Technology News Articles on Fox News

AI wearable helps stroke survivors speak again

Losing the ability to speak clearly after a stroke can feel devastating. For many survivors, the words are still there in their minds, but their bodies will not cooperate. Speech becomes slow, unclear or fragmented. This condition, known as dysarthria, affects nearly half of all stroke survivors and can make everyday communication exhausting. Now, researchers believe they may have found a better way forward. Scientists at the University of Cambridge have developed a wearable device called Revoice. It is designed to help people with post-stroke speech impairment communicate naturally again without surgery or brain implants. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. FULLY IMPLANTABLE BRAIN CHIP AIMS TO RESTORE REAL SPEECH Dysarthria is a physical speech disorder. A stroke can weaken the muscles in the face, mouth and vocal cords. As a result, speech may sound slurred, slow or incomplete. Many people can only say a few words at a time, even though they know exactly what they want to say. According to professor Luigi Occhipinti, that disconnect creates deep frustration. Stroke survivors often work with speech therapists using repetitive drills. These exercises help over time, but open-ended conversation remains difficult. Recovery can take months or even longer, which leaves patients struggling during daily interactions with family, caregivers and doctors.Revoice takes a very different approach. Instead of asking users to type, track their eyes or rely on implants, the device reads subtle physical signals from the throat and neck. It looks like a soft, flexible choker made from breathable, washable fabric. Inside are ultra-sensitive textile strain sensors and a small wireless circuit board. When a user silently mouths words, the sensors detect tiny vibrations in the throat muscles. At the same time, the device measures pulse signals in the neck to estimate emotional state.Those signals are processed by two artificial intelligence (AI) agents: Together, they allow Revoice to turn a few mouthed words into fluent speech in real time. ELON MUSK SHARES PLAN TO MASS-PRODUCE BRAIN IMPLANTS FOR PARALYSIS, NEUROLOGICAL DISEASE Earlier silent speech systems had serious limits. Many were tested only on healthy volunteers. Others forced users to pause for several seconds between words, which made the conversation feel unnatural. Revoice avoids those delays. It uses an AI-driven throat sensor system paired with a lightweight language model. Because the model runs efficiently, it uses very little power and delivers near-instant responses. The device is powered by a 1,800 mWh battery, which researchers expect will last a full day on a single charge.After refining the system with healthy participants, researchers tested Revoice with five stroke patients who had dysarthria.The results were striking:In one example, a patient mouthed the phrase "We go hospital." Revoice expanded it into a complete sentence that reflected urgency and frustration, based on emotional signals and context. Participants reported a 55% increase in satisfaction and said the device helped them communicate as fluently as they did before their stroke. PARALYZED MAN WALKS AGAIN AFTER EXPERIMENTAL DRUG TRIAL TRIGGERS REMARKABLE RECOVERY Researchers believe Revoice could also help people with Parkinson's disease and motor neuron disease. Because the device is comfortable, washable, and designed for daily wear, it could fit into real-world routines rather than being confined to clinics. Before that can happen, larger clinical trials are required. The research team plans to begin broader studies with native English-speaking patients and hopes to expand the system to support multiple languages and a wider range of emotional expressions. The findings were published in the journal Nature Communications.If you or someone you care for has experienced a stroke, this research points to a major shift in recovery tools. Revoice suggests that speech assistance does not need to be invasive to be effective. A wearable solution could support communication during the most difficult months of rehabilitation, when confidence and independence often suffer the most. It may also reduce stress for caregivers who struggle to understand incomplete or unclear speech. Clear communication can improve medical care, emotional well-being and daily decision-making. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com Communication is tied closely to dignity and independence. For stroke survivors, losing that ability can be one of the hardest parts of recovery. Revoice shows how artificial intelligence and wearable tech can work together to restore something deeply human. While it is still early, this device represents a meaningful step toward making recovery feel less isolating and more hopeful.If a simple wearable could help restore natural speech, should it become a standard part of stroke rehabilitation? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com.  All rights reserved.

Tax season scams surge as filing confusion grows

Tax season already brings stress. In 2026, it brings added confusion. Changes to tax filing programs and the discontinuation of the free government-run filing system have left many taxpayers unsure about what is legitimate. That uncertainty has created an opening for scammers who move quickly when people hesitate. "Every tax season we see scammers ramp up their activity, and with likely confusion now that the free government-run filing system is discontinued, we're sure scammers will take advantage," said Lynette Owens, vice president of consumer marketing and education at Trend Micro.In past years, scammers have leaned heavily on impersonation. Fake IRS emails promising refunds, text messages claiming accounts have been flagged under new rules and fraudulent tax help offers that promise faster returns continue to circulate, Owens said. As February begins, many taxpayers feel pressure to file quickly. That urgency creates the perfect conditions for fraud. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. WHY SCAMMERS OPEN BANK ACCOUNTS IN YOUR NAME Uncertainty is one of the most effective tools scammers have. When taxpayers are unsure how filing rules work or whether a message is legitimate, criminals step in with communications designed to sound official and helpful. The goal is not clarity. It is speed."Scammers aim to create a heightened sense of anxiety among the people they are targeting," Owens said. "When taxpayers don't feel confident about what's real, whether it's new filing options, eligibility rules or program updates, criminals step in with messages that sound official and helpful." They often pose as the IRS, a tax prep service, or even government support. Once trust is established, the message quickly turns transactional, asking for clicks, personal data or payments.While the delivery methods change, the core message rarely does. Something is wrong, and it must be fixed immediately. "The most common tactic we're seeing is fake refund or account alert messages that claim something is wrong and demand immediate action," Owens said. Other scams go a step further. Some direct victims to fake IRS login pages designed to steal credentials.Others promote fraudulent tax assistance, presenting themselves as government-backed or low-cost help in order to collect personal and financial information. These scams arrive by email, text message, phone calls and fake websites. Many are polished enough to appear legitimate at first glance.Language plays a central role in tax scams. Phrases such as new rules or urgent account issues are designed to trigger panic before logic has a chance to catch up. They suggest the recipient has missed something important or risks losing money."Those phrases work because they can trigger panic and urgency, and people are more likely to react emotionally than logically," Owens said. "New rules suggest you may have missed something important, and an urgent account issue creates fear of penalties, delays or losing a refund." The safest response is to pause. Do not click links, reply to messages or call phone numbers included in the alert. Instead, go directly to a trusted source like IRS.gov using your own browser.Many tax scams follow a familiar structure. A common example reads: "IRS Notice: Your tax refund is on hold due to a filing discrepancy under updated 2026 rules. Verify your identity now to avoid delays." At first glance, messages like this may appear credible. They often include official-looking logos, reference numbers and links that resemble real government pages."It may include a convincing IRS-style logo, a case number and a link that looks legitimate at a glance," Owens said. "But the red flags are usually the same." The message pressures immediate action, directs users to non-government websites, and requests sensitive information such as Social Security numbers, bank details or login credentials. HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET The damage rarely ends with a single click. "The most serious consequences are identity theft and financial loss ," Owens said. "Once scammers have personal information, they can file fraudulent tax returns, steal refunds, open credit accounts and access bank funds."Victims often spend months working to recover lost money, repair credit damage and restore their identities.Despite repeated warnings, many people still believe the IRS might email or text them. "A legitimate tax service or the IRS won't reach out unexpectedly by email, text or social media, and they won't pressure you to act immediately," Owens said.Scam messages often share the same warning signs. They sound urgent, include links or attachments and ask for sensitive information right away. If a message creates panic or demands fast action, that alone is reason to be skeptical. The IRS primarily communicates by official mail. Unexpected digital contact should always raise concern.Tax scams continue to grow more sophisticated each year. "Taxpayers should watch for scams that feel more real than ever," Owens said. "That includes highly polished phishing emails , refund texts designed for quick mobile clicks, fake tax help ads and cloned websites that mimic real IRS or tax prep portals."The biggest mistake people still make is treating an unexpected tax message like an emergency. "In tax season, speed is the scammer's advantage," Owens said. "Taking 30 seconds to double-check the source can prevent months of financial and identity damage."If someone realizes too late that a message was fraudulent, fast action can limit the damage. "First, stop engaging immediately," Owens said. "Don't click links, download attachments or reply."Next, report the incident. Forward phishing emails to phishing@irs.gov and file a report at reportfraud.ftc.gov.After that, monitor financial accounts closely, change passwords and consider placing a fraud alert or credit freeze if necessary.To learn more about how to do this, go to Cyberguy.com and search "How to freeze your credit."  SCAMMERS TARGET RETIREES AS MAJOR 401(K) RULE CHANGES LOOM FOR 2026 TAX YEAR AHEAD NATIONWIDE Scammers count on rushed decisions. The good news is that a few smart habits can dramatically lower your risk.Urgency is the scammer's favorite tool. Messages that demand immediate action aim to short-circuit your judgment. "Scammers rely on fear, urgency or false promises, especially during tax season," Owens said. "It's important to slow down, verify information through official channels, and use trusted security tools." If a message pressures you to act fast, stop. Take a breath before doing anything else.Scam messages often reference new rules, updated policies or eligibility changes . That language sounds credible when filing programs shift. Always confirm changes by typing IRS.gov directly into your browser or signing in to your trusted tax provider account. Never rely on links or phone numbers included in a message.Tax portals hold valuable personal and financial data. Weak passwords make them easy targets. Use strong and unique passwords for every tax-related account. A password manager can help generate and store secure credentials without relying on memory.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com ) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com Scammers know refunds motivate quick action. Messages claiming your refund is waiting, delayed or at risk often signal fraud. Be cautious of promises like faster refunds, guaranteed results or special access to government-backed assistance. Legitimate services do not operate that way.Clicking a single link can expose login credentials or install malware . Do not click on links in unexpected tax messages. Also, use strong antivirus software to help block malicious sites and detect threats before damage occurs.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com Personal data fuels tax scams. The more information criminals can find online, the easier impersonation becomes. Using a data removal service can help limit exposed personal details across data broker sites. Less data means fewer opportunities for scammers to exploit your identity.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com Get a free scan to find out if your personal information is already out on the web: Cyberguy.com eason pressure makes even cautious people vulnerable. In 2026, filing confusion adds fuel to the fire. Scammers know this and design messages to look official, urgent and helpful. Pausing, verifying and trusting official sources remains the strongest defense. When something feels rushed, it is usually for a reason.Have you received a suspicious IRS message this tax season, and what made you question whether it was real? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com.  All rights reserved.

Major US shipping platform left customer data wide open to hackers

Cargo theft is no longer just about stolen trucks and forged paperwork. Over the past year, security researchers have been warning that hackers are increasingly targeting the technology behind global shipping, quietly manipulating systems that move goods worth millions of dollars. In some cases, organized crime groups use hacked logistics platforms to redirect shipments, allowing criminals to steal goods without ever setting foot in a warehouse. One recent case involving a critical U.S. shipping technology provider shows just how exposed parts of the supply chain have been and for how long. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter      CRIME RINGS, HACKERS JOIN FORCES TO HIJACK TRUCKS NATIONWIDE, FUELING MAJOR HOLIDAY SHIPPING SECURITY FEARS The company at the center of this incident is Bluspark Global, a New York-based firm whose Bluvoyix platform is used by hundreds of companies to manage and track freight moving around the world. While Bluspark isn't a household name, its software supports a large slice of global shipping, including major retailers, grocery chains and manufacturers.For months, Bluspark's systems reportedly contained basic security flaws that effectively left its shipping platform exposed to anyone on the internet. According to the company, five vulnerabilities were eventually fixed, including the use of plaintext passwords and the ability to remotely access and interact with the Bluvoyix platform. These flaws could have given attackers access to decades of shipment records and customer data.Bluspark says those issues are now resolved. But the timeline leading up to the fixes raises serious concerns about how long the platform was vulnerable and how difficult it was to alert the company in the first place.Security researcher Eaton Zveare discovered the vulnerabilities in October while examining the website of a Bluspark customer. What started as a routine look at a contact form quickly escalated. By viewing the website's source code, Zveare noticed that messages sent through the form passed through Bluspark's servers using an application programming interface, or API.From there, things unraveled fast. The API's documentation was publicly accessible and included a built-in feature that allowed anyone to test commands. Despite claiming authentication was required, the API returned sensitive data without any login at all. Zveare was able to retrieve large amounts of user account information, including employee and customer usernames and passwords stored in plaintext.Worse, the API allowed the creation of new administrator-level accounts without proper checks. That meant an attacker could grant himself full access to Bluvoyix and view shipment data going back to 2007. Even security tokens designed to limit access could be bypassed entirely.One of the most troubling parts of this story isn't just the vulnerabilities themselves, but how hard it was to get them fixed. Zveare spent weeks trying to contact Bluspark after discovering the flaws, sending emails, voicemails and even LinkedIn messages, without success.With no clear vulnerability disclosure process in place, Zveare eventually turned to Maritime Hacking Village, which helps researchers notify companies in the shipping and maritime industries. When that failed, he contacted the press as a last resort.Only after that did the company respond, through its legal counsel. Bluspark later confirmed it had patched the flaws and said it plans to introduce a formal vulnerability disclosure program. The company has not said whether it found evidence that attackers exploited the bugs to manipulate shipments, stating only that there was no indication of customer impact. It also declined to share details about its security practices or any third-party audits.Hackers can break into a shipping or logistics platform without you ever realizing your data was involved. These steps help you reduce risk when attacks like this happen. After supply chain breaches , criminals often send phishing emails or texts pretending to be shipping companies, retailers or delivery services. If a message pressures you to click a link or "confirm" shipment details, slow down. Go directly to the retailer's website instead of trusting the message.If attackers gain access to customer databases, they often try the same login details on shopping, email and banking accounts. A password manager ensures every account has a unique password, so one breach doesn't give attackers the keys to everything else.Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com ) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com Criminals often combine data from one breach with information scraped from data broker sites. Personal data removal services can help reduce how much of your information is publicly available, making it harder for criminals to target you with convincing scams.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com Get a free scan to find out if your personal information is already out on the web: Cyberguy.com Strong antivirus software can block malicious links, fake shipping pages and malware-laced attachments that often follow high-profile breaches. Keeping real-time protection enabled adds an important layer when criminals try to exploit confusion.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com HUGE DATA LEAK EXPOSES 14 MILLION CUSTOMER SHIPPING RECORDS Two-factor authentication (2FA) makes it much harder for attackers to take over accounts, even if they have your password. Prioritize email, shopping accounts, cloud storage and any service that stores payment or delivery information.Check your online shopping accounts for unfamiliar orders, address changes or saved payment methods you don't recognize. Catching changes early can prevent fraud from escalating.Identity theft protection services can alert you to suspicious credit activity and help you recover if attackers access your name, address or other personal details. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com If your name, email or address was exposed, consider placing a credit freeze with the major credit bureaus. A freeze prevents criminals from opening new accounts in your name, even if they obtain additional personal data later. It's free, easy to lift temporarily, and one of the most effective steps you can take after a breach. To learn more about how to do this, go to Cyberguy.com and search "How to freeze your credit."  Review the security settings on major shopping and delivery accounts, including retailers, grocery services and shipping providers. Pay close attention to saved delivery addresses, default shipping locations and linked payment methods. Attackers sometimes add their own address quietly and wait before making a move.If you run a business that relies on shipping or logistics platforms, incidents like this are a reminder to review vendor access controls. Limit administrative permissions, rotate API keys regularly, and confirm vendors have a clear vulnerability disclosure process. Supply chain security depends on more than just your own systems. Shipping platforms sit at the intersection of physical goods and digital systems, making them attractive targets for cybercriminals. When basic protections like authentication and password encryption are missing, the consequences can spill into the real world, from stolen cargo to supply chain disruption. The incident also highlights how many companies still lack clear, public ways for researchers to report vulnerabilities responsibly.Do you think companies that quietly power global supply chains are doing enough to protect themselves from cyber threats?  Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter Copyright 2026 CyberGuy.com.  All rights reserved.

Amazon Prime settlement could put money back in your pocket

Amazon has agreed to pay $2.5 billion to settle allegations brought by the Federal Trade Commission over how it enrolled customers in Prime and how difficult it made cancellation. The FTC alleged Amazon enrolled millions of consumers without clear consent and failed to provide a simple way to cancel."The evidence showed that Amazon used sophisticated subscription traps designed to manipulate consumers into enrolling in Prime, and then made it exceedingly hard for consumers to end their subscription," Federal Trade Commission Chairman Andrew N. Ferguson said.Rather than proceed to trial, Amazon chose to settle the case. The company did not admit liability and says it has already made changes to Prime enrollment and cancellation flows. Still, the agreement stands as the second-largest monetary judgment ever secured by the Federal Trade Commission. ALEXA.COM BRINGS ALEXA+ TO YOUR BROWSER Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.The court-ordered settlement is divided into two parts. First, Amazon must pay a $1 billion civil penalty to the federal government. As a result, this marks the largest civil penalty ever tied to a violation of an FTC rule. Second, $1.5 billion is set aside for consumer refunds. Eligible Prime subscribers may receive compensation for Prime membership fees paid during the covered period, capped at $51 per person. Because this is an FTC action, only U.S.-based Prime subscribers qualify. Therefore, customers outside the United States are not eligible.You may qualify for compensation if either of the following applies.To confirm when you joined Prime, log in to your Amazon account. Then go to Memberships and Subscriptions and select Payment history under Prime.Under the settlement, refunds are distributed in two groups based on eligibility.Some consumers qualified for automatic payments.However, if you believe you qualified for an automatic payment but did not receive one, you may still be eligible to file a claim.At this point, the claims process is the primary path for refunds. The claims window opened January 5, 2026. Eligible consumers are being notified by email or postcard through early February. You may qualify to file a claim if you unintentionally enrolled in Prime through a challenged enrollment method or tried but failed to cancel your membership online between June 23, 2019, and June 23, 2025, and used fewer than 10 Prime benefits during any 12-month period. In addition, you must not have already received an automatic payment. To file a claim, you will need to confirm one of two conditions by checking a box on the claim form. Claims are reviewed for eligibility. Approved claims receive compensation for Prime fees paid, capped at $51 per person.If you are eligible to file a claim, official instructions will be provided by email or mail. You can also access the court-approved settlement site directly at: subscriptionmembershipsettlement.com. Links to the settlement site are also available on Amazon's website, the Prime membership page and within the Amazon app. THE WEEK'S BEST AMAZON HOME DEALS: SAVE 40% OR MORE ON PILLOWS, BLENDERS, VACUUMS AND MORE Even if you do not qualify for a refund, this settlement is a strong reminder to review your subscriptions and confirm you are paying only for services you actively use. Here's how to cancel a subscription using your iPhone and Android."Payments are being handled by the settlement administrator. Customers can find information and submit claims at the administrator's website subscriptionmembershipsettlement.com," an Amazon spokesperson told CyberGuy.If you already have an Amazon account, adding or managing Prime takes only a few minutes. First, log in to Amazon and open the Accounts and Lists menu. From there, select Prime to view your membership details. Next, follow the prompts to add Prime or manage an existing subscription. Amazon displays pricing, billing dates and available benefits before you confirm. For that reason, review each screen carefully so you know exactly what you are agreeing to. For more on "How to get a cheap Amazon Prime membership," click here.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. Overall, this settlement sends a clear message about subscription transparency. While a $51 refund may feel modest, the broader impact matters. Regulators are forcing companies to simplify signups and make cancellations easier. If you ever felt trapped in a subscription you did not intend to start, this case shows enforcement is finally catching up to deceptive design tactics.Have you ever tried to cancel a subscription and felt blocked or misled along the way? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Under Armour data breach claims trigger alerts for millions of users

Sportswear and fitness brand Under Armour is investigating claims of a massive data breach after customer records were posted on a hacker forum. The breach became widely known after millions of people received alerts warning their information may have been compromised. While Under Armour says its investigation is ongoing, cybersecurity researchers reviewing the leaked data say it appears to include personal details potentially linked to customer purchases.According to breach notification service Have I Been Pwned, the dataset contains email addresses linked to approximately 72 million people, prompting the organization to notify affected users directly. The scale of the exposure has raised new concerns about how consumer data can be misused long after a breach occurs. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS   The stolen data is reportedly linked to a ransomware attack that occurred in November 2025. At the time, the Everest ransomware group claimed responsibility and attempted to extort Under Armour by threatening to leak internal files. In January 2026, customer data from that incident appeared publicly on a popular hacking forum. Soon after, breach notification service Have I Been Pwned obtained a copy of the data and alerted affected users by email. According to reports, the seller claimed the stolen files came directly from the November breach and included millions of customer records.The leaked dataset reportedly includes a broad range of personal information. While payment card details have not been confirmed, the exposed data is still valuable to cybercriminals.Compromised information may include:Researchers also found email addresses belonging to Under Armour employees within the data. That increases the risk of targeted phishing and business email compromise scams."We are aware of claims that an unauthorized third party obtained certain data," an Under Armour spokesperson told CyberGuy. "Our investigation of this issue, with the assistance of external cybersecurity experts, is ongoing. Importantly, at this time, there's no evidence to suggest this issue affected UA.com or systems used to process payments or store customer passwords. Any implication that sensitive personal information of tens of millions of customers has been compromised is unfounded. The security of our systems and data is a top priority for UA, and we take this issue very seriously."Even without passwords or payment details, this breach still poses serious risks. Names, email addresses, birth dates and purchase history can be used to create highly convincing scams. Cybercriminals often reference real purchases or account details to gain trust. As a result, phishing emails tied to this breach may appear legitimate and urgent. Over time, exposed data like this can also be combined with other breaches to build detailed identity profiles that are harder to protect against.To see if your email was affected, visit the Have I Been Pwned website. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the leak. When done, come back here for Step 1 below.If you received a breach alert or believe your information may be included, taking action now can reduce your risk later.If you reused the same password on other sites, change those passwords right away. Even if Under Armour says passwords were not affected, exposed email addresses are often used in follow-up attacks. A password manager makes this easier. It creates strong, unique passwords for each account and stores them securely. That way, one breach cannot unlock multiple accounts.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Cybercriminals often move fast after a breach. As a result, emails that appear to come from Under Armour or fitness brands may land in your inbox. Be cautious of messages that claim there is an issue with your account or a recent purchase. Do not click links or open attachments in unexpected emails. Instead, go directly to the company's official website if you need to check your account. Using strong antivirus software can also help block malicious links and attachments before they cause harm. ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS' RECORDS The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Two-factor authentication (2FA) adds an extra layer of protection. Even if someone gets your password, they still need a second step to log in. Turn it on for email accounts first. Then enable it for shopping, fitness and financial accounts. This single step can stop many account takeover attempts linked to breached data.After a breach, attackers often test stolen email addresses across multiple sites. That activity can trigger password reset emails you did not request. Pay close attention to these alerts. If you see one, secure the account immediately by changing the password and reviewing recent activity.This breach included purchase information, which makes scams more convincing. Attackers may reference real products or order details to earn your trust. Treat any message that pressures you to act quickly as suspicious. Legitimate companies do not demand immediate action by email or text.Over time, exposed personal data often ends up with data brokers. These companies collect and sell profiles that scammers use for targeting. A data removal service can help you request the deletion of your information from these databases. Reducing what is publicly available makes it harder for criminals to build detailed profiles.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. The Under Armour data breach is a reminder that even major global brands can become targets. While payment systems appear unaffected, the exposure of personal data still creates long-term risks for millions of customers. Data breaches often unfold over time. What starts as leaked records can later fuel scams, identity theft and targeted attacks. Staying alert now can reduce the chance of bigger problems later.If your personal shopping or fitness data were exposed in a breach like this, would you keep using the brand or move on to a competitor? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.  

Fox News AI Newsletter: Amazon cuts thousands of roles

IN TODAY'S NEWSLETTER:- Amazon to cut 16,000 roles as it looks to invest in AI, remove 'bureaucracy'
- Uber unveils a new robotaxi with no driver behind the wheel 
- Ex-Google engineer found guilty of stealing AI secrets for Chinese companies MASSIVE CUTS: Amazon said Wednesday it will cut approximately 16,000 roles across the company as part of an organizational overhaul aimed at "reducing layers, increasing ownership, and removing bureaucracy," while continuing to invest heavily in areas such as artificial intelligence. YOUR NEW RIDE: Uber is getting closer to offering rides with no one behind the wheel. The company recently unveiled a new robotaxi and confirmed that autonomous testing is already underway on public roads in the San Francisco Bay Area. While the vehicle first appeared earlier this month at the Consumer Electronics Show 2026, the bigger story now is what is happening after the show. TECH THEFT: A federal jury found a former Google engineer guilty of stealing artificial intelligence (AI) trade secrets and spying for Chinese tech companies, ending a high-profile Silicon Valley trial. FIDO'S BIG BROTHER: Tuya Smart just introduced Aura, its first AI-powered companion robot made for pets. Aura is designed specifically for household cats and dogs, with AI trained to recognize their behaviors, movements and vocal cues. The idea behind Aura is simple. Pets need more than food bowls and cameras. They need attention, interaction and reassurance. GOING BIG: What happens when artificial intelligence (AI) moves from painting portraits to designing homes? That question is no longer theoretical. At the Utzon Center in Denmark, Ai-Da Robot, the world's first ultra-realistic robot artist, has made history as the first humanoid robot to design a building. Facebook
Instagram
YouTube
X
LinkedIn Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health Fox News Go Fox Nation Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

YouTube lets parents limit or block Shorts for teens

YouTube is rolling out new parental controls designed to give families more say over how much time teens spend scrolling through Shorts. Parents can now set daily time limits or block Shorts entirely, depending on what works best for their household. The update comes as concerns grow around endless scrolling and its impact on teens. YouTube says these tools are meant to support healthier viewing habits while still allowing young users to enjoy the platform in a more balanced way. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. 5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW Short-form video has become one of the most addictive parts of social media, especially for teens. The constant scroll can make it hard to stop watching, even when kids are supposed to be studying or winding down for bed. YouTube says the new controls respond to feedback from parents, advocates, and lawmakers who want stronger safeguards for young users. The goal is to give families flexibility instead of forcing an all-or-nothing approach.If you supervise a teen's Google account, you can now:YouTube also says it is adjusting how content is recommended to teens, placing more emphasis on videos tied to curiosity, life skills, inspiration, and credible information that supports well-being.Before you start, make sure:The new limits apply immediately. OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN Once the daily limit is reached:Regular, long-form YouTube videos remain available unless you restrict them separately through screen-time controls.Beyond Shorts, parents can also:These options are managed through Google Family Link, with guidance and account setup available in YouTube's Family Center.If you are a parent or guardian, these controls give you more practical ways to manage screen time without banning YouTube entirely. You can limit Shorts during school nights, allow more time on long trips, or block them when focus matters most. Instead of relying on willpower alone, families now have built-in tools that help reinforce healthy habits.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. Short-form video is not going away, but the way teens interact with it can change. YouTube's new parental controls show a shift toward giving families more flexibility and clearer boundaries. Used alongside conversations about online habits, these tools can make a real difference. Oh, and be sure to check out my new "Beyond Connected" podcast on YouTube.How much control do you think parents should have over teens' screen time, and where should the line be drawn? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Humanoid robot makes architectural history by designing a building

What happens when artificial intelligence (AI) moves from painting portraits to designing homes? That question is no longer theoretical. At the Utzon Center in Denmark, Ai-Da Robot, the world's first ultra-realistic robot artist, has made history as the first humanoid robot to design a building.The project, called Ai-Da: Space Pod, is a modular housing concept created for future bases on the Moon and Mars . CyberGuy has covered Ai-Da before, when her work focused on drawing, painting and performance art. That earlier coverage showed how a robot could create original artwork in real time and why it sparked global debate.Now, the shift is clear. Ai-Da is moving beyond art and into physical spaces designed for humans and robots to live in. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.com newsletter. 3D-PRINTED HOUSING PROJECT FOR STUDENT APARTMENTS TAKES SHAPE The exhibition "I'm not a robot" has just opened at Utzon Center and runs through October. It explores the creative capacity of machines at a time when robots are increasingly able to think and create for themselves. Visitors can experience Ai-Da's drawings, paintings and architectural concepts. Throughout the exhibition period, visitors can also follow Ai-Da's creative process through sketches, paintings and a video interview. ELON MUSK TEASES A FUTURE RUN BY ROBOTS Ai-Da is not a digital avatar or animation. She has camera eyes, specially developed AI algorithms and a robotic arm that allows her to draw and paint in real time. Developed in Oxford and built in Cornwall in 2019, Ai-Da works across disciplines. She is a painter, sculptor, poet, performer and now an architectural designer whose work is meant to provoke reflection."Ai-Da presents a concept for a shared residential area called Ai-Da: Space Pod, a foreshadowing of a future where AI becomes an integrated part of architecture," explains Aidan Meller, creator of Ai-Da and Director of Ai-Da Robot. "With intelligent systems, a building will be able to sense and respond to its occupants, adjusting light, temperature and digital interfaces according to needs and moods."The Space Pod is intentionally modular. Each unit can connect to others through corridors, creating a shared residential environment.Through a series of paintings, she envisions a home and studio for humans or robots alike. According to the Ai-Da Robot team, these designs could evolve into fully realized architectural models through 3D renderings and construction. They could also adapt to planned Moon or Mars base camps.While the concept targets future bases on the Moon and Mars, the design can also be built as a prototype on Earth. That detail matters as space agencies prepare for longer missions beyond our planet."With our first crewed Moon landing in 50 years coming in 2027, Ai-Da: Space Pod is a simple unit connected to other Pods via corridors," Meller said. "Ai-Da is a humanoid designing homes. This raises questions about where architecture may go when powerful AI systems gain greater agency." The timing also aligns with renewed lunar exploration tied to NASA missions. AUSTRALIAN CONSTRUCTION ROBOT CHARLOTTE CAN 3D PRINT 2,150-SQ-FT HOME IN ONE DAY USING SUSTAINABLE MATERIALS According to Meller, the exhibition is meant to feel uncomfortable at times. "Technology is developing at an extraordinary pace in these years, " he said, pointing to emotional recognition through biometric data, CRISPR gene editing and brain computer interfaces. Each carries promise and ethical risk. He references Brave New World and warnings from Yuval Harari about how powerful technologies may be used. In that context, Ai-Da becomes a mirror of our time. "Ai-Da is confrontational. The very fact that she exists is confrontational," said Line Nørskov Davenport, Director of Exhibitions at Utzon Center. "She is an AI shaker, a conversation starter."This story goes beyond robots and space travel. Ai-Da's Space Pod shows how quickly AI is moving from a creative tool to a decision-maker. Architecture, housing and shared spaces shape daily life. When AI enters those fields, questions about control, ethics and accountability become unavoidable. If a robot can design homes for the Moon, it may soon influence how buildings function here on Earth. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. A humanoid robot designing a building once sounded impossible. Today, Ai-Da's work sits inside a major cultural institution and sparks real debate. She offers no easy answers. Instead, she pushes us to think more critically about creativity, technology and responsibility. As the line between human and machine continues to blur, those questions matter more than ever.If AI can design the homes of our future, how much creative control should humans be willing to give up? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved.

Thousands of iPhone apps expose data inside Apple App Store

Apple often promotes the App Store as a secure place to download apps. The company highlights strict reviews and a closed system as key protections for iPhone users. That reputation now faces serious questions.New research shows that thousands of iOS apps approved by Apple contain hidden security flaws. These flaws can expose user data, cloud storage and even payment systems. The issue is not malware; it's poor security practices baked directly into the app code. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK Security researchers at Cybernews, a cybersecurity research firm, analyzed the code of more than 156,000 iPhone apps . That represents about 8% of all apps available worldwide.Here is what they found:These secrets include passwords, API keys and access tokens. Developers place them directly inside apps, where anyone can extract them. According to Cybernews researcher Aras Nazarovas, this makes attackers' jobs much easier than most users realize.A hardcoded secret is sensitive information saved directly inside an app instead of being protected on a secure server. Think of it like writing your bank PIN on the back of your debit card. Once someone downloads the app, they can inspect its files and pull out those secrets. Attackers do not need special access or advanced hacking tools. Both the Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation warn developers not to do this. Yet it is happening at a massive scale.One of the most serious problems involves cloud storage. More than 78,000 iOS apps contained direct links to cloud storage buckets. These buckets store files such as photos, documents, receipts and backups. In some cases, no password was required at all. Researchers found:This data included user uploads, registration details, app logs and private records. Anyone who knew where to look could view or download it. APPLE PATCHES TWO ZERO-DAY FLAWS USED IN TARGETED ATTACKS Many iOS apps rely on Google Firebase to store user data. Cybernews found more than 51,000 Firebase database links hidden in app code. While some were protected, over 2,200 had no authentication. That exposed:If a Firebase database is not locked down, attackers can browse user data like a public website.Some of the leaked secrets were far more dangerous than analytics or ads. Researchers discovered secret keys for:A leaked Stripe secret key can allow attackers to issue refunds, move money or access billing details. Leaked login keys can let attackers impersonate users or take over accounts.Some of the apps with the largest leaks were related to artificial intelligence. According to VX Underground, security firm CovertLabs identified 198 iOS apps leaking user data. The worst known case was Chat & Ask AI by Codeway. Researchers say it exposed chat histories, phone numbers and email addresses tied to millions of users. Another app, YPT - Study Group, reportedly leaked messages, user IDs and access tokens. CovertLabs tracks these incidents in a restricted repository called Firehound. The full list of affected apps has not been publicly released, and researchers say the data is limited to prevent further exposure and to give developers time to fix security flaws. MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS reviews apps before they appear in the App Store. However, the review process does not scan app code for hidden secrets. If an app behaves normally during testing, it can pass review even if sensitive keys are buried inside its files. This creates a gap between Apple's security claims and real-world risks. Removing leaked secrets is not simple for developers. They must revoke old keys, create new ones and rebuild parts of their apps. That can break features and delay updates. Even though Apple says most app updates are reviewed within 24 hours, some updates take weeks. During that time, vulnerable apps can remain available.CyberGuy contacted Apple for comment, but did not receive a response before publication.You cannot easily inspect an app for hidden secrets. Apple does not provide tools for that. Still, you can reduce your risk and limit exposure by being selective and cautious. These steps help reduce the risk if an app leaks data behind the scenes.Well-known developers tend to have stronger security teams and better update practices. Smaller or unknown apps may rush features to market and overlook security basics. Before downloading, check how long the developer has been active and how often the app is updated.Many apps ask for more access than they need. Location, contacts, photos and microphone access all increase the risk of data leaks. Go into your iPhone settings and remove permissions that are not essential for the app to work.Unused apps still retain access to data you shared in the past. They may also store information on remote servers long after you stop opening them. If you have not used an app in months, remove it. Here's how: Open Settings , tap General , select iPhone Storage , and scroll through the list of apps to see when each one was last used. Tap any app you no longer need and select Delete App to remove it and reduce ongoing data exposure.Avoid entering sensitive information unless it is absolutely necessary. This includes full names, addresses, payment details and private conversations. AI apps are especially risky if you share deeply personal content.A password manager creates strong, unique passwords for each app and service. This prevents attackers from accessing multiple accounts if one app leaks data. Never reuse passwords tied to your email address.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. If an app uses your email address for login, change that password immediately. Do this even if there is no confirmation of a breach. Attackers often test leaked credentials across other services.Some leaked data ends up with data brokers that sell personal information online. A data removal service can help find and remove your details from these databases. This reduces the chance that exposed app data gets reused for scams or identity theft.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Watch for unexpected emails, password reset notices, login alerts, or payment confirmations. These can signal that leaked data is already being abused. Act quickly if something looks off.If you use AI apps for private conversations, consider stopping until the developer confirms security fixes. Once data is exposed, it cannot be pulled back. Avoid sharing sensitive details with apps that store conversations remotely.Apple's App Store still offers important protections, but this research shows it is not foolproof. Many trusted iPhone apps quietly expose data due to basic security mistakes. Until app reviews improve, you need to stay alert and limit how much data you share.How many apps on your iPhone have access to information you would not want exposed? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved.

Tiny autonomous robots can now swim on their own

For decades, microscopic robots lived mostly in our imagination. Movies like "Fantastic Voyage" convinced us that tiny machines would one day cruise through the human body, fixing problems from the inside. In reality, that future stayed frustratingly out of reach. The reason was not a lack of ambition. It was physics. Now, a breakthrough from researchers at the University of Pennsylvania and the University of Michigan has changed the equation. The teams have built the smallest fully programmable autonomous robots ever created, and they can swim. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO The robots measure about 200 by 300 by 50 micrometers. That is smaller than a grain of salt and close to the size of a single-celled organism. They do not have legs or propellers. Instead, they use electrokinetics. Each robot generates a small electrical field that pulls charged ions in the surrounding fluid. Those ions drag water molecules with them, effectively creating a flowing river around the robot. The result is motion without moving parts. That makes the robots extremely durable and surprisingly easy to handle, even with delicate lab tools.Each robot runs on tiny solar cells that generate just 75 nanowatts of power. That is more than 100,000 times less than a smartwatch. To make this work, engineers redesigned everything. They built ultra-low voltage circuits and created a custom instruction set that compresses complex behavior into just a few hundred bits of memory. Despite the limits, each robot can sense its environment, store data and decide how to move next.The robots cannot carry antennas, so the team borrowed a trick from nature. Each robot performs a tiny wiggle pattern to report information like temperature. The motion follows a precise encoding scheme that researchers can decode by watching through a microscope. The idea closely mirrors how bees communicate through movement. Programming works the other way. Researchers flash light signals that the robots read as instructions. A built-in passcode prevents random light from interfering with their memory.In current tests, the robots demonstrate thermotaxis. They sense heat and autonomously swim toward warmer areas. That behavior hints at future uses like tracking inflammation, locating disease markers or delivering drugs with extreme precision. Light can already power robots near the skin. For deeper environments, the researchers are exploring ultrasound as a future energy source. PRIVATE AUTONOMOUS PODS COULD REDEFINE RIDE-SHARING Because these robots are made with standard semiconductor manufacturing, they can be produced in large numbers. More than 100 robots fit on a single chip, and manufacturing yields already exceed 50%. In mass production , the estimated cost could drop below one cent per robot. At that price, disposable robot swarms become realistic rather than theoretical.This technology is not about flashy gadgets. It is about scale. Robots this small could one day monitor health at the cellular level , build materials from the bottom up or explore environments too delicate for larger machines. While medical use is still years away, this breakthrough shows that true autonomy at the microscale is finally possible.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. For nearly 50 years, microscopic robots felt like a promise science could never quite keep. This research, published in Science Robotics, changes that narrative. By embracing the strange physics of the microscale instead of fighting it, engineers unlocked an entirely new class of machines. This is only the first chapter, but it is a big one. Once sensing, movement and decision-making fit into something almost invisible, the future of robotics looks very different.If tiny robots could swim through your body one day, would you trust them to monitor your health or deliver treatment ? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved.  

5 myths about identity theft that put your data at risk

Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn't even realize were public: old addresses, family connections, phone numbers and shopping habits. All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it's a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they're "careful enough." Let's break them down. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS Reality: You don't need to be in a breach to have your data exposed.Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you've never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you. Reality: They usually have more than enough.Scammers don't need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:This is why scams often feel unsettlingly personal. Reality: Retirees are one of the most targeted groups.Why? Because scammers assume:Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate "Tax Resolution Oversight Department" that tries to steal your money. Reality: Credit monitoring only tells you after something has gone wrong.It doesn't stop scammers from:Think of credit monitoring like a smoke alarm-helpful, but it doesn't prevent the fire. Reality: You can take control, but doing it manually is time-consuming and frustrating.Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That's why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn't quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS' RECORDS Identity theft rarely begins with a dramatic moment.It usually starts with:By the time fraud shows up on a credit report, the damage has often already been done.If there's one takeaway this week, it's this: reducing your exposed data lowers your risk.Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.If a message claims there's a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message. Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Enable two-factor authentication (2FA) wherever it's available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com. Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.Identity theft isn't about being careless; it's about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won't just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.  

Grubhub confirms data breach amid extortion claims

Food delivery platform Grubhub has confirmed a recent data breach after unauthorized actors accessed parts of its internal systems. The disclosure comes as sources tell BleepingComputer the company is now facing extortion demands linked to stolen data. In a statement to BleepingComputer, Grubhub said it detected and stopped the activity quickly."We're aware of unauthorized individuals who recently downloaded data from certain Grubhub systems," the company said. "We quickly investigated, stopped the activity, and are taking steps to further increase our security posture."Grubhub added that sensitive information, such as financial details or order history, was not affected. However, the company declined to answer follow-up questions about when the breach occurred, whether customer data was involved or if it is actively being extorted. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. RANSOMWARE ATTACK EXPOSES SOCIAL SECURITY NUMBERS AT MAJOR GAS STATION CHAIN While details remain limited, Grubhub confirmed several key points. It has brought in a third-party cybersecurity firm and notified law enforcement. Beyond that, the company has stayed largely silent. That lack of detail has raised concern, especially given Grubhub's recent security history. Just last month, the company was linked to scam emails sent from its own b.grubhub.com subdomain. Those messages promoted a cryptocurrency scam promising large returns on Bitcoin payments. Grubhub said it contained the incident and blocked further unauthorized emails. It did not clarify whether the two events are related.According to multiple sources cited by BleepingComputer, the ShinyHunters hacking group is behind the extortion attempt. The group has not publicly commented on the claims and declined to respond when contacted. Sources say the attackers are demanding a Bitcoin payment to prevent the release of stolen data. That data reportedly includes older Salesforce records from a February 2025 breach and newer Zendesk data taken during the most recent intrusion. Grubhub uses Zendesk to run its online customer support system. That platform handles order issues, account access and billing questions, making it a valuable target for attackers.Investigators believe the breach may be tied to credentials stolen during earlier Salesloft Drift attacks. In August 2025, threat actors used stolen OAuth tokens from Salesloft's Salesforce integration to access sensitive systems over a 10-day period. According to a report from Google Threat Intelligence Group, also known as Mandiant, attackers used that stolen data to launch follow-up attacks across multiple platforms. "GTIG observed UNC6395 targeting sensitive credentials such as AWS access keys, passwords and Snowflake-related access tokens," Google reported.  ShinyHunters previously claimed responsibility for that campaign, stating it stole roughly 1.5 billion records from Salesforce environments tied to hundreds of companies.Even if payment data and order history were not affected, support systems often contain personal details. Names, email addresses and account notes can be enough to fuel phishing attacks or identity scams. More importantly, this incident highlights how older breaches can continue to cause damage long after the initial attack. Stolen credentials that are never rotated remain a powerful entry point for threat actors.If you use Grubhub or any online delivery service, a few smart steps can reduce your risk after a breach.Start by changing your Grubhub password right away. Make sure you do not reuse that password anywhere else. Reused passwords give attackers an easy path into other accounts. A password manager can help here. It creates strong, unique logins and stores them securely so you do not have to remember them all.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS' RECORDS If two-factor authentication ( 2FA ) is available, enable it. This adds a second step when you sign in, such as a code sent to your phone or app. Even if a hacker steals your password, two-factor authentication can stop them from getting in.Be alert for emails or texts that mention orders, refunds or support issues. Attackers often use stolen support data to make messages feel urgent and real. Do not click links or open attachments unless you are certain they are legitimate. Strong antivirus software can also help block malicious links and downloads before they cause harm.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at  Cyberguy.com. Consider using a data removal service to reduce your online footprint. These services help remove your personal details from data broker sites that attackers often use to build profiles. Less exposed data means fewer tools for scammers to exploit.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web:  Cyberguy.com. Be skeptical of any cryptocurrency offers tied to familiar companies. Grubhub was previously linked to scam emails promoting crypto schemes, which shows how often attackers abuse trusted names. Legitimate companies do not promise fast returns or pressure you to act immediately.Check your Grubhub account for anything that looks unfamiliar. Watch for unexpected password reset emails, order confirmations or support messages you did not request. Attackers often test stolen data quietly before making bigger moves.Your email account is the key to password resets. Change that password and enable two-factor authentication if it is not already on. If attackers control your email, they can regain access even after you change other passwords.Breach data is often reused weeks or months later. Phishing attempts may appear long after headlines fade. Treat any future messages claiming to reference Grubhub support, refunds or account issues with extra caution.These steps will not undo a breach, but they can limit how attackers exploit stolen information and reduce your risk going forward. FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS Grubhub's confirmation puts an official stamp on what sources have warned about for weeks. While the company says sensitive data was not affected, unanswered questions remain. As extortion-driven breaches rise, transparency and rapid credential rotation matter more than ever. What stands out most is how past compromises continue to create new risks. When access tokens live too long, attackers do not need to break in again. They simply walk back through an open door.If companies stay quiet after breaches, how can customers know when it is time to protect themselves? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Uber unveils a new robotaxi with no driver behind the wheel

Uber is getting closer to offering rides with no one behind the wheel. The company recently unveiled a new robotaxi and confirmed that autonomous testing is already underway on public roads in the San Francisco Bay Area. While the vehicle first appeared earlier this month at the Consumer Electronics Show 2026, the bigger story now is what is happening after the show.These robotaxis are no longer confined to presentations or closed courses. They are driving in real traffic as Uber prepares for a public launch later this year. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. PRIVATE AUTONOMOUS PODS COULD REDEFINE RIDE-SHARING Uber is the name most riders recognize. However, two partners handle the technology behind the scenes. Lucid Group builds the all-electric vehicle. It is based on the Lucid Gravity SUV, which was designed for long-range efficiency and passenger comfort. Nuro provides the self-driving system. Nuro also leads testing and safety validation. Together, the three companies are developing a robotaxi service that will be available only through Uber. Autonomous on-road testing began last month in the Bay Area. These tests take place on public streets rather than private test tracks. Nuro runs the testing program using trained safety operators who supervise each trip. The focus is on everyday driving situations such as intersections, lane changes, traffic lights and pedestrians. This stage is critical. It allows engineers to evaluate how the system behaves in real conditions before opening rides to the public.Uber's robotaxi was designed from the start to operate without a driver. It combines electric vehicle engineering with visible autonomy features that riders can understand.Key features include:The robotaxi runs on high-performance computing powered by NVIDIA DRIVE AGX Thor. This system handles the real-time AI processing required for autonomous driving.One standout feature is transparency. Riders can see how the robotaxi perceives the road and plans its next move. The display shows lane changes, yielding behavior, slowing at traffic lights and the planned drop-off point. This helps riders understand what the vehicle is doing instead of guessing. Inside the cabin, passengers can adjust heated seats, climate controls and music. They can also contact support or request the vehicle to pull over if needed. CAN AUTONOMOUS TRUCKS REALLY MAKE HIGHWAYS SAFER? Uber plans to deploy 20,000 or more robotaxis over the next six years. These vehicles will operate in dozens of U.S. and international markets. Lucid will integrate all required hardware directly on the production line at its Casa Grande, Arizona factory. Uber will own and operate the vehicles along with third-party fleet partners. Every robotaxi ride will be booked through the Uber app, just like a standard Uber trip. Safety sits at the center of this rollout. Nuro's validation process combines simulation, closed-course testing and supervised on-road driving. The system relies on an end-to-end AI foundation model paired with clear safety logic. The goal is predictable, comfortable driving across a wide range of conditions. Uber and its partners are also working with regulators, policymakers and local governments to ensure the service aligns with public safety standards and city planning goals.Uber says the first autonomous rides will launch in a major U.S. city later in 2026. The service will be available exclusively through the Uber app. Production of the robotaxi is expected to begin later this year, pending final validation.If you use Uber, driverless rides may soon appear as an option. These vehicles could offer quieter trips, more consistent driving and improved availability during peak times. For cities, a shared electric robotaxi fleet could help reduce emissions and congestion. For riders, seeing how the vehicle thinks and reacts may make autonomous travel feel less intimidating. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com. rget=_new href="https://www.foxnews.com/tech/ces-2026-showstoppers-10-gadgets-you-have-see" target="_blank" rel="noopener"> CES 2026 SHOWSTOPPERS: 10 GADGETS YOU HAVE TO SEE Uber's robotaxi effort feels more grounded than many past autonomous promises. It combines a known ride-hailing platform a purpose-built electric vehicle and a self-driving system already operating on public roads. If testing continues to progress, driverless Uber rides could move from something new to something normal sooner than many expect.Would you get into an Uber if there was no driver sitting in the front seat? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

AI robot brings emotional care to pets

Tuya Smart just introduced Aura, its first AI-powered companion robot made for pets.Aura is designed specifically for household cats and dogs, with AI trained to recognize their behaviors, movements and vocal cues. The idea behind Aura is simple. Pets need more than food bowls and cameras. They need attention, interaction and reassurance. Aura stays active in the home, watches for behavior changes and responds in real time so owners can better understand how their pets are doing. Many pets struggle when left alone for long hours. Small changes often show up first. A dog may stop playing. A cat may hide or groom excessively. These signs can point to stress or anxiety. Aura steps in during those quiet stretches, offering engagement instead of an empty room. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO Smart feeders and pet cameras handle the basics. Emotional care is a different story. Pets are social. When routines change, their mood can shift quickly. Aura tracks behavior and listens for changes in sound patterns. It can tell whether a pet feels excited, anxious, lonely, or relaxed. Aura then sends real-time emotional updates to an owner's phone. That makes it easier to spot issues early rather than guessing after the fact.Aura acts more like a companion than a device that sits still. Several systems work together throughout the day to keep pets engaged. Key features include:Instead of waiting for a button press, Aura looks for opportunities to engage. It turns long, quiet hours into moments of play and stimulation.Aura also keeps an eye out for moments worth saving. Using AI pet recognition and intelligent tracking, it captures everyday highlights like playful bursts, calm naps and funny interactions. Aura can automatically turn these clips into short videos. That helps owners stay connected and feel closer to their pets even when they are away. It also makes it easier to capture moments you might never catch on your own and share them with family or post on social media. AI PHOTO MATCH REUNITES TEXAS WOMAN WITH LOST CAT AFTER 103 DAYS Movement is a big part of Aura's role in the home. With V-SLAM navigation, binocular vision and AIVI object recognition, Aura moves freely while avoiding obstacles. When the battery runs low, it returns to its feeding and charging dock on its own. That keeps it ready without constant attention from owners.Aura connects to Tuya's broader ecosystem, which opens access to services beyond the home. These include smart pet boarding, health and medical care, behavior training, grooming, customization and community tools. Instead of handling one task, Aura becomes a central hub for pet care that can evolve over time.Aura focuses on pets today, but the technology behind it reaches further. Emotional awareness, proactive assistance and ecosystem integration could also support elder care, home monitoring and family connectivity. Starting with pets gives Tuya a clear emotional use case while setting the stage for future home robotics.
  Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com. ROBOT STUNS CROWD AFTER SHOCKING ONSTAGE REVEAL has not shared a release date or pricing for Aura yet. The company unveiled the robot earlier this month at CES 2026, but details on availability and cost remain unclear. Those specifics are likely to come closer to a wider consumer launch. Even so, Aura signals a shift in how smart home technology shows up for pets. It moves beyond simple monitoring and leans into interaction and emotional awareness. If Aura delivers on its promise, it could help pet owners feel more comfortable leaving their pets home alone while staying connected throughout the day.If technology can read your pet's emotions and respond in real time, would you trust it to become part of your home routine, or would that feel like too much? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Malicious Google Chrome extensions hijack accounts

Cybersecurity researchers have uncovered a serious threat hiding inside Google Chrome.  Several browser extensions pretend to be helpful tools. In reality, they quietly take over user accounts. These extensions impersonate popular human resources and business platforms such as Workday, NetSuite and SAP SuccessFactors. Once installed, they can steal login data and block security controls designed to protect users.Many people who installed them had no warning signs that anything was wrong. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK Security researchers from Socket's Threat Research Team identified five malicious Chrome extensions connected to this campaign. The add-ons were marketed as productivity or security tools, but were designed to hijack accounts. The extensions include:We reached out to Google, and a spokesperson told CyberGuy that the extensions are no longer available on the Chrome Web Store. However, some are still available on third-party software download sites, which continues to pose a risk. If you see any of these names installed in your browser, remove them immediately.These malicious add-ons are designed to look legitimate. They use professional names, polished dashboards and business-focused descriptions. Some claim to offer faster access to workplace tools. Others say they restrict user actions to protect company accounts. Privacy policies often promise that no personal data is collected. For people juggling daily work tasks or managing business accounts, the pitch sounds helpful rather than suspicious.After installation, the extensions operate silently in the background. They steal session cookies, which are small pieces of data that tell websites you are already logged in. When attackers get these cookies, they can access accounts without a password. At the same time, some extensions block access to security pages. Users may be unable to change passwords, disable accounts or review login history. One extension even allows criminals to insert stolen login sessions into another browser. That lets them sign in instantly as the victim.This attack goes beyond stealing credentials. It removes the ability to respond. Security teams may detect unusual activity, but cannot fix it through normal controls. Password changes fail. Account settings disappear. Two-factor authentication tools become unreachable. As a result, attackers can maintain access for long periods without being stopped.If you use Google Chrome, review your extensions now. The process only takes a few minutes.Look for unfamiliar names, especially those claiming to offer access to HR platforms or business tools. WEB SKIMMING ATTACKS TARGET MAJOR PAYMENT NETWORKS If you find one of these extensions, remove it immediately.Restart your browser after removal to ensure the extension is fully disabled. If Chrome sync is enabled, repeat these steps on all synced devices before turning sync back on. What to do after removing the extension Removal is only the first step. Change passwords for any accounts accessed while the extension was installed. Use a different browser or device if possible.A password manager can help you create strong, unique passwords for each account and store them securely. This reduces the risk of reused passwords being exploited again.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at  guy.com. Finally, review account activity for unfamiliar logins, locations or devices and be sure to follow the steps below to stay safe moving forward.Simple habits can significantly reduce your risk.Only install extensions you truly need. The fewer extensions you use, the smaller your attack surface becomes.Avoid extensions that promise premium access or special tools for enterprise platforms. Legitimate companies rarely require browser add-ons for account access.Be wary of extensions that request access to cookies, browsing data or account management. These permissions can be abused to hijack sessions.Check your browser every few months and remove tools you no longer use or recognize. WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY Strong antivirus software can help detect malicious extensions, block suspicious behavior and alert you to browser-based threats before damage occurs.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at  guy.com. If your work or personal information has been exposed, a data removal service can help reduce your digital footprint by removing your details from data broker sites. This lowers the risk of follow-up scams or identity misuse.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting  guy.com. Get a free scan to find out if your personal information is already out on the web:  guy.com. Do not reinstall extensions from third-party websites, even if they claim to offer the same features. These sites often host outdated or malicious versions.Browser extensions can be useful, but this research shows how easily they can also be abused. These fake Chrome add-ons did not rely on flashy tricks or obvious warnings. They blended in, looked professional and quietly did their damage in the background. The good news is that you do not need to be a tech expert to protect yourself. Taking a few minutes to review your extensions, remove anything unfamiliar and lock down your accounts can make a real difference. Small habits, repeated regularly, go a long way in reducing risk. If there is one takeaway here, it is this: convenience should never come at the cost of security. A clean browser and strong account protections give you back control.How many browser extensions do you have installed right now that you have never looked at twice? Let us know by writing to us at  guy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts  and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Google Fast Pair flaw lets hackers hijack headphones

Google designed Fast Pair to make Bluetooth connections fast and effortless. One tap replaces menus, codes and manual pairing. That convenience now comes with serious risk. Security researchers at KU Leuven uncovered flaws in Google's Fast Pair protocol that allows silent device takeovers. They named the attack method WhisperPair. An attacker nearby can connect to headphones, earbuds or speakers without the owner knowing. In some cases, the attacker can also track the user's location. Even more concerning, victims do not need to use Android or own any Google products. iPhone users are also affected. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK Fast Pair works by broadcasting a device's identity to nearby phones and computers. That shortcut speeds up pairing. Researchers found that many devices ignore a key rule. They still accept new pairings while already connected. That opens the door to abuse.Within Bluetooth range, an attacker can silently pair with a device in about 10 to 15 seconds. Once connected, they can interrupt calls, inject audio or activate microphones. The attack does not require specialized hardware and can be carried out using a standard phone, laptop, or low-cost device like a Raspberry Pi. According to the researchers, the attacker effectively becomes the device owner.The researchers tested 17 Fast Pair compatible devices from major brands, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech and Google. Most of these products passed Google certification testing. That detail raises uncomfortable questions about how security checks are performed.Some affected models create an even bigger privacy issue. Certain Google and Sony devices integrate with Find Hub, which uses nearby devices to estimate location. If a headset has never been linked to a Google account, an attacker can claim it first. That allows continuous tracking of the user's movements. If the victim later receives a tracking alert, it may appear to reference their own device. That makes the warning easy to dismiss as an error. GOOGLE NEST STILL SENDS DATA AFTER REMOTE CONTROL CUTOFF, RESEARCHER FINDS There is another problem most users never consider. Headphones and speakers require firmware updates. Those updates usually arrive through brand-specific apps that many people never install. If you never download the app, you never see the update. That means vulnerable devices could remain exposed for months or even years.The only way to fix this vulnerability is by installing a software update issued by the device manufacturer. While many companies have released patches, updates may not yet be available for every affected model. Users should check directly with the manufacturer to confirm whether a security update exists for their specific device.Bluetooth itself was not the problem. The flaw lives in the convenience layer built on top of it. Fast Pair prioritized speed over strict ownership enforcement. Researchers argue that pairing should require cryptographic proof of ownership. Without it, convenience features become attack surfaces. Security and ease of use do not have to conflict. But they must be designed together.Google says it has been working with researchers to address the WhisperPair vulnerabilities and began sending recommended patches to headphone manufacturers in early September. Google also confirmed that its own Pixel headphones are now patched.In a statement to CyberGuy, a e spokesperson said, "We appreciate collaborating with security researchers through our Vulnerability Rewards Program, which helps keep our users safe. We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report's lab setting. As a best security practice, we recommend users check their headphones for the latest firmware updates. We are constantly evaluating and enhancing Fast Pair and Find Hub security."Google says the core issue stemmed from some accessory makers not fully following the Fast Pair specification. That specification requires accessories to accept pairing requests only when a user has intentionally placed the device into pairing mode. According to Google, failures to enforce that rule contributed to the audio and microphone risks identified by the researchers.To reduce the risk going forward, Google says it updated its Fast Pair Validator and certification requirements to explicitly test whether devices properly enforce pairing mode checks. Google also says it provided accessory partners with fixes intended to fully resolve all related issues once applied.On the location tracking side, Google says it rolled out a server-side fix that prevents accessories from being silently enrolled into the Find Hub network if they have never been paired with an Android device . According to the company, this change addresses the Find Hub tracking risk in that specific scenario across all devices, including Google's own accessories.Researchers, however, have raised questions about how quickly patches reach users and how much visibility Google has into real-world abuse that does not involve Google hardware. They also argue that weaknesses in certification allowed flawed implementations to reach the market at scale, suggesting broader systemic issues.For now, both Google and the researchers agree on one key point. Users must install manufacturer firmware updates to be protected, and availability may vary by device and brand. SMART HOME HACKING FEARS: WHAT'S REAL AND WHAT'S HYPE You cannot disable Fast Pair entirely, but you can lower your exposure.If you use a Bluetooth accessory that supports Google Fast Pair, including wireless earbuds, headphones or speakers, you may be affected. The researchers created a public lookup tool that lets you search for your specific device model and see whether it is vulnerable. Checking your device is a simple first step before deciding what actions to take. Visit whisperpair.eu/vulnerable-devices to see if your device is on the list.Install the official app from your headphone or speaker manufacturer. Check for firmware updates and apply them promptly.Pair new devices in private spaces. Avoid pairing in airports, cafés or gyms where strangers are nearby.Unexpected audio interruptions, strange sounds or dropped connections are warning signs.  A factory reset can remove unauthorized pairings, but it does not fix the underlying vulnerability. A firmware update is still required.Bluetooth only needs to be on during active use. Turning off Bluetooth when not in use limits exposure, but it does not eliminate the underlying risk if the device remains unpatched.Always factory reset used headphones or speakers before pairing them. This removes hidden links and account associations.Investigate Find Hub or Apple tracking alerts, even if they appear to reference your own device.Install operating system updates promptly. Platform patches can block exploit paths even when accessories lag behind.WhisperPair shows how small shortcuts can lead to large privacy failures. Headphones feel harmless. Yet, they contain microphones, radios and software that need care and updates. Ignoring them leaves a blind spot that attackers are happy to exploit. Staying secure now means paying attention to the devices you once took for granted.Should companies be allowed to prioritize fast pairing over cryptographic proof of device ownership? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com.  All rights reserved.

Smart pill confirms when medication is swallowed

Remembering to take medication sounds simple. However, missed doses put people at serious health risk every day. Because of that, engineers at the Massachusetts Institute of Technology (MIT) have designed a pill that confirms when someone swallows it. As a result, doctors could track treatment more accurately, and patients could stay on schedule more easily. At the same time, the pill safely breaks down inside the body, which helps reduce long-term risk. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. FDA CLEARS FIRST AT-HOME BRAIN DEVICE FOR DEPRESSION The new system fits inside existing pill capsules. It uses a tiny, biodegradable radio-frequency antenna made from zinc and cellulose. These materials already have strong safety records in medicine. Here is what happens step by step:This entire process happens within about 10 minutes. An external receiver, potentially built into a wearable device, detects the signal from up to two feet away.Previous smart pill designs relied on components that stayed intact as they passed through the digestive system. That raised concerns about long-term safety. The MIT team took a different approach. Nearly all parts of the antenna break down in the stomach within days. Only a tiny off-the-shelf RF chip remains, and it passes naturally through the body. According to lead researcher Mehmet Girayhan Say, the goal is clear. The system avoids long-term buildup while still reliably confirming that a pill was taken.This smart pill is not meant for every prescription. Instead, it targets situations where missing medication can be dangerous. Potential beneficiaries include:For these patients, adherence can mean the difference between recovery and serious complications. BREAKTHROUGH DEVICE PROMISES TO DETECT GLUCOSE WITHOUT NEEDLES Senior author Giovanni Traverso emphasizes that the focus is on patient health. The aim is to support people, not police them. The research team published its findings in Nature Communications and plans further preclinical testing. Human trials are expected next as the technology moves closer to real-world use. This research received funding from Novo Nordisk, MIT's Department of Mechanical Engineering, Brigham and Women's Hospital Division of Gastroenterology and the U.S. Advanced Research Projects Agency for Health.Patients failing to take medicine as prescribed contribute to hundreds of thousands of preventable deaths each year. It also adds billions of dollars to health care costs. This problem hits hardest when patients must take treatment consistently over long periods. That includes people who have received organ transplants, patients with tuberculosis and those managing complex neurological conditions. For these groups, missing doses can have life-altering consequences. 10 HEALTH TECH PRODUCTS STEALING THE SPOTLIGHT AT CES 2026 If you or a loved one relies on critical medication, this kind of technology could add an extra layer of safety. It may reduce guesswork for doctors and ease pressure on patients who manage complex treatment plans. At the same time, it raises important questions about privacy, consent and how medical data is shared. Any future rollout will need strong safeguards to protect patients.For now, until this technology becomes available, you can still stay on track by using the built-in tools on your phone. We break down the best ways to track your meds on iPhone and Android in our step-by-step guide. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com      A pill that confirms it was swallowed may sound futuristic, but it addresses a very real problem. By combining simple materials with smart engineering, MIT researchers created a tool that could save lives without lingering in the body. As testing continues, this approach could reshape how medicine is monitored and delivered.Would you be comfortable taking a pill that reports when you swallow it if it meant better health outcomes ? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com.  All rights reserved.

Why clicking the wrong Copilot link could put your data at risk

AI assistants are supposed to make life easier. Tools like Microsoft Copilot can help you write emails, summarize documents and answer questions using information from your own account. But security researchers are now warning that a single bad link could quietly turn that convenience into a privacy risk. A newly discovered attack method shows how attackers could hijack a Copilot session and siphon data without you seeing anything suspicious on screen. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.      ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS' RECORDS Security researchers at Varonis uncovered a technique they call "Reprompt." In simple terms, it shows how attackers could sneak instructions into a normal-looking Copilot link and make the AI do things on their behalf.Here's the part that matters to you: Microsoft Copilot is connected to your Microsoft account. Depending on how you use it, Copilot can see your past conversations, things you've asked it and certain personal data tied to your account. Normally, Copilot has guardrails to prevent sensitive information from leaking. Reprompt showed a way around some of those protections.The attack starts with just one click. If you open a specially crafted Copilot link sent through email or a message , Copilot can automatically process hidden instructions embedded inside the link. You don't need to install anything, and there are no pop-ups or warnings. After that single click, Copilot can keep responding to instructions in the background using your already logged-in session. Even closing the Copilot tab does not immediately stop the attack, because the session stays active for a while.Varonis found that Copilot accepts questions through a parameter inside its web address. Attackers can hide instructions inside that address and make Copilot execute them as soon as the page loads.That alone would not be enough, because Copilot tries to block data leaks. The researchers combined several tricks to get around this. First, they injected instructions directly into Copilot through the link itself. This allowed Copilot to read information it normally shouldn't share.Second, they used a "try twice" trick. Copilot applies stricter checks the first time it answers a request. By telling Copilot to repeat the action and double-check itself, the researchers found that those protections could fail on the second attempt.Third, they showed that Copilot could keep receiving follow-up instructions from a remote server controlled by the attacker. Each response from Copilot helped generate the next request, allowing data to be quietly sent out piece by piece. The result is an invisible back-and-forth where Copilot keeps working for the attacker using your session. From your perspective, nothing looks wrong. MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO 'REAL-WORLD DANGERS' FOR USERS Varonis responsibly reported the issue to Microsoft, and the company fixed it in the January 2026 Patch Tuesday updates. There is no evidence that Reprompt was used in real-world attacks before the fix. Still, this research is important because it shows a bigger problem. AI assistants have access, memory and the ability to act on your behalf. That combination makes them powerful, but also risky if protections fail. As researchers put it, the danger increases when autonomy and access come together.It's also worth noting that this issue only affected Copilot Personal. Microsoft 365 Copilot, which businesses use, has extra security layers like auditing, data loss prevention and admin controls."We appreciate Varonis Threat Labs for responsibly reporting this issue," a Microsoft spokesperson told CyberGuy. "We have rolled out protections that address the scenario described and are implementing additional measures to strengthen safeguards against similar techniques as part of our defense-in-depth approach."Even with the fix in place, these habits will help protect your data as AI tools become more common.Security fixes only protect you if they're installed. Attacks like Reprompt rely on flaws that already have patches available. Turn on automatic updates for Windows, Edge and other browsers so you don't delay critical fixes. Waiting weeks or months leaves a window where attackers can still exploit known weaknesses.If you wouldn't click a random password reset link, don't click unexpected Copilot links either. Even links that look official can be weaponized. If someone sends you a Copilot link, pause and ask yourself whether you were expecting it. When in doubt, open Copilot manually instead.A password manager creates and stores strong, unique passwords for every service you use. If attackers manage to access session data or steal credentials indirectly, unique passwords prevent one breach from unlocking your entire digital life. Many password managers also warn you if a site looks suspicious or fake.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Two-factor authentication (2FA) adds a second layer of protection, even if attackers gain partial access to your session. It forces an extra verification step, usually through an app or device, making it much harder for someone else to act as you inside Copilot or other Microsoft services. 5) Reduce how much personal data exists online Data broker sites collect and resell personal details like your email address, phone number, home address and even work history. If an AI tool or account session is abused, that publicly available data can make the damage worse. Using a data-removal service helps delete this information from broker databases, shrinking your digital footprint and limiting what attackers can piece together.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Modern antivirus tools do more than scan files. They help detect phishing links, malicious scripts and suspicious behavior tied to browser activity. Since Reprompt-style attacks start with a single click, having real-time protection can stop you before damage happens, especially when attacks look legitimate.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Check your Microsoft account activity for unfamiliar logins, locations, or actions. Review what services Copilot can access, and revoke anything you no longer need. These checks don't take long, but they can reveal issues early, before attackers have time to do serious damage. Here's how:Go to account.microsoft.com, and sign in to your Microsoft account.Select Security , then choose View my sign-in activity and verify your identity if prompted.Review each login for unfamiliar locations, devices or failed sign-in attempts.If you see anything suspicious, select This wasn't me or Secure your account , then change your password immediately and enable two-step verification. Visit account.microsoft.com/devices, and remove any devices you no longer recognize or use.In Microsoft Edge, open Settings > Appearance > Copilot and Sidebar > Copilot, and turn off Allow Microsoft to access page content if you want to limit Copilot's access.Review apps connected to your Microsoft account and revoke permissions you no longer need.Avoid giving AI assistants broad authority like "handle whatever is needed." Wide permissions make it easier for hidden instructions to influence outcomes. Keep requests narrow and task-focused. The less freedom an AI has, the harder it is for malicious prompts to steer it silently.Reprompt doesn't mean Copilot is unsafe to use, but it does show how much trust these tools require. When an AI assistant can think, remember and act for you, even a single bad click can matter. Keeping your system updated and being selective about what you click remain just as important in the age of AI as it was before.Do you feel comfortable letting AI assistants access your personal data, or does this make you more cautious? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved. 

Winter storms can knock out your tech fast: Prepare now

Weather forecasters are warning that a major winter storm is expected to impact large portions of the United States starting Friday. Forecasts call for snow, freezing rain and ice stretching from Texas and the Southern Plains through the Southeast, Mid-Atlantic and into the Northeast. This system is concerning because it combines ice accumulation, gusty winds and plunging temperatures. In many regions, especially across the South and parts of the Mid-Atlantic, infrastructure is not designed to handle prolonged ice events.That increases the risk of extended power outages and disrupted cell service. When the grid goes down, everyday tech becomes critical. Phones, alerts, vehicles and apps may be your only connection to updates and emergency help. Preparing now matters far more than reacting later.  Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. RUSSIAN WINTER STRIKE LEAVES NEARLY 800K HOMES WITHOUT POWER AND HEAT IN UKRAINE'S DNIPRO REGION Ice storms cause more damage than most people expect. Unlike snow, ice sticks to everything and adds significant weight. Ice builds up on trees and power lines, causing branches to snap and lines to fall. Utility crews often cannot begin repairs until conditions improve, which delays restoration. Forecasters at Fox Weather warn that freezing rain across the South and interior Southeast could be particularly damaging, while snow and wind farther north may slow emergency response. Even if cell towers remain standing, networks often overload during severe weather. When thousands of people try to call at once, connections fail. Texts and alerts usually have a better chance of getting through. That is why you should assume you may be offline longer than expected.These steps are simple, but timing matters. Do them before the weather conditions worsen.A fully charged phone, smart power settings and a reliable portable charger can keep you connected early in an outage while longer-term home power solutions carry you through the days ahead.Clear expectations reduce panic and unnecessary phone useEmergency alerts can reach your phone even when apps and social media cannot. They are designed to cut through network congestion and deliver critical warnings. US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN'T KEEP UP WITHOUT NEW INVESTMENT S ettings may vary, depending on your Android phone 's manufacturer On some phones, you may also see options for Public safety messages or Emergency alerts, which should be turned on. These alerts may include evacuation notices, shelter updates and severe weather warnings.Both iPhone and Android let you preview alert sounds and settings in these menus, so take a moment to test them now and make sure alerts are loud enough before severe weather hits.If you need help during a winter storm, Emergency SOS can contact emergency services even when you cannot unlock your phone or make a normal call. Set this up now. Do not wait until you are stressed, cold or without power.To activate Emergency SOS during an emergency, press and hold the side button and a volume button , or quickly press the side button five times , depending on your settings.S ettings may vary, depending on your Android phone's manufacturer On many Android phones, pressing the power button five times will trigger Emergency SOS. Emergency SOS can call for help, share your location and alert emergency contacts when conditions are dangerous.If cell towers go down during this storm, features like Emergency SOS can still help you reach emergency services. Our guide explains in more detail how these lifesaving settings work.The right apps can deliver critical updates when power is out, cell networks are strained and social media is unreliable. Install and set these up before the storm arrives.Using more than one weather app can give you redundancy if one service is delayed or overloaded.These apps can confirm outages, provide restoration updates and reduce unnecessary calls to utilities when systems are overwhelmed.Your vehicle may become a critical resource during extended outages.Severe weather creates ideal conditions for scams. Power outages, delayed responses and anxiety make people more likely to trust messages that appear urgent or official.Scammers often impersonate electric, gas or water utilities. What to know: Utilities do not charge fees to restore power and do not demand payment by text, gift cards or apps.These scams spike right after storms hit. What to know: Legitimate aid is announced through official government or well-known nonprofit channels, not unsolicited messages.Storms disrupt normal services, which scammers exploit. What to know: Do not click links or pay deposits without verifying the company independently.Storm chaos makes it easier for attackers to slip through unnoticed. What to know: Never share one-time codes or login details, even if the message looks legitimate.Taking a few precautions now can help you avoid costly mistakes when outages, delays and scam messages start piling up.Scammers rely on panic. If a message pressures you to act fast, stop and verify it through a trusted source.Go directly to official websites or apps instead of tapping links in texts or emails. Keep your operating system up to date, and use strong antivirus software to block malicious links and fake websites.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Enable two-factor authentication (2FA) on email, banking, and utility accounts so stolen passwords cannot be used alone.Many storm scams work because criminals already have your phone number, address or email. Using a data removal service to opt out of data broker sites can reduce how easily scammers target you during emergencies.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet . By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Utilities and government agencies do not charge fees to restore service or release emergency assistance.When power and internet access are limited, it is harder to verify messages quickly. That makes preparation just as important as awareness. A little skepticism now can prevent financial loss and identity theft when help is hardest to reach.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. Winter storms can turn small tech decisions into critical ones. Ice, power outages and overloaded cell networks can leave people cut off faster than expected, especially in regions not built for prolonged winter weather. Preparing your devices, alerts, vehicles and accounts ahead of time gives you more control when conditions worsen. It also reduces panic and limits your exposure to scams that thrive during emergencies. A little planning now can make a big difference when help is harder to reach.Have you taken steps to prepare your tech for this winter storm, or did this checklist highlight something you still need to do? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.  

Ransomware attack exposes Social Security numbers at major gas station chain

Cybercriminals are happy to target almost any industry where data can be stolen. In many cases, less prepared and less security-focused companies are simply easier targets. A recent ransomware attack on a company tied to dozens of gas stations across Texas shows exactly how this plays out. The incident exposed highly sensitive personal data , including Social Security numbers and driver's license details, belonging to hundreds of thousands of people. The breach went undetected for days, giving attackers ample time to move through internal systems and steal sensitive data. If you've ever paid at the pump or shopped inside one of these convenience stores, this is the kind of incident that should make you stop and pay attention. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.According to a disclosure filed with the Maine Attorney General's Office, Gulshan Management Services, Inc. reported a cybersecurity incident that impacted more than 377,000 individuals. Gulshan is linked to Gulshan Enterprises, which operates around 150 Handi Plus and Handi Stop gas stations and convenience stores across Texas. WINDOWS 10 USERS FACE RANSOMWARE NIGHTMARE AS MICROSOFT SUPPORT ENDS IN 2025 WORLDWIDE The company says it detected unauthorized access to its IT systems in late September. Investigators later determined that attackers had been inside the network for roughly ten days before anyone noticed. The intrusion began with a phishing attack, a reminder of how a single deceptive email can still open the door to massive breaches.During that window, the attackers accessed and stole personal data, then deployed ransomware that encrypted files across Gulshan's systems. The compromised information includes names, contact details, Social Security numbers and driver's license numbers. That combination is especially dangerous, since it can be used for identity theft, account takeovers and fraud that may surface months or even years later.So far, no known ransomware group has publicly taken credit for the attack. That might sound like good news, but it does not necessarily change the risk for affected individuals. In many ransomware cases, silence can mean one of two things. Either the attackers have not yet posted stolen data publicly, or the victim company may have resolved the incident privately.Gulshan's filing states that it restored its systems using known-safe backups. That detail often suggests a company chose to rebuild rather than negotiate with attackers. Even so, once data has been copied out of a network, there is no way to pull it back. Whether or not the stolen information ever appears online, the exposure alone puts affected people at long-term risk .This incident also highlights a recurring pattern. Retail and service businesses handle huge volumes of personal data but often rely on legacy systems and frontline employees who are prime phishing targets. Gas stations may not feel like obvious hacking targets, but their payment systems, loyalty programs and HR databases make them valuable all the same.We reached out to Gulshan Management Services for comment regarding the breach, but did not receive a response before our deadline.If your information was exposed in this breach or any similar ransomware incident, there are concrete steps you can take to reduce the fallout.If the company offers free credit monitoring or identity protection, enroll in it. These services can alert you early if someone tries to open accounts or misuse your identity. If nothing is offered, consider signing up for a reputable identity theft protection service on your own.Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at guy.com. The less of your information that's floating around data broker sites, the harder it is for criminals to target you. Data removal services can help reduce your digital footprint over time.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting guy.com. Get a free scan to find out if your personal information is already out on the web: guy.com. A password manager helps you create and store unique passwords for every account. If attackers try to reuse stolen data to break into your online accounts, strong, unique passwords can stop that attempt cold.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS Check out the best expert-reviewed password managers of 2026 at guy.com. 2FA adds an extra barrier, even if someone has your personal details. Prioritize email, banking, cloud storage, and shopping accounts, since those are often targeted first.Strong antivirus software can help detect phishing attempts, malicious downloads, and suspicious activity before it turns into a full compromise. Keep real-time protection enabled and don't ignore warnings.The best way to safeguard yourself from malicious links that install malware , potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at guy.com. After breaches like this, scammers often send fake emails or texts pretending to be the affected company or a credit monitoring service. Slow down, verify messages independently, and never click links you weren't expecting.Check your reports from all major credit bureaus for unfamiliar accounts or inquiries. You're entitled to free reports, and catching issues early makes them much easier to fix.If criminals expose your Social Security number, place a credit freeze as soon as possible. A credit freeze blocks lenders from opening new accounts in your name, even when thieves have your personal details. The credit bureaus offer freezes for free, and you can temporarily lift one when you apply for credit yourself. This step stops identity theft before it starts, instead of alerting you after the damage is done. If you prefer not to freeze your credit, place a fraud alert instead. A fraud alert tells lenders to verify your identity before approving credit, which adds another layer of protection.To learn more about how to do this, go to Cyberguy.com and search "How to freeze your credit." When Social Security numbers are stolen, tax fraud often follows. Criminals can file fake tax returns in your name to steal refunds before you ever submit your paperwork. An IRS Identity Protection PIN (IP PIN) helps prevent this by ensuring only you can file a tax return using your SSN. It's a simple but powerful safeguard that can block a common form of identity theft tied to data breaches.Don't just watch for new fraud, proactively secure the accounts you already have. Enable alerts on bank and credit card accounts for large transactions, new payees, or changes to contact information. If your SSN or driver's license number was exposed, consider calling your bank to ask about additional protections or account notes. Acting early can prevent small issues from becoming major financial problems.Your personal data doesn't just live with banks and hospitals. Retailers, gas stations, and convenience store operators also hold information that can cause real harm if it falls into the wrong hands. When attackers get in through something as simple as a phishing email and stay undetected for days, the damage can spread fast. You can't prevent these breaches yourself, but you can limit how much power stolen data gives criminals by locking down your accounts and staying alert.Do you think everyday businesses like gas stations take cybersecurity seriously enough? Let us know by writing to us at guy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.  

Fox News AI Newsletter: Historic infrastructure buildout for AI

IN TODAY'S NEWSLETTER:- Nvidia CEO says AI boom is fueling the 'largest' infrastructure buildout in history
- Apple taps Google Gemini to power Apple Intelligence
- Amazon to cut thousands of jobs in sweeping corporate layoffs TECH TSUNAMI: Nvidia CEO Jensen Huang said the rapid expansion of artificial intelligence is setting off what he described as the "largest infrastructure buildout in human history," as companies and governments pour trillions of dollars into the computing power needed to run AI systems in real time. TITANS UNITE: Apple and Google just made one of the most important artificial intelligence (AI) announcements of the year. Under a new multi-year collaboration, Apple will base the next generation of its Apple Foundation Models on Google's Gemini models and cloud technology. JOB CUTS: Amazon is planning to cut thousands of jobs as part of a broader push to eliminate nearly 10% of its corporate workforce, according to Reuters. GOING MOBILE: Amazon has rolled out Alexa.com, which brings Alexa+ directly to your web browser for Early Access users. Instead of relying on a speaker or phone, you can now open a laptop and start using Alexa like any other web-based AI tool. AI FOR MAIN STREET: The House of Representatives passed a bill that would require the government to create more access to artificial intelligence (AI) education for small businesses Tuesday evening. BEYOND DATA CENTERS: Qualcomm CEO Cristiano Amon joins "Mornings with Maria" to discuss the next phase of the AI boom that's expanding beyond data centers into cars, devices and robotics. THE ENTERPRISE SHIFT: ServiceNow and OpenAI are deepening their strategic partnership with an enhanced collaboration to help enterprises accelerate efforts to turn artificial intelligence (AI) into measurable business outcomes. JOB CONCERNS: Palantir CEO Alex Karp suggested Tuesday that usage of artificial intelligence "bolsters civil liberties," while also warning Europe that its adoption of technology is falling behind the U.S. and China.  NOT TRUE: Billy Bob Thornton is setting the record straight about hanging up his cowboy hat. The 70-year-old star of Taylor Sheridan's hit series "Landman" shut down rumors he's exiting the Paramount+ drama, calling the claims false. 'SO WRONG': Pro Football Hall of Famer Jimmy Johnson appeared to be just as unsettled as other football fans were over an AI video of him that appeared during the college football national championship. COMING SOON: Tesla CEO Elon Musk said Thursday the company is planning to make its Optimus robots available for sale to the public by the end of 2027. Facebook
Instagram
YouTube
X
LinkedIn Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health Fox News Go Fox Nation Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Private autonomous pods could redefine ride-sharing

Crowded cabins and forced small talk have long defined ride-sharing. A California startup wants to flip that idea on its head. Pliyt believes the future of ride-sharing means sharing the ride as little as possible. Instead of one shared cabin, its autonomous vehicle concept divides the interior into four fully independent pods. Each one acts like a private room on wheels. The goal is simple. Get you from point A to point B without invading your personal space . Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Pliyt's vehicle is designed from the inside out. Each passenger rides inside a self-contained capsule that prioritizes privacy, comfort and control. The company says the idea resonated strongly when the prototype debuted at CES earlier this month. Here is what sets the concept apart: BLUE-CITY RIDERS HIT WITH PRICIEST UBER FARES AS LA, NYC COSTS SOAR PAST COMPARABLE METROS, DATA SHOWS You decide how social or private your ride feels. Traveling with a companion? The divider between pods can be lowered so you can share the space by choice. "We believe rider choice and personal space will be foundational to the future of shared autonomous mobility," the company told CyberGuy. "As vehicles become autonomous, differentiation will shift from driving to experience. Giving riders control over privacy, comfort, and interaction, rather than forcing a one-size-fits-all shared cabin, will be critical for trust and adoption, especially in dense urban environments. Shared mobility doesn't have to mean shared personal space, and we see that as a key evolution of the category."Yes. Pliyt vehicles are designed to operate without human drivers. However, the company does not plan to build its own autonomous driving system. Instead, Pliyt intends to partner with established autonomy providers once development progresses."Our current plan is to launch an initial service in San Francisco around 2028, beginning with controlled, geo-fenced deployments and expanding gradually as autonomy, infrastructure, and regulatory frameworks mature," a spokesperson for Pliyt told CyberGuy. "Our focus today is on building the right vehicle architecture, partnerships, and user experience to support that rollout responsibly."Privacy sits at the center of Pliyt's design philosophy. Every pod is built for in-ride anonymity even during shared trips. Fellow passengers cannot see you, and you cannot see them unless you choose to. This approach stands out in a world where many mobility platforms depend on data collection and shared environments. Pliyt positions privacy as foundational rather than optional. The company says no personal identities are visible during rides. The experience aims to feel calm, intentional and free from observation. CAN AUTONOMOUS TRUCKS REALLY MAKE HIGHWAYS SAFER? Pliyt also leans heavily into comfort. Seats feature what the company calls zero-gravity positioning . You will not float like an astronaut, but the posture is designed to reduce pressure and fatigue. Large windows offer panoramic city views while still maintaining privacy. Personal lighting and climate controls help tailor the ride to your preferences. If relaxing is not your goal, productivity comes built in. The retractable workstation allows you to work, review documents or create content while moving through the city.Autonomous pods are not entirely new. Companies like Zoox and Waymo already operate self-driving vehicles with unique interiors. Waymo's Zeekr RT, for example, focuses on spacious seating and rider comfort. Pliyt's difference lies in isolation by design. Instead of rethinking a shared cabin, it breaks the vehicle into four private spaces. The result feels closer to a personal lounge than a ride-share.If this concept becomes reality, ride-sharing could feel very different. No forced conversations. No shared armrests. No feeling watched. For commuters, it could mean working quietly on the way to the office. For travelers, it could mean relaxing without distractions. For introverts, it could mean finally enjoying shared mobility on their own terms. It also raises bigger questions about how future cities balance efficiency with dignity and personal space.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. Pliyt is not promising faster rides or cheaper fares. It is promising something more subtle. A calmer, more respectful way to move through cities . Whether the concept scales will depend on partnerships, regulation and public adoption. Still, the idea challenges long-standing assumptions about what ride-sharing has to feel like. If autonomous vehicles are coming either way, designs like this suggest they do not have to feel crowded or impersonal.Would you choose a shared ride that feels completely private, or does part of you still want the human element along the way? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved. 

Web skimming attacks target major payment networks

Online shopping feels familiar and fast, but a hidden threat continues to operate behind the scenes. Researchers are tracking a long-running web skimming campaign that targets businesses connected to major payment networks . Web skimming is a technique where criminals secretly add malicious code to checkout pages so they can steal payment details as shoppers type them in. These attacks work quietly inside the browser and often leave no obvious signs. Most victims only discover the problem after unauthorized charges appear on their statements. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY Magecart is the name researchers use for groups that specialize in web-skimming attacks. These attacks focus on online stores where shoppers enter payment details during checkout. Instead of hacking banks or card networks directly, attackers slip malicious code into a store's checkout page. That code is written in JavaScript, which is a common type of website code used to make pages interactive. Legitimate sites use it for things like forms, buttons and payment processing.In Magecart attacks, criminals abuse that same code to secretly copy card numbers, expiration dates, security codes and billing details as shoppers type them in. The checkout still works, and the purchase goes through, so there is no obvious warning sign. Magecart originally described attacks against Magento-based online stores. Today, the term applies to web-skimming campaigns across many e-commerce platforms and payment systems.Researchers say this campaign targets merchants tied to several major payment networks, including:Large enterprises that rely on these payment providers face a higher risk due to complex websites and third-party integrations. 700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS Attackers usually enter through weak points that are easy to overlook. Common entry paths include vulnerable third-party scripts, outdated plugins and unpatched content management systems. Once inside, they inject JavaScript directly into the checkout flow. The skimmer monitors form fields tied to card data and personal details, then quietly sends that information to attacker-controlled servers.To avoid detection, the malicious JavaScript is heavily obfuscated. Some versions can remove themselves when they detect an admin session, which makes inspections appear clean. Researchers also found the campaign uses bulletproof hosting. These hosting providers ignore abuse reports and takedown requests, giving attackers a stable environment to operate. Because web skimmers run inside the browser, they can bypass many server-side fraud controls used by merchants and payment providers.Magecart campaigns impact three groups at the same time:This shared exposure makes detection slower and response more difficult. NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY While shoppers cannot fix compromised checkout pages, a few smart habits can reduce exposure, limit how stolen data is used, and help catch fraud faster. Virtual and single-use cards are digital card numbers that link to your real credit or debit account without exposing the actual number. They work like a normal card at checkout, but add an extra layer of protection. Most people already have access to them through services they use every day, including:Major banks and credit card issuers that offer virtual card numbers inside their appsMobile wallet apps like Apple Pay and Google Pay generate temporary card numbers for online purchases, keeping your real card number hidden.Some payment apps and browser tools that create one-time or merchant-locked card numbersA single-use card typically works for one purchase or expires shortly after use. A virtual card can stay active for one store and be paused or deleted later. If a web skimming attack captures one of these numbers, attackers usually cannot reuse it elsewhere or run up repeat charges, which limits financial damage and makes fraud easier to stop.Transaction alerts notify you the moment your card is used, even for small purchases. If web skimming leads to fraud, these alerts can expose unauthorized charges quickly and give you a chance to freeze the card before losses grow. For example, a $2 test charge on your card can signal fraud before larger purchases appear.Use strong, unique passwords for banking and card portals to reduce the risk of account takeover. A password manager helps generate and store them securely.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Strong antivirus software can block connections to malicious domains used to collect skimmed data and warn you about unsafe websites.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Data removal services can reduce how much personal information is exposed online, making it harder for criminals to pair stolen card data with full identity details.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet . By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Review statements regularly, even for small charges, since attackers often test stolen cards with low-value transactions.Magecart web skimming shows how attackers can exploit trusted checkout pages without disrupting the shopping experience. While consumers cannot fix compromised sites, simple safeguards can reduce risk and help catch fraud early. Online payments rely on trust, but this campaign shows why that trust should always be paired with caution.Does knowing how web skimming works make you rethink how safe online checkout really is?  Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved.

Apple taps Google Gemini to power Apple Intelligence

Apple and Google just made one of the most important artificial intelligence (AI) announcements of the year. Under a new multi-year collaboration, Apple will base the next generation of its Apple Foundation Models on Google's Gemini models and cloud technology.The companies confirmed the partnership in a joint statement, signaling a major shift in how Apple plans to deliver AI features across the iPhone, iPad and Mac. The deal comes as Apple faces growing pressure to catch up in AI, especially after delaying a long-promised overhaul of Siri.  Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. 5 BEST APPS TO USE ON CHATGPT RIGHT NOW evaluated multiple AI options before settling on Gemini. According to the joint statement, Apple believes Google's AI provides the strongest foundation for its own models. Gemini has quickly become one of the most capable large language model families, backed by Google's massive cloud infrastructure. For Apple, this means faster development, more reliable performance and the ability to roll out advanced features without rebuilding everything from scratch. At the same time, Apple says Apple Intelligence will still run on the device and through its Private Cloud Compute system. In other words, Apple controls how user data flows, even if the underlying models come from Google.Here is the full joint statement from the two companies:"Apple and Google have entered into a multi-year collaboration under which the next generation of Apple Foundation Models will be based on Google's Gemini models and cloud technology. These models will help power future Apple Intelligence features, including a more personalized Siri coming this year."After careful evaluation, Apple determined that Google's AI technology provides the most capable foundation for Apple Foundation Models and is excited about the innovative new experiences it will unlock for Apple users. Apple Intelligence will continue to run on Apple devices and Private Cloud Compute, while maintaining Apple's industry-leading privacy standards."That last line is critical. Apple is clearly trying to reassure users that privacy remains central, even with Google's technology involved. CHATGPT'S GPT-5.2 IS HERE, AND IT FEELS RUSHED A more personalized Siri is one of the biggest promises tied to this deal. Apple had already previewed major Siri improvements but ran into development problems. Reports described internal frustration, bugs and delays that pushed the revamped assistant further out than planned. This partnership helps explain why. By leaning on Gemini, Apple can accelerate Siri's evolution instead of trying to solve every AI challenge internally. The result should be a smarter assistant that better understands context, handles complex requests and integrates more deeply across Apple apps.This deal did not happen in a vacuum. Apple has faced criticism for moving too slowly on AI while rivals pushed ahead. Apple had reportedly been in talks to license a custom version of Gemini for Siri and was expected to pay roughly $1 billion per year, though the official announcement did not confirm any financial terms. Apple has also reshuffled its AI leadership. The company recently hired Amar Subramanya as vice president of artificial intelligence. He replaced John Giannandrea, who stepped down from the role after leading Apple's AI strategy since 2018.There is also a regulatory angle. Apple and Google already face scrutiny for their long-standing search agreement. That partnership came under renewed attention after U.S. District Judge Amit Mehta ruled that Google holds a monopoly in online search, while still allowing payments to Apple to keep Google as the default search engine on iPhones. This new AI collaboration could attract fresh attention from antitrust regulators who worry about powerful tech companies becoming even more intertwined.For those of you using Apple devices, the impact is straightforward. You should see smarter Apple Intelligence features arrive faster, starting with a more capable Siri. Tasks like summarizing messages, handling complex reminders and understanding context across apps should improve. At the same time, Apple insists your data stays protected. Apple Intelligence will still rely on device processing and Private Cloud Compute, rather than funneling personal data directly into Google's systems. In short, users get better AI without giving up Apple's privacy stance, at least in theory. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. 's partnership with Google marks a turning point in its AI story. Instead of going it alone, Apple is betting that combining its privacy-focused platform with Google's AI muscle is the fastest path forward. If Apple delivers on its promises, this deal could finally close the AI gap that has frustrated users and investors alike. The real test will come when those features land on your devices.Do you trust Apple to balance powerful AI with privacy now that Google's technology sits under the hood? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved.

'Are You Dead?' app taps into global loneliness crisis

A new mobile app from China is going viral for a reason that feels both unsettling and familiar. It exists to answer one basic question for people who live alone: Are you still alive? The app is called "Are You Dead?" and it has surged to the top of China's paid app charts. It also climbed into the top ten paid apps in the United States. Its popularity reflects more than curiosity. It highlights how many people now live by themselves and worry about what happens if something goes wrong. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. 10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS The app's design is intentionally simple. After paying about $1.15, users add an emergency contact and agree to check in every two days.Here is how it works in practice:That is it. No tracking. No health data. No constant monitoring. The goal is reassurance, not surveillance. On its English-language page, the app goes by the name Demumu. The developers describe it as a "lightweight safety tool" meant to make solitary life feel less risky. For now, the app is available only on Apple's App Store for iPhone and iPad.The app debuted quietly in May. Then it took off. It is now the top-paid app on China's Apple App Store and ranks sixth among paid apps in the U.S. The surge reflects a major social shift. More people in China live alone than ever before. One-child policies, rapid urbanization and work that pulls people far from their families all play a role. By 2030, China is projected to have around 200 million one-person households. At that scale, a simple safety check turns from a niche idea into a mass-market tool.For many users, the app is not a joke. It is a safety net. One 38-year-old user told reporters he lives far from his family and worries about dying alone in a rented apartment. He set his mother as his emergency contact so someone would know if something happened to him. Others echoed a similar sentiment online. People living alone, introverts, unemployed workers and those dealing with depression said the app offers peace of mind without requiring constant interaction. Some users even reportedly framed it as a practical courtesy to loved ones rather than a morbid tool. HOW TO HELP OLDER RELATIVES WITH TECH OVER THE HOLIDAYS Not everyone is comfortable with the app's blunt branding. Some users say the name is too dark and turns people away. Several suggested a simple fix: rename it "Are You Alive?" One commenter argued that death in this context is not only literal but social. A softer name might signal care rather than fear. Some users said they would gladly pay for the app if it sounded less grim. The developers appear to be listening.The app is built by a small Gen Z team at Moonscape Technologies. In public statements, the company said it plans to refine the product based on feedback.Planned updates include:Those changes matter in a country where about one in five people is now over age 60.The app's success abroad suggests the issue is global. In the U.S., living alone is becoming the norm rather than the exception. According to recent census data, 27.6% of U.S. households had just one person in 2020. That figure was under 8% in 1940. Loneliness trends among younger men are especially striking. A Gallup poll found that about one in four Gen Z and millennial men in the U.S. report feeling lonely. That rate is higher than in peer countries like France, Canada, Ireland and Spain. Against that backdrop, an app that asks people to check in feels less extreme and more revealing. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com. rget=_new href="https://www.foxnews.com/tech/5-best-apps-use-chatgpt-right-now" target="_blank" rel="noopener"> 5 BEST APPS TO USE ON CHATGPT RIGHT NOW "Are You Dead?" succeeds because it addresses a fear many people rarely say out loud. As more people live alone, the worry is not only about loneliness but also about invisibility. A simple tap every two days becomes a quiet signal that someone still knows you are here. The app may evolve, change its name or add features. The problem it highlights is not going away.If an app has to ask whether you are alive, what does that say about how disconnected modern life has become? Let us know by writing to us at  Cyberguy.com Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Distributed by aarss.com.