Technology News Articles on Fox News

Over 8M patient records leaked in healthcare data breach

In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join. Cybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers. MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS Clues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERS The exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT If your information was part of the healthcare breach or any similar one, it's worth taking a few steps to protect yourself. 1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it's crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it's compromised.  See my tips and best picks on how to protect yourself from identity theft. 2. Use personal data removal services:  The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.  Check out my top picks for data removal services here.  GET FOX BUSINESS ON THE GO BY CLICKING HERE Get a  free scan  to find out if your personal information is already out on the web 3. Have strong antivirus software:  Hackers have people's email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you're not careful. However, you're not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.  Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices . 4. Enable two-factor authentication:  While passwords weren't part of the data breach, you still need to enable  two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data. 5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.  WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE If nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.Do you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at  Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Compact machine turns air into ready-to-use gasoline

Recently, Aircela, a fuel company headquartered in New York, publicly demonstrated a machine in Manhattan that produces gasoline directly from air.  The event attracted city and state officials, investors and energy professionals who witnessed the launch of this compact, refrigerator-sized unit. Aircela's technology combines direct air capture with on-site fuel synthesis, providing fossil-free gasoline that is fully compatible with existing engines and infrastructure. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide -  free when you join. Led by co-founder and CEO Eric Dahlgren (pictured on the right below), Aircela has  developed a machine that produces real, engine-ready gasoline from just air and water, powered by renewable electricity and advanced chemical processes. The technology is based on direct air capture research, notably the work of physicist Klaus Lackner (shown on the left below), and is designed for easy installation in residential, commercial and industrial settings.The process begins by drawing in ambient air and using a water-based solution containing potassium hydroxide to efficiently capture carbon dioxide. As air flows through a specially designed chamber, the liquid sorbent absorbs carbon dioxide from the atmosphere, which is then regenerated for repeated use. Next, the system uses renewable electricity to split water into hydrogen and oxygen through electrolysis. The hydrogen is retained for the fuel synthesis process, while the oxygen is safely released into the environment. FLYING CAR WITH 620-MILE RANGE SCHEDULED FOR UPCOMING LAUNCH The captured carbon dioxide and generated hydrogen are then combined to create methanol, which is subsequently converted into gasoline using established chemical processes. The resulting gasoline contains no sulfur, ethanol or heavy metals, making it fully compatible with existing engines and infrastructure. Each Aircela unit can produce approximately one gallon of gasoline per day from around 22 pounds of captured carbon dioxide with a storage capacity of up to 17 gallons. This innovative machine enables users to generate fossil-free gasoline on site using only air, water and renewable electricity.Unlike traditional synthetic fuel projects that rely on large, centralized plants, Aircela's approach is modular and distributed. Each unit can produce gasoline on site, making it suitable for off-grid locations, ports, islands or emergency situations. This design allows users to access cleaner fuel without the need to alter their vehicles or fueling routines. HYDROGEN FUEL CELL TRUCKS HIT THE ROADS IN GEORGIA Aircela has secured funding from notable investors, including Chris Larsen, founder of Ripple Labs' Jeff Ubben, a board member at ExxonMobil; and Maersk Growth, the venture capital arm of A.P. Moller-Maersk. During the demonstration, Morten Bo Christiansen, Maersk's head of energy transition, emphasized the machine's potential to support global efforts to reduce carbon emissions , particularly in the shipping and logistics industries.The process developed by Aircela is intended to be carbon neutral, as the carbon dioxide released when the gasoline is burned is balanced by the amount captured during production. The gasoline works with current engines and fueling systems, so there is no need for costly upgrades. Distributed production reduces reliance on centralized refineries and long supply chains. In addition, the fuel's purity, free from sulfur and additives, helps lower harmful emissions beyond just carbon dioxide. GET FOX BUSINESS ON THE GO BY CLICKING HERE Aircela plans to begin initial deployments of its machines in the fall of 2025, with a focus on off-grid, commercial and industrial users. The company's goal is to increase production, reduce costs and make the technology widely available. While the current output is modest, Aircela aims to provide a practical, climate-aligned alternative to fossil fuels that does not require people to change their vehicles or daily habits. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Aircela's gasoline-from-air machine shows that sometimes the best solutions are the ones that fit right into our daily routines. Instead of requiring new cars or major changes, this technology lets people keep using what they already have, just with cleaner fuel. Watching carbon pulled from the air and turned into gasoline on the spot feels like a practical step toward a more sustainable future. As Aircela gets ready to roll out these machines, it will be interesting to see how this approach might help ease the transition to cleaner energy for everyone.What would it take for you to fill up your tank with gasoline made from thin air? Let us know by writing us at   Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to   Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

How addresses are collected and put on people finder sites

Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join. If you've ever searched for your name and found personal details, like your address, on unfamiliar websites, you're not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives. 11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025 While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach,  more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams.First, let's define  two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. Your home address can appear in: WHAT IS ARTIFICIAL INTELLIGENCE (AI)? These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.Other sites buy your data from companies you've interacted with:People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information.The Federal Trade Commission (FTC) advises people to  request the removal of their private data , including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are  a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks  increased by 33% in 2024 , according to the FBI. So, having your home address publicly accessible can lead to several risks:The good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to  delete your private information , including your home address, from such websites. 1. Use personal data removal services:  Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you're looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.  Check out my top picks for data removal services here.  Get a  free scan to find out if your personal information is already out on the web 2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site's opt-out process carefully, and confirm they've removed all your personal info, otherwise, it may get relisted. 3. Monitor your digital footprint:  I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there's no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time. 4. Limit sharing your address online:  Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don't track your location.Your home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.How do you feel about companies making your home address so easy to find? Let us know by writing us at  Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

Fox News AI Newsletter: Hollywood studios sue 'bottomless pit of plagiarism'

IN TODAY'S NEWSLETTER:
- Major Hollywood studios sue AI company over copyright infringement in landmark move
- Meta's Zuckerberg aiming to dominate AI race with recruiting push for new 'superintelligence' team: report
- OpenAI says this state will play central role in artificial intelligence development 'PIRACY IS PIRACY': Two major Hollywood studios are suing Midjourney, a popular AI image generator, over its use and distribution of intellectual property. AI RACE: Meta CEO  Mark Zuckerberg is reportedly building a team of experts to develop artificial general intelligence (AGI) that can meet or exceed human capabilities. TECH HUB: New York is poised to play a central role in the development of  artificial intelligence (AI) , OpenAI executives told key business and civic leaders on Tuesday. APPLE FALLING BEHIND: Apple's annual Worldwide Developers Conference (WWDC) kicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision.  FROM COAL TO CODE: This week, Amazon announced a $20 billion investment in artificial intelligence infrastructure in the form of new data centers, the largest in the commonwealth's history, according to the eCommerce giant. DIGITAL DEFENSE: A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly. SHIELD FROM BEIJING: Rep. Darin LaHood, R-Ill., is introducing a new bill Thursday imploring the National Security Administration (NSA) to develop an "AI security playbook" to stay ahead of threats from China and other foreign adversaries.  ROBOT RALLY PARTNER: Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve.  DIGITAL DANGER ZONE: Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook's own ad system.  'EXPONENTIAL RATE': Artificial intelligence is helping Chipotle rapidly grow its footprint, according to CEO Scott Boatwright.  AI TAKEOVER THREAT: The hottest topic nowadays revolves around Artificial Intelligence (AI) and its potential to rapidly and imminently transform the world we live in - economically, socially, politically and even defensively. Regardless of whether you believe that the technology will be able to develop superintelligence and lead a metamorphosis of everything, the possibility that may come to fruition is a catalyst for more far-leftist control. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Robots step into the ring for a first-ever boxing match

Robot combat just got a lot more interesting in Hangzhou, China. Four Unitree G1 robots, each steered by a human operator, went head-to-head in a tournament called Unitree Iron Fist King: Awakening!The event took place right next to Unitree's massive new factory and drew a lively mix of tech fans and people just curious to see what all the buzz was about. This wasn't only about showing off robotic strength; it gave everyone a front-row seat to how impressively robots can now move and react almost like humans. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join. The competition was structured like a classic martial arts tournament . Each match consisted of three rounds, each lasting two minutes. Points were awarded for strikes: one for a hand hit, three for a leg strike. Knockdowns or failure to recover within eight seconds meant penalties, adding to the tension. The format kept things fast-paced and easy to follow. AI TENNIS ROBOT COACH BRINGS PROFESSIONAL TRAINING TO PLAYERS rget=_new href="https://cyberguy.com/robot-tech/ai-humanoid-robot-changing-buy-cars-dealerships/" target="_blank" rel="nofollow noopener"> AI HUMANOID ROBOT IS CHANGING THE WAY YOU BUY CARS AT DEALERSHIPS The opening match set the tone. " AI Strategist ," controlled by Lu Xin, faced "Silk Artisan," piloted by Jiao Tianqi. AI Strategist wasted no time, landing precise blows and ultimately knocking out Silk Artisan in the third round.Next up, "Armored Mulan" faced off against "Energy Guardian." Energy Guardian scored a dramatic knockdown in the first round, and despite a late stumble from Armored Mulan, Energy Guardian secured the win.The final bout saw AI Strategist return to the ring against Energy Guardian. In a display of skill and adaptability, AI Strategist delivered three consecutive knockouts, clinching the championship. According to Zhou Di, a robotics expert with the China Computer Federation, "The robots' ability to predict opponents' moves and adjust in real time is a leap forward." CHINESE HUMANOID ROBOT WITH EAGLE EYE VISION AND POWERFUL AI Standing 4.3 feet tall and weighing 77 pounds, the  Unitree G1 is built for agility. With 23 degrees of freedom and powerful knee joints, these robots can throw hooks and side kicks and recover quickly after a fall. They may look a bit clunky in action, but their movements are surprisingly fluid and engaging.The G1 is designed with accessibility in mind. It's more affordable than Unitree's flagship H1 model, which stands nearly 6 feet tall and costs upwards of $90,000. The G1 can be folded up and carried by one person, and it can reach speeds of about 4.5 miles per hour. Its impressive moves, such as kip-ups and side flips, are made possible by the LAFAN1 motion capture dataset, which translates human movements into robotic actions. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? rget=_new href="https://cyberguy.com/robot-tech/humanoid-robot-breakdances-history/" target="_blank" rel="nofollow noopener"> HUMANOID ROBOT BREAKDANCES ITS WAY INTO HISTORY This tournament wasn't just for show. It served as a real-world test for the G1's sensors, motors, and algorithms. Every punch, dodge and recovery pushed the robots to their limits. Observers noted some minor issues, like slight delays in reaction time or wobbles after taking a hit, but overall, the robots handled the pressure well.One of the most interesting aspects of the G1 is its ability to learn new skills over time. Operators can control the robots using motion-sensing devices, traditional controllers or even voice commands. Unitree is making it easy for anyone to experience these battles, whether through live streams or in-person events. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The "Unitree Iron Fist King: Awakening!" tournament really showed us what the future of robot combat could look like. The G1 robots wowed everyone with their quick moves, flexibility and the kind of action that keeps a crowd cheering. As the tech keeps getting better, these events are only going to get more fun and easier for everyone to check out, bringing the excitement of robot sports to fans everywhere.Would you buy a ticket to watch a live robot battle, or do you prefer traditional sports? Let us know by writing us a trget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener">   Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to   Cyberguy.com/Newsletter rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

11 easy ways to protect your online privacy in 2025

Privacy is getting harder to protect in a world where everything is connected. Whether you're chatting with an AI, checking your email or using your smartphone, your personal information is constantly being collected, tracked and sometimes even sold. But protecting your privacy in 2025 doesn't have to be overwhelming. With a few practical steps, you can take back control of your data and make your online life safer. This guide walks you through 11 easy ways to get started. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join. AI chatbots like ChatGPT are useful, but they're not private journals. The platform owners may have privacy policies and use the latest security measures, but that doesn't mean you should let your guard down. When using these tools, refrain from sharing any personal information, such as your name, address, birthdate, passwords, financial details or sensitive conversations. Remember that AI systems store and process your inputs, and despite security promises, data breaches can occur. SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST 1 CHATGPT SEARCH Tip: Treat all online forms of AI interaction like public forums. Keep your examples generic and use caution with anything that could identify you.If you're going to input your personal information while using these AI tools, ensure there is an option to prevent them from sharing it. On ChatGPT, for instance, do the following: Why it matters: AI tools may seem personal, but they're not secure vaults. Guarding what you share helps prevent misuse, identity theft or data leaks from breaches. CLEAN UP YOUR PHONE: SPEED, STORAGE AND PRIVACY BOOST IN MINUTES Your email is often the key to your online identity and a common target for spam. By creating disposable email aliases that forward messages to your main inbox, you can keep your real address hidden from websites and services. These unique aliases act as shields, so if one starts getting spammed or is involved in a data breach, you can simply deactivate it without affecting your main email account.My top recommendation to avoid being inundated with spam emails is  to use an alias email address . An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address.In addition to creating throwaway email accounts for online sign-ups and other circumstances where you would not want to disclose your primary email address, alias email addresses are helpful for handling and organizing incoming communications. Sometimes, it's best to create various email aliases so that you don't have to worry about getting tons of spam mail or having your information taken in a data breach. An alias email address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address.  See my review of the best secure and private email services here . Why it matters: You stay anonymous, avoid data leaks and never have to change your main email address again. BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS Meta frequently updates its privacy settings, so it's best to check regularly to see how you can improve your privacy. Use Facebook's  Privacy Checkup tool to review and adjust crucial settings, including post visibility, app permissions, search visibility and friend-request settings. This comprehensive tool helps ensure your profile remains as private as you want it to be. You can find the tool by following these steps:Once you open the Privacy Checkup, you'll be guided through several key areas to customize your privacy preferences and better control your information. Quick tip:  Set a reminder to run a privacy checkup every few months, especially after major Facebook updates. This way, you'll always be in control of your information. Why it matters: Social media platforms thrive on your personal data. Adjusting your settings regularly puts you back in control of what others and Facebook can see and use. HOW TO PROTECT YOUR ONLINE PRIVACY AND SECURITY ON YOUR NEXT CRUISE VACATION Your name, phone number and home address may already be listed on people-search sites like Spokeo, Whitepages and BeenVerified. These data brokers collect and sell your personal information without you even knowing it. Fortunately, personal data removal services are available to protect your privacy. They automatically send legal removal requests to hundreds of data brokers. They also go above and beyond by continuously monitoring them in case these third parties happen to get your information again.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.  Check out my top picks for data removal services here . Get a rget=_new href="https://cyberguy.com/privacy/best-services-for-removing-your-personal-information-from-the-internet/#freescan" target="_blank" rel="nofollow noopener"> free scan to find out if your personal information is already out on the web . Why it matters: The less personal information available about you online, the harder it is for scammers and identity thieves to target you and the more peace of mind you'll have.  10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE'S SECURITY AND PRIVACY If you're still using standard texting apps or platforms like Facebook Messenger, it's time to upgrade to a more secure option. Apps like  Signal and Session offer end-to-end encryption, no ads and no metadata tracking, meaning they can't see who you're talking to or what you're saying. Both apps support disappearing messages, giving you more control over how long your conversations stick around. Why it matters:  Your messages stay private and can't be accessed by hackers, advertisers or the app developers themselves.Google collects a massive amount of data from your searches, YouTube views, Gmail activity and location history, all of which fuels targeted advertising. You can stop much of this tracking by turning off Ad Personalization and deleting your activity history. Here's what to do: Why it matters:  Cutting down on ad tracking reduces how much of your online behavior is used to build a profile on you, often without your knowledge.Apps don't need to know your every move. Disabling or limiting location tracking is one of the simplest ways to protect your physical privacy. Here's what to do: iPhone: For apps like Maps, toggle  Precise Location off to prevent pinpoint tracking.To disable location tracking entirely, toggle  Location Services off at the top of the Location Services page (this will stop all apps from using your location). Android: S ettings may vary depending on your Android phone's manufacturer. For apps that have location access, you can also turn  Precise location on or off if you want to limit accuracy. Repeat for each app you want to manage. Tip: If you want to stop all apps from accessing your location, you can  turn off Location at the top of the Location settings page. Why it matters:  Prevents apps, advertisers and even your OS from building a detailed map of your daily routines. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Most routers ship with default admin usernames and passwords like "admin" or "1234," and these are publicly available online. Hackers know this and often scan networks looking for unprotected routers. Here's what to do: Why it matters: Prevents intruders from hijacking your home network and spying on your devices.WPA3 is the newest wireless encryption protocol and offers much stronger protection than WPA2. If your router supports WPA3, enabling it is a no-brainer. How to check: Why it matters: Stronger encryption means hackers can't easily intercept or crack your Wi-Fi traffic.Your friends don't need access to your entire home network and neither do your smart lights and doorbells. Creating a  guest network adds a safety barrier between your personal devices and less trustworthy ones. Steps to take: Why it matters: Even if a smart device gets compromised, the attacker won't have access to your main network or sensitive devices.Not all browsers treat your privacy equally. Switching to a browser designed for privacy like  Brave, Firefox or DuckDuckGo's browser can drastically cut down on the amount of data collected about you while you browse. Also, use incognito/private mode for sensitive searches.  Why it matters: Reduces digital fingerprints and helps stop advertisers and data brokers from building a profile on you based on your browsing behavior. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Staying private online isn't about being paranoid; it's about making smart, intentional choices. With the right tools and a few small changes, you can take back control of your data in 2025. Digital privacy is always changing, so it's a good idea to check your settings and habits every so often. The upside is that for every new privacy challenge, there's usually a way to push back and keep your information safe.If you'd like a printable checklist or want this content turned into a shareable infographic, just let me know.What privacy tools and methods do you use to protect your data online? Let us know by writing us at  rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter. rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

FBI warns over 1 million Android devices hijacked by malware

Everything that connects to the internet can be hacked by malware. This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren't safe either.But who would have thought hackers are now targeting your smart TVs , streaming boxes, projectors and tablets, too? That's right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network . Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join. The FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces. FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW Once infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people's accounts.The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection. DON'T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX BadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers "sinkholed" the malware's command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN's Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds.  These are not official Android TV OS products and are not protected by Google Play Protect. Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look. ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY If you're wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do. 1. You bought a low-cost Android-based device from an unknown or no-name brand:  Devices sold online through third-party sellers or unknown brands, especially if advertised as "unlocked," "jailbroken" or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware: Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ 2. Your device is not Google-certified:  If your Android device doesn't support  Google Play Protect or doesn't show the  Play Protect certification in the Play Store settings, it's likely running on an uncertified version of Android. That's a major red flag. To check: 3. Suspicious behavior or strange apps:  Look for unfamiliar apps you didn't install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded. 4. Google Play Protect is disabled:  If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise. 5. Your home internet is acting strange:  If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network. 6. The device came with outdated or unofficial firmware:  If your device doesn't receive software updates or has a strange update process, that's another potential sign it's not legit or may be compromised. FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE Want to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats. 1. Use strong antivirus software:  Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices . 2. Only buy certified and trusted devices:  Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled. 3. Avoid sideloading apps from unofficial sources:  Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats. 4. Check your device settings for tampering:  Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised. GET FOX BUSINESS ON THE GO BY CLICKING HERE 5. Monitor your network for unusual activity:  If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router's settings or a network monitoring app to track strange behavior or unauthorized connections. 6. Disconnect and replace suspicious hardware:  If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller. 7. Keep your devices and apps updated:  Install system and app updates regularly. Even though cheap devices may not always offer updates,  keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches. 8. Secure your router and home network:  Your devices are only as safe as the network they're connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my  best expert-reviewed password managers of 2025 here .As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals. THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALL It's alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.With over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at  Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

AI tennis robot coach brings professional training to players

Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence -powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. Tenniix brings smart technology and adaptability to your training sessions, making it easier to get the most out of your time on the court. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join. Tenniix is an AI-powered tennis robot that is compact and weighs only 15 pounds, which is much lighter than traditional ball machines. Despite its small size, it serves balls at speeds of up to 75 mph, with spins reaching 5,000 RPM, and holds up to 100 balls at a time. The robot's movable base allows it to deliver shots from different angles, keeping practice sessions dynamic and engaging. TENNIS PRO ERIN ROUTLIFFE EXPLODES OVER LACK OF 'ROBOTS' AT AUSTRALIAN OPEN NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT One of the standout features of Tenniix is its AI-driven coaching. The robot has been trained on over 8,000 hours of professional tennis data, allowing it to adjust its shots based on your position and playing style. This gives you a realistic and challenging experience every time you step on the court. Tenniix offers a wide variety of training modes, with more than 1,000 drills and three skill levels, so you can focus on everything from timing and footwork to shot accuracy. WILL 3D TECH CHANGE SPORTS FOREVER? Controlling Tenniix is simple and intuitive. You can use voice commands or gestures to change spin, speed or shot type without interrupting your practice. Tenniix also features convenient app controls, letting you select training modes, adjust settings and review session data right from your smartphone for a fully customized and trackable experience. The robot's modular design means you can start with the model that fits your needs and upgrade as your skills improve. With a built-in camera and AI chip, Tenniix analyzes your shots and provides instant feedback, helping you track your progress over time. SKYROCKET TO A HEALTHIER LIFESTYLE WITH THIS GEAR IN 2025 Tenniix uses a combination of visual tracking and ultra-wideband sensors to know exactly where you and the ball are on the court. Its motorized base moves smoothly to deliver a wide range of shots, from high lobs to fast groundstrokes, at different speeds and spins. The battery lasts up to four hours, which is enough for a solid training session. BEST FATHER'S DAY GIFTS FOR EVERY DAD Another feature that sets Tenniix apart is its ability to mimic the playing styles of tennis greats like Nadal and Federer. This helps you prepare for matches by practicing against shots and spins similar to those you'll face in real competition. Coaches and players have noted how Tenniix creates realistic rallies and adapts to different skill levels, making training both efficient and enjoyable.Tenniix is easy to carry and set up, making it convenient for players who want to practice anywhere. With thousands of shot combinations and drills, your workouts stay fresh and challenging. The smart technology, real-time tracking and instant feedback help make every session productive. Each robot comes with a one-year warranty and reliable customer service. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? There are three Tenniix models to choose from. The Basic model is priced at $699, the Pro at $999 and the Ultra at $1,499. Each model offers a different set of features, with the Ultra version including advanced options like the movable base and enhanced vision system. Tenniix was launched through a  Kickstarter campaign , giving early supporters a chance to back the project and receive the robot at a special price. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Tenniix feels less like a machine and more like a smart tennis partner who's always ready to help you improve. Whether you want to polish your technique or get serious about your game, it offers a flexible and engaging way to train. If you're looking for a training partner that adapts to you, Tenniix is worth checking out.Would you rather challenge yourself playing against a robot like Tenniix, or do you prefer training with a human opponent? Let us know by writing us at   Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to   Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

Trump's nuclear strategy takes shape as former Manhattan Project site powers up for AI race against China

Over 80 years after scientists of the 'Manhattan Project' harnessed the power of the atom to end World War II, the top-secret worksite has a new mission to help dominate AI before China does. The first phase of the United States' latest uranium enrichment facility opened in Oak Ridge, Tennessee in May. Uranium powers the nuclear reactors the AI data centers are turning to for reliable energy. They will use more energy as AI becomes more sophisticated, according to Orano USA CEO Jean-Luc Palayer."The United States can lead in AI, only if we can power AI," Palayer said. "Having that in mind and our new project on enrichment in Oak Ridge, Tennessee, we step forward on a new mission of equal consequence."Numerous Tennessee lawmakers joined Palayer for a ribbon cutting of his new facility in Oak Ridge. The U.S. Energy Information Administration reported 99% of U.S. nuclear fuel is imported from other countries. In 2023, most of America's uranium products came from Russia, Canada, Australia, Kazakhstan, and Uzbekistan. The U.S. banned the import of uranium products from Russia in May 2024, but companies can still apply for waivers until 2028. FIRE DEPARTMENTS TURN TO AI TO DETECT WILDFIRES FASTER "America is staring down the barrel of an energy crisis," Tennessee Gov. Bill Lee said. "We can't lose the AI war to China. We can't lose the energy war to Russia. In order to do that, we have to win the nuclear energy renaissance war in America."At the end of May, President Trump signed four executive orders aimed at quadrupling domestic nuclear energy production by 2050. The orders include a deadline for the publication of a report on how to strengthen domestic uranium conversion capacity and enrichment capabilities. It orders the government to update its nuclear energy policies to streamline production. At least 10 large nuclear reactors must be under construction no later than 2030, according to the order.  FDA APPROVES FIRST AI TOOL TO PREDICT BREAST CANCER RISK Meanwhile, China plans to build 10 new nuclear power reactors each year for the next decade, totaling 100 reactors by 2035. A list of U.S. nuclear reactors posted by the National Energy Institute shows the U.S. has built three in the last 30 years. Despite rapid capacity growth in 2022, nuclear power made up only about 5% of China's cumulative power generation that year. Nuclear power accounts for about 18% of the electricity generation mix in the United States. CLICK HERE TO GET THE FOX NEWS APP "We can't wait 10 years to build nuclear reactors in this country. "That's how long it used to take to approve them, to permit them, to build them," Lee said. "We don't have 10 years. China will have built 150 in 10 years."In 2023, the Department of Energy reported data centers used an estimated 176 TWh. That number is expected to rise to between 325 and 580 TWh by 2028. The department estimated AI data centers will use about 12% of U.S. energy annually by 2028, enough to power New York City for 11 years. 

When clicks turn into scams on Facebook ads

Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence , fueled by deepfake technology and distributed at scale through Facebook's own ad system. From fake crypto endorsements by celebrities to malware disguised as video game betas, the landscape of digital scams is smarter, faster and more dangerous than ever. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! DON'T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX Scammers used to rely on low-effort clickbait, but that era is over. Now, sophisticated schemes are leveraging AI-generated content. Technology is being used to create convincing videos of celebrities endorsing fake products or services. These ads exploit the trust users place in public figures and the perceived legitimacy of Facebook's advertising platform . These tools can mimic a person's appearance and voice with alarming accuracy, making it challenging for users to discern real from fake. And these tools are no longer out of reach. Scammers use a mix of freely available AI generators and private networks to mass-produce scam campaigns that look more real than ever. ONE CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERS On Reddit, users have posted screenshots of bizarre scam ads that made it through Facebook's filters: One features an AI-generated video of Kelly Clarkson promoting a suspicious cash giveaway. There are reportedly over 20 accounts using variations of the name "Kelly Clarkson Live." These ads ask users to comment "Christmas" to receive free money, then instruct them to contact a WhatsApp number to claim their prize, which is a common tactic used to harvest personal information or initiate payment scams. AI CYBERSECURITY RISKS AND DEEPFAKE SCAMS ON THE RISE Another uses Billie Eilish's face to endorse a knockoff shopping site. The design mimics standard e-commerce ads, making it easy to fall for, especially for fans or younger users.These scams are not the work of lone fraudsters. They are coordinated efforts that mirror real digital marketing operations.These operations are designed to appear legitimate. Landing pages mimic reputable news sites. Comment sections feature AI-written praise. Every element is optimized to build trust and get the click.Scammers do not just blast out ads at random. They use Facebook's ad targeting system to handpick the most vulnerable audiences.These groups are targeted because they are either perceived as trusting, impulsive or unfamiliar with how digital scams operate. HOW TO ESCAPE FACEBOOK'S CREEPY AD TRACKING Despite Meta's claims of robust  ad review , scam ads still make it through frequently and quickly. Here is why:Even with tools like facial recognition being tested to detect unauthorized celebrity use, these systems have not been widely implemented. Meanwhile, investigations by consumer advocacy groups and cybersecurity firms have found that a significant portion of crypto-related Facebook ads are fraudulent. With scammers paying for ad space, Meta has little financial incentive to aggressively remove them.Scam ads can be surprisingly well-made, but common themes show up again and again. Watch for:If an ad prompts you to download a file, especially a .zip or .rar, it is almost certainly a trap. HOW TO SPOT THE RED FLAGS FOR THIS LATEST FACEBOOK MARKETPLACE SCAM Here is how to stay safe and help others do the same: 1. Check the source: If it is an ad, approach it with extra skepticism. Look it up independently. 2. Do not download files from ads: Especially avoid compressed formats like .zip or .rar, which often contain malware. 3. Verify endorsements: If a celebrity is promoting something, check their official social media or public statements. 4. Report suspicious ads: Even if you are not sure,  reporting helps Meta identify fraudulent activity. 5. Talk to friends and family: Especially older adults, who may be more trusting of what they see on Facebook. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? 6. Be wary of unsolicited messages or friend requests and install strong antivirus software:  Scammers often use fake profiles to send scam ads or phishing links via Facebook Messenger or friend requests. Avoid clicking links from unknown contacts. Also, install strong antivirus software, which adds a layer of defense that can block malware from scam links. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.  Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices . 7. Consider using a password manager: If your credentials are compromised, this minimizes the risk of attackers accessing other accounts. A password manager can securely store and generate complex passwords. It will help you create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you're logging into an account, so that you never have to remember them yourself. The fewer passwords you remember, the less likely you are to reuse them for your accounts. Get more details about my  best expert-reviewed password managers of 2025 here . 8. Turn on two-factor authentication (2FA):   2FA can prevent unauthorized logins even if your password is stolen. 9. Regularly update your software and apps: Keeping your operating system, browsers and Facebook app updated ensures you have the latest security patches that can block known vulnerabilities exploited by scammers. Get a  free scan to find out if your personal information is already out on the web.ads on Facebook are evolving fast, using AI-generated content, fake celebrity endorsements and deepfakes to trick users into clicking. What looks like a game beta or cash giveaway can actually lead to malware, phishing scams or fake crypto schemes. Facebook's ad review system isn't catching these in time, which means users need to stay alert. Be skeptical of ads, avoid downloading files, install trusted antivirus software and talk to family members who may be more vulnerable.Given how widespread and sophisticated scam ads have become on Facebook, do you think Meta should be held more accountable for protecting users, and if so, what actions should they take to better prevent these scams? Let us know by writing us at  Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

WWDC 2025: iOS 26, Liquid Glass design and Apple's AI shortfall

Apple's annual Worldwide Developers Conference (WWDC) kicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs , iPhones, iPads and Vision. We are seeing a unified naming scheme, with every software version getting a "26" suffix. This means iOS 26, macOS 26, iPadOS 26, watchOS 26 and more. Beyond the name changes, the software has received major updates across devices, including a new Liquid Glass design that reminds me a bit of the old Windows Vista.All of this sounds great, but I couldn't help but notice that the AI features this year feel subpar. They seem even duller when you consider the cutting-edge AI announcements Google made last month.Let's dive deeper into WWDC 2025 and Apple's ongoing AI crisis. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! One of the most noticeable changes this year is Apple's decision to unify the naming across all its platforms. Instead of traditional version numbers, Apple is now using the year after release as the version name. So the new names are iOS 26, iPadOS 26, macOS 26, watchOS 26, tvOS 26 and visionOS 26. These updates will arrive in late 2025, but the new naming makes it much easier to keep track compared to older versions like iOS 19, watchOS 12 or macOS 16. FIRST 15 THINGS TO DO OR TRY FIRST WHEN YOU GET A NEW IPHONE On iOS 26 and iPadOS 26, the updates bring a fresh look thanks to the Liquid Glass design. This design language uses translucent materials and subtle animations to create a sense of depth and clarity. Some might say it feels a little nostalgic, reminding me of the old Windows Vista's glossy glass effects.Several core apps have received noticeable redesigns. The Camera app now looks cleaner and easier to navigate, while Safari introduces updated tab management and new tools to improve browsing. The Phone app moves to a unified layout, combining Favorites, Recents and Voicemails in one place, making call management simpler than before.Messages also gets some fun and useful additions. You can now add custom backgrounds to conversations, letting you personalize your chats in a new way. Group chats become more interactive with new features like quick polls, making it easier to gather opinions from your friends or family.Apple is making iPads a lot more Mac-like with iPadOS 26. It introduces new windowing capabilities that let you resize app windows, place them anywhere on the screen and open more windows at once. It also introduces a more precise mouse pointer and a new menu bar that allows you to swipe down on an app to view various options and commands. iPadOS 26 also gains a version of the Mac's Preview app, letting you view and annotate images and files with ease. DOES MY IPHONE NEED ANTIVIRUS PROTECTION? macOS Tahoe 26, the successor to macOS Sequoia, brings Apple's new Liquid Glass design to the Mac, giving the Dock, toolbars, app icons, widgets and system colors a translucent, glass-like look.The update also introduces a dedicated Phone app that works with a paired iPhone via Continuity. It combines Favorites, Voicemails, Call Screening and Hold Assist. Live Activities from your iPhone, such as tracking an Uber, now appear in the Mac menu bar for quick updates.Spotlight gets its biggest update yet, letting users run Shortcuts and actions inside the current app. Quick keys enable faster commands such as sending messages or adding reminders. Spotlight can also act as a mini launcher, showing all your apps, including those mirrored from your iPhone, with results prioritized by relevance. OPENAI'S $6.5B NEW ACQUISITION SIGNALS APPLE'S BIGGEST AI CRISIS YET As part of Intelligence , Apple announced the integration of OpenAI's ChatGPT directly into system-wide features such as writing suggestions and Siri. When Siri encounters a question or task it can't handle, it can now request assistance from ChatGPT, but only after explicitly asking for the user's permission each time. Users can access ChatGPT within apps like Mail and Notes to generate summaries, compose replies or brainstorm content ideas on demand.This partnership marks the first time OpenAI's GPT-4o has been embedded into the Apple ecosystem for fallback AI tasks. The integration is tightly controlled and opt-in: Users must grant permission before any information is sent to ChatGPT, and Apple emphasizes robust privacy protections, including obscuring IP addresses and not sharing personal data unless a user connects their ChatGPT account. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Additionally, ChatGPT's capabilities extend to creative tools such as Image Playground, where users can generate images in new styles like oil painting or vector art, and to Visual Intelligence features, which allow users to ask ChatGPT about content on their screens or search for similar products and images. This integration is designed to enhance productivity and creativity while keeping user privacy at the forefront.Notably, Apple Intelligence also includes on-device foundational models for privacy, preserving AI tasks such as notification summaries, text rewriting and app actions separate from ChatGPT integration. GET MY IPHONE TIPS HERE 's artificial intelligence features took a backseat at WWDC 2025. While the company introduced a visually striking redesign across platforms with Liquid Glass and rolled out new apps and quality-of-life improvements, its AI announcements were limited in scope.New features under the Apple Intelligence banner include live translation across Messages, FaceTime and the Phone app, a capability Android users have had for several years. Apple also introduced Workout Buddy, a fitness tool that uses an AI-generated voice to provide spoken encouragement. While functional, these additions do little to shift the broader AI narrative in Apple's favor.By contrast, Google, Microsoft and OpenAI have all rolled out monthly or even weekly AI advancements, highlighting Apple's slower pace. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Notably absent were any major upgrades to Siri. Last year, Apple announced a more dynamic version of its virtual assistant. Many of those promised features remain unreleased.Craig Federighi, Apple's senior vice president of software engineering, during the keynote gave Siri only a passing mention."As we have shared, we are continuing our work to deliver the features that make Siri even more personal," he said. "This work needed more time to reach our high-quality bar, and we look forward to sharing more about it in the coming year."That vague timeline of "in the coming year" suggests we will not see major Siri news until 2026 at the earliest.This is definitely not good news for the company as competitors push out updates every few weeks. Apple originally pitched the new Siri as the next big step for the company, with personalized capabilities based on your relationships, conversations, routines and more. But one year later, those ambitions are still just promises. In fact, the new Siri experience is currently available only in limited beta on iPhone 15 Pro models and select iPads or Macs with M-series chips, further underscoring the slow rollout. 5 AI TERMS YOU KEEP HEARING AND WHAT THEY ACTUALLY MEAN 's WWDC 2025 brought plenty of polish and a few welcome surprises. The Liquid Glass design gives every device a more modern feel, and the unified naming system finally brings some consistency. But the company's AI story still feels like it is lagging behind. There's no doubt Apple is laying the groundwork for something bigger. But for now, the most ambitious AI updates remain out of reach, and the gap between Apple and its competitors continues to grow.Do you believe Apple can regain its edge in AI innovation? Let us know by writing us at   Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

Mind-controlled prosthetic arms are now becoming a reality

If you've ever wondered what's next for prosthetic technology, you're not alone. For many people living with limb loss, finding a prosthetic that feels natural and works seamlessly with their body has always been a challenge. Now, a California startup called Atom Bodies is making headlines for its groundbreaking approach to prosthetic technology. By combining artificial intelligence , machine learning and advanced sensor systems, Atom Bodies is developing mind-controlled robotic arms that could soon make highly advanced prosthetics accessible to thousands of amputees. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! Atom Bodies' flagship product, Atom Touch, is setting a new standard in prosthetic arms. Unlike traditional prosthetics, which often offer only basic movement and can be uncomfortable to wear, Atom Touch uses EMG (electromyography) sensors placed on the user's skin to detect muscle activity. These signals are then interpreted by machine-learning algorithms, allowing users to control individual fingers, the wrist and the elbow with remarkable precision just by thinking about the movement they want to make. AI ENABLES PARALYZED MAN TO CONTROL ROBOTIC ARM WITH BRAIN SIGNALS The arm is powered by the Atom A1, an AI neural interface that can be trained in minutes for intuitive, natural control. The design also includes a load-balanced harness, which distributes weight across the torso, making the device lighter and more comfortable for all-day use. SOFT ROBOTIC PROSTHETIC HAND USES NERVE SIGNALS FOR MORE NATURAL CONTROL Atom Touch stands out for several reasons. It is the first prosthetic arm to offer true individual finger movement, which means users can perform tasks like typing, gripping and delicate manipulation with much greater ease. The device uses the Atom A1 AI neural interface, which learns from the user's muscle signals to provide seamless, natural movement. Dozens of sensors in the hand generate haptic feedback, so users can better gauge grip strength and control. With more than 10 motors in the hand alone, Atom Touch offers a near-human range of motion and dexterity. The load-balanced harness system also makes the arm lighter than a human arm and comfortable enough for extended wear, addressing a challenge that many current prosthetics have yet to solve. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? WORLD'S FIRST TOUCH-SENSING BIONIC HAND WITH LIGHTNING-FAST RESPONSE For the more than 2 million Americans living with limb loss, current prosthetic options are often expensive, uncomfortable and limited in capability. Jason Morris, who lost his arm due to a work accident and is Atom Bodies' lead test user, notes that most prosthetics can only be worn for about two hours due to discomfort. Atom Touch is designed for initial wear of four to six hours, with the goal of achieving all-day use. Atom Bodies has already attracted significant interest, with over 11,000 people on its  wait list and plans to begin clinical trials within the next year, pending FDA approval. WIRELESS WATERPROOF BIONIC HAND WITH 360-DEGREE WRIST ROTATION One of the most transformative aspects of Atom Touch is its price point. While state-of-the-art myoelectric arms can cost around $200,000, Atom Bodies plans to offer Atom Touch for approximately $25,000. This brings the cost in line with basic hook prosthetics, making advanced bionic limbs accessible to a much larger population. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES BEST FATHER'S DAY GIFTS FOR EVERY DAD Seeing Atom Bodies bring this level of innovation to prosthetics feels like a real turning point for people with limb loss. With technology that's both advanced and affordable, Atom Touch could help many regain abilities and comfort that have been out of reach for years. As the company moves closer to launching, there is a sense of real possibility for a future where high-quality prosthetics are available to many more people who need them.If you or someone you know could benefit from this technology, what would be the most important factor in choosing a prosthetic arm? Let us know by writing us at   Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to   Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

Fire departments turn to AI to detect wildfires faster

A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly.In Aspen, Colorado, fire officials say wildfire risk has shifted from being a seasonal concern to a year-round threat. To meet that challenge, they're using AI-powered cameras to detect smoke - sometimes before 911 calls even come in.Arvind Satyam is the co-founder and chief commercial officer of Pano AI."They're getting a full 360-degree picture of the landscape," said Satyam. 2 DEAD AFTER HOUSE BURNS DOWN IN NEW JERSEY FOLLOWING 'GIGANTIC EXPLOSION,' CRIMINAL INVESTIGATION UNDERWAY High in the mountains, rotating cameras scan the terrain for smoke. If the system detects a potential fire, the alert is reviewed by a human team. Verified alerts are then sent to Aspen Fire via text or email, along with the exact location, Satyam said."We run a smoke detection algorithm," Satyam said. "So essentially looking at the imagery to determine is that smoke or not smoke."Satyam said the devices can also give satellite views of the terrain, and overlay a picture of the weather to understand wind speed and relative humidity.Aspen Fire was the first department in the U.S. to adopt the technology four years ago, when rising wildfire risk began driving up insurance costs in the area, Pano AI leaders and Aspen Fire Department officials said. SOUTHERN CALIFORNIA COMMUNITY MEMBERS RETURN FOR FIRST TIME TO SITE WHERE CHURCH BURNED DOWN AHEAD OF EASTER "It gives us that instantaneous intelligence and not off of, you know, hoping we get someone there quickly," said Jake Andersen, deputy chief of operations for Aspen Fire.Aspen officials aim to have crews on the scene within five minutes - something they say would be nearly impossible without precise location data. Fire officials say their fire crews can also access the Pano AI map on their phones while responding to calls. The system can track heat signatures at night and monitor hot spots for days after a fire. 175 WILDFIRES IN NORTH AND SOUTH CAROLINA FORCE SOME EVACUATIONS Aspen Fire Chief Rick Balentine said the device especially helps with the terrain in Aspen. Balentine said a recent example of when they used Pano AI was for Aspen's Sunnyside Prescribed Fire. The 900-acre Sunnyside Prescribed Fire was ignited back in April of this year on the south face of Red Mountain, fire officials said.The department used Pano AI cameras to monitor that fire and prevent it from spreading beyond the designated area, Baletine said.The system is now used across 10 states: Colorado, California, Oregon, Washington, Idaho, Texas, Wyoming, Utah, Arizona and Montana. Multiple fire agencies can share alerts across those regions and coordinate response efforts."Having this type of tool for our department, it makes all the difference in the world to understand the conditions we are sending our firefighters into," said Ali Hammond, Aspen Fire's director of community wildfire resistance. 

How to tell if your iPad has been hacked

Apple's iPad has a strong reputation for security. Thanks to the system architecture of iOS, a non-jailbroken iPad isn't susceptible to typical viruses or malware infections. However, that doesn't mean it's completely safe from every threat. As with any computer, there are still vulnerabilities that determined hackers can exploit.iPads are generally secure devices, but it's still possible for hackers to gain access, so knowing the warning signs of a hacked iPad can help you act quickly to protect your data. Moreover, an iPad often contains a lot of personal information about you and your family, so if it's ever hacked, it can be quite alarming. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! Be on the lookout for these signs that could indicate your iPad's security has been compromised:If your iPad suddenly feels more like a sluggish turtle than the speedy device it used to be, that's a warning sign. When a device is hacked, malicious software might be running in the background, using up memory and processing power. This can make apps slow to open, cause lagging or freezing and even lead to more frequent crashes. You might also notice the battery draining much faster than usual along with the slowdown, since unwanted software can chew through battery life while it secretly runs in the background.A sudden flood of pop-up ads or strange messages on your iPad screen is a big red flag. Under normal circumstances, iPads should not bombard you with random pop-ups, especially outside of safe apps or websites. If you start seeing lots of unsolicited ads or "Your iPad is hacked!" alerts popping up, it could mean an adware program or scam has found its way onto the device. These pop-ups might try to trick you or your kids into clicking links or downloading something harmful, so they're not just annoying, they're dangerous signs that something is wrong. HOW TO PROTECT AN IPHONE & IPAD FROM MALWARE 2025 Keep an eye on how the iPad is using the internet. An unusual spike in data usage or constant network activity (even when no one is actively using the iPad) might indicate the device is secretly sending or receiving information without your permission. For example, if your data plan suddenly maxes out or you notice the Wi-Fi icon flickering with activity when the iPad is idle, it could be a sign that a hacker's software is communicating in the background. Such suspicious network activity is concerning because it suggests someone else might be remotely accessing the iPad or siphoning off personal data. HOW TO TRANSFER INFO FROM AN OLD IPAD TO A NEW IPAD One clear warning sign is finding changes to your Apple account that you didn't make. If your Apple ID password was changed without your knowledge or you receive security alerts about logins you never did, be wary; a hacker may have gained access to your account.You might also discover that account details or settings (like your recovery email or trusted phone number) have been altered. Another clue is seeing unfamiliar charges or App Store purchases on your Apple ID bill, since unauthorized purchases or subscriptions often mean that someone has compromised your account and is using it maliciously. BEST VPNS FOR IPHONES & IPADS - CYBERGUY PICKS 2025 If you suspect your iPad has been hacked, taking immediate action can secure your device and give you peace of mind. Here are a few basic steps to help you respond: 1) Reset your passwords: Change your Apple ID password right away (and any other important account passwords used on the iPad) to lock out any intruders. Using a strong password (think long, random and unique to each account) greatly reduces that risk. A password manager can help you generate and store complex passwords so you don't have to remember them all yourself. Get more details about my  best expert-reviewed password managers of 2025 here . 2) Remove unfamiliar apps: Check the iPad for any apps you or your child didn't install. If you find an unknown app or a suspicious profile, delete it immediately. This helps eliminate any malicious programs the hacker may have added. To do this, open  Settings , tap  General  iPad Storage , scroll to find the unfamiliar app, tap it, then tap  Delete App and confirm. 3) Update iOS: Make sure the iPad is running the latest version of iPadOS. Apple frequently releases security updates to fix vulnerabilities, so  updating the software can shut down any loopholes the hacker might have used. Turning on automatic updates is a good idea to stay protected going forward. 4) Enable two-factor authentication: If you haven't already,  turn on two-factor authentication for your Apple ID account. This feature adds an extra verification step (like a code sent to your phone) whenever someone tries to sign in, which can stop hackers in their tracks even if they somehow know your password. It's an excellent safeguard to prevent unauthorized access. 5) Have strong antivirus protection on all devices: Malware, spyware and viruses can run quietly in the background or compromise enough data before it is discovered. While not being hacked in the first place is the best position to be in, it is worse to give access to your iPad's data to a hacker for a prolonged period of time. That's why having strong antivirus software running consistently in the background of your device is a great way to prevent compromises from happening in the first place.  Best antivirus security software and apps to protect you . CAN IPHONE TEXTS HAVE MALWARE? SPOT & AVOID SMS SCAMS It's important to remember that many of these symptoms can have innocent explanations, so don't panic at the first sign of trouble. For example, a new iOS update or a heavy app can temporarily slow down your iPad's performance, so one isolated issue doesn't always mean you've been hacked. However, if you notice multiple warning signs at the same time or anything that just doesn't feel right, it's best to act quickly and err on the side of caution.Do you think Apple should do more to help users spot and respond to potential hacks? Let us know your experience or questions by writing us at   Cyberguy.com/Contact . Your story could help someone else stay safe.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

How to transfer photos and videos off your phone

It's unfortunate, but bad things happen to phones all the time. For instance, they break when dropped or get stolen. Many people have lost precious memories because of it. Moving photos and videos off your phone is the best way to protect them and free up storage space without permanently losing them.You can use several reliable methods, whether you're using an iPhone or an Android device, to transfer photos and videos from your phone to a computer or cloud storage. Keep reading to find out how. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! iPhone users can also use Apple's cloud storage service, iCloud, to automatically sync and back up their photos and videos to the cloud. This will also make them accessible across all your Apple devices, as well as Windows. Follow these steps:When you turn on  Sync this iPhone , your photos and videos will be automatically uploaded to iCloud and securely stored in their original, full-resolution formats.Be aware that just syncing your photos and videos to iCloud doesn't immediately free up space on your iPhone. You're creating a copy in iCloud, but the full-size photos and videos still remain on your phone. Now that your photos and videos are backed up to iCloud, here's the crucial step to actually clear space on your iPhone. You'll need to enable a special setting called  Optimize iPhone Storage .   Here's how to do it:This setting keeps smaller, space-saving versions of your photos and videos on your iPhone while the full-resolution originals stay safely stored in iCloud. This way, your iPhone frees up storage space without deleting any photos and videos. However, note that this depends on the number of photos and videos you have and the overall space used. Optimizing doesn't guarantee immediate, huge storage savings. It can take time, especially for 4K videos. Pro tip: Don't delete photos and videos manually to save space. If you delete a photo or video on your iPhone, it's also removed from iCloud. Let the "optimize" setting do the work for you.For those of you who prefer not to pay for iCloud storage, several reliable products allow you to offload photos and videos from your iPhone, freeing up space while keeping your memories secure, without a recurring fee.  Check out our top iPhone backup alternatives that don't require a subscription .These external storage options offer a range of features to suit different needs, allowing you to prioritize what matters most, whether it's portability, storage capacity, speed or ease of use. By choosing the right device, you can efficiently manage your iPhone storage and avoid ongoing iCloud fees. Just remember to confirm that all photos and videos have been safely transferred before deleting them from your iPhone. Now, you'll also want to be sure to  check this hidden folder on your iPhone that may be eating up your space. HOW TO MANAGE PHOTOS AND VIDEOS ON A NEW LAPTOP WITH LIMITED SPACE Google Photos is a convenient cloud storage solution that works across all devices, offering both free and paid storage options for backing up your photos and videos securely. You can back up your phone's photos and videos to Google Photos with the steps below.Now that your photos and videos are safely backed up to Google Photos, you can free up space on your Android device:That's it. You've now backed up your photos and videos, freeing up valuable storage space on your Android device.On both iPhone and Android, deleted photos and videos usually go to a "Recently Deleted" or "Trash" folder and stay there for up to 30 days. To immediately free up space and ensure your photos and videos are truly gone, open this folder and permanently delete the photos and videos. Pro tip: Always make sure your photos and videos are  safely backed up before deleting them from your phone.With the photos and videos stored safely on the cloud, you can access and download them anytime. Here is what you need to know: Google Photos : You can access the photos and videos using the Google Photos app on either your Android device or iPhone. You can also go to the  Google Photos website on your computer and sign in with your Google account to find the photos and videos. iCloud (iPhone) : Go to  iCloud.com and sign in with your Apple account. Afterward, click  Quick Access in the top-right corner and select  Photos in the menu, and you should then be able to see your uploaded photos and videos. HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES If you're a Windows user, you can easily transfer photos and videos from your phone using the built-in Photos app to import your pictures and videos directly to your PC. Follow the steps below to do that.If you moved your photos and videos to a computer and then deleted them from your phone, they're gone from the device but remain safe on your computer. Always double-check that your transfer was successful before deleting anything from your phone. HOW TO HIDE PHOTOS ON YOUR IPHONE AND ANDROID FROM SNOOPS For Android users, accessing the DCIM (Digital Camera Images) folder directly through Windows File Explorer provides a simple way to transfer photos and video from your phone to your computer. Here's how to do it: SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES a mistake to wait until something happens to start moving photos off your phone. We recommend creating a backup schedule so that you're never without a way to restore them or free up space on your device. The initial moving process can be long, but doing it in the future will definitely be faster. You can also create extra backups by  transferring the photos to external storage .How do you feel about the role tech companies like Apple, Google and Microsoft play in managing and protecting your personal photos? Have you had any positive or negative experiences with their backup services? Let us know by writing us at   Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

Digital Social Security cards coming this summer

The Social Security Administration (SSA) just announced a major update. Starting this summer, Americans with a "My Social Security" account will be able to access their digital Social Security number (SSN) online. The goal is to simplify access, reduce paper card replacements and improve data protection.But with convenience comes new cybersecurity concerns. Here's how the digital SSN works, why it's being introduced now and the steps you should take to protect your SSN from identity theft both online and offline. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! SA is introducing secure  digital access to your Social Security number through the "My Social Security" portal. If you forget your SSN, misplace your card or need to share your number for non-SSA purposes (such as job applications or financial services), you'll be able to view your number online from a mobile device."This enhancement will provide individuals...a simple solution allowing them to securely view their SSN online," said the SSA. This update eliminates the need for mail delays or in-person visits to your local SSA office. TOP WAYS TO SAFEGUARD YOUR SOCIAL SECURITY NUMBER There are a few big reasons the SSA is rolling this out now: IS YOUR SOCIAL SECURITY NUMBER AT RISK? SIGNS SOMEONE MIGHT BE STEALING IT The digital SSN option will be available in early summer 2025. If you already have a "My Social Security" account, you'll be able to access the feature once it rolls out.You'll need a "My Social Security" account to use the digital SSN features. Here's how to get started: 1) Visit the SSA's account portal: Go to  ssa.gov/myaccount and click "Create an Account." 2) Verify your identity: You'll be asked to provide your name, birthdate, SSN and address. The SSA may use a third-party identity verification service and ask questions based on your credit report. 3) Choose a username and password: Use a strong, unique password and set up two-factor authentication with your phone number or an authenticator app. Consider using a  password manager to generate and store complex passwords. 4) Log in and check your dashboard: Once the digital SSN feature launches, you'll be able to view your number securely from your account on a mobile device or computer.If you're already signed up, double-check your security settings and make sure your contact information is current. OUTSMART HACKERS WHO ARE OUT TO STEAL YOUR IDENTITY Even with digital access making your SSN more convenient, it's still one of the most sensitive pieces of personal information you own. If your SSN falls into the wrong hands, it can lead to identity theft, credit fraud and even tax return scams. Here are the best ways to protect it: 1) Use a strong password for your SSA account: Create a unique, complex password for your "My Social Security" account and enable  two-factor authentication . This ensures that even if someone guesses your password, they won't be able to log in without a second verification step. Consider using a password manager to generate and store complex passwords. Get more details about my  best expert-reviewed password managers of 2025 here . 2) Avoid public Wi-Fi when accessing your SSN: If you're checking your SSA account, avoid doing so over unsecured networks like  public Wi-Fi. Use a secure home network or VPN to encrypt your connection and protect your session from hackers.  For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices . 3) Be cautious of phishing scams and use strong antivirus software: Scammers often pose as the SSA to trick you into revealing your SSN. Don't click links in unsolicited emails or texts and never give personal information unless you're sure the source is legitimate. Always go directly to  ssa.gov if in doubt.To block suspicious links and attachments before they reach you, consider using  strong antivirus software . The right antivirus can help detect phishing attempts and protect you from malicious downloads.  Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices . 4) Monitor your credit and bank accounts and use an identity theft service: Staying on top of your financial activity is one of the most effective ways to catch identity theft early. That's where identity protection services come in. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.  See my tips and best picks on how to protect yourself from identity theft . 5) Check your credit reports: Make it a habit to review your credit reports regularly. Look for unfamiliar accounts, unauthorized inquiries or incorrect personal information. If something seems off, contact the credit bureau right away to dispute it. 6) Request an IRS Identity Protection PIN: Prevent fraudulent tax filings using your SSN by setting up an  Identity Protection PIN with the IRS. This six-digit number adds another layer of protection during tax season. 7) Review your Social Security earnings record: Log in to your "My Social Security" account regularly to review your earnings history and benefits. This helps ensure your information hasn't been altered or compromised.Starting this summer, the SSA will let you view your Social Security number online through your "My Social Security" account. It's a secure, convenient update that cuts down on lost cards and office visits. To use it safely, set up strong login credentials and two-factor authentication. And since your SSN remains a top target for identity thieves, now's the time to protect it with tools like a password manager, VPN, antivirus software and identity theft monitoring.Do you trust digital access to your Social Security number? Let us know by writing to us at   Cyberguy.com/Contact.   For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

Underwater jetpack backpack lets you explore ocean depths

If you've ever dreamed of gliding underwater with the freedom of a dolphin, the CudaJet might be the gadget for you. Unlike most underwater propulsion systems that strap onto your arms or legs, the CudaJet is worn like a backpack, giving you a hands-free way to cruise beneath the surface. It's a fresh approach that feels a lot more natural and comfortable, especially for longer swims. The CudaJet's story started almost seven years ago. Back then, it was just a prototype called the Cuda, a passion project by British designer Archie O'Brien during his final year at Loughborough College of Art and Design, now known as Loughborough Design School. Archie wanted something lighter and faster than anything else out there, and in 2023 his vision became reality with the first commercial CudaJet. Now, the CudaJet has been redesigned with a longer battery life, lighter build and updated features, making it even more appealing to underwater adventure seekers. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! So, what's it like to use? The main unit is a dual-jet-drive pack that attaches to a padded neoprene harness, which you wear on your torso. You control everything with a hardwired, trigger-style remote that lets you adjust your speed and keep an eye on the battery level. One of the biggest improvements for 2025 is the battery. While the original model provided approximately 40 minutes of underwater fun for every 75-minute charge, the latest version extends that time to a full 90 minutes per charge. That's more than double the original runtime, so you can explore even more on a single outing.CudaJet can take you down to a maximum depth of 131 feet, and it delivers about 88 pounds of thrust. That translates to a top speed of roughly 10 feet per second, or about 6.7 mph. Now, that might not sound fast on land, but underwater it's a whole different story. The company likes to point out that at 10 feet per second, the drag force on your body is about the same as flying through air at nearly 200 mph. It's an exhilarating experience that feels powerful and smooth.The 2025 redesign also trimmed some weight from the original, reducing it from approximately 33 pounds to just over 30 pounds, including the harness. The harness itself comes in four sizes, so you can get a fit that feels just right. Safety is clearly a priority as well. Each CudaJet ships with a factory-set safety depth of about 10 feet, which you can adjust up to the full 131 feet if you're feeling adventurous. If you ever go past your set limit, the motor cuts out and floats you right back to the surface. The controller's full-color display keeps you updated on your speed, battery and depth at all times. DIVE INTO THE SEA WITH THIS STATE-OF-THE-ART UNDERWATER DRONE CudaJet is aimed at the luxury market. Think superyacht owners and underwater adventure lovers who want something special. Each jetpack is made to order, handcrafted and painted in the U.K. The  2025 package starts at around $31,000 , which is a jump from the original price, but it now includes a two-year warranty, a luxury hard case and a fast charger. For those who want something even more exclusive, there's a Founder's Edition with lifetime product access, in-water training with the founder and a lifetime warranty, but only 20 of those are being made. THE SHAPE-SHIFTING UNDERWATER ROBOT PIONEERING THE DEPTHS OF THE SEA Since each CudaJet is made to order, buyers should expect a personalized experience. The process involves custom-fitting the harness to your size and selecting your preferred finish, all of which are handcrafted in the U.K. Due to this approach, there is typically a wait time before delivery, which varies depending on demand and the customization options. This ensures you receive a truly unique jetpack tailored just for you. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES BEST FATHER'S DAY GIFTS FOR EVERY DAD It's pretty amazing to see how far CudaJet has come since it started as a student project. Now it's no longer just a clever idea; it's a real way to zip around underwater and see the ocean from a fresh perspective. With the longer battery life, lighter design and smart safety features, this jetpack is definitely for anyone looking to make their underwater adventures more exciting. If you love being in the water and want to try something truly different, and the price fits your budget, the CudaJet could be your next big thrill.Would you feel safe exploring deep waters with technology like the CudaJet, or does the idea of relying on a jetpack make you nervous? Let us know by writing us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

How to tell if a login alert is real or a scam

Online scams thrive on the urgency and fear of their victims. If you've ever been a victim of a scam, you'd know that bad actors often try to rush you into taking action by creating a sense of fear. A scammer may call you impersonating a government agency and claim your Social Security number has been linked to drug trafficking. A phishing email might ask you to update your tax details or claim you've won a lottery or a free product, all to get you to click a malicious link.A more effective tactic scammers use is sending fake login alerts. These are warnings that someone has logged into your account, prompting you to take immediate action. This method works well because legitimate services like Google, Apple, Netflix and Facebook also send these types of notifications when someone, including you, logs in from a new device. It can be tricky to tell the difference. As Robert from Danville asks, "I constantly get in my spam junk folder emails saying 'someone has logged into your account.' Is this spam? legitimate? concerning? How do I know? How to avoid wasting time checking? How do I check?" Join The FREE CyberGuy Report : Get my expert tech tips, critical security alerts and exclusive deals - plus instant access to my  free Ultimate Scam Survival Guide when you sign up! Thanks for writing to us, Robert. I completely understand how tricky it can be to figure out whether these messages are legitimate or just another scam attempt. Let's break down what these urgent warnings usually look like and go over a few ways you can stay safe.Scammers often pose as login alerts from Google , Apple, Meta or even your bank, complete with official-looking logos, because fear is effective. But not every alert is a scam. In many cases, these notifications are legitimate and can help you detect unauthorized access to your accounts. Let's focus on the scam side first.Login alert scams have been around for a while. Early reports date back to 2021, and the trend has persisted since then. In 2022, reports surfaced that scammers were impersonating Meta and sending phishing emails to users. FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE One such email used a clean layout with minimal text. It avoided the usual scare tactics and stuck to a simple message. But that is not always the case. A common red flag in phishing attempts is the tendency to overload the email with unnecessary details. These messages often include cluttered formatting, excessive explanations and an increasing number of typos or design errors. One phishing email simply gets to the point: Someone tried to Iog into Your Account, User lD A user just logged into your Facebook account from a new device Samsung S21. We are sending you this email to verify it's really you. Thanks, The Facebook Team What's concerning now is that poor grammar is no longer a reliable sign of a scam. Thanks to AI, even those with limited English skills can write emails that sound polished and professional. As a result, many phishing messages today read just like legitimate emails from trusted companies.Receiving a phishing email is not the real issue. The real problem starts when you click on it. Most of these emails contain links that lead to fake login pages, designed to look exactly like platforms such as Facebook, Google or your bank. If you enter your credentials there, they go directly to the scammer. In some cases, simply clicking the link can trigger a malware download, especially if your browser is outdated or your device lacks proper security. Once inside, attackers can steal personal information, monitor your activity or take control of your accounts. DON'T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX Real login notifications  do exist; they're just much less scary. A genuine alert from Google, Apple or Microsoft will come from an official address (for example, no-reply@accounts.google.com or security@apple.com) and use consistent branding. The tone is factual and helpful.For instance, a legit Google security alert might say, " We detected a login from a new sign-in to your Google Account on a Pixel 6 Pro device. If this was you, you don't need to do anything. If not, we'll help you secure your account ."   It may include a "Check activity" button, but that link always redirects to a google.com address, and it won't prompt you to reenter your password via the email link. Similarly, Apple notes it will never ask for passwords or verification codes via email. FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE 1. Don't click any links or attachments and use strong antivirus software: Instead, manually log in to the real site (or open the official app) by typing the URL or using a bookmarked link. This guarantees you're not walking into a scammer's trap. The FTC recommends this: if you have an account with that company, contact them via the website or phone number you know is real,  not the info in the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.  Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices . 2. Remove your data from the internet: Scammers are able to send you targeted messages because your data, like your email address or phone number, is already out there. This often happens due to past data breaches and shady data brokers. A data removal service can help clean up your digital trail by removing your information from public databases and people-search sites. It's not a quick fix, but over time, it reduces how easily scammers can find and target you.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.  Check out my top picks for data removal services here.  GET FOX BUSINESS ON THE GO BY CLICKING HERE Get a  free scan  to find out if your personal information is already out on the web. 3. Check your account activity:  Go to your account's security or sign-in page. Services like Gmail, iCloud or your bank let you review recent logins and devices. If you see nothing unusual, you're safe. If you do find a strange login, follow the site's process (usually changing your password and logging out all devices). Even if you don't find anything odd, change your password as a precaution. Do it through the official site or app, not the email. Consider using a  password manager to generate and store complex passwords. 4. Enable two-factor authentication (2FA): This is your best backup. With  2FA enabled, even if someone has your password, they can't gain access without your phone and an additional second factor. Both Google and Apple make 2FA easy and say it "makes it harder for scammers" to hijack your account. 5. Report suspicious emails: If you receive a suspicious email claiming to be from a specific organization, report it to that organization's official support or security team so they can take appropriate action. THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALL You shouldn't have to vet every sketchy email. In fact, your email's spam filters catch most phishing attempts for you. Keep them enabled, and make sure your software is up to date so that malicious sites and attachments are blocked. Still, the most powerful filter is your own awareness. You're definitely not alone in this. People receive these spammy login scares every day. By keeping a cool head and following the steps above, you're already ahead of the game.Have you ever encountered a suspicious email or phishing attempt? How did you handle it, and what did you learn from the experience?  Let us know by writing us at   Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

6 high-tech Father's Day gifts that show you really care

Shopping for Father's Day can feel like a bit of a puzzle, right? Every dad is different. Maybe yours is always glued to his laptop , loves keeping the pool spotless or enjoys pouring a fresh pint at home. If you want to skip the usual gifts and pick something that actually matches his personality, you're in the right place. From cool gadgets to smart tools and a few fun surprises, these ideas are all about making dad's day brighter and more memorable. Join The FREE CyberGuy Report : Get my expert tech tips, critical security alerts and exclusive deals - plus instant access to my  free Ultimate Scam Survival Guide when you sign up! FOR THE DAD WHO'S ALWAYS ON HIS LAPTOP The Lenovo Yoga 9i 2-in-1 is a powerful and versatile laptop featuring a vibrant 14-inch 2.8K OLED touchscreen, Intel 16-core Ultra 7-155H processor, 16GB LPDDR5X RAM, and 2TB SSD storage. It offers a flexible 360-degree hinge design, AI-enhanced performance with Microsoft Copilot and comes with a precision pen and 128GB portable SSD, making it ideal for both productivity and creative work. BEST CUTTING-EDGE HEALTH AND FITNESS TECH FROM CES 2025 Get Lenovo Yoga 9i 2-in-1  FOR THE DAD WHO LOVES A SPOTLESS POOL WITHOUT THE HASSLE The Dreame Z1 Pro Cordless Robotic Pool Cleaner is an advanced, award-winning solution designed for effortless pool maintenance in both above-ground and in-ground pools. Featuring powerful 8,000-GPH suction and dual active brushes, it effectively removes stubborn dirt, leaves and algae from floors, walls and waterlines, covering pools up to 2,160 square feet on a single charge for up to four hours. Its standout features include LiFi-powered remote control for precise underwater navigation, intelligent PoolSense AI mapping with triple-sensor technology for thorough, obstacle-avoiding cleaning and automatic retrieval with poolside docking for easy lift-out. Control is seamless via the Dreamehome app or the innovative remote, making the Z1 Pro a top choice for hands-free, smart pool cleaning. Get Dreame Z1 Pro Cordless Robotic Pool Cleaner & claim $400 coupon BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - SAVE 85% FOR THE DAD WHO WANTS FRESH DRAFT BEER AT HOME Brew beers you love at home with the Pinter, the all-in-one brew and draft machine. Enjoy 20-plus beers from world-class breweries such as BrewDog, Appalachian Mountain, Sycamore and more with new additions to the lineup all the time! Just mix, brew, chill and pour fresh pints straight from your fridge.  Get USA's No. 1 all-in-one brew machine  FREE today & save $159! Get Pinter Brew and Draft Machine HOW TO STOP ANNOYING ROBOCALLS FOR THE DAD WHO READS ANYTIME, ANYWHERE GET FOX BUSINESS ON THE GO BY CLICKING HERE The GrandPad is an all-in-one tablet and phone specifically designed for seniors 75 and older, offering a simple, intuitive interface with large buttons and a stylus to assist with navigation. It enables easy connection with family through video calls, emails, photo sharing and messaging, all within a secure, approved contact network that protects users from scams and unwanted calls. The device includes built-in 4G LTE connectivity, eliminating the need for Wi-Fi and allowing users to stay connected anywhere nationwide. GrandPad comes with a wireless charging cradle and offers 24/7 customer support for peace of mind. Additional features include medication reminders, wellness information and interactive games, all tailored to enhance seniors' social engagement and well-being. Family members can manage contacts and share content through a companion mobile app, fostering a safe and connected family circle. The GrandPad subscription covers unlimited data and internet browsing with customizable security settings, making it an ideal technology solution for seniors with limited tech experience or physical challenges such as diminished vision or motor skills.  Father's Day Special: Save $50 on a New GrandPad Annual Plan Get GrandPad FOR THE DAD WHO NEVER LETS DARKNESS SLOW HIM DOWN The Powercap 25/75 Structured Cotton LED Lighted Hat makes a fantastic Father's Day gift for dads who enjoy spending time outdoors or working on projects. This cap provides hands-free visibility in the dark thanks to its ultra-bright dual-action LED system, featuring four LEDs that offer both close-up and distance lighting, allowing dad to see up to 42 feet ahead. With up to 43 hours of battery life and a washable design for long-lasting use, it's a practical and innovative accessory he'll love for evening walks, camping or tackling tasks around the house. Get 30% off Powercap Structured LED Lighted Hat FOR THE DAD WHO VALUES HIS PRIVACY In today's digital world, protecting personal information is more important than ever. Give your dad the gift of peace of mind with a data removal service that scrubs his personal details from people-search sites and shady data brokers. These services help reduce unwanted spam, protect against identity theft and keep his online footprint under control, so he can browse, shop and scroll with peace of mind.  Save 60% off with our #1 Data Removal Service pick CLICK HERE TO SEE ALL OF KURT'S FATHER'S DAY PICKS  At the end of the day, the best Father's Day gifts are the ones that show you really get your dad. Whether you choose a high-tech laptop, a pool-cleaning robot, a hands-free LED hat or something to help him stay connected and secure, it's the thought that counts. Celebrate everything that makes your dad special with a gift that fits his interests and brings a smile to his face. Whatever you pick, he'll appreciate the care you put into finding something just for him.Which unique Father's Day gift idea resonates most with you, and how do you plan to personalize it for the special man in your life? Let us know by writing us at   Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to   Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.

Massive DMV phishing scam tricks drivers with fake texts

If you've received a text message claiming to be from your state's Department of Motor Vehicles (DMV) and threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals - plus instant access to my free Ultimate Scam Survival Guide when you sign up! These scam messages vary slightly depending on the state you're in, but they're generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website. FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE Pro tip : If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. DON'T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX The scam relies on two key elements to be effective:  fear and a sense of urgency . These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: NEW PHISHING SCAM OUTSMARTS SECURITY CODES TO STEAL YOUR INFO Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.If you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself: 1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag. 2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website. 3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.  Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices .   4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text. 5. Consider a Personal Data Removal Service:  Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details.  GET FOX BUSINESS ON THE GO BY CLICKING HERE While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap - and neither is your privacy .  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.  Check out my top picks for data removal services here. 6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to  block phone numbers and texts that send spam or scam messages, reducing future risk. 7. Register your number with the  National Do Not Call Registry : While this won't stop all scams, it can help reduce unwanted communications. 8. Don't provide any personal or financial information: Never share your Social Security number , driver's license number, banking information, or passwords in response to an unsolicited text. 9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage. 10. Keep your phone's security features updated: Ensure your  device's operating system and security software are current to help block known scam numbers and malicious links. 11. Report the scam:  Forward the message to 7726 (SPAM) to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at  reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at  ic3.gov . DON'T GET CAUGHT IN THE "APPLE ID SUSPENDED" PHISHING SCAM Scam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.Should tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us a Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

Fox News AI Newsletter: FDA approves cancer-fighting tech tool

IN TODAY'S NEWSLETTER:- FDA approves first AI tool to predict breast cancer risk
- Kesha changes cover art for 'Delusional' single after fan backlash over AI image
- OpenAI to appeal copyright ruling in NY Times case as Altman calls for 'AI privilege' SMARTER SCREENINGS: The U.S. Food and Drug Administration (FDA) has approved the first artificial intelligence (AI) tool to predict breast cancer risk. 'WE WILL FIGHT': OpenAI CEO Sam Altman said Thursday that the company plans to appeal a court decision in a copyright case brought by The New York Times.  NOVA IN ACTION: Flock Safety has released another piece of revolutionary technology aimed at keeping everyday civilians safe from crime. The company's new product, Flock Nova, helps law enforcement with a common but often overlooked problem - a lack of data sharing and access. ROBOT NURSES RISING: The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. INNOVATION HUB: Amazon is investing $10 billion to create data centers in North Carolina aimed at expanding its artificial intelligence and cloud computing technology capabilities. 30 AI STOCKS:  Investing in the next generation of artificial intelligence winners is getting more comprehensive with the launch of a new exchange-traded fund based on 30 stock picks from one of Wall Street's top analysts. AI ART BACKLASH: Kesha unveiled the new cover artwork for her single "Delusional" after facing backlash from fans for initially using an AI-generated image. OPINION: UAE AMBASSADOR: President Donald Trump's recent visit to the UAE marked a pivotal moment for UAE-U.S. bilateral relations , shining a spotlight on a shared vision for the future. As the UAE and the "New Gulf" pivot from oil to cutting-edge technologies, our partnership with the U.S., rooted in decades of trust, has become a beacon of what's possible when nations collaborate.  ROBOT GOES BERSERK: A chilling video circulating on social media has reignited old anxieties about robots turning against their creators . The footage shows a Unitree H1 humanoid robot, a machine about the size of an adult human, suddenly flailing its arms and legs with alarming force during a test, coming dangerously close to two technicians. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

New mobile robot helps seniors walk safely and prevent falls

The demographic landscape in the U.S. is shifting rapidly, with the median age now at 38.9, almost a decade older than it was in 1980. By 2050, the population of adults over 65 is projected to surge from 58 million to 82 million, intensifying the already urgent challenge of eldercare. With falls remaining the top cause of injury among older adults, the need for innovative, tech-driven solutions has never been clearer. MIT engineers are stepping up to this challenge with E-BAR, a mobile robot designed to physically support seniors and prevent falls as they move around their homes. Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals - plus instant access to my free Ultimate Scam Survival Guide when you sign up! E-BAR, short for  Elderly Bodily Assistance Robot , is not your typical assistive device. Rather than relying on harnesses or wearables, which many seniors find cumbersome or stigmatizing, E-BAR operates as a set of robotic handlebars that follow users from behind. This allows individuals to walk freely, lean on the robot's arms for support or receive full-body assistance when transitioning between sitting and standing. The robot's articulated body, constructed from 18 interconnected bars, mimics the natural movement of the human body, delivering a seamless and intuitive experience. AI ROBOTS HELP NURSES BEAT BURNOUT AND TRANSFORM HOSPITAL CARE The engineering behind E-BAR's mobility is equally impressive. The robot's 220-pound base is meticulously designed to support the weight of an average adult without tipping or slipping, and its omnidirectional wheels enable smooth navigation through tight spaces and around household obstacles. This means E-BAR can move effortlessly alongside users, providing support in real time, whether they are reaching for a high shelf or stepping out of a bathtub. BEST CREDIT CARDS FOR SENIORS AND RETIREES 2025 What sets E-BAR apart from previous eldercare robots is its integrated fall-prevention system. Each arm is embedded with airbags made from soft, grippable materials that can inflate instantly if a fall is detected. This rapid response cushions the user without causing bruising, and, crucially, it does so without requiring the user to wear any special gear. In lab tests, E-BAR successfully supported elderly volunteers as they performed everyday tasks that often pose a risk for falls, such as bending down, stretching up or navigating the tricky edge of a bathtub.Currently, E-BAR is operated via remote control, but the MIT team is already working on automating its navigation and assistance features. The vision is for future versions to autonomously follow users, assess their real-time fall risk using machine learning algorithms and provide adaptive support as their mobility needs evolve. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? TOP TABLETS FOR SENIORS: EASY, DISTRACTION-FREE AND WI-FI OPTIONAL The E-BAR project is rooted in extensive interviews with seniors and caregivers, which revealed a strong preference for unobtrusive, non-restrictive support systems. E-BAR's U-shaped handlebars leave the front of the user completely open, allowing for a natural stride and easy exit at any time. The robot is slim enough to fit through standard doorways and is designed to blend into the home environment, making it a practical addition rather than an intrusive medical device.MIT researchers see E-BAR as part of a broader ecosystem of assistive technologies, each tailored to different stages of aging and mobility. While some devices may offer predictive fall detection or harness-based support, E-BAR's unique combination of full-body assistance, fall prevention and user autonomy addresses a critical gap for those who want to maintain independence but need occasional support. HOW VR TECHNOLOGY IS CURING LONELINESS IN SENIORS  Currently, MIT's E-BAR robot is still in the prototype stage and is not yet available for consumer purchase. The research team is continuing to refine the design and aims to bring it to market in the coming years, but it could take 5-10 years before the device receives full regulatory approval and becomes commercially accessible.Looking forward, the research team is also focused on refining E-BAR's design to make it slimmer, more maneuverable and even more intuitive to use. They are also exploring ways to integrate advanced AI for real-time fall prediction and adaptive assistance, ensuring that the robot can meet users' changing needs as they age. The ultimate goal is to provide seamless, continuous support, empowering seniors to live safely and confidently in their own homes. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES BEST FATHER'S DAY GIFTS FOR EVERY DAD What stands out about E-BAR is how it's designed with real people in mind, not just as a tech gadget. It's easy to see how something like this could make a big difference for seniors wanting to stay independent without feeling tied down by bulky or uncomfortable devices. As the technology improves, it could change the way we think about caring for older adults, making everyday life safer and a bit easier for everyone involved.How comfortable would you feel trusting a robot like E-BAR to help your loved ones move safely around their home? Let us know by writing us at   Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to   Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

If you don't know about these video tools, you're already behind

I've said it before, and I'll say it again, AI is changing everything . And now, it's coming for video in a huge way. We're not just talking about deepfakes or filters anymore. This is next-level, movie-magic stuff. Enter to win $500 for you and $500 for your favorite person or charity in our  Pay It Forward Sweepstakes . Hurry, ends soon! Let's talk about the wild part first.  FOX NEWS AI NEWSLETTER: SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST 1 CHATGPT SEARCH You don't need any editing software. You don't need a green screen. Heck, you don't even need a camera. Your keyboard is now the director, the producer, the editor, and your creative partner. All you have to do is type what you want to see, and boom, AI turns your words into high-def, studio-quality video clips. It's like having a Hollywood studio tucked inside your laptop.Two of the biggest names in this space right now are Sora from OpenAI and Veo from Google . And yes, you can actually try them both right now . I've tested them side by side, and you can watch my results at the end to see which one came out on top. Sora is built right into ChatGPT and is shockingly good. Type something simple like, "a golden retriever puppy playing on the beach with a tennis ball," and within seconds, Sora delivers a smooth, visually rich video clip. No stock footage. No need to mess with editing timelines or export settings. Just write what you want to see.Here's the breakdown:And here's a hot tip: Microsoft just announced that Sora is being integrated into their new Bing Video Creator, so you'll start seeing it pop up in more places soon. FEDERAL AI POWER GRAB COULD END STATE PROTECTIONS FOR KIDS AND WORKERS Now over to  Google's Veo , and wow, this one is aiming for cinematic quality. Veo gives you up to 60-second videos in 1080p, and the realism is something else. You can include camera moves, lighting shifts, and smooth transitions, just by typing a sentence. For example: "A cat runs across a Paris rooftop at sunset." And it delivers exactly that, complete with lens flares and realistic shadows.To get your hands on Veo, you'll need to sign up for Google's Gemini plans:I wanted to see how each platform handled the same prompt, so I asked both to generate a video based on: "Show me a golden retriever puppy playing on the beach with a tennis ball."Now you can  watch the videos side-by-side . My AI puppy Bella stars in both (Veo's on the left, Sora's on the right).My thoughts? Sora nailed the adorable close-up details, Bella's floppy ears, the texture of the fur, the light hitting the waves. But it fumbled a bit when it came to physics. The ball's bounce didn't feel quite right. On the other hand, Veo did a better job with the action. The puppy's movements were more lifelike but it wasn't as sharp on the visual details.We are entering a new age of video creation where your ideas are enough. No gear, no crew, no edits. Just imagination and a little typing. Whether you're a marketer, content creator, educator, or just someone who likes to experiment, this is the future of storytelling.Trust me, it's just getting started.Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment.

5 smart settings to make your phone work harder

Sometimes it feels like our phones take up more of our time than they save. Between constant notifications, repetitive tasks and digital clutter, it's easy to forget they're supposed to make life easier.But with a few simple setting tweaks, your phone can actually help you stay organized, reduce distractions and save time. These built-in tools don't require any extra apps or subscriptions, and once you set them up, they work quietly in the background so you don't have to. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! If you're constantly typing your email address, home address or the same greeting, you can save time by using built-in text shortcuts. On iPhone: CLEAN UP YOUR PHONE: SPEED, STORAGE AND PRIVACY BOOST IN MINUTES On Android: Settings may vary depending on your Android phone's manufacturer.  A few of the shortcuts I use include "@@" for my email, "adr" for my address and "gm" for a quick "Good morning!" but I've also put together a full guide of my most useful keyboard shortcuts  here . HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES  Instead of turning off notifications manually, let your phone do it for you based on a schedule or even your physical location. On iPhone:  For example, when you click  Work , you can allow notifications from key apps like Outlook or Slack and silence the rest. You can also allow for notifications from important people, like your co-workers and family members. When you click  Add a Schedule , you'll be able to customize a  Time  for your phone to know exactly when to turn Work mode on and off. Or, if you work odd hours, you can even set up  Location ,   so when you arrive to work, your phone does, too. On Android:  Settings may vary depending on your Android phone's manufacturer.  This feature helps reduce distractions while working, sleeping or commuting without needing to remember to toggle it on.   Rather than setting reminders for a specific time, you can have them appear when you arrive or leave a location. This can be useful for reminders like "Pick up eggs" when you arrive at the store or "Bring laptop" when you leave home. On iPhone : On Android: Settings may vary depending on your Android phone's manufacturer.  Now, your phone works like a virtual assistant, reminding you of your tasks when you need them most. GET FOX BUSINESS ON THE GO BY CLICKING HERE HOW TO INCREASE THE TEXT SIZE ON YOUR PHONE Instead of scrolling back through months or years of messages to clean up, you can set your phone to delete them automatically. On iPhone: On Android: Settings may vary depending on your Android phone's manufacturer.  This keeps your device from getting bogged down with old group chats or spam texts. HOW SECURE IS MY PASSWORD? USE THIS TEST TO FIND OUT   Make sure your apps stay up to date with the latest features and security fixes without needing to check manually. On iPhone: On Android: Settings may vary depending on your Android phone's manufacturer.  Turning on auto-updates saves you time and helps keep your phone running smoothly and securely. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES These five small automations can make a big difference in how you use your phone. Setting up text shortcuts helps you type faster. Scheduling Do Not Disturb cuts down on unwanted distractions. Location-based reminders take the mental load off your to-do list. Auto-deleting old messages keeps things tidy. And auto-updating apps ensures you always have the latest improvements without lifting a finger.Got a tip you'd like to share and/or what other everyday tech challenges would you like help solving? Let us know by writing us at   Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

10 Android automation tips to simplify your daily routine

Many people don't know that they can automate certain tasks on their Android devices. These automations can save them time and streamline their workflows, and they only take a few taps to set up. It can take some trial and error to figure out which automations work for you, but the good news is that we have 10 of them you can try right now. Note : We are using a Samsung Galaxy phone for this guide. Due to Android phones having different user interfaces, depending on the manufacturer, the steps might be slightly different on your device. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  free "Ultimate Scam Survival Guide" when you sign up! If you have a well-defined work schedule, automating when Do Not Disturb (DND) mode turns on and off ensures uninterrupted focus during those times. CLEAN UP YOUR PHONE: SPEED, STORAGE AND PRIVACY BOOST IN MINUTES Here's how you can set it up:Now you need to choose what the mode does. Follow the steps below: ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY You might need to send a message later, but you might not always remember to do so. Luckily, your Android allows you to schedule it to go out at a specific time in case you're tied up.Open the Messages app and compose your message as you normally would. Instead of sending the message, do this instead: BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2025 Setting up a bedtime mode on your phone ensures you can sleep through the night without interruptions from your Android phone. It simply silences notifications and minimizes distractions automatically.To set it up, you will need to create a sleep routine. Follow the steps below: HOW TO UPDATE YOUR PIN OR PASSWORD ON YOUR ANDROID Enabling Google Autofill can save precious time by automatically filling in forms, passwords and payment details across apps and websites . Here's how to enable it:  SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Setting your phone to automatically switch to power-saving mode when the battery gets low helps you conserve battery life, with no manual intervention required.Let's start by setting up the time period for when you want the phone to turn on power-saving mode. Follow these steps:Now you need to set it to switch to power-saving mode at the set time. Follow these steps:Social media, games and other time-consuming apps can be a hindrance when you need to focus on work. This automation is a good one for automatically blocking them during work hours and unblocking them when you're out of the office. To set it up, you must first set the period with the steps below:Now to restrict the apps:It's always a good idea to enable dark mode during the evening hours. That way, you can reduce eye strain in low-light conditions. Here's how you can do that: HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES   HOW TO HIDE APPS ON YOUR ANDROID TO KEEP THEM SECRET This location-based Wi-Fi automation helps conserve battery life and enhance security by automatically connecting to trusted networks when you're at specific locations, like at home or work. It will remain disconnected everywhere else. Here are the steps to do that:By automating your photo backups, you'll never have to manually save or transfer photos again. They'll automatically sync to the cloud whenever you take new pictures, giving you peace of mind that your memories are always protected.While there are several apps you can use to do this, we will use Google Photos . Here are the steps: WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE  It's understandable to disable auto-rotation to prevent the screen from unintentionally rotating when you move your device. However, you might want it to turn on again when, for example, watching a movie on Netflix or viewing a photo. To save yourself some frustration, it's best to automate the process. First, let's create the routine with the steps below: HOW SECURE IS MY PASSWORD? USE THIS TEST TO FIND OUT   GET FOX BUSINESS ON THE GO BY CLICKING HERE BEST FATHER'S DAY GIFTS FOR EVERY DAD Automation isn't just about convenience. It's about creating habits that improve the way your Android phone works for you, especially in scenarios where it seems like it's working against you (e.g., causing too many distractions). Your Android phone is smarter than you think. While many of these automations can work for you as is, don't be afraid to tweak them to your particular scenario.What tedious task are you going to automate now that you know how to go about it? Let us know by writing us at  Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt: Copyright 2025 CyberGuy.com. All rights reserved.

Distributed by aarss.com.