Technology News Articles on Fox News

AI-powered home security system strikes back with paintballs and tear gas

A company from Slovenia, called PaintCam, is shaking things up in the security world . It has come up with this wild new gadget, the PaintCam Eve. It's not just another security camera watching over your house. This thing packs a punch with paintball and tear gas projectiles to really give intruders a surprise they won't soon forget. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The heart of Eve's capability lies in its sophisticated computer vision technology . It can identify human faces and animals even in low-light conditions, distinguishing between friends and foes. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The system, which comes in 3 models, Eve, Eve +, and Eve Pro , allows homeowners to categorize visitors via an app interface - making decisions about who is welcome and who is not. But the most intriguing feature? When Eve detects an intruder, it issues a stern warning, and if not heeded, it proceeds to launch paintballs or tear gas. MORE: CREEPY TOOL LETS CRIMINAL HACKERS ACCESS YOUR HOME VIDEO CAMERAS PaintCam does offer users a significant degree of control. The system alerts the homeowner when an unknown person is detected in the company of someone known, asking whether to "take the shot" or not.This feature places a heavy responsibility on the user, turning home security into a more interactive and potentially morally complex activity. How users will navigate these choices, especially in high-pressure situations, is yet to be seen. MORE: 6 BEST OUTDOOR SECURITY CAMERAS  While the prospect of a security camera that can "shoot" at intruders may sound appealing to some, it raises significant ethical and legal questions. The use of force, even non-lethal, by an autonomous system could lead to unintended consequences.For instance, what happens if the system mistakenly identifies a neighbor or a child retrieving a lost toy as a threat? The legal ramifications of such scenarios remain unclear, making Eve a subject of debate among security experts and civil rights advocates alike. MORE: SNEAKY LIGHTBULB SECURITY CAMERAS ARE THE NEXT BIG THING IN HOME SECURITY  The global home security market is set to garner a market size of an estimated $106.3 billion by 2030 , indicating a vast potential customer base for innovative products like Eve. However, its market success will depend not only on consumer interest but also on navigating the legal landscape and public perception challenges that such a confrontational device presents.PaintCam launched Eve with a Kickstarter campaign on Tuesday. At the time of publishing, the exact cost of the security device has not yet been disclosed. You can sign up for notifications about the product on PaintCam's official website , as well as on the Kickstarter product page .   GET FOX BUSINESS ON THE GO BY CLICKING HERE The company posted this mission statement on its site: "We offer innovative solutions that seamlessly integrate with your environment, establishing both passive presence and active deterrence. Our unwavering commitment is to make the world a safer place, not by fortifying intimidation strongholds, but by delivering intelligent, adaptable, and elegant security options." This innovation invites us to reflect on the nature of home security. Are we moving towards a future where our homes are not just passively protected but actively defended by machines? And at what point does the integration of such technology in our daily lives challenge our notions of privacy and safety? Only time will tell whether systems like Eve will become the new norm or remain a curious footnote in the evolution of home security technologies.Considering the potential for mistakes, do you feel comfortable with the idea of a security system like PaintCam Eve that can autonomously deploy paintballs or tear gas? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

11 insider tricks for the tech you use every day

If you're the person skipping updates on your devices ... knock that off. You're missing out on important security enhancements-like iOS 17.4, which adds better Stolen Device Protection and Android's new Find My feature to locate your lost phone. 🎉 Win an iPhone 15 worth $799! I'm giving it to one person who tries my free daily tech newsletter.  Enter to win now! It's nearly impossible to keep up with every update and added feature. That's what I'm here for. I hope you find a tech tip below that makes life better for you! Shop open-box deals US AIRPORTS ADAPT TO TRAVEL SURGE BY EXPANDING USE OF TECHNOLOGY TO PROCESS PASSENGERS Most sites use grades or ratings, so you know the condition. For example, a "Grade A" smartphone has just a bit of wear. Amazon open-box products are always fully functional and in one of four conditions: "Used/Like New," "Very Good," "Good" or "Acceptable."  Here's a link to Amazon's open-box deals. Know what apps are listening Buried within all the legal mumbo jumbo you said "yes" to when downloading an app, you may have given the app permission to listen using your phone's microphone and collect data. Your Google Doc holds secrets you shouldn't share It'll be called "Copy of" and your original file name by default. Rename it, then share that. Why? Anyone accessing the original doc can review all your edits, changes and versions. Hit File > Make a copy . Pro tip: Reverse this idea to see someone else's edits and changes. Make your iPad more useful SEE WHAT THE HOME YOU GREW UP IN LOOKS LIKE NOW AND OTHER MAPS TRICKS This is a pro move if you spend time with your Apple tablet on the couch . Go to Settings  > General  > Keyboard , then enable Split Keyboard . Long-press the keyboard key at the bottom right, slide your finger to Split , then release. Now you can type with your thumbs! To return to normal, long-press the keyboard key, slide your finger to Merge and release. Don't say I didn't warn you Take off your phone's case and you'll see all the grime collected inside. Gross. For plastic, rubber and silicone cases, use an old toothbrush and a bit of warm, soapy water. For leather cases, very lightly dampen a microfiber cloth with water and mild soap. Stay safe on the road Get the  free NHTS SaferCar app . Enter your car's VIN and receive automatic alerts about recalls. There have been a lot lately, and it's easy to miss notifications from your dealership. For your eyes onlyu have sensitive pics like your driver's license on your phone, set up a locked folder in Google Photos. Open the Google Photos app > Utilities  > Set up Locked Folder. Follow the on-screen directions to finish up. Note : Anything stored there isn't backed up to the cloud. Wouldn't be very private that way. Have an iPhone? CAN YOU SPOT ELECTION DEEPFAKES? HERE'S HOW NOT TO BE DUPED You can store secret pics in the Notes app. Open the pic in the Photos app, tap the share icon and select Notes . Go into the note you want to protect, tap the three-dot icon in the upper right corner, then choose Lock . You made a bad call And streamed a terrible rom-com. Get it off your Netflix history so it doesn't influence your future suggestions. On a computer, click your profile , then Viewing activity . By each show or movie, you'll see a small icon of a circle with a line through it. Click on that to hide it. I'd rather be safe than sorry For every study that shows your phone is perfectly safe, there's another about the impacts of even low-level radiation. I rarely bring my phone to my head or put it in my pocket.  AirPods are my favorite way to take a call (I'm an iPhone gal). Go with  AirPods Pro if you can. On an Android, here's a  budget earbuds option and  the fancy ones . Men, don't store your phones in your pants pockets.  It can hurt your fertility. Too many tabs and too much noise?  Right-click on a tab in your browser and select Mute Tab  or Mute Site . In some browsers, you can also click the microphone on a tab playing noise to stop it. Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

The AI camera stripping away privacy in the blink of an eye

It's natural to be leery regarding the ways in which people may use artificial intelligence to cause problems for society in the near future. On a personal level, you may be concerned about a future where artificial intelligence takes your job or creates a Terminator that comes back in time to try to eliminate a younger you. (We admittedly might be overthinking that one.) One fear regarding AI on a personal level that you should know about because it's very much in the present is the creation of deepfake photos, including those that strip you of the most basic of privacy rights: the right to protect images of your body.Two German artists recently created a camera called NUCA that uses AI to create deepfake photos of subjects by stripping away their clothing. The automated removal of the photo subject's clothing occurs in close to real-time, speeding up the creepy factor exponentially. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The two German artists, Mathias Vef and Benedikt Groß, decided to create the camera to show the implications of AI's rapid advancements . The pair were trying to think of the worst possible uses of AI to affect someone's privacy, and they realized that the technology needed to create a camera like NUCA was already possible. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The two artists hope that people will consider the dangers of continuing to develop AI technologies like this, which could eliminate the expectation of privacy. They hope it will spark debates about the direction of AI. MORE: HOW SCAMMERS HAVE SUNK TO A NEW LOW WITH AN AI OBITUARY SCAM TARGETING THE GRIEVING The German artists used 3D design and print software to create the lenses and the shell for controlling the camera. It then uses a smartphone on the inside of the shell that handles the image capture. NUCA passes the photo to the cloud for the application of AI that removes the subject's clothing.Of course, NUCA is not actually creating a photo of your naked body. Instead, it analyzes your gender, face, age and other aspects of your body shape to develop a replication of what AI believes your naked body would look like. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: ARE AI DEEPFAKES THE END OF ACTING AS WE KNOW IT  Deepfake nude photos, usually of celebrities, have been around for a long time on pornography websites, but the photos from NUCA require almost no technical know-how. Even more frightening, NUCA is able to perform the process within about 10 seconds. The immediacy of the creation of the deepfake nude photo is what sets NUCA apart from other fake nude photos that typically require quite a bit of editing skill and time.  MORE: AI WORM EXPOSES SECURITY FLAWS IN AI TOOLS LIKE CHATGPT Bottom line: Anyone could use the technology that's found with NUCA to create a deepfake nude photo of almost anyone else within several seconds. NUCA doesn't ask for permission to remove your clothing in the photo.It's worth emphasizing again that the two artists have no plans to allow others to use NUCA for commercial gain. They will showcase its capabilities in late June at an art exhibition in Berlin all in an effort to spark public debate.However, the next people who develop a similar technology may choose to use it in a far different way, such as to potentially blackmail people by threatening to release these fake nude photos that other people won't necessarily know are fake.If it feels like AI is expanding wildly in dozens of different directions all at once, you aren't all that far off. Some of those directions will be helpful for society, but others are downright terrifying. As deepfakes continue to look more and more realistic, the line between a fake digital world and reality will become increasingly difficult to discern. Guarding our privacy will almost certainly be more and more difficult as AI strips away our safeguards ... and, potentially, even our clothing. Are you concerned about AI-created deepfake photos and videos affecting you personally? What safeguards should exist around the use of AI? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

This off-road teardrop trailer adds luxury camping to the most remote locations

Are you looking for a camper that breaks away from the conventional teardrop design and blends functionality with sleek aesthetics? Meet the Kimberley Kube. This innovative camper challenges the norms with its unique rectangular profile, flat roofline and vertical rear end.By integrating the smooth composite construction of Kimberley's Kruiser line with the enclosed form of the Karavan, the Kube offers a compact yet surprisingly spacious design.  CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Whether you're planning a weekend escape or a long adventure , the Kube brings a fresh perspective to teardrop campers, providing eye-catching design without sacrificing space or functionality. MORE: BEST CAR ACCESSORIES 2024 True to Kimberley's heritage of robust, trail-ready caravans, the Kube is not just another pretty face. It's built to tackle the harshest of terrains, equipped with a molded thermoplastic-composite body shell , a 100% recycled ArmaPET plastic floor and a sturdy hot-dipped galvanized steel chassis.Complementing its tough build are 16-inch steel wheels, custom air springs, off-road racing mono-tube shocks and hydraulic override disc brakes, ensuring that it can handle even the most challenging off-road conditions. MORE: DISCOVER THE FUTURE OF RVING WITH THE ELECTRIC TRANSFORMER HOUSE Stepping inside the Kube, one is greeted by an interior that rivals a well-appointed hotel room. The trailer stretches 17 feet, providing ample space for a king-sized bed positioned within a mini-greenhouse setup that offers 270-degree views through three large windows and an additional skylight.Storage is ingeniously integrated around and under the bed, ensuring that every inch of space is utilized. The front of the cabin includes a full-width console with storage solutions and an 85-L upright fridge/freezer, enhancing both convenience and comfort.Kimberley understands that camping is about engaging with the outdoors. The Kube features a slide-out outdoor kitchen accessible from a hatch at the rear, equipped with a dual-burner stove, sink and dedicated prep area.This kitchen setup allows for comfortable outdoor dining under the awning, facilitated further by a stainless steel breakfast table that attaches to the kitchen unit.Additionally, the Kube offers the luxury of hot showers, thanks to a Webasto diesel water heater, with the option to add an ensuite shower/toilet tent for complete privacy. 25 CAMPING ESSENTIALS YOU NEED FOR VENTURING OUT INTO THE WOODS MORE: 5 BEST PORTABLE CHARGERS The Kube is prepared for any adventure with advanced technology integrations, such as a 200-Ah lithium battery, extensive LED lighting, optional solar charging and Starlink satellite internet prep.The inclusion of modern comforts such as air conditioning, an onboard audio/video setup and the ability to stay connected via superfast 4G and GPS technology makes the Kube a standout in its class. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: TOP TECH YOU NEED ON RV ROAD TRIPS With prices starting at approximately $44,675, the Kimberley Kube offers a unique blend of luxury, functionality and ruggedness, making it an ideal choice for adventurers who refuse to compromise on comfort and style.Whether exploring remote landscapes or enjoying a weekend getaway, the Kube promises an unmatched camping experience. It truly stands out as the "King of the Off-Road." It's a trailblazing camper that promises both the thrill of the journey and the pleasures of home, wherever you may roam.What additional features or customizations would you like to see in future models of the Kimberley Kube? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: AI predicts your politics with single photo

IN TODAY'S NEWSLETTER:- AI can predict political orientations from blank faces - and researchers fear 'serious' privacy challenges
- Google to provide AI to military for disaster response
- AI could predict whether cancer treatments will work, experts say: 'A natural progression' BLANK SPACE: Researchers are warning that facial recognition technologies are "more threatening than previously thought" and pose "serious challenges to privacy" after a study found that artificial intelligence can be successful in predicting a person's political orientation based on images of expressionless faces.  DISASTER RESPONSE: An artificial intelligence venture backed by Google is partnering with the military to use AI in responding to natural disasters. 'NATURAL PROGRESSION': A chemotherapy alternative called immunotherapy is showing promise in treating cancer - and a new artificial intelligence tool could help ensure that patients have the best possible experience. GOOGLE AI MOVES: Google announced on Thursday that it will consolidate a pair of its internal teams that are focused on building artificial intelligence models. COUNTERING SCAMS: Unfortunately, scammers are using artificial intelligence to mimic the voices of people, potentially turning these fake voices into things like kidnapping scams. This particular scam seems to be rare, but it's happening.
  FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Tired of getting those mysterious password reset emails? Here's what to do about it

Passwords can definitely be a frustrating part of our lives. Remembering which passwords you used for your dozens of different accounts is nearly impossible without the help of password managers. Should you suddenly start receiving constant emails telling you that you have to reset your password for whatever reason (or sometimes with no reason listed) on top of everything else, you may be at the end of your patience.Several reasons exist for receiving these email messages, and they can range from legitimate to scam to somewhere in between.  CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER When you are entering your username and password at a website to access your account, you may see a small "Forgot Password" text link. If you can't remember your password, and you click this link, the account holding company will send you an email that allows you to reset your password. This type of email reset message, like the one below, would be a legitimate one.However, some password reset emails you receive are fake, usually attempting to trick you into revealing your username and password to a hacker . MORE: THIS IS HOW YOUR EMAIL GETS INTO WRONG HANDS When you receive email messages asking you to reset a password when you did not make the request, the message could be a fake. Some of the reasons you may receive fake emails like this include: Beware the bait: A hacker is attempting a phishing attack , hoping you'll click on a fake link in the message. Privacy alert: You potentially shared your email address at an unsafe website, and hackers are trying to steal your account password by tricking you into revealing it. Security warning: Your account has some sort of security issue that is triggering these messages. Update required: You may need to update your software or app to the latest version. MORE: HOW TO KEEP YOUR ONLINE PASSWORDS SAFE The password reset email message you are receiving could be a legitimate request. It may indicate that your account is under attack from a hacker. You can protect yourself in a few ways. Go to the website directly and access your account. Then change your password to make it stronger. Set up rget=_new href="https://cyberguy.com/how-to/what-is-two-factor-authentication-and-why-should-i-enable-it/" target="_blank" rel="nofollow noopener"> two-factor authentication (2FA) on your account. Should someone figure out how to hack your account password, having the second verification requirement significantly protects you. Reach out to the website that holds your account for help with taking the necessary steps to protect yourself. You may receive the message because you need to change your password every few months to match the requirements of the company holding the account. Never click on a link in the email message as it could be a fake. If you click on it, you may actually give the hacker the information to take over your account rather than protect your account. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices .You can take a few steps to try to reduce the number of emails you receive requesting a password reset. 1. Double-check your username and password. When accessing your account, you may have a typo in your login information. Should you repeatedly attempt to access your account with this error, the company that holds the account may believe a hacking attempt is occurring, triggering an automatic reset. If your web browser automatically populates your username and password for you, make sure this information is free of typos. RURAL TEXAS TOWNS REPORT CYBERATTACKS THAT CAUSED WATER SYSTEM TO OVERFLOW 2. Remove unauthorized devices. Some accounts maintain a list of devices authorized to use your account. If a hacker manages to gain some of your personal information, it may be able to add one of its devices to your authorized list, triggering account login errors as it tries to hack your password. Check the list of authorized devices and remove any items you don't recognize. The process varies, depending on the type of account. We'll cover steps for Microsoft, Gmail, Yahoo and AOL.Remember to regularly check your account settings and authorized devices to ensure the security of your accounts. If you suspect any unauthorized access, it's also a good idea to change your passwords and review your account recovery options. GET FOX BUSINESS ON THE GO BY CLICKING HERE 3. Sort such messages to spam. If you'd prefer to simply not see these kinds of email messages, set up your email client to sort messages like this to a spam folder. (Because many of them are spam, some email clients do this automatically.) Should you ever legitimately request a password reset, though, you'll need to remember to look in the spam folder for the message. 4. Use a static IP address. Some accounts attempt to recognize your device through your IP address. If you have a dynamic IP address, your IP address changes constantly, meaning the account may not recognize your device, triggering the reset message. This often occurs because you are using a VPN. See if your VPN allows you to use a static IP address. MORE: WHAT HAPPENS WHEN CYBERCRIMINAL GETS ACCESS TO YOUR EMAIL ADDRESS Although it can be frustrating to receive password reset emails, you should investigate any request like this that comes from an account you use regularly. Reach out to the customer service team for the account where you are having the issue. You may find that a simple glitch is causing the issue. Fix that, and you can put a halt to these frustrating messages. Or if it is a fake password reset email, you now know how to handle the situation to stay safe and secure.Can you share a time when you strengthened your online security measures in response to a threat? What prompted it and how did you do it? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

New stealthy submarine glider set for autonomous undersea missions

The ocean depths are a new frontier explored by humans and autonomous vehicles.Leading the charge is Northrop Grumman's innovative Manta Ray uncrewed underwater vehicle (UUV), a technological innovation set to revolutionize undersea missions.The Manta Ray UUV was built through a Defense Advanced Research Projects Agency (DARPA) program . It is a testament to human ingenuity and nature's inspiration. Drawing from the hydrodynamic form of its namesake, the manta ray, this extra-large glider vehicle promises to soar through the ocean on long-range missions without human assistance. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER rget=_new href="https://cyberguy.com/safety/bulletproof-body-armor-exoskeleton-innovation-can-take-rounds-from-ak-47-rifle/" target="_blank" rel="nofollow noopener"> MORE: THIS BULLETPROOF BODY ARMOR EXOSKELETON INNOVATION CAN TAKE ROUNDS FROM AK-47 Details on the Manta Ray are sparse, shrouded in mystery, much like the ocean depths it's designed to explore. What we do know is that it's built for endurance and versatility, capable of carrying various payloads tailored to specific missions. GREECE PROPOSES 2 MARINE PARKS AS PART OF $830M ENVIRONMENTAL PROTECTION PROGRAM rget=_new href="https://cyberguy.com/gadgets/dive-into-sea-with-state-of-art-underwater-drone/" target="_blank" rel="nofollow noopener"> MORE: DIVE INTO THE SEA WITH THIS STATE-OF-THE-ART UNDERWATER DRONE rget=_new href="https://news.northropgrumman.com/news/releases/northrop-grumman-completes-assembly-of-manta-ray-uncrewed-underwater-vehicle?_gl=1*nb3uii*_ga*MTMxOTEwNjY0Mi4xNzEzMjA0MDE5*_ga_7YV3CDX0R2*MTcxMzIwNDA0MC4xLjEuMTcxMzIwNDA3Mi4yOC4wLjA." target="_blank" rel="nofollow noopener"> Northrop Grumman isn't just creating a vehicle but pioneering advanced autonomous technologies. The Manta Ray's energy-saving systems and modular design are set to revolutionize subsea warfare and beyond. MORE: IT MAY LOOK LIKE AN EAGLE, BUT IT'S ACTUALLY A STEALTHY BIRD-DRONE FOR COVERT MISSIONS The Manta Ray program is set to introduce critical technologies for a new class of UUVs. These technologies include:The program's multiphase effort includes at-sea demonstrations of these critical technologies, employing a disciplined systems engineering approach to define objectives and identify enabling technologies needed for future systems. GET FOX BUSINESS ON THE GO BY CLICKING HERE The Manta Ray UUV is more than just a machine; it's a leap into the future of undersea exploration and combat . Its ability to operate autonomously and adapt to various missions represents a significant advancement in unmanned maritime technology.With the deployment of the Manta Ray UUV and similar autonomous technologies, what concerns do you have about the escalation of undersea warfare and its potential consequences for global security? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Get a handle on your time: Google Calendar tips and tricks

Before we get into it, I'll acknowledge what you may be thinking: Using Calendar means handing over even more info to Google. Win an iPhone 15 worth $799! I'm giving it to one person who tries my free daily tech newsletter.  Sign up here while you're thinking about it. SEE WHAT THE HOME YOU GREW UP IN LOOKS LIKE NOW AND OTHER MAPS TRICKS Sure, but here's my take: For the sake of convenience, most of us choose a Big Tech company or two that we're OK sharing a lot with. If you use Gmail and Google Maps, adding Calendar to the mix won't make much difference in terms of privacy. Here are some ideas to get the most out of it Spoiler: A lot more than just meetings and dentist appointments. And yes, you can definitely use you preferred calendar app for all these things too, if Google isn't your thing . Let's get to the tricks FIX AUTOCORRECT IF IT'S DRIVING YOU DUCKING CRAZY A little know-how goes a long way in getting more out of your everyday software. Know when people are free:  I use this daily at work. Put your cursor in the box labeled Search for people under the Meet with  heading. Everybody in your organization should be searchable here, so no more setting meetings no one can attend. You can also create a new meeting, add guests and click Find a time under the date to see the attendees' availability side by side! WATCH OUT FOR THE NEW 'GHOST HACKERS' Automatically share meeting minutes:  In your meeting details, click Create meeting notes under the event description to generate a Google Doc that automatically gets shared with attendees. It includes a built-in outline with the meeting date, attendees, notes and action items. Pro tip: Attach additional notes, docs, slides or whatever else to the meeting so no one's looking around for them later! Never miss a beat:  When setting an appointment, simply click Add Notification . Choose how long before the event you'd like to be reminded. Boom! Whether it's 10 minutes or a day in advance, Google Calendar's got your back. No more oops moments. You know I have more amazing tips up my sleeve.  Get more Google Cal secrets. Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

How to remove Facebook access to your photos

Raise your hand if you've ever skimmed through the user agreements and legal jargon that appear when signing up for new software or services. (If you aren't raising your hand right now, you probably should be.) No one enjoys sifting through this dense information.Unfortunately, by not reading service agreements thoroughly, you might inadvertently grant services access to things you'd prefer they didn't have. For instance, you may have unknowingly allowed the Facebook app to access the photos stored on your phone or tablet during the download process.If you'd rather not give Facebook this level of access to your stored photos, you can modify the permissions even after installing the app. We'll guide you through the steps to protect your privacy concerning your photographs. Note that some images, like your profile picture and cover photo, are always visible to Facebook. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER You can prevent Facebook from gaining access to your photos on your iPhone or iPad through the following steps.You can then exit all of the menus and continue using Facebook, knowing that your photos are safe. MORE: IS FACEBOOK LISTENING TO YOU? You can deny Facebook access to your photos on your Android tablet or smartphone. Here's how. Settings may vary depending on your Android phone's manufacturer. MORE: 5 WAYS TO MAKE YOUR FACEBOOK ACCOUNT BULLETPROOF After disabling photo access for Facebook, you may encounter frequent popup messages requesting you to restore access. Allowing access can simplify the process of uploading and sharing photos directly from your device to your Facebook page.However, Facebook will not automatically post your personal photos without your permission; you decide which photos to upload. You might opt to restrict access to maintain privacy, ensuring that only selected photos are shared and preventing accidental posts of personal or sensitive images. MORE: HOW TO ESCAPE FACEBOOK'S CREEPY AD TRACKING You can enjoy social media without sacrificing your privacy by taking a few moments to adjust your settings. Remember, it's your data, and you have the power to control who sees what. Stay informed, stay secure and keep your personal moments personal.How do you decide which photos or personal information to share on platforms like Facebook? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to turn your iPhone into instant foreign language translator

In today's interconnected world, the ability to communicate across language barriers is more important than ever. Apple has recognized this need and, in a recent iOS update, introduced a nifty feature that allows you to translate languages instantly without even opening the Translate app.This feature utilizes the "Dynamic Island," a pill-shaped area at the top of the iPhone screen that can change size and shape to accommodate various types of alerts, notifications and interactions, turning it into a kind of front-and-center information hub. The Dynamic Island feature is available on the iPhone 15 models, which includes the iPhone 15, iPhone 15 Plus, iPhone 15 Pro and iPhone 15 Pro Max. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER MORE: TOP AFFORDABLE CELLPHONE PLANS Getting started is simple. Here's how you can set up the Translate option using the Action Button on your iPhone: MORE: HOW TO UPDATE YOUR PASSCODE ON YOUR IPHONE Once you've set it up, using it is just as easy:Make sure to release the Action Button after the Dynamic Island shows "English, Listening" to ensure the feature works correctly. MORE: HOW TO CREATE OR LEAVE GROUP TEXT ON YOUR IPHONE While you can't change the Translate settings directly from the Action Button, you can still customize your experience within the Translate app itself: MORE: 8 WAYS TO LOCK UP YOUR PRIVATE STUFF ON YOUR IPHONE Apple's latest update is more than just a technical enhancement. It's a step toward a world where language differences are no longer a barrier to communication. Whether you're traveling abroad, learning a new language or connecting with friends and family across the globe, the ability to translate on the fly is a game-changer. It's a testament to how technology can bring us closer together, making the vast world just a little bit smaller.Have you ever found yourself in a situation where instant translation would have made a significant difference? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Tidy up your tech: Spring-cleaning tips for safeguarding your data

It happens without warning. Suddenly, access to your personal data gets interrupted by a simple hardware failure, nasty virus, cyberattack, software glitch, accidental deletion or human mistake. It's clearer than ever that our personal data is vulnerable.As an advocate for privacy and security, and the editor behind the popular CyberGuy Report, which you can subscribe to for free at CyberGuy.com/newsletter , I have always emphasized the importance of personal responsibility when it comes to data security. My top recommendation for protecting your precious memories, critical documents and the mountains of personal data we accumulate is straightforward: utilize a personal drive for backups. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Spring is traditionally a time for cleaning, and this should extend to digital hygiene as well. Each year, I undertake a thorough cleaning of my personal data, making sure to back up documents, family photos and other irreplaceable items. There's nothing quite like the peace of mind that comes from having a physical backup, which places control firmly in your hands, irrespective of whether you use a Mac, PC or even a Chromebook. MORE: BEST LAPTOPS FOR 2024 One of my favorite tools for this task is the WD Portable Drive , which offers 2 terabytes of storage. It easily connects to your device via SuperSpeed USB 3.0, ensuring quick and efficient data transfer and is fully compatible with Chromebook. A reliable drive like this is a must-have; I use another similar WD model for my MacBook and PC. MORE: BEST DESKTOP COMPUTERS FOR 2024 In addition to regular ongoing backups either on the cloud or another drive, I use this WD drive that plugs into your Mac, PC or Chromebook as an extra copy of my important data that can be disconnected and kept in a safe place away from hackers and other threats. MORE: 10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE When deciding what to back up from your computer, it's crucial to prioritize documents, files and memories that are important and irreplaceable. Here's a comprehensive list to consider. 1) Personal documents : Include items like birth certificates, passports, social security cards, marriage certificates, wills and other legal documents that could be difficult or time-consuming to replace. 2) Financial records : This category should cover bank statements, tax returns, investment records and other financial documents that are essential for personal record-keeping and legal compliance. 3) Photos and videos : Family photos, vacation videos, special events like weddings or graduations and other personal memories that cannot be recreated. 4) Work and educational documents : If you use your computer for work or school, ensure you back up important projects, research papers, presentations and related correspondence. 5) Emails : Some emails might contain important information, agreements or attachments that you may need to refer back to. Consider backing up important emails or archiving them. 6) Contacts : A backup of your digital address book can save you a lot of trouble in case you lose access to your devices. 7) Music and media collections: For those who collect music, movies and books digitally, backing up these files ensures you don't lose your collection. 8) Software and app data : Back up settings and data for apps that you use frequently, especially if they help manage your schedule, finances or health. 9) Website bookmarks : If you rely on bookmarks to navigate the internet efficiently, backing them up can save time if you need to restore or switch to a new device. 10) Game saves and profiles : If you're a gamer, backing up your game saves and profiles can prevent loss of progress in case of system failure. 11) Creative works : Include writings, artwork, design files, coding projects or any other personal or professional creative work.The reality of digital threats, whether from ransomware attacks, viruses or even technical glitches in the cloud, is not a matter of "if" but "when." By maintaining a physical backup of your most crucial data, you ensure that in the event of a digital catastrophe, what matters most remains safe in your hands.Remember, safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. This spring, take the time to protect yourself from potential future data disasters. Unplug your backup drive and store it in a safe place. It's a simple step that could save you a lot of heartaches.What's your "data disaster" story and what lessons did you learn about digital backups from it? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

The troubling truth about our country's recycling programs

Imagine diligently separating your recyclables, placing them into the green bin as instructed, and then discovering it's all for naught. That's the frustrating reality a Redditor faced, sparking a conversation on r/Apartmentliving about the disheartening state of recycling in their complex. The green dumpster was just a facade, and the company didn't even offer residential recycling. It begs the question: Is anyone else's complex out there lying about something so obvious? CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER This isn't an isolated incident. Across the nation, renters find themselves handcuffed by landlords who block eco-friendly practices like gardening or air-drying laundry. Yet, there's hope. In the U.S., 74 million people live under homeowners associations where there's room to navigate or even alter the rules for the betterment of the community.The discourse on Reddit resonates with many who share similar struggles. One user lamented their building's failed recycling attempt due to contamination, and another mentioned the absence of recycling services altogether, leaving the responsibility on individuals to transport recyclables to centers. MORE: IS THIS TECHNOLOGY THE ANSWER TO CLEANING UP OUR OCEAN'S PLASTIC PROBLEM? In Washington, D.C., a report by The Recycling Partnership sheds light on the dire state of U.S. residential recycling. A mere 21% of recyclables actually get recycled. The report, "State of Recycling: Present and Future of Residential Recycling in the U.S.," reveals the gap between current practices and the five pillars of an efficient recycling system. It's a call to action for policymakers, companies and communities to bridge these gaps. MORE: HOW A FORMULA E RACE CAR WAS BUILT ENTIRELY FROM RECYCLED ELECTRONIC WASTE Under-recycled materials: A staggering 76% of recyclables end up in the trash at home. Only 73% of households have recycling access, with a significant disparity between single-family (85%) and multifamily homes (37%). Participation is low, with only 43% of households recycling, and even then not to full potential. State-by-state disparities: Some states like Alabama and Mississippi recycle less than 10%, while others like California and New York exceed 30%. The report suggests that extended producer responsibility (EPR) policies could elevate recycling rates significantly. The million-ton loss: Eleven states, including some with high recycling rates, lose over a million tons of recyclables each year. Local investment solutions are crucial for revamping the recycling infrastructure. MORE: THIS AI ROBOT GARBAGE PICKER CAN SORT OVER 500 TYPES OF TRASH IN SECONDS The Recycling Partnership's Chief System Optimization Officer, Cody Marshall, emphasizes the need for comprehensive action. Investing in access to recycling services and improving communication can lead to substantial progress. The report urges: Policymakers: Adopt EPR to fund recycling improvements. Companies: Design recyclable packaging and invest in closing the system's gaps. Community leaders: Use the report's data to enhance recycling efforts through education and engagement.The report is an urgent call for action. Systemic change is a slow process, but the road map is clear. It's time for concerted efforts to ensure recycling fulfills its role in waste reduction and resource conservation.The stories shared by individuals on platforms like Reddit aren't just tales of frustration; they're a rallying cry for change. From the deceptive green dumpsters to the stark disparities in recycling access, the issues are as real as they are widespread. But there's a silver lining - the collective voice of communities and the actionable insights from reports like The Recycling Partnership's are powerful catalysts for change. It's a reminder that every effort counts, and together, we can turn the tide on the recycling conundrum we find ourselves in.What changes do you think are necessary to make a real impact as far as recycling in this country? Let us know by writing us at Cyberguy.com/Contact .For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover .Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

5 great tips for planning your next travel getaway

Are you gearing up for your next big adventure but dreading the daunting task of planning? Worry not. We've got the ultimate travel toolkit to make organizing your journey a total breeze.From finding the best flight deals with Kayak to snagging that perfect window seat via ExpertFlyer, we're diving into the top travel resources that savvy globetrotters swear by. So buckle up, and let's explore how these five great tech tools can turn your travel woes into wows. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER If flying either domestically or internationally, Kayak is an excellent site to search for the cheapest flight deals. With the exception of airlines such as Southwest, Kayak searches tons of airlines for the cheapest flight based on specific or flexible dates. This is especially helpful if you want to compare costs and amenities across multiple airlines, hotels and rental car companies. GET FOX BUSINESS ON THE GO BY CLICKING HERE Additionally, they offer "hacker fares," which help you combine flights from different airlines to create your ideal journey. The only hitch is that you won't make the final booking on its website. Kayak will guide you to a third-party website, such as Expedia or the airline itself, to book the flight, car or hotel room. MORE: THE BEST TRAVEL GEAR FOR 2024 Flying? Any seasoned traveler knows that the seat you pick for your flight can determine how your vacation begins and ends. It can either be the most relaxing flight or a complete nightmare. If you want to beat other travelers on your flight for the best seat on the plane, check out ExpertFlyer .  Whether you've booked online, offline with a travel agent or directly through the airline, the free account lets you set an alert for a specific seat option (window seat, anyone?). Once you receive the alert, you can change your seat assignment to your preferred seat. MORE: HOW TO MAKE USE OF GOOGLE FLIGHTS' NEWEST FEATURE If you're more interested in taking your vacation via car, motorcycle, or RV, Roadtrippers can help you can help you create the journey by populating fun stops between your departure and destination location. Compatible and accessible across multiple devices, you can plan your trip on your desktop and take it on the road with you on your phone or tablet.For RV drivers, the Roadtrippers Premium account can give you RV-specific GPS navigation, which includes turn-by-turn directions appropriate for your RV. You get 3 stops for free or 150 stops with the Roadtrippers Premium. The app is available on iOS and Android . MORE: DISCOVER THE FUTURE OF RVING WITH THE ELECTRIC TRANSFORMER HOUSE  Most travelers tend to book their accommodations as soon as their flights or train tickets are booked. However, even the best-laid plans go haywire in some situations, and you are left looking for a hotel room at the last minute.Whether you're dealing with an overbooked hotel or a misleading accommodation listing, HotelTonight can help you find discounted rooms the same day at 1,000 properties worldwide. The app is available on iOS and Android. MORE: FILTERING FLIGHTS BY AIRCRAFT TYPE UP 15X FOLLOWING 737 MAX 9 INCIDENT While used frequently by many people daily to navigate cross-city traffic, Google Maps boasts new updates that make travel planning and sharing easier. It is available on iOS and Android . Discoverable lists: Now, you can aggregate lists from top travel and city sites such as Lonely Planet, Open Table and The New York Times. Starting with select cities in the U.S. and Canada, you can search for a curated list of recommendations from others who know the city well. There are also lists based on places other users are interested in or love on Maps. You can search for top, trending and gem restaurant lists. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? List customization: Go ahead and compile your recommendations from a variety of different sources, such as social media, so those you share your list with know why you picked a specific place. You can also choose how the list is ordered so you can arrange it by chronology or preference. Understand better with AI: Ever wish you could get more details while browsing specific restaurant reviews or photos? Now you can with artificial intelligence, which can do things like help you identify the name of a dish or price - making for a more immersive experience. MORE: UNEXPECTED HERO APP TURNS AROUND TERRIFYING TRAVEL TROUBLE    With so many options and so little time, summer vacation planning can feel like a full-time job. New tech, however, can truly take the guesswork out of the planning. In fact, it can be downright fun. Whether you are traveling by plane or car, summer vacation planning might be as fun as the trip itself.What type of traveler are you? Do you like to plan months in advance or the week of the trip? How do you take the stress out of travel planning?  Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

The secret meaning of your iPhone clock's 4 different colors

While casually scrolling on your iPhone , you may have noticed different colors behind the clock in the top left corner. These colors are not random, and you should know what they mean. You might see a blue, green, red or purple color as a bubble behind your clock at the top left corner status bar if you own an iPhone X or later, or across the entire status bar if you have an iPhone 8 or earlier. Knowing what these different colors mean can improve how you use your phone and enhance your privacy and security . Learn more about what these different colors behind the clock mean for iPhones (X or later) below. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER When a blue bubble appears in the top-left corner of your screen - right behind your time or clock - this means an app is actively using your iPhone's location or you are using Screen Mirroring . CHANGE THIS APPLE MUSIC SETTING ASAP TO PROTECT YOUR PRIVACY When a green bubble appears in the top-left corner of your screen - right behind your time or clock - this means you're on a call or your iPhone is being used as a personal hot spot. If you're not using it and you see the green bubble, another device may be connected to your hot spot and potentially using your data without your knowledge.To prevent unauthorized access to your personal hot spot, ensure you have a strong password set up.You can see how many devices are connected to your hot spot by opening the Control Center. For iPhones with Face ID, swipe down from the top-right corner; for iPhones with a home button, swipe up from the bottom. Press and hold the wireless section to see the number of connected devices.If you find an unknown device connected to your hot spot, you can disconnect it by changing the hot spot password or turning off the personal hot spot feature.Remember, monitoring your hot spot connections regularly is important to ensure no unauthorized usage, which can lead to data loss and potential security risks. MORE: AVOID PUBLIC WIFI BY USING YOUR IPHONE AS A HOT SPOT When a red bubble appears in the top-left corner of your screen - right behind your time or clock - this means your iPhone's recording sound or your screen . MORE: THE NEW IPHONE SECURITY THREAT THAT ALLOWS HACKERS TO SPY ON YOUR PHONE   When a purple bubble appears in the top-left corner of your screen - right behind your time or clock - this means your iPhone is using SharePlay , which can be used to share content such as games across iPhones.Now that you know what these different colors mean, you can be more aware if your iPhone is doing something you don't want it to do. Curious to see exactly what app or iPhone function is being used with these different color bubbles? If you tap on the clock when there is a color behind it, it will take you to the app or the control settings for the function that is being utilized.For example, if you tap the clock when the bubble is green, and you are on a call, it will return you to the main window where you can see who you are speaking with. If your iPhone is being used as a personal hot spot, tapping the green bubble will send you to the personal hot spot section of settings, where you can see who is using it and turn it off if you never intended it to be used as a hot spot in the first place.This is where knowing what these color bubbles are comes in handy. On one hand, you can use them to maneuver apps or settings on your iPhone easily. From the security and privacy perspective, you can now be alerted when any apps or other people are utilizing information or functions from your iPhone you don't want them to. GET FOX BUSINESS ON THE GO BY CLICKING HERE If you see that your iPhone's microphone and/or camera are in use even though you don't have an app opened, it likely means that an app has permission to use those features on your phone even when it isn't being used or your phone may have been hacked. In our article, "Is your device spying on you?" you will find step-by-step instructions to see which apps have permission to access your microphone or camera and how to turn those features off.If you've gone through your permission settings and your microphone and camera are being accessed without your consent, there is a chance that some malicious spyware may be using your device to spy.  If you're not sure your phone has been compromised, you can check for these additional signs outlined in our article, "How to tell if your phone has been hacked." To avoid this, consider adding good antivirus software to your phone to prevent malware. Also, the best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . MORE: 'IN CASE OF EMERGENCY' IPHONE SHORTCUT COULD SAVE YOUR LIFE The colorful indicators on your iPhone serve as a visual guide to what's happening behind the scenes. Whether it's the blue bubble alerting you to location services or screen mirroring, the green bubble indicating an active call or hot spot usage, the red bubble warning of recording in progress or the purple bubble signifying SharePlay activity, each color plays a crucial role in enhancing your awareness and control over your device's functions.By understanding what these colors represent, you can take proactive steps to protect your privacy, manage your connections and optimize your iPhone experience. This subtle yet powerful feature underscores the importance of being informed and vigilant about the digital footprints we leave. So, the next time you notice a colored bubble behind the clock, remember it's more than just a design choice - it's a gateway to understanding and managing your iPhone's diverse capabilities.How do you think Apple could further improve the color notification feature to assist iPhone users in managing their devices' functions? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Can AI help someone stage a fake kidnapping scam against you or your family?

You may feel confident in your ability to avoid becoming a victim of cyber scams . You know what to look for, and you won't let someone fool you.Then you receive a phone call from your son, which is unusual because he rarely calls. You hear a shout and sounds resembling a scuffle, making you take immediate notice. Suddenly, you hear a voice that you are absolutely certain is your son, screaming for help. When the alleged kidnappers come on the line and demand money to keep your son safe, you are sure that everything is real because you heard his voice.Unfortunately, scammers are using artificial intelligence (AI) to mimic the voices of people, potentially turning these fake voices into things like kidnapping scams. This particular scam seems to be rare, but it's happening.  CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Such fake emergency scams occur frequently enough that the Federal Trade Commission (FTC) provided warnings and examples for consumers. Hard numbers that indicate the frequency of these calls aren't readily available, though, especially for calls known to make use of AI.Such scams are certainly possible with current AI technology. Fake video and audio of politicians and other famous people are appearing with regularity. Aided by AI, these clips are frighteningly believable.You may recall the incident in late 2023 involving a fake dental plan advertisement that featured Tom Hanks. AI technology created the video. Hanks had to make a social media post calling out the fake advertisement. MORE: THE 'UNSUBSCRIBE' EMAIL SCAM IS TARGETING AMERICANS The AI technology creates a fake by analyzing a sampling of an audio clip of the person it wants to mimic. It uses its ability to interpret incredible amounts of data to take note of multiple characteristics of the person's voice, allowing it to make a highly realistic fake.Once the AI is able to create the fake audio, programmers then tell it what to say, creating a personalized message designed to sell dental plans or to convince you that your loved one is in trouble with kidnappers.Some AI programmers that use the fake audio for helpful purposes - such as for allowing people with medical problems like ALS to regain their "speech" - claim they can mimic a voice with as little as a few minutes of audio clips. However, the more audio that's available, the more realistic the mimicked voice should sound. Twenty minutes of audio is far better than three, for example.As AI's capabilities continue to expand at breakneck speed, you can expect the time requirements to shrink in future years. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? MORE: HOW TO GUARD AGAINST BRUSHING SCAMS Realistically, the vast majority of people don't have to worry about a fake kidnapping scheme that originates from AI-generated audio. If your loved one has a lot of video and audio on social media, though, the scammers may be able to find enough source audio to create a realistic fake.Even though AI makes this type of scam easier to perform, the setup process still remains too time-consuming for most scammers. After all, scammers in this type of scheme are relying on your rapidly expanding fear at receiving this type of call to cause you to miss obvious clues that would tell you it's a fake. The scammers may simply have a random child scream and sob uncontrollably, while allowing you to rapidly jump to the conclusion that it's your child. This is far easier than using AI to try to source and generate audio ... at least for now. MORE: HOW SCAMMERS USE AI TOOLS TO FILE PERFECT-LOOKING TAX RETURNS IN YOUR NAME Even though the scammers try to gain the upper hand with the suddenness of the fake kidnapping call and by catching you off guard, you have some steps you can take before and after you receive this type of call to prepare and protect yourself. 1. Ask your loved ones to keep you informed about trips: Fake kidnappers may try to convince you that the abduction is taking place outside your city. However, if you know that your loved one did not leave town, you can be confident that the call is probably a fake. 2. Set up a safe word or phrase: Set up a safe word that your loved ones should use if they ever are calling you because of a dangerous situation or because they are under duress. A scammer is not going to know this safe word. If you don't hear the safe word, you know it's probably a fake call. GET FOX BUSINESS ON THE GO BY CLICKING HERE 3. Use privacy settings on social media: Ask your family members to limit who can see their social media posts. This would make it harder for a scammer to obtain source audio that's usable in a fake kidnapping audio call. For more information on maintaining and protecting your online privacy, click here 4. Try to text your loved one: Either during or immediately after the call, send a text message to your loved one without telling the caller. Ask your loved one to text you back immediately, so you can converse without tipping off the scammers. If you receive a text back, you can be confident the call is a fake. Consider creating a code word that you can use with the entire family. When you send this code word in a text, everyone knows it's a serious situation that requires an immediate response. 5. Stay calm and think things through: Finally, although it is incredibly difficult to stay calm when you receive this kind of call, it's important to keep thinking clearly. Do not panic. Regardless of whether it's a real call or a scam call, panicking is never going to help. Listen for clues that make it obvious the call is a scam. Try to gather some information that can help you make a clear-headed judgment about the legitimacy of the call.As AI continues to become more readily available and gains sophistication, scammers will be ready to take advantage of it. Perhaps by then, AI will even the playing field by coming up with ways to help us protect ourselves. Until then, taking steps to protect your family, such as by setting up a safe word, can give you some peace of mind.Are you concerned about how scammers may take advantage of AI to create new scams?  Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Star singer fights AI

IN TODAY'S NEWSLETTER:- Meghan Trainor's will ensures her voice can't be used by 'spooky' technology after her death
- US Air Force confirms first successful AI dogfight
- Ever-evolving generative AI brings new, game-changing element to sports landscape 'THAT'S SPOOKY': Meghan Trainor is one of many stars wary of artificial intelligence . Earlier this month at the iHeartRadio Music Awards, Trainor shared her thoughts on the technology with Fox News Digital. AI DOGFIGHT: The U.S. Air Force on Wednesday publicly confirmed the first successful dogfight between a fighter jet piloted by artificial intelligence and a human-piloted aircraft. LOOKING AHEAD: Sports leagues and brands are constantly exploring advancements in technology and its potential impact on their respective end products. Many sports properties work within the content management and distribution space. WAR TECH: Some of Israel's most advanced military technology was on display over the weekend when its multi-level aerial defense array led the way in striking down an estimated 99% of the more than 350 drones, rockets and missiles that were fired by Iran in an unprecedented attack on the Jewish state. JUST SAY NO: The Department of Homeland Security and the Customs and Border Protection Agency can leverage the power of artificial intelligence to identify the trucks, boats and planes trying to sneak fentanyl into the country.   FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

How this new crazy invisibility tech can literally make you disappear

What would you think if I told you that there is technology available today that could make you vanish? It's true. Thanks to optical engineering, it's possible to become invisible to the naked eye. This isn't just a fantasy. It's a reality crafted by the U.K.'s Invisibility Shield Co. , which has introduced the impressive Invisibility Shield. This 6-foot-tall shield offers a new dimension to the concept of invisibility. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER At the heart of this technology lies a precision-engineered lens array. Picture this: You're standing behind the shield, and instead of being a conspicuous figure, the light reflecting off you is cleverly redirected.This array, composed of vertically oriented lenses, scatters the light horizontally, causing your image to dissolve into the backdrop. It's like a magic trick, where the magician vanishes not with a puff of smoke but with a whisper of light. MORE: BALANCING THE PROMISE OF NEW VR TECH'S X-RAY VISION WITH PRIVACY CONCERNS  Now, let's delve deeper into the science . The lenses are not just any lenses; they are elongated, convex lenses meticulously embossed onto a polymer sheet. These aren't your run-of-the-mill magnifying glasses; they are the result of rigorous testing and fine-tuning - shaped to perfection to manipulate light just right.But what about the backdrop? Ah, that's where the magic amplifies. The background light, brighter and broader, passes through the shield and gets refracted towards the observer. From their point of view, it's as if the background itself has stretched out, masking your presence. EARTH DAY WAS FOUNDED OVER 50 YEARS AGO, PUTTING A HEIGHTENED FOCUS ON THE ENVIRONMENT EVER SINCE MORE: THIS MIND-READING TECH USING AI CAN CONVERT BRAIN ACTIVITY INTO TEXT The versatility of the invisibility shield The shields aren't just a one-trick pony, though. They excel against a variety of backdrops - be it the lush green foliage, the rough texture of sand or even the smooth expanse of the sky. And for those who appreciate the finer details, the shields work wonders against horizontal lines, whether painted by nature's brush or the human hand. MORE: HOW STORES ARE SPYING ON YOU USING CREEPY FACIAL RECOGNITION TECHNOLOGY WITHOUT YOUR CONSENT But let's not forget, these shields are not armor. They won't protect you from harm, but will make you virtually invisible. And they're built to last, with materials that withstand the elements and the test of time.The company tells us that "generally, we find customers who have previously ordered a small version just like to play around with hiding items on their desks and experiment with the material."With respect to the large models, our shields have been used for all sorts of things: paintball, stalking wildlife, pranks, stage magic, making 'invisibility windows' and interior screening in apartments." GET FOX BUSINESS ON THE GO BY CLICKING HERE You will be able to pre-order a shield for $870 via a Kickstarter campaign . A less expensive, smaller version, measuring 7.9 inches in height, is available for $67. This will help fund the first large production run of the new shields. The company tells us the Kickstarter campaign exceeded the initial goal of around $12,600 by almost 10 times, which would be close to $125,000.The Invisibility Shield Co.'s creation takes us a step closer to the stuff of daydreams, allowing us to vanish on a whim. With the support of a thriving Kickstarter initiative, this piece of tech could one day reshape our interaction with the visible world. It's a leap into a future where being unseen is just a matter of choice, a shield's width away.How would you use this device to disappear? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Olympic organizers announce plans to use AI in sports ahead of Paris games

Olympic organizers unveiled their plans Friday to use artificial intelligence in sports, joining the global rush to capitalize on the rapidly advancing technology.The International Olympic Committee outlined its agenda for taking advantage of AI. Officials said it could be used to help identify promising athletes, personalize training methods and make the games fairer by improving judging."Today we are making another step to ensure the uniqueness of the Olympic Games and the relevance of sport. To do this, we have to be leaders of change," IOC President Thomas Bach said at a press event at the former London Olympic Park, which hosted the summer games in 2012. 'UNCONTROLLABLE' AI SYSTEMS COULD TURN ON HUMANS, REPORT WARNS "We are determined to exploit the vast potential of AI in a responsible way," Bach said.The IOC revealed its AI strategy as it gears up to hold the Paris Olympics, which are set to kick off in just under 100 days.The IOC's AI plans also include using the technology to protect athletes from online harassment and to help broadcasters improve the viewing experience for people watching from home. The IOC earns billions of dollars through the sale of broadcast rights for the games.The local organizers of the Paris games have already sparked controversy with their plans to use artificial intelligence for security, with a video surveillance system that includes AI-powered cameras to flag potential security risks such as abandoned packages or crowd surges.

How to zoom in and out on PC

Have you ever found yourself squinting at your computer screen to decipher tiny text or make out the details of an image? Well, you're not alone. Fortunately, there's a nifty trick that can save your eyes: zooming in . It's a simple yet effective way to enhance your browsing experience, whether you're working, shopping or just surfing the web.If you want to zoom in and out on browser text on a Mac, we've got those step-by-step instructions here . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Let's start with the basics. If you need a quick zoom in or out on your browser window on your PC, here's how to do it. 10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE MORE: FIRST THINGS TO DO IF YOU GOT A NEW PC Prefer using your mouse to zoom in and out? No problem. MORE: 10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE Sometimes, you need to see more than just the browser text on your PC. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: HOW TO TIDY UP YOUR DESKTOP ON A PC OR MAC Zooming in on your computer screen is more than just a trick; it's a way to adapt technology to your needs. Whether it's for accessibility or comfort, the ability to zoom in and out with ease ensures that everything you need to see is within view. So the next time you're struggling to read that small print or want a closer look at a web page, remember these simple shortcuts. See my Best Laptops for 2024 here . How important is it for you to have control over visual elements like size, contrast and layout when using various devices, and how does this affect your choice of technology? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Over half a million Roku accounts compromised in second cybersecurity breach

Recently, Roku has faced significant security challenges, with two separate cyberattacks occurring within a short span. The streaming giant confirmed that over half million Roku user accounts were compromised through credential-stuffing attacks in a second incident.The first of these incidents was detected earlier this year when Roku's security systems noticed unusual activity in about 15,000 user accounts. Investigations revealed that these breaches were due to credential stuffing, where attackers used login information stolen from other services to access Roku accounts. Fortunately, Roku confirmed that there was no compromise of their systems and the credentials used were obtained from external sources. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The situation escalated with a second, larger-scale incident involving approximately 576,000 accounts. In fewer than 400 of these cases, malicious actors logged in and unauthorized purchases of streaming service subscriptions and Roku hardware products were made. However, sensitive user information, including full credit card numbers or other full payment information, remained secure. Roku has over 80 million active accounts , and the affected accounts represent a small fraction of their user base. The company posted a statement on its website, saying, "We sincerely regret that these incidents occurred and any disruption they may have caused. Your account security is a top priority, and we are committed to protecting your Roku account." MORE: HOW TO FIND OUT WHO'S SPYING ON YOU In response to these security breaches, Roku has taken four proactive steps.1. Password Resets: All affected accounts have had their passwords reset.2. Direct Notifications: Roku has been notifying affected customers directly.3. Refunds and Reversals: Charges made during the breach are being refunded or reversed.4. Two-Factor Authentication: Roku has rolled out two-factor authentication (2FA) for all accounts to provide an additional layer of security. NATIONWIDE ALERT: SMS PHISHING ATTACKS TARGET TOLL ROAD CUSTOMERS MORE: HOW TO PROTECT YOURSELF FROM STREAMING HACKS Roku emphasizes the importance of user participation in securing accounts. Here are a few recommendations:If it has already happened, and you've been hacked, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow.If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn't' recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely. Enable two-factor authentication: Two-factor authentication prevents credential-stuffing attacks by adding an additional layer of security to your Roku account. It works by prompting you to enter a time-sensitive code along with your username and password. This prevents hackers from breaking into your account with just a stolen password. GET FOX BUSINESS ON THE GO BY CLICKING HERE You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or authorities immediately. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.Identity Theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using an identity theft protection company is that it could include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft . If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.  MORE: HACKERS USE PIRATED SOFTWARE TO HIJACK MAC, ANDROID AND WINDOWS DEVICES Roku's recent experiences highlight digital service providers' ongoing challenges in securing user data against increasingly sophisticated cyberthreats. By implementing stronger security measures and fostering user awareness, Roku aims to safeguard against future incidents. The adoption of two-factor authentication is a significant step forward, ensuring that the security of user accounts is not solely dependent on passwords.How has the recent surge in cyberattacks affected your trust in digital platforms, and what actions should companies take to regain your confidence? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

This crazy 2-in-1 electric vehicle comes equipped with 2-seat aircraft hidden inside

Have you ever noticed how science fiction has this uncanny ability to make us dream about the future? Sometimes, it's hard to tell where fantasy ends and reality begins. But Chinese company XPENG AeroHT is shaking things up with something straight out of a sci-fi novel - a vehicle that's set to turn our whole idea of travel on its head. With 2025 just around the corner, we're getting a sneak peek into what might just be the next big thing in adventure travel . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Dubbed the Land Aircraft Carrier (LAC), this vehicle combines the rugged allure of an electric six-wheel off-roader with the capabilities of a two-seat eVTOL (electric Vertical Take-Off and Landing) aircraft.At its core, the LAC is a van-like six-wheeler capable of traveling on the most challenging terrain. Its extended-range electric 6WD system, enhanced by six driven wheels and rear-wheel steering, provides exceptional maneuverability. It is equipped with an intelligent cockpit featuring four to five seats. SCI-FI SOLAR EV NEVER NEEDS TO PLUG IN FOR A RECHARGE Concealed within this terrestrial titan lies the human-piloted X3-F air module that is ready to take its occupants from the rugged trails to the skies . It features electric vertical take-off and landing. Its distributed electric propulsion can meet single-point failure safety requirements. It has manual/autonomous dual driving modes and a 270-degree panoramic two-seat cockpit.  GET FOX BUSINESS ON THE GO BY CLICKING HERE The X3-F isn't just any aircraft; it's an all-electric, panoramic cockpit-equipped eVTOL designed for both leisure and utility. From search-and-rescue missions to breathtaking aerial tours, its capabilities are as diverse as they are revolutionary. With AeroHT at the helm, already demonstrating prototypes and securing crucial certifications, this vision inches closer to reality. MORE: BEST CAR ACCESSORIES 2024 XPENG AeroHT's journey from concept art to concrete action is a testament to innovation and ambition. Despite the daunting dual certification processes for automotive and aeronautical components, the company is making significant strides. The acceptance of the Type Certificate application by the Civil Aviation Administration of Central and Southern China marks a pivotal step towards bringing the LAC to the market. MORE: A CAR-BOAT COMBO THAT CAN HIT ROAD OR WATER WITH SAME VEHICLE The LAC's dual-mode design offers not just a new way to travel, but a new way to explore. Its ground module serves as a robust, all-terrain "mother ship," while the air module offers a unique vantage point to experience the world. Whether it's navigating the wilderness or soaring above it, the possibilities are as boundless as the skies. MORE: GET READY FOR A FOLDABLE ELECTRIC CAR THAT MAKES PARKING A BREEZE As we stand on the cusp of witnessing the LAC's debut, it's clear that we're not just looking at a new vehicle, but a new chapter in human mobility. XPENG AeroHT's vision challenges us to reimagine the boundaries of exploration and adventure. Whether it will transform our world or remain an ambitious dream is a story yet to unfold. But one thing is certain: the Land Aircraft Carrier is a bold stride into the future, promising an adventure on an entirely new level.What are some applications you foresee for the LAC in various fields such as travel, emergency response or scientific exploration? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

European Union has requested details surrounding TikTok's newest app that has quietly been released in the EU

European Union regulators said Wednesday they're seeking details from TikTok on a new app from the video sharing platform that pays users to watch videos.The European Commission said it sent TikTok a "request for information" on the TikTok Lite app that has been quietly released in France and Spain.The commission wants to know about the risk assessment that TikTok should have carried out before deploying the app in the European Union. EXPERT WARNS OF 'CHILLING REALITY' TIKTOK THREAT POSES: 'CHINA'S GREATEST ASYMMETRIC ADVANTAGE' "We have already been in direct contact with the Commission regarding this product and will respond to the request for information," TikTok said in a statement.Such evaluations are required under the bloc's Digital Services Act, a sweeping law that took effect last year with the aim of cleaning up social media platforms . The commission is the 27-nation bloc's executive arm and top enforcer of digital regulations.TikTok Lite lets users "earn great rewards," according to its app store listing. The app, which launched this month in France and Spain, is a slimmed-down version of the main TikTok app and doesn't come with ecommerce or livestreaming features.The commission said the app lets users earn points by doing things like watching videos, liking content and following content creators. The points can be exchanged for rewards including Amazon vouchers and gift cards on PayPal.TikTok said rewards are restricted to users 18 years and older, who have to verify their age. Users can watch up to one hour a day of videos to earn rewards, which are capped at the equivalent of one euro ($1.06) a day, it said.TikTok has 24 hours to turn over the risk assessment. The commission is interested in what it says about the app's potential impact on the protection of minors, "as well as on the mental health of users, in particular in relation to the potential stimulation of addictive behavior."It's also seeking other information on the measures TikTok has put in place to mitigate such "systemic risks," which the company has until April 26 to provide.

Fox News AI Newsletter: Doctor's groundbreaking surgery

IN TODAY'S NEWSLETTER:- First-ever augmented reality abdominal surgery performed in Chile: 'A revolution'
- High school students, parents warned about deepfake nude photo threat
- Adobe releases Acrobat AI assistant starting at $4.99 a month SURGICAL 'REVOLUTION': Surgeon and CEO Dr. Alberto Rodriguez conducted the first-ever augmented reality (AR) abdominal surgery March 11 in Santiago, Chile. That's according to Rodriguez's company, Levita Magnetics, a medical equipment manufacturer in Silicon Valley. 'SCARY' SCHOOL TREND: Multiple Los Angeles-area school districts have investigated instances of "inappropriate," artificial intelligence-generated images of students circulating online and in text messages in recent months. AI IN PDF: Adobe announced that its new Acrobat artificial intelligence assistant will be available to Acrobat and Reader users starting on Tuesday. POTHOLE HEALER: Tech firm Robotiz3d is developing three technologies as part of its Autonomous Road Repair System. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Nationwide alert: SMS phishing attacks target toll road customers

The FBI has issued a critical warning about a pervasive scam sweeping across the country.Americans are being targeted by a sophisticated series of SMS phishing - or "smishing" - attacks that bait them with fictitious unpaid road toll charges.The smishing scheme has been active since last month, duping thousands of people, as reported by victims to federal authorities. BI's Internet Crime Complaint Center has documented a significant influx of over 2,000 complaints detailing deceptive texts that impersonate road toll services from various states. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER MORE: IS THE FTC CALLING YOU? PROBABLY NOT. HERE'S HOW TO AVOID A NEW PHONE SCAM TARGETING YOU Investigations reveal that these messages are uniform in their deception , falsely asserting that the recipient is delinquent on road toll payments. These communications aim to manipulate individuals into clicking on links that are ingeniously designed to mimic legitimate state toll service websites, complete with fluctuating phone numbers to elude detection. HIGH SCHOOL STUDENTS, PARENTS WARNED ABOUT DEEPFAKE NUDE PHOTO THREAT MORE: THE DARK WORLD OF FACEBOOK ADS WHERE SCAMMERS ARE TRYING TO STEAL YOUR MONEY The Pennsylvania Turnpike has been at the forefront of the afflicted services, proactively advising its customers to avoid interacting with these fraudulent messages. Similarly, the Pennsylvania State Police have expressed their concern, highlighting that the scam texts redirect to counterfeit websites designed to steal personal data.Regional services are not the only ones affected. Residents across various parts of the U.S. have been under threat since the onset of these attacks, which seem to target residents using toll services. While this detail is not directly mentioned in the FBI's public service announcement, secondary sources tracking the issue have confirmed it.  MORE: 'UNSUBSCRIBE' EMAIL SCAM IS TARGETING AMERICANS BI has recommended several preventive measures in light of the ongoing phishing attacks. 1. Report the phishing attempt at ic3.gov with the scammer's contact details and the website URL from the message. 2. Verify your toll account through the official service website. 3. Reach out to the official customer service for the toll service. 4. Erase the fraudulent text message from your device. 5. Use good antivirus protection on all devices to reduce risks. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . GET FOX BUSINESS ON THE GO BY CLICKING HERE For individuals who have engaged in these phishing attempts, it is crucial to take immediate action to secure personal and financial information. The FBI stresses the importance of monitoring for unfamiliar charges and disputing them promptly to mitigate any potential financial harm.As the threat landscape evolves, staying informed about these scams is paramount. By following the FBI's advisories and maintaining a high level of skepticism toward unsolicited texts claiming to be from toll services, you can safeguard against these invasive phishing tactics. It's really important that we all work together to spot and call out scams. By doing this, we're joining forces to protect people from cybercriminals who try to trick them.What role should mobile carriers and tech companies play in combating smishing scams, and how can they improve their current measures? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Change this Apple Music setting ASAP to protect your privacy


In the age of oversharing, there's something to be said for keeping a slice of your digital life to yourself, especially when it comes to your music . Whether you're headbanging to heavy metal or crooning to country , your Apple Music experience is yours alone.So, let's talk about a little-known setting that might be overexposing your musical escapades: "Discoverable by Nearby Contacts." It's tucked away in your Apple Music settings , and it could be letting your contacts know what you're listening to via SharePlay - whether you're in the mood for sharing or not. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Ready to reclaim your audio anonymity? We'll show you how to switch off this feature and keep your playlists private. Because sometimes, the best soundtrack is the one only you know is playing. MORE: HERE'S HOW TO FIND ANYTHING ON YOUR APPLE DEVICE GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: GET YOUR KARAOKE ON WITH THIS NEW APPLE MUSIC SING FEATURE MORE: IOS 17.4 INTRODUCES REVEALING APPLE PODCAST TRANSCRIPTION FEATURE Your music, your rules. Whether it's a guilty pleasure track or a new indie discovery, what you listen to should be your choice to share or not. So, take control of your Apple Music settings and keep your beats to yourself.How important is it for you to keep your music listening activity private from friends, family or colleagues? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Distributed by aarss.com.