targeted individuals.”

    CVE-2025-43529 is a WebKit use-after-free vulnerability that can lead to arbitrary code execution when a device processes maliciously crafted web content. To put it simply, it allows attackers to run their own code on a device by tricking the browser into mishandling memory. Apple credited Google’s Threat Analysis Group with discovering this flaw, which is often a strong indicator of nation-state or commercial spyware activity.

    The second flaw, CVE-2025-14174, is also a WebKit issue, this time involving memory corruption. While Apple describes the impact as memory corruption rather than direct code execution, these types of bugs are often chained together with other vulnerabilities to fully compromise a device. Apple says this issue was discovered jointly by Apple and Google’s Threat Analysis Group.

    In both cases, Apple acknowledged that it was aware of reports confirming active exploitation in the wild. That language is important because Apple typically reserves it for situations where attacks have already occurred, not just theoretical risks. The company says it addressed the bugs through improved memory management and better validation checks, without sharing deeper technical details that could help attackers replicate the exploits.

    Devices affected and signs of coordinated disclosure

    Apple has released patches across its supported operating systems, including the latest versions of iOS, iPadOS, macOS, Safari, watchOS, tvOS and visionOS.

    According to Apple’s advisory, affected devices include iPhone 11 and newer models, multiple generations of iPad Pro, iPad Air from the third generation onward, the eighth-generation iPad and newer and the iPad mini starting with the fifth generation. This covers the vast majority of iPhones and iPads still in active use today.

    Apple has patched the flaws across its entire ecosystem. Fixes are available in iOS 26.2 and iPadOS 26.2, iOS 18.7.3 and iPadOS 18.7.3, macOS Tahoe 26.2, tvOS 26.2, watchOS 26.2, visionOS 26.2 and Safari 26.2. Because Apple requires all iOS browsers to use WebKit under the hood, the same underlying issue also affected Chrome on iOS.

    6 steps you can take to protect yourself from such vulnerabilities

    Here are six practical steps you can take to stay safe, especially in light of highly targeted zero-day attacks like this.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    Safari and Chrome app

    Because WebKit powers Safari and all iOS browsers, even a malicious webpage may be enough to put unpatched devices at risk. (Jakub Porzycki/NurPhoto via Getty Images)

    1) Install updates as soon as they drop

    This sounds obvious, but it matters more than anything else. Zero-day attacks rely on people running outdated software. If Apple ships an emergency update, install it the same day if you can. Delaying updates is often the only window attackers need. If you tend to forget about updates, let your devices handle them for you. Enable automatic updates for iOS, iPadOS, macOS and Safari. That way, you are protected even if you miss the news or are traveling.

    2) Be careful with links, even from people you know

    Most WebKit exploits start with malicious web content. Avoid tapping on random links sent over SMS, WhatsApp, Telegram or email unless you are expecting them. If something feels off, open the site later by typing the address yourself.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    3) Use a lockdown-style browsing setup

    If you are a journalist, an activist or someone who deals with sensitive information, consider reducing your attack surface. Use Safari only, avoid unnecessary browser extensions, and limit how often you open links inside messaging apps.

    4) Turn on Lockdown Mode if you feel at risk

    Apple’s Lockdown Mode is designed specifically for targeted attacks. It restricts certain web technologies, blocks most message attachments, and limits attack vectors commonly used by spyware. It is not for everyone, but it exists for situations like this.

    5) Reduce your exposed personal data

    Targeted attacks often start with profiling. The more personal data about you that is floating around online, the easier it is to pick you as a target. Removing data from broker sites and tightening social media privacy settings can lower your visibility.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    An overhead view of an Apple store

    Apple urges users to install the latest updates, especially those who may face higher-risk, targeted threats. (Cheng Xin/Getty Images)

    6) Pay attention to unusual device behavior

    Unexpected crashes, overheating, sudden battery drain or Safari closing on its own can sometimes be warning signs. These do not automatically mean your device is compromised. However, if something feels consistently wrong, updating immediately and resetting the device is a smart move.

    Kurt’s key takeaway

    Apple has not shared details about who was targeted or how the attacks were delivered. However, the pattern fits closely with past spyware campaigns that focused on journalists, activists, political figures and others of interest to surveillance operators. With these patches, Apple has now fixed seven zero-day vulnerabilities that were exploited in the wild in 2025 alone. That includes flaws disclosed earlier this year and a backported fix in September for older devices.

    Have you installed the latest iOS or iPadOS update yet, or are you still putting it off? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Most parked domains now push scams and malware

    NEWYou can now listen to Fox News articles!

    Typing a web address directly into your browser feels harmless. In fact, it feels normal. But new research shows that a simple habit is now one of the riskiest things you can do online. A recent study from cybersecurity firm Infoblox reveals a troubling shift.

    Most parked domains now redirect visitors to scams, malware or fake security warnings. In many cases, this happens instantly. You do not have to click anything. That means a single typo can expose your device.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    What are parked domains? 

    Parked domains are unused or expired web addresses. Many exist because someone forgot to renew a domain. Others are deliberate misspellings of popular sites like Google, Netflix or YouTube. For years, these domains displayed harmless placeholder pages. They showed ads and links to monetize accidental traffic. While annoying, they rarely posed serious danger. That is no longer true. Infoblox found that more than 90 percent of visits to parked domains now lead to malicious content. This includes scareware, fake antivirus offers, phishing pages and malware downloads.

    A single mistyped web address can redirect you from a trusted site to a dangerous parked domain in seconds, Kurt Knutsson writes. (PeopleImages/Getty Images)

    Why direct navigation has become so risky

    Direct navigation means typing a website address by hand instead of using a bookmark or search result. One missing letter can change everything. For example, mistyping gmail.com as gmai.com does not trigger an error. Instead, it can deliver your email straight to criminals. Infoblox found that some of these typo domains actively run mail servers to capture messages. Even worse, many of these domains form part of massive portfolios. One group tracked by Infoblox controlled nearly 3,000 lookalike domains associated with banks, tech companies and government services.

    Hooded person looking at his computer monitors.

    Malicious parked domains often trigger fake security warnings or hidden redirects without requiring any clicks. (CyberGuy.com)

    How these domains decide whom to attack

    Not everyone sees the same thing when visiting a parked domain. That is intentional. Researchers discovered that parked pages often profile visitors in real time. They analyze IP address, device type, location, cookies and browsing behavior. Based on that data, the domain decides what you see next. Visitors using a VPN or non-residential connection often see harmless placeholder pages. Residential users on phones or home computers get redirected to scams or malware instead. This filtering helps attackers stay hidden while maximizing successful attacks.

    Why parked domain scams are increasing

    Several trends are fueling the problem. First, traffic from parked domains is often resold multiple times through affiliate networks. By the time it reaches a malicious advertiser, there is no direct relationship with the original parking company. Second, recent ad policy changes may have increased exposure. Google now requires advertisers to opt in before running ads on parked domains. While intended to improve safety, this shift may have pushed bad actors deeper into affiliate networks with weaker oversight. The result is a murky ecosystem where responsibility is difficult to trace.

    Even government domains are being targeted

    Infoblox also found typosquatting aimed at government services. In one case, a researcher accidentally visited ic3.org instead of ic3.gov while trying to report a crime. The result was a fake warning page claiming a cloud subscription had expired. That page could just as easily have delivered malware. This highlights how easy it is to fall into these traps, even when doing something important.

    Parked domans push scams, malware

    A screenshot shows how mistyping the FBI’s IC3 web address redirects users to an unrelated parked domain. (Infoblox)

    Ways to stay safe from parked domain traps

    You can reduce your risk with a few smart habits:

    1) Use bookmarks for important sites

    Save banks, email providers and government portals. Avoid typing these addresses manually.

    2) Double-check URLs before hitting Enter

    Slow down when entering web addresses. One extra second can prevent a costly mistake.

    3) Install strong antivirus software

    Strong antivirus software protects your device if a malicious page loads, blocking malware downloads, scripts and fake security pop-ups.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Consider a data removal service

    Data brokers often fuel targeting by selling personal details. Removing your data can reduce exposure to personalized scam redirects.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Be cautious of scare tactics

    Fake warnings about expired subscriptions or infected devices are a major red flag. Legitimate companies do not use panic screens.

    6) Keep your browser and device updated

    Security updates often close the exact loopholes attackers use to exploit malicious redirects.

    7) Consider a VPN for added protection

    While not a cure-all, VPNs can reduce exposure to targeted redirects tied to residential IP addresses.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways 

    The web has changed in subtle but dangerous ways. Parked domains are no longer passive placeholders. In many cases, they act as active delivery systems for scams and malware. The most alarming part is how little effort it takes to trigger an attack. A typo is enough. As threats grow quieter and more automated, safe browsing habits matter more than ever.

    Have you ever mistyped a web address and ended up somewhere suspicious, or do you rely entirely on bookmarks now? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • ChatGPT’s GPT-5.2 is here, and it feels rushed

    NEWYou can now listen to Fox News articles!

    OpenAI, the company behind ChatGPT, has moved at an unusually fast pace in 2025. According to the company, it launched GPT-5 in August, followed by GPT-5.1 in November. Now, just weeks later, GPT-5.2 has launched with familiar claims of being the smartest and most capable ChatGPT yet.

    At first glance, the rapid rollout might seem surprising. But there’s context behind it. OpenAI CEO Sam Altman has reportedly called a “code red” inside the company, urging teams to move faster on improving ChatGPT. That push comes as competition heats up. Google recently released Gemini 3, which reportedly outperformed ChatGPT on several artificial intelligence benchmarks and delivered stronger image generation. At the same time, Anthropic’s Claude continues to advance quickly.

    Against that backdrop, GPT-5.2 feels less like a routine upgrade and more like a strategic response. So what actually changed in GPT-5.2, and why does OpenAI say it matters?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    AMAZON ADDS CONTROVERSIAL AI FACIAL RECOGNITION TO RING

    OpenAI CEO Sam Altman looks on as he takes a lunch break, during the Federal Reserve’s Integrated Review of the Capital Framework for Large Banks Conference in Washington, D.C., July 22, 2025. (REUTERS/Ken Cedeno)

    What exactly is GPT-5.2

    GPT-5.2 is the newest version in OpenAI’s flagship 5-series of large language models. Like its predecessor, it includes two default variants. GPT-5.2 Instant is designed for everyday chatting and web searches. GPT-5.2 Thinking is meant for more complex tasks like long reasoning chains and multi-step problem solving. These two models are now the default for all ChatGPT users, including free users. They replace GPT-5.1 Instant and Thinking entirely. If you are using ChatGPT today, you are already using GPT-5.2, whether you realize it or not.

    What OpenAI says GPT-5 brings to ChatGPT

    At the same time, OpenAI continues to position GPT-5 as “expert intelligence for everyone.” The company says GPT-5 delivers stronger performance across math, science, finance, law and other complex subjects. In OpenAI’s view, ChatGPT now acts more like a team of on-demand experts than a basic chatbot. To support that claim, OpenAI points to practical examples. These include better coding help, more expressive writing support, clearer health-related explanations and improved safety and accuracy. The company showcases use cases such as generating app code, writing speeches, explaining medications and correcting mistakes in user-submitted images. In theory, GPT-5.2 builds on that same foundation. However, while OpenAI emphasizes deeper thinking and more reliable answers, those gains remain subtle for many everyday users.

    What new features does GPT-5.2 add?

    Here’s the short answer. None. GPT-5.2 does not introduce new tools, interfaces, or headline features. Instead, OpenAI describes a series of behind-the-scenes improvements that supposedly make ChatGPT faster, smarter and more capable. According to OpenAI, GPT-5.2 performs better at:

    • Building presentations
    • Completing complex projects
    • Creating spreadsheets
    • Understanding long context windows
    • Interpreting images
    • Using tools more effectively
    ChatGPT app

    Kurt Knutsson reviews the new features in ChatGPT-5.2. (Kurt “CyberGuy” Knutsson)

    OpenAI also released new benchmarks showing GPT-5.2 outperforming GPT-5.1 and competing models by small margins. However, big numbers on charts do not always translate into noticeable improvements for real users.

    NEW US MILITARY GENAI TOOL ‘CRITICAL FIRST STEP’ IN FUTURE OF WARFARE, SAYS EXPERT

    Why testing chatbot improvements is tricky

    Evaluating chatbot upgrades is harder than it sounds. Responses can vary widely even when prompts stay the same. A model might excel at one task and struggle with a nearly identical one just moments later. On top of that, OpenAI’s 5-series models already perform at or near the top of the field. When performance starts that high, meaningful gains become harder to detect. With that in mind, we tested GPT-5.2, and in most tests, it behaved almost identically to GPT-5.1.

    Why benchmarks don’t tell the full story

    OpenAI’s benchmarks show modest gains for GPT-5.2. That matters for researchers and developers working at scale. Still, even advanced users may struggle to see practical benefits. Other companies have delivered clearer upgrades. Google’s Gemini Nano Banana Pro model shows obvious gains in AI image generation and editing. Those improvements are easy for anyone to test and verify. By contrast, GPT-5.2’s changes feel abstract. They exist mostly on paper rather than in daily use.    

    What this means to you

    If you pay for ChatGPT, there’s little downside to using GPT-5.2. It replaces GPT-5.1 in the model lineup and generally performs at least as well in everyday use. Free users don’t have much choice either, as model access is handled automatically. For most people, the experience feels familiar and stable.

    The picture shifts slightly for programmers and those who use it for business. Early pricing details suggest GPT-5.2 may cost roughly 40 percent more per million tokens than GPT-5.1, depending on usage tier and access method. That makes testing important before committing at scale.

    Woman on smartphone in Italy

    ChatGPT-5.2 works fine but may not feel exciting, Kurt Knutsson writes. (Michael Nguyen/NurPhoto via Getty Images)

    In short, GPT-5.2 works fine. It simply may not feel exciting.

    KEVIN O’LEARY WARNS CHINA ‘KICKING OUR HEINIES’ IN AI RACE AS REGULATORY ROADBLOCKS STALL US

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    GPT-5.2 feels like a model released under pressure rather than inspiration. It performs well, stays reliable, and moves forward in measurable ways. Still, it doesn’t deliver the kind of clear progress many people expect from a new version number. OpenAI remains a leader in AI, but competition is closing in fast. As rivals roll out more noticeable improvements, small updates may no longer be enough to stand out. For now, GPT-5.2 feels less like a breakthrough and more like OpenAI holding its ground.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Should AI companies slow down releases until improvements feel more meaningful? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Android Sound Notifications help you catch key alerts

    NEWYou can now listen to Fox News articles!

    Staying aware of your surroundings matters. That includes hearing smoke alarms, appliance beeps or a knock at the door. Still, real life gets busy. You wear headphones. You get focused. Sounds slip by. That is where Android Sound Notifications help. This built-in accessibility feature listens for key sounds and sends an alert to your screen. Think of it as a gentle tap on the shoulder when something important happens.

    Although it was designed to help people who are hard of hearing, it is useful for anyone. If you work with noise-canceling headphones or often miss alerts at home, this feature can make a real difference.

    Now, if you use an iPhone, here’s how Apple’s Sound Recognition can alert you to alarms and other key sounds on your device. 

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Android Sound Notifications alert you when important sounds happen around you.  (Kurt “CyberGuy” Knutsson)

    CHROME ROLLS OUT AI PODCAST FEATURE ON ANDROID

    What Sound Notifications do on Android

    Sound Notifications use your phone’s microphone to listen for specific sounds nearby. When it detects one, it sends a visual alert. You will see a pop-up, feel a vibration and may even see the camera flash.

    By default, Android can detect sounds like:

    • Smoke alarms
    • Fire alarms
    • Sirens
    • Door knocks
    • Doorbells
    • Appliance beeps
    • A landline phone ringing
    • Running water
    • A baby crying
    • A dog barking

    That range makes the feature practical at home or at work. Even better, you control which sounds matter to you.

    Why this feature is worth using

    Here is the simple truth. You cannot hear everything all the time. Distractions happen. Headphones block sound. Focus takes over. Sound Notifications fill that gap. While you stay locked into a task, your phone keeps listening. When something important happens, you still get the message. As a result, you worry less about missing alarms or visitors. You gain awareness without extra effort.

    How to turn on Sound Notifications

    Getting started only takes a minute. Note: We tested these steps on a Samsung Galaxy S24 Ultra running the latest version of Android. Menu names and locations may differ slightly on other Android phones, depending on the manufacturer and software version.

    • Open the Settings app
    • Go to Accessibility
    • Tap Hearing enhancements
    • Select Sound Notifications
    • Turn the feature on
    Screens side-by-side displaying how to turn on Sound Notifications

    Turning on Sound Notifications only takes a few taps in Android’s Accessibility settings. (Kurt “CyberGuy” Knutsson)

    When you enable Sound Notifications for the first time, Android will ask how you want to start the feature. Choose the option that works best for you:

    • Tap the button in the quick settings panel
    • Tap the Accessibility button
    • Press the Side and Volume Up buttons
    • Press and hold the Volume Up and Volume Down buttons for three seconds

    After you select a shortcut, Click Ok.  Then, Sound Notifications will start listening in the background.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    If you do not see the option, install the Live Transcribe & Notifications app from the Play Store. You can enable Sound Notifications from there. Once active, your phone listens for selected sounds and alerts you when it detects one. 

    Choose which sounds trigger alerts

    Not every sound deserves your attention. Thankfully, Android lets you fine-tune alerts.

    Settings may vary depending on your Android phone’s manufacturer

    • Go back to Settings
    • Tap Accessibility
    • Click Hearing enhancements
    • Tap Sound Notifications
    • Click Open Sound Notifications. This opens the actual Sound Notifications control screen.
    • On the Sound Notifications screen, tap Settings or the gear icon in the top corner
    • Tap Sound types

    You will now see the full list of detectable sounds.

    • Toggle on the sounds you want alerts for, such as smoke alarms or doorbells
    • Toggle off sounds you do not want, like dog barking or appliance beeps, if they are not important to you
    Screens side-by-side displaying how to turn on Sound Notifications

    You can choose exactly which sounds trigger alerts, helping you avoid unnecessary interruptions. (Kurt “CyberGuy” Knutsson)

    Check the sound history log

    Sound Notifications keep a log of detected sounds. This helps if you were away from your phone and want to see what happened.

    You can also save sounds and name them. That makes it easier to tell the difference between your washer finishing and your microwave timer.

    The log adds context, which makes alerts more helpful.

    GOOGLE’S NEW CALL REASON FEATURE MARKS CALLS AS URGENT

    Teach your phone custom sounds

    Android does not stop at presets. You can train it to recognize sounds unique to your space.

    Maybe your garage door has a distinct tone. Maybe an appliance uses a nonstandard beep. You can record it once, and your phone will listen for it going forward. To add a custom sound:

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Tap the gear icon
    • Select Custom sounds
    • Tap Add sound
    • Hit Record

    Record a clear 20-second clip. The better the audio, the better detection works later.

    Customize how alerts appear

    By default, Sound Notifications use vibration and the camera flash. That visual cue is helpful for urgent alerts. However, not every sound needs that level of attention. You can adjust how alerts appear based on importance.

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Open the gear icon
    • Tap Ways to be notified
    • From there, choose which alerts vibrate, flash or stay subtle

    This flexibility keeps the feature working for your routine.

    Your privacy stays on your phone

    It is reasonable to question constant listening. Here is the key detail. Sound Notifications process audio locally on your device. Sounds never leave your phone. Nothing gets sent to Google. The only exception is if you choose to include audio with feedback. That design keeps the feature private and secure.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Android Sound Notifications quietly solve a real problem. They help you stay aware when your ears cannot. Setup is fast. Controls are flexible. Privacy stays intact. Once you turn it on, you may wonder how you lived without it.

    What important sound have you missed lately that your phone could have caught for you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • OpenAI announces upgrades for ChatGPT Images with ‘4x faster generation speed’

    NEWYou can now listen to Fox News articles!

    OpenAI announced an update for ChatGPT Images that it says drastically improves both the generation speed and instruction-following capability of its image generator.

    A blog post from the company Tuesday says the update will make it much easier to make precise edits to AI-generated images. Previous iterations of the program have struggled to follow instructions and often make unasked-for changes.

    “The update includes much stronger instruction following, highly precise editing, and up to 4x faster generation speed, making image creation and iteration much more usable,” the company wrote.

    “This marks a shift from novelty image generation to practical, high-fidelity visual creation — turning ChatGPT into a fast, flexible creative studio for everyday edits, expressive transformations, and real-world use.”

    CHINESE HACKERS WEAPONIZE ANTHROPIC’S AI IN FIRST AUTONOMOUS CYBERATTACK TARGETING GLOBAL ORGANIZATIONS

    The OpenAI GPT-5 logo appears on a smartphone screen and as a background on a laptop screen in this photo illustration in Athens, Greece. (Nikolas Kokovlis/NurPhoto via Getty Images)

    The announcement comes just weeks after OpenAI CEO Sam Altman declared a “code red” in a memo within his company to improve the quality of ChatGPT.

    In the document, Altman said OpenAI has more work to do on enhancing the day-to-day experience of its chatbot, such as allowing it to answer a wider range of questions and improving its speed, reliability and personalization features for users, according to The Wall Street Journal.

    The reported company-wide memo from Altman comes as competitors have narrowed OpenAI’s lead in the AI race. Google last month released a new version of its Gemini model that surpassed OpenAI on industry benchmark tests.

    GOOGLE CEO CALLS FOR NATIONAL AI REGULATION TO COMPETE WITH CHINA MORE EFFECTIVELY

    Illustration shows OpenAI logo

    The OpenAI logo Feb. 16, 2025 (Reuters/Dado Ruvic)

    To focus on the “code red” effort to improve ChatGPT, OpenAI will be pushing back work on other initiatives, such as a personal assistant called Pulse, advertising and AI agents for health and shopping, Altman said in the memo, according to the Journal.

    Altman also said the company would have a daily call among those responsible for enhancing ChatGPT, the newspaper added. 

    “Our focus now is to keep making ChatGPT more capable, continue growing, and expand access around the world — while making it feel even more intuitive and personal,” Nick Turley, the head of ChatGPT, wrote on X Monday night.

    OpenAI CEO Sam Altman speaks in July

    OpenAI CEO Sam Altman speaks during the Federal Reserve’s Integrated Review of the Capital Framework for Large Banks Conference in Washington, D.C., July 22, 2025.  (Reuters/Ken Cedeno)

    CLICK HERE TO READ MORE ON FOX BUSINESS        

    OpenAI currently isn’t profitable and has to raise funding to survive compared to competitors like Google, which can fund investments in their AI ventures through revenue, the Journal reported.

    Source link

  • 3D printed cornea restores sight in world first

    NEWYou can now listen to Fox News articles!

    Surgeons at Rambam Eye Institute have made medical history.

    They restored sight to a legally blind patient using a fully 3D printed corneal implant grown entirely from cultured human corneal cells. This marked the first time a corneal implant that did not rely on donor tissue had ever been transplanted into a human eye.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.  

    A breakthrough that turns one donor cornea into hundreds

    The cornea came from a healthy deceased donor and was then multiplied in the lab. Researchers used the cultured cells to print about 300 transparent implants with Precise Bio’s regenerative platform. 

    Their system builds a layered structure that looks and behaves like a natural cornea. It is designed to provide clarity, strength and long-term function.

    HOW A TINY RETINAL IMPLANT IS HELPING PEOPLE REGAIN THEIR SIGHT

    Since donor shortages prevent millions from receiving sight-saving care each year, this approach could transform access. Many patients in developed countries wait only a few days for a transplant, while others wait years due to low tissue availability. A single donor cornea that can create hundreds of implants changes that equation. 

    The surgery used a fully 3D printed corneal implant grown from cultured human cells and restored sight to a legally blind patient. (Rambam Eye Institute)

    The surgery that proved it works

    Professor Michael Mimouni, director of the Cornea Unit in the Department of Ophthalmology at Rambam Eye Institute, led the surgical team. He described the moment as unforgettable because the lab-grown implant restored sight to a real patient for the first time.

    He says, “What this platform shows and proves is that in the lab, you can expand human cells. Then print them on any layer you need, and that tissue will be sustainable and work. We can hopefully reduce waiting times for all kinds of patients waiting for all kinds of transplants.”

    The procedure is part of an ongoing Phase 1 clinical trial that assesses safety and tolerability in people with corneal endothelial disease. This achievement reflects years of work across research labs, operating rooms and industry. It also shows how coordinated teams can push new treatments from concept to clinical reality.

    How the science fits into a bigger future

    The breakthrough will have a permanent home in Rambam’s upcoming Helmsley Health Discovery Tower. The new Eye Institute will consolidate care, training and research under one roof. It aims to speed the move from emerging science to real-world treatment for patients across Northern Israel and beyond.

    Precise Bio says its 3D printing system could eventually support other tissues like cardiac muscle, liver and kidney cells. That future will require long trials and extensive validation, but the path now looks more achievable.

    POPULAR WEIGHT-LOSS DRUGS LINKED TO SUDDEN VISION LOSS, RESEARCH SUGGESTS

    Surgeon in blue scrubs speaks inside a brightly lit operating room with medical equipment behind him.

    Professor Michael Mimouni led the surgical team at Rambam Eye Institute’s Cornea Unit. (Rambam Eye Institute)

    What this means for you

    If corneal disease affects someone in your family, this work brings new hope. Donor tissue may continue to play a role in many regions, but lab-grown implants offer a way to expand access where shortages hold patients back. The success of this first transplant also suggests a future where regenerative medicine supports many types of tissue repair.

    This milestone also shows how long scientific breakthroughs take to reach real patients. The first 3D printed cornea design appeared in 2018 and only now reached human use. Even so, the progress feels fast when the result is restored sight.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    EYE DROPS MAY REPLACE READING GLASSES FOR THOSE STRUGGLING WITH AGE-RELATED VISION LOSS

    Kurt’s key takeaways

    This successful transplant marks a turning point for eye care. It suggests a world where the limits of donor supply do not decide who receives sight-saving surgery. As more trial results arrive, we will see how far this technology can scale and which patients stand to benefit first.

    If regenerative implants become common, what medical challenge should researchers focus on next? Let us know by writing to us at Cyberguy.com

    Woman peers over her reading glasses to look into book she holds in her hands

    The breakthrough shows how one donor cornea can generate hundreds of lab-grown implants, offering new hope for people who face long waits for sight-saving treatment. (iStock)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Chinese hackers turned AI tools into an automated attack machine

    NEWYou can now listen to Fox News articles!

    Cybersecurity has been reshaped by the rapid rise of advanced artificial intelligence tools, and recent incidents show just how quickly the threat landscape is shifting.

    Over the past year, we’ve seen a surge in attacks powered by AI models that can write code, scan networks and automate complex tasks. This capability has helped defenders, but it has also enabled attackers who are moving faster than before.

    The latest example is a major cyberespionage campaign conducted by a Chinese state-linked group that used Anthropic’s Claude to carry out large parts of an attack with very little human involvement.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    How Chinese hackers turned Claude into an automated attack machine

    In mid-September 2025, Anthropic investigators spotted unusual behavior that eventually revealed a coordinated and well-resourced campaign. The threat actor, assessed with high confidence as a Chinese state-sponsored group, had used Claude Code to target roughly thirty organizations worldwide. The list included major tech firms, financial institutions, chemical manufacturers and government bodies. A small number of those attempts resulted in successful breaches.

    HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE

    Claude handled most of the operation autonomously, triggering thousands of requests and generating detailed documentation of the attack for future use. (Kurt “CyberGuy” Knutsson)

    How the attackers bypassed Claude’s safeguards

    This was not a typical intrusion. The attackers built a framework that let Claude act as an autonomous operator. Instead of asking the model to help, they tasked it with executing most of the attack. Claude inspected systems, mapped out internal infrastructure and flagged databases worth targeting. The speed was unlike anything a human team could replicate.

    To get around Claude’s safety rules, the attackers broke their plan into tiny, innocent-looking steps. They also told the model it was part of a legitimate cybersecurity team performing defensive testing. Anthropic later noted that the attackers didn’t simply hand tasks to Claude; they engineered the operation to make the model believe it was performing authorized pentesting work, splitting the attack into harmless-looking pieces and using multiple jailbreak techniques to push past its safeguards. Once inside, Claude researched vulnerabilities, wrote custom exploits, harvested credentials and expanded access. It worked through these steps with little supervision and reported back only when it needed human approval for major decisions.

    The model also handled the data extraction. It collected sensitive information, sorted it by value and identified high-privilege accounts. It even created backdoors for future use. In the final stage, Claude generated detailed documentation of what it had done. This included stolen credentials, systems analyzed and notes that could guide future operations.

    Across the entire campaign, investigators estimate that Claude performed around eighty to ninety percent of the work. Human operators stepped in only a handful of times. At its peak, the AI triggered thousands of requests, often multiple per second, a pace still far beyond what any human team could achieve. Although it occasionally hallucinated credentials or misread public data as secret, those errors underscored that fully autonomous cyberattacks still face limitations, even when an AI model handles the majority of the work.

    Why this AI-powered Claude attack is a turning point for cybersecurity

    This campaign shows how much the barrier to high-end cyberattacks has dropped. A group with far fewer resources could now attempt something similar by leaning on an autonomous AI agent to do the heavy lifting. Tasks that once required years of expertise can now be automated by a model that understands context, writes code and uses external tools without direct oversight.

    Earlier incidents documented AI misuse, but humans were still steering every step. This case is different. The attackers needed very little involvement once the system was in motion. And while the investigation focused on usage within Claude, researchers believe similar activity is happening across other advanced models, which might include Google Gemini, OpenAI’s ChatGPT or Musk’s Grok.

    This raises a difficult question. If these systems can be misused so easily, why continue building them? According to researchers, the same capabilities that make AI dangerous are also what make it essential for defense. During this incident, Anthropic’s own team used Claude to analyze the flood of logs, signals and data their investigation uncovered. That level of support will matter even more as threats grow.

    We reached out to Anthropic for comment, but did not hear back before our deadline.

    Chinese hackers target US telecoms: What you need to know to protect your data

    Hackers used Claude to map networks, scan systems, and identify high-value databases in a fraction of the time human attackers would need. (Kurt “CyberGuy” Knutsson)

    FORMER GOOGLE CEO WARNS AI SYSTEMS CAN BE HACKED TO BECOME EXTREMELY DANGEROUS WEAPONS

    You may not be the direct target of a state-sponsored campaign, but many of the same techniques trickle down to everyday scams, credential theft and account takeovers. Here are seven detailed steps you can take to stay safer.

    1) Use strong antivirus software and keep it updated

    Strong antivirus software does more than scan for known malware. It looks for suspicious patterns, blocked connections and abnormal system behavior. This is important because AI-driven attacks can generate new code quickly, which means traditional signature-based detection is no longer enough.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    2) Rely on a password manager

    A good password manager helps you create long, random passwords for every service you use. This matters because AI can generate and test password variations at high speed. Using the same password across accounts can turn a single leak into a full compromise.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    3) Consider using a personal data removal service

    A large part of modern cyberattacks begins with publicly available information. Attackers often gather email addresses, phone numbers, old passwords and personal details from data broker sites. AI tools make this even easier, since they can scrape and analyze huge datasets in seconds. A personal data removal service helps clear your information from these broker sites so you are harder to profile or target.

    FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWING

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Turn on two-factor authentication wherever possible

    Strong passwords alone are not enough when attackers can steal credentials through malware, phishing pages or automated scripts. Two-factor authentication adds a serious roadblock. Use app-based codes or hardware keys instead of SMS. While no method is perfect, this extra layer often stops unauthorized logins even when attackers have your password.

    5) Keep your devices and apps fully updated

    Attackers rely heavily on known vulnerabilities that people forget or ignore. System updates patch these flaws and close off entry points that attackers use to break in. Enable automatic updates on your phone, laptop, router and the apps you use most. If an update looks optional, treat it as important anyway, because many companies downplay security fixes in their release notes.

    6) Install apps only from trusted sources

    Malicious apps are one of the easiest ways attackers get inside your device. Stick to official app stores and avoid APK sites, shady download portals and random links shared on messaging apps. Even on official stores, check reviews, download counts and the developer name before installing anything. Grant the minimum permissions required and avoid apps that ask for full access for no clear reason.

    7) Ignore suspicious texts, emails, and pop-ups

    AI tools have made phishing more convincing. Attackers can generate clean messages, imitate writing styles, and craft perfect fake websites that match the real ones. Slow down when a message feels urgent or unexpected. Never click links from unknown senders, and verify requests from known contacts through a separate channel. If a pop-up claims your device is infected or your bank account is locked, close it and check directly through the official website.

    woman using phone

    By breaking tasks into small, harmless-looking steps, the threat actors tricked Claude into writing exploits, harvesting credentials, and expanding access.  (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaway

    The attack carried out through Claude signals a major shift in how cyber threats will evolve. Autonomous AI agents can already perform complex tasks at speeds no human team can match, and this gap will only widen as models improve. Security teams now need to treat AI as a core part of their defensive toolkit, not a future add-on. Better threat detection, stronger safeguards and more sharing across the industry are going to be crucial. Because if attackers are already using AI at this scale, the window to prepare is shrinking fast.

    Should governments push for stricter regulations on advanced AI tools? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • VA issues overpayment scam alert for veterans

    NEWYou can now listen to Fox News articles!

    As the nation honors veterans for their service, the Department of Veterans Affairs is reminding the community to stay alert to a growing threat, the VA overpayment scam.

    Reports show that fraudsters are contacting veterans through text, email and phone calls, pretending to be VA employees. They claim you were overpaid on your benefits and must send money or banking details to correct the issue.

    These criminals often make their messages look official with VA logos, formal wording and even fake caller IDs. Once they gain your trust, they push for quick payment, hoping you act before verifying. Staying informed and cautious is the best way to protect your benefits and your identity.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    Scammers are claiming veterans were overpaid on their benefits by impersonating VA employees. (Kurt “CyberGuy” Knutsson)

    How to spot a VA overpayment scam

    Be on alert for these red flags:

    • Messages demanding urgent payment, especially by gift card, wire transfer or cryptocurrency.
    • Requests for your VA login or password.
    • Emails or texts with links that don’t lead to VA.gov.
    • Caller ID spoofing showing “VA” or “Debt Center” to look official.
    • Messages or letters that lack detailed explanations or account numbers.

    If you spot any of these, don’t engage; instead, verify the communication directly through VA.gov or by calling the VA’s official number.

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

    Real VA communications always direct veterans to VA.gov or the official Debt Management Center.

    Legitimate VA communications always direct veterans to VA.gov or the official Debt Management Center.  (Kurt “CyberGuy” Knutsson)

     How real VA overpayments work

    When the VA determines an actual overpayment, it sends a formal letter explaining the amount and your options to appeal or set up a payment plan. You’ll never be told to pay through text or third-party apps, and you’ll never be asked to share login credentials or banking info outside VA.gov.

    Real VA notices always direct you to official channels like VA.gov or the Debt Management Center (1-800-827-0648). If something feels off, it probably is, so always verify before taking action.

    Staying alert and verifying messages through official channels helps protect your hard-earned VA benefits.

    To protect your hard-earned VA benefits stay alert and verify messages through official channels.  (Kurt “CyberGuy” Knutsson)

    Top ways to protect yourself from VA overpayment scams

    Stay ahead of scammers by following these simple but powerful steps to protect your VA benefits.

    1) Verify through your official VA.gov account

    Whenever you receive a notice about an overpayment, log in to your VA.gov account directly instead of clicking any link or responding to a message. The site shows your current balance, payment status and any real debts.

    2) Use official VA payment channels

    If you discover a legitimate debt, handle it only through VA’s official payment options. Call the Debt Management Center at 1-800-827-0648 or make payments through your secure VA.gov dashboard. Avoid sending funds through apps, wire transfers, or prepaid cards as the VA will never ask for those.

    3) Never share your login information

    Your VA login and password are like your house keys. The VA will never ask for them, not by phone, email, or text. Anyone who requests them is a scammer. If you think your credentials were compromised, change your password immediately and enable multi-factor authentication (MFA) if available.

    Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    4) Avoid suspicious links and attachments

    Fraudsters often embed fake links in messages that look real at first glance. Hover over a link before clicking to preview the URL; if it doesn’t start with “https://www.va.gov,” it’s fake. Be equally cautious with attachments, as they can install malware designed to steal your personal data.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    5) Use a data removal service

    Data brokers often publish your name, phone number and even veteran status online, information scammers use to target you. Personal data removal services can automatically request data removals from hundreds of broker sites, reducing your exposure and lowering the odds of being targeted.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    6) Watch out for unusual payment methods

    Scammers love untraceable transactions. Any request for payment through gift cards, Bitcoin, prepaid debit cards, or wire transfers is an instant red flag. The VA does not and will not use these methods to collect payments.

    7) Limit your social media exposure

    Scammers sometimes gather information from social networks to make messages seem more personal. Review your friends and followers, tighten privacy settings and think twice before posting details about your military service or VA benefits.

    8) Report suspected fraud immediately

    If you think someone tried to scam you, contact the VA directly at 1-800-827-1000. You can also report incidents at VSAFE.gov or call (833) 38V-SAFE (833-388-7233). Reporting quickly helps protect others in the veteran community.

    Kurt’s key takeaways

    This Veterans Day is a time to reflect on service, sacrifice and strength, and that includes protecting what you have earned. Scammers may be persistent, but staying alert and using official VA resources gives you the upper hand. Your benefits represent more than money; they are recognition of your service. Keep them safe, stay skeptical of sudden messages and verify everything before you act.

    How can technology companies and the government do a better job of protecting veterans online? Let us know your thoughts in the comments below. Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Travelling soon? Know how to navigate flight cancellations now

    NEWYou can now listen to Fox News articles!

    Flying soon? Listen up. 

    GOP LAWMAKER WARNS OF POSSIBLE FOOD, MEDICINE SHORTAGES AS FLIGHTS GROUNDED

    At 40 of the country’s busiest airports, flights coming and going will be reduced by 10% this week. 

    Travelers go through TSA airport security at Seattle-Tacoma International Airport, Thursday, Nov. 6, 2025, in SeaTac, Wash. (Lindsey Wasson/AP Photo)

    That means thousands of flights canceled, or in other words, 200,000 fewer seats and butts in the air per day. Blame it on a record‑long government shutdown.

    FLIGHT CHAOS GRIPS US AIRPORTS AS SOME AIRLINES ADVISE BOOKING ‘BACKUP TICKET’: SEE THE LIST

    Major hubs will be the hardest hit: Hartsfield‑Jackson Atlanta, Los Angeles, New York‑JFK, Chicago O’Hare and many more. Together, those 40 airports cover roughly 70% of U.S. flights, so yes, even if you’re in Hicksville, you feel it.

    Your “flightmare” survival plan

    A man waits with his luggage

    A traveler waits with his luggage at Newark Liberty International Airport in Newark, N.J., on Nov. 7, 2025. Hundreds of flights were canceled across the United States on Friday after the Trump administration ordered reductions to ease strain on air traffic controllers who are working without pay amid congressional paralysis on funding the US budget. Forty airports were due to slow down, including the giant hubs in Atlanta, Newark, Denver, Chicago, Houston and Los Angeles.  (Timothy A. Clary/AFP via Getty Images)

    Your “flightmare” survival plan

    If you plan on flying anywhere, here’s what you do.

    • Book the first flight of the day. Yea, it’s a bummer, but flights departing before 9 a.m. are about twice as likely to fly as those later in the day.
    • Download your airline’s app now. This is your fastest route to real‑time rebooks and alerts.
    • Use the MyTSA app. Get live security wait times, so you’re not stuck in a five‑hour shuffle line that’s already happening.
    • Check your seat map. Oddly empty flight = higher risk of cancellation. Full flight = safer bet.
    • Know your rights. If your flight is canceled or significantly delayed due to the cuts, you’re legally entitled to a cash refund, not just some future credit.
    • Have a Plan B. Rental car one‑way pickups are up 20% this week. Trains or even a longer drive might save your holiday.

    SHUTDOWN’S IMPACT AT AIRPORTS WILL WORSEN, SAYS TSA — TRAVELERS SHOULD ‘GO EARLY’ AND ‘BE PATIENT’

    Gas prices are down (average around $3.08), so a road trip could really make sense.

    Don’t wait. Don’t assume. Keep checking, stay flexible and treat your travel like you’d treat a storm warning: Get ahead of it, not behind it.

    Travellers head down an escalator after clearing through a security checkpoint in Denver International Airport Friday, Nov. 7, 2025, in Denver, during the government shutdown.

    Travelers head down an escalator after clearing through a security checkpoint in Denver International Airport Friday, Nov. 7, 2025, in Denver. (David Zalubowski/AP Photo)

    Pass this on: Know someone flying soon? Don’t leave them grounded. Forward this post before they end up sleeping in an airport chair with their neck at a 90-degree angle. Sharing this could save a trip, a holiday or at least someone’s sanity. And hey, we’ve all got that one friend who needs the reminder to download the airline app before they get to the gate.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio: Airing on 500+ stations across the US — Find yours or get the free podcast.
    • Daily newsletter: Join 650,000 people who read the Current (free!)
    • Watch: On Kim’s YouTube channel

    Source link

  • Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection

    NEWYou can now listen to Fox News articles!

    We spend so much time online that how we connect to the internet has become almost as important as the devices we use. Most people never give it a second thought. They connect their computer to Wi-Fi, type in a password and get on with their day. But if you have ever wondered whether plugging in an Ethernet cable is safer than sticking to wireless, you are asking the right question. The way you connect can have real consequences for your privacy and security. Recently, Kathleen reached out to me with the same doubt.

    “Is it more secure to use the Ethernet connection at home for my computer, or is it safer to use the Wi-Fi from my cable provider?”

    It’s a great question, Kathleen, because both options seem similar on the surface but work very differently under the hood. Those differences can mean the difference between a private, secure connection and one that’s more vulnerable to attackers.

    BEWARE OF FAKE WI-FI NETWORKS THAT STEAL YOUR DATA WHEN TRAVELING

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Ethernet offers direct, wired security without wireless risks. (Kurt “CyberGuy” Knutsson)

    How Ethernet and Wi-Fi differ when it comes to security

    Ethernet and Wi-Fi both get you online, but they do it in completely different ways. Ethernet uses a physical cable that connects your computer directly to the router. Since it is a wired connection, data travels straight through that cable, making it much harder for anyone to intercept it. There is no wireless signal to hijack, no airwaves to eavesdrop on.

    Wi-Fi, on the other hand, is built on convenience. It sends your data through the air to and from your router, which is what makes it so easy to connect from anywhere in your home. But that convenience comes with more risk. Anyone within range of your signal could potentially try to break into the network. If your Wi-Fi is protected by a weak password or uses outdated encryption, a skilled attacker might gain access without ever stepping inside your house. 

    At home, that risk is smaller than in a coffee shop or hotel, but it is not zero. Even a poorly secured smart device on your network can give attackers a way in. Ethernet removes many of those risks simply because it is harder to access a connection that requires physical access to a cable. Check out our steps for setting up a home network like a pro here.

    DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKS

    Why one connection might be safer than the other

    It is easy to think Ethernet is automatically safer, but that is not the whole story. Your real security depends on how your entire network is set up. For example, a Wi-Fi network with a strong password, up-to-date router firmware, and WPA3 encryption is going to be far more secure than a poorly configured Ethernet setup connected to an outdated router.

    There is also the question of who else uses your network. If it is just you and a handful of devices, your risk is low. But if you live in a shared space or run smart home gadgets, that changes the equation. Each device connected to Wi-Fi is a potential entry point. Ethernet reduces the number of devices that can connect, which limits the attack surface.

    Ultimately, the connection type is one piece of the puzzle. The bigger factors are how your router is configured, how often you update your software, and how careful you are with what devices you connect.

    Wireless router with four antennas glowing in blue and pink light.

    Wi-Fi brings convenience but also potential exposure to hackers.  (Kurt “CyberGuy” Knutsson)

    6 ways to make your internet safer

    Whether you stick with Wi-Fi or switch to Ethernet, there are several practical steps you can take to protect your devices and data. Each step adds an extra layer of security to your network.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    1) Use a strong network password

    Choose a long and unique password for your Wi-Fi. Avoid obvious choices like your name, address, or simple sequences. A strong password makes it far harder for attackers to guess or crack your network. A password manager helps you create and store strong, unique passwords for every account, reducing the chances of a hacker gaining access through weak or repeated credentials.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2) Enable the latest encryption on your router

    Most modern routers support WPA3, which is much more secure than older standards like WPA2. Check your router’s settings to enable the latest encryption and ensure your network traffic is harder to intercept.

    3) Keep your router firmware updated

    Router manufacturers regularly release updates that patch security vulnerabilities. Log into your router’s admin panel occasionally to check for updates and install them as soon as they are available. This prevents attackers from exploiting known flaws. 

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    4) Review connected devices

    Regularly check which devices are connected to your network and disconnect anything you no longer use. Each connected device is a potential entry point for attackers, so keeping the list limited reduces your network’s exposure.

    5) Install strong antivirus software

    Even on a secure network, malware can sneak in through downloads, phishing attacks, or compromised websites. A strong antivirus program will detect and block malicious activity, protecting your computer before damage occurs.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    Close-up of a Wi-Fi router showing Ethernet ports and connected network cables.

    Ethernet cables connect to a router as part of a home network setup. (Kurt “CyberGuy” Knutsson)

    6) Use a VPN for sensitive tasks

    A virtual private network encrypts your internet traffic, making it unreadable to outsiders. This is especially useful if you ever use Wi-Fi in public or need an extra layer of privacy at home. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    Kurt’s key takeaway

    So, which is safer, Ethernet or Wi-Fi? Ethernet wins in raw security because it eliminates many of the risks that come with wireless connections. But in a well-secured home network, the difference is often smaller than most people think. What matters more is how you manage your devices, passwords, software, and online habits.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you trade the flexibility of wireless for the peace of mind of a wired connection? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Google rolls out ‘preferred sources’ feature, allowing users to choose outlets that appear within Top Stories

    NEWYou can now listen to Fox News articles!

    Google users can now customize their search results to display favorite sources such as Fox News, using the company’s new “preferred sources” feature. 

    Google officially launched the feature on Aug. 12, creating a way to tailor the Top Stories section to include outlets handpicked by the user. 

    “When you select your preferred sources, you’ll start to see more of their articles prominently displayed within Top Stories, when those sources have published fresh and relevant content for your search,” read a statement from Google. 

    Google’s new “preferred sources” feature allows users to customize their search results by choosing their favorite publishers to appear within the Top Stories section.  (AP Photo/Don Ryan, File)

    GOOGLE TURNS CO2 INTO BATTERY POWER FOR CLEAN ENERGY

    Content from your handpicked sources may also appear in a dedicated “from your sources” section, Google says. 

    Adding Fox News as a “preferred source” can be done in just a few clicks using this shortcut. 

    woman using laptop

    You can make Fox News a preferred source on Google to stay up-to-date on coverage.  (iStock)

    HOW GOOGLE’S ‘ASK PHOTOS’ USES AI TO FIND THE PICTURES YOU WANT

    Alternatively, you can follow these steps. 

    1. Search for any topic in the news on Google.
    2. Click on the icon presented to the right of Top Stories.
    3. Search for Fox News when prompted.
    4. Select Fox News.
    5. Refresh results to see Fox News content in Top Stories.

    This new Google feature allows users to select as many sites as they want as a preferred source. You can also change sites you’ve selected at any time. 

    Google logos

    Users can select one or more “preferred sources” to appear on the Google search results page. Once “preferred sources” are selected, if there is recent and relevant coverage from those sources related to your search, they will appear more frequently within Top Stories.  (Photo Illustration by Soumyabrata Roy/NurPhoto via Getty Images)

    CLICK HERE TO GET THE FOX NEWS APP

    Make sure you stay up-to-date on Fox News coverage by adding it as a preferred source.

    Source link