Technology News Articles on Fox News

Fox News AI Newsletter: Waymo's robotaxi launches citywide in San Francisco

IN TODAY'S NEWSLETTER:- Robots take the wheel as San Francisco opens streets to driverless taxis- FTC probes AI-powered 'surveillance pricing' at Mastercard, JPMorgan Chase, McKinsey and others- US Air Force's XQ-67A drone thinks, flies, acts on its own DRIVERLESS TAXIS ARRIVE: The future of urban transportation is here, and it's taking the form of sleek, autonomous vehicles traveling through city streets. Across the United States, self-driving car companies are racing to revolutionize how we move, promising safer roads, reduced traffic and a new era of mobility. But it's in San Francisco that this future is suddenly now a reality for thousands. 'SHADOWY ECOSYSTEM': The Federal Trade Commission on Tuesday announced that it launched a probe of eight companies that offer "surveillance pricing" tools that use artificial intelligence and other technology to analyze consumer data to help set price targets for products and services. AI IN THE SKY: The U.S. Air Force has just unveiled a new aircraft that's turning heads and raising eyebrows across the globe. ACCIDENT AVOIDANCE: Developed by Maine-based entrepreneur Josh Fox, Survue is an innovative device that looks to address the limitations of existing bicycle radar systems. While conventional systems primarily focus on the speed of approaching vehicles, Survue takes a more holistic approach by considering multiple factors to assess potential risks. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

What exactly is a data breach and why should I care?

Data breaches have become common, and if you've actively used online services in the past year, you might have been affected by them. For example, the Advance Auto Parts breach exposed more than 2.3 million users' personal information, while a recent AT&T incident allowed hackers to access around six months of customer call and text interactions. But what do bad actors do with all this data?John from Jackson, Mississippi, asked a similar question that I want to highlight and address because it helps all of us: "What do you mean when you say a company has exposed 2.3 million or whatever in a data breach? This happens often, but there is never any follow-up. It's like throwing address labels in a trash can, and then they are carried to the landfill. So? What really happens with a data breach?" I get what you're saying, John. breaches make headlines, but you rarely hear about the fallout. It's tough to link a specific breach to a specific problem later on. Below is a detailed look at what a data breach actually means. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE A data breach occurs when an unauthorized person gains access to information that is meant to be confidential, private, protected or sensitive. Think of it this way: You have personal information that you trusted a friend with, but while sharing it, someone who wasn't supposed to know it overheard it.A real-life example is the AT&T data breach mentioned earlier. Your call logs and text interactions that were meant to be private and which you trusted AT&T to protect ended up in the hands of hackers. These details can now be used by bad actors to scam you. GET FOX BUSINESS ON THE GO BY CLICKING HERE breaches can happen in a few ways. Hackers might target specific organizations or launch broad attacks hoping to steal certain kinds of data. They can also use targeted cyberattacks to go after specific individuals.Sometimes, data breaches occur due to honest mistakes or oversights by employees. Weaknesses in an organization's systems and infrastructure can also leave them vulnerable to data breaches. MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS' PERSONAL INFORMATION TO CYBERCRIMINALS Here's what typically happens in a data breach that's deliberately caused: Research: Cybercriminals often begin by identifying a target , such as a large corporation like AT&T, focusing on the type of data they want, which could include personal customer information. They search for weaknesses in the company's security, which might involve exploiting system flaws or targeting network infrastructure. Attack: The attackers make their initial move using either a network or social attack. Common methods include phishing attacks, where individuals are tricked into revealing personal information; malware attacks that can steal or encrypt data; and denial-of-service attacks that disrupt services. These tactics can compromise the personal information of customers, such as names, addresses, phone numbers and even payment information. Exfiltration: Once inside the company's systems, cybercriminals tunnel their way to confidential data. For individuals, this means that their personal information can be extracted and sold on the dark web, used for identity theft or for other malicious purposes. The impact on individuals can be severe, including financial loss, damage to credit scores and the emotional stress of having personal information exposed and misused. WORLD'S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM Once the hackers obtain protected and confidential data, they have various ways to profit from it. They can use compromised data for illegal activities, including identity theft, financial fraud, spamming or even extortion. Information such as email addresses and phone numbers can be used in phishing scams.Sometimes, this data is also posted on dark web forums for sale . It can be purchased by other criminals, who may use it for various illicit activities. Just as you don't hear about every burglary, homicide or battery, you don't hear about each instance of these criminal activities.They only make headlines when something significant occurs, such as the incident where hackers scammed a Colorado woman out of $25,000 or when a man was arrested for scamming a Kalispell, Montana, woman of $150,000.Data breaches impact not only customers but also the companies involved. These companies may face government fines or lawsuits. For example, AT&T is currently dealing with a class-action lawsuit due to a security breach in 2022 that exposed months' worth of data from nearly all its customers . Similarly, T-Mobile is facing a lawsuit related to a data breach that affected millions of people. CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE It's primarily the responsibility of companies or online services to keep your data safe, but if it gets exposed, here are some tips to keep in mind:If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn't recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.Activate two-factor authentication (2FA) for an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud. CLICK HERE FOR MORE US NEWS If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. These services employ advanced tools and techniques to identify and eliminate your data from people-search sites, data brokers and other platforms where your information might be exposed. By using a data removal service, you can minimize the risk of identity theft and fraud, especially after a data breach. Additionally, these services often provide ongoing monitoring and alerts, keeping you informed of any new instances of your data appearing online and taking immediate action to remove it. Check out my top picks for data removal services here . Identity theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft .If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.The impact of a data breach may not be immediate, but once your data is on the internet, it can be misused by bad actors. They can steal your hard-earned money, cause emotional and mental harm or affect your loved ones. So, even if you don't see the immediate impact of a data breach, take action. Ensure your devices are protected, and keep a close eye on your bank accounts.Have you ever noticed unusual activity in your accounts after a data breach was reported? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

US Air Force's XQ-67A drone thinks, flies, acts on its own

Have you ever wondered what the future of warfare might look like? Well, it's starting to take shape right above our heads.  The U.S. Air Force has just unveiled a new aircraft that's turning heads and raising eyebrows across the globe.But don't expect to see a pilot in the cockpit. This high-tech innovation flies itself. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE On a sunny California day in February 2024, something extraordinary took flight. The XQ-67A , a sleek unmanned aircraft, soared into the sky for the first time, giving us a glimpse into the future of aerial combat and reconnaissance.The XQ-67A is what's known as a drone or unmanned aerial vehicle. This aircraft is packed with cutting-edge technology that allows it to fly without a human pilot on board. Instead, it can be controlled remotely or even fly on its own, making decisions based on its programming and the data it collects. A NEW BREED OF MILITARY AI ROBO-DOGS COULD BE MARINES' NEW SECRET WEAPON So, what makes the XQ-67A stand out in a world where drones are becoming increasingly common ? For starters, it's part of a program called the off-board sensing station. This fancy name essentially means it's designed to be the eyes and ears of the Air Force, gathering crucial information in situations that might be too dangerous for human pilots.But here's where it gets really interesting: The XQ-67A is built on what engineers call a "common chassis." Think of it like a car frame that can be used to build different types of vehicles. This approach allows the Air Force to create various types of drones quickly and cost-effectively. All of these are based on the same core design. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES COULD THESE CREEPY, DEAD STUFFED BIRDS BE USED AS DRONES FOR MILITARY? The XQ-67A isn't alone in this new era of aviation. It's actually based on an earlier drone called the XQ-58A Valkyrie. And there's more on the horizon. The Air Force is also developing something called the off-board weapon station, which could be thought of as the XQ-67A's more combat-oriented cousin.This family of drones represents a shift in military thinking. Instead of relying solely on expensive, manned aircraft, the Air Force is moving towards a mix of crewed and uncrewed vehicles working together. It's a concept they call "Loyal Wingman," where these autonomous drones support and protect human pilots in the air. GET FOX BUSINESS ON THE GO BY CLICKING HERE The implications of this technology are huge. With drones like the XQ-67A, the Air Force can gather intelligence, conduct surveillance and potentially even engage in combat without putting pilots directly in harm's way. It's not just about reducing risk to human life; it's about expanding capabilities.These drones can fly longer missions without the limitations of human endurance. They can be sent into dangerous or contaminated areas without hesitation. And perhaps most importantly, they can make split-second decisions based on data and algorithms, potentially reacting faster than a human pilot could. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET As exciting as the XQ-67A is, it's just the beginning. The technology behind these autonomous aircraft is advancing rapidly, and it's not hard to imagine a future where swarms of artificial intelligence-controlled drones work in perfect coordination with human pilots.But this future also raises important questions. How will the role of human pilots evolve? What are the ethical implications of having machines make life-and-death decisions in combat? And how might this technology change the nature of warfare itself? WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The XQ-67A represents a pivotal moment in military aviation. The skies of tomorrow will be filled with aircraft that think, decide and act on their own, working alongside human pilots to accomplish missions we can only imagine today. Whether this prospect fills you with excitement or concern, one thing is certain: The future of aerial warfare is here, and it's autonomous.What are your thoughts on this new technology? Does the idea of autonomous military aircraft intrigue you, or does it give you pause? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Your bank wants your voice. Just say no.

You already gave your bank your address, date of birth, Social Security number and your mother's maiden name. Now, they want your voice .Banks say it's an extra layer of biometric protection against fraud and cybercrime . But with the rise of hackers stealing voice data for deepfakes, is it worth the risk? You need a vacation. We're giving away a $1,000 getaway gift card for your favorite airline.  Enter to win now! IT NEVER ENDS! WHAT TO DO AFTER A DATA BREACH No matter how much money you have in the bank, a hacker or scammer wants it - and they're always one step ahead.If you're skeptical of your bank having your voice data on record, you're not crazy - you're smart . A voice can be cloned using AI with as little as 10 seconds of audio and a few bucks.Call your bank's customer service line and ask to opt out of voice authentication . It takes two minutes. If you can do it now, great. If you can't, I highly recommend you set a reminder to do it later. This is important. Pro tip: Scammers have been known to plant fake numbers in search results. Don't just Google search the name of your bank and call that number. Go directly to your bank's website or call the number on the back of your debit or credit card. YOUR KIDS MAY BE TREATING VIDEO GAMES LIKE BANKS AND PLAYING WITH REAL MONEY. THE GOVERNMENT HAS QUESTIONS Because you're smart, you use strong unique passwords, you enable 2FA, you don't bank on public Wi-Fi, and you always monitor your accounts. (More on all that below if you need help.)But it might be worth a phone call or trip to your local bank branch to ask if they offer extra security features. Popular options include: Secure keys: This physical or digital device generates one-time passcodes that are usually only good for 30 seconds for safer online banking. Banking alerts: Set up text or email notifications for real-time account activities, such as large transactions or account changes. It's a bit of a pain when you have to approve all your charges, but it has saved me from scams and phony charges. Account lockout features:  Many banks offer options to automatically lock your account after a certain number of failed online login attempts. Advanced access : This is enhanced security for certain activities using additional verification steps. For example, Morgan Stanley asks me for a one-time passcode if I log in at a new location. OWN A HOME? SHOPPING OR SELLING? YOU'RE A SCAM TARGET Maybe you need to get the basics in order first. That's OK, and it's definitely not too late to take a couple smart steps.With 2FA enabled, a secondary form of verification is required to prove your identity instead of just entering your username and password to log in to an account.The second form of verification can be something only you know (an answer to a question), something you have (your device), or who you are (a fingerprint, voice pattern or facial scan). You enter the temporary code, and voila - you're in.  My pick:   An authenticator app. Biometrics (your face or fingerprint scan) are a close runner-up. A text code is the most hackable.Looking at you, random coffee shop Wi-Fi. Public Wi-Fi networks do little to nothing to protect your privacy. Cybercriminals know this and use free Wi-Fi networks to find victims. Malware, phony hotspots, unsecured networks and nefarious passers-by might all be able to cut in, compromising your data and account.If you connect to public Wi-Fi without taking precautions, thieves can steal login credentials to any account you sign into while on the network, including your bank accounts.If you must connect to free public Wi-Fi, don't do it without a virtual private network (VPN). A VPN allows you to browse the internet while encrypting your sensitive information. This helps hide your online credentials and IP address. I use  ExpressVPN , a sponsor of my national radio show.Now, help me get the word out. Share this story with friends and family to keep them safe before the tsunami of voice-cloning scams hits. They're coming.Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

The rise of dumbphones in a smartphone world

Most of us know how much smartphones can become a distraction. Even if we make our very best effort not to grab our phone when we are bored immediately, the average American spends 4.1 hours a day staring at their smartphone screen. Not only does this affect our eyes, posture and attentiveness, it also impacts our mental health and feelings of isolation and loneliness.Some people's dependency on smartphones has led them to ditch them altogether and replace them with what's now known as a "dumbphone."But what exactly is a " dumbphone ," and is this the answer to our smartphone and social media woes? CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER TOP AFFORDABLE CELLPHONE PLANS Dumbphones are basic '90s-inspired cellphones that lack the vast array of apps found on smartphones. Remember that old Nokia that you could play "Snake" on or that snazzy flip phone that was once all the rage but took a long time to send one text message?Dumbphones focus on providing core functionalities like texting and calling, avoiding the high screen time associated with smartphones we use every day. These phones are part of a growing market providing offline alternatives for those seeking to reduce their digital footprint and be more present in their physical environments. IS YOUR SMARTPHONE SPYING ON YOU WITHOUT YOU EVEN KNOWING IT? The shift towards dumbphones is driven by a growing awareness of the adverse effects associated with prolonged screen time, such as loneliness, addiction and mental health issues like anxiety or depression. Desire for simplicity: Many advocate for a return to simpler devices that focus on basic functionalities like texts and calls, reducing the constant bombardment of information and notifications. Reduction in digital footprint: Using a dumbphone helps decrease online presence and data sharing, appealing to privacy-conscious users. HOW TO STOP ANNOYING ROBOCALLS The popularity of dumbphones is on the rise. These trends suggest a robust future for dumbphones, especially among younger generations embracing other retro technologies. The market is evolving, with new models and options becoming available that cater to a desire for simplicity and a break from constant connectivity. Get Kurt's picks for the best dumbphones HOW TO KNOW IF YOUR SMARTPHONE IS LISTENING TO YOU Consider a dumbphone if you feel overwhelmed by your smartphone usage or are concerned about its impact on your mental health. Many users of dumbphones still keep a smartphone but switch between the two depending on their needs, which could be a practical approach for those unsure about fully transitioning. Trying out a dumbphone could be a beneficial experiment if you frequently find yourself distracted by your phone or looking for ways to enhance real-life interactions. Get Kurt's picks for the best dumbphones SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES If you're part of the older generation and have only ever used your smartphone for calling, texting and maybe email, then perhaps you don't have all the other concerns that heavy smartphone users have. Therefore, getting a dumbphone may only be advantageous if you're looking to save money on your phone bill and don't need all the bells and whistles. But, if you find yourself a little distracted by your smartphone, then resorting back to a dumbphone might be the way to go.Do you know anyone who has gotten themselves a dumbphone? What was the straw that broke the camel's back that made them do so? Would you consider trading in your smartphone for a dumbphone ? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Giant battery-powered dump truck dumps diesel for electric

In the world of heavy industry, change often comes at a glacial pace. But every once in a while, an innovation emerges that sends shock waves through the sector. Enter Hitachi Construction Machinery's latest creation: the world's first ultra-large, fully electric mining dump truck. This isn't just another incremental improvement; it's a game-changer that could reshape the future of mining operations worldwide. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Picture a machine as tall as a three-story building, capable of hauling over 200 tons of earth in a single trip. Now, imagine that this colossus runs entirely on electricity without a drop of diesel in sight. That's exactly what Hitachi has achieved with their groundbreaking electric dump truck.Developed in collaboration with ABB Ltd., a leader in electrification and automation, this electric titan represents the culmination of years of research and development. The project, which kicked off in 2021, aimed to tackle one of the mining industry's most pressing challenges: reducing greenhouse gas emissions without sacrificing productivity. THIS $112K LUXURY EV FROM CHINA CAN SHAKE AND JIGGLE OFF SNOW What sets Hitachi's electric dump truck apart is its innovative charging system. Unlike electric cars that need to stop and plug in, this behemoth keeps on rolling thanks to a clever combination of overhead charging lines and regenerative braking.As the truck moves along its route, it draws power directly from overhead lines, much like an electric train. Simultaneously, its regenerative braking system captures energy that would otherwise be lost during deceleration, feeding it back into the batteries. This dual-charging approach allows for continuous operation, eliminating the downtime associated with traditional battery charging.The result? A mining truck that can operate for up to 20 hours a day, 350 days a year, matching the grueling schedules of conventional diesel-powered vehicles while slashing emissions to zero. BULLET TRAIN-LOOKING GIANT SEMI TRUCK TO HIT US HIGHWAYS Hitachi isn't content with proving their concept in controlled conditions. Instead, they've taken their electric dump truck to the heart of the mining world : First Quantum's Kansanshi copper and gold mine in Zambia.This choice of location is no coincidence. Zambia, with its abundance of renewable energy sources, provides the perfect backdrop for testing a zero-emission vehicle. The country's energy grid, powered by hydroelectricity and an expanding portfolio of solar and wind projects, aligns perfectly with the ethos behind Hitachi's electric truck.Moreover, the Kansanshi mine already boasts an extensive network of overhead power lines for its existing fleet of trolley-assisted trucks. This infrastructure, coupled with the site's varied terrain and real-world operating conditions, offers an ideal proving ground for Hitachi's revolutionary vehicle. MONSTER PLANE COULD REPLACE TRUCKS AND TRAINS The implications of Hitachi's electric dump truck extend far beyond the confines of a single mine. If successful, this technology could pave the way for a dramatic reduction in the mining industry's carbon footprint.Consider this: a single one of these electric giants could eliminate the need for 1,200,000 liters of diesel fuel annually. That translates to a staggering 3,000 metric tons of CO2 emissions avoided each year per truck. Now, multiply that by the hundreds of trucks operating at major mining sites worldwide, and the potential for emissions reduction becomes truly monumental.However, the benefits don't stop at the environmental impact. The electric dump truck's design, with its smaller battery pack and dynamic charging system, allows it to maximize payload capacity. This means more efficient operations, potentially leading to increased productivity and reduced operating costs for mining companies. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET As the two-year trial at the Kansanshi mine unfolds, all eyes in the mining industry are on Zambia. The success of Hitachi's electric dump truck could signal the beginning of a new era in mining operations, one where the roar of diesel engines is replaced by the quiet hum of electric motors.This shift wouldn't just benefit the mining industry. The technologies developed for these massive vehicles could find applications in other heavy industries, from construction to logistics. We might be witnessing the first steps towards a broader electrification of heavy-duty vehicles across various sectors.As we watch this electric titan tackle the rugged terrain of Zambia's copper belt, we're not just observing a new piece of machinery at work. We're witnessing the potential dawn of a new, cleaner era in mining. It's a future where the extraction of Earth's resources no longer comes at the cost of polluting its atmosphere. The road to a zero-emission mining industry may be long and challenging, but with each electric haul, Hitachi's dump truck is bringing that future a little bit closer. And that's something worth digging into.What other big machines or vehicles do you think could go electric next? How might that change things in your city or town? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Top 12 elderly fraud scams of 2024

Senior citizens are often targets for scams, and as scams are getting more sophisticated, it's getting easier to deceive even the most tech-savvy person. Elder fraud involves a variety of scams targeting seniors, from fake prizes to pleas for help from their "grandchildren," resulting in an annual loss of $3 billion, according to the FBI . Seniors are often targeted due to their good credit, financial security and trusting nature. Here are the top elderly fraud scams of the year: GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE In this scam, people pose as tech support or home repair professionals from reputable companies like Amazon, offering to fix non-existent issues. Seniors should be wary of unsolicited calls and independently verify the caller's identity. In some cases, they may even show up at your front door, telling you that they noticed your roof needs repair or something along those lines. BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS This scam is one of the worst ones . Fraudsters claim to be a grandchild or close relative urgently needing financial help. The scammers will say something like their grandchild has been in an accident and needs money to help them get to the hospital or something along those lines.If the senior catches on and realizes it's a scam, the fraudster will say they have kidnapped their grandchild and won't release them until the senior pays up. In most cases, it's a scam. Before acting, always verify the story with other family members and try calling your grandchild. (This is a good excuse to encourage them to answer the phone more often.) HOW TO STOP ANNOYING ROBOCALLS 5 INNOVATIONS TO HELP SENIORS LIVE BETTER This is when scammers pretend to be officials from agencies like the IRS, DEA or FBI and threaten legal action unless a payment is made. Scammers can also do this by phone spoofing , making it so that when they call the person they are targeting, their name and number actually show up in the caller ID as one of these agencies. Remember, these agencies will never call to demand money, and most companies won't, either.Wouldn't it be nice to find out you've just won the lottery? Well, chances are, the exciting news is actually a scam. The sweepstakes or lottery scam happens when seniors receive calls from a scammer claiming they've won a sweepstakes or lottery but must pay a fee to claim their prize. They'll never ask you to pay money first if it's an authentic sweepstakes.Scammers place ads for fraudulent services on TV or radio, tricking seniors into calling and handing over money, whether for a certain product or service. Always research companies thoroughly before buying from them. PREVENT PHONE SCAMS AGAINST THE ELDERLY In this particular scam, fraudsters send fake Geek Squad invoices via email, prompting seniors to call a provided number. During the call, scammers steal personal information under the guise of resolving a fake issue . Avoid clicking on suspicious links, and verify invoices through official company contacts. DON'T FALL FOR THIS EMAIL SCAM THAT ALMOST COST AN ELDERLY WOMAN $25,000 If you're one to balance your checkbook the "old-fashioned" way, then you may have a hard time falling for this scam. Here, they'll trick victims into believing they were accidentally overpaid for an item, service, bill or subscription, convincing them to refund the fake overpayment. To do this, they'll ask for your sensitive data, including your bank account information. Always verify such claims with your bank or the relevant company before taking any action.Similar to the above, emails in your inbox that claim to help you unsubscribe from services are often actually phishing attempts to steal personal information. Sometimes, there will even be an "unsubscribe" link right in the email. Always use official websites to manage subscriptions and avoid clicking on unknown email links.When it's that time of year again to enroll in your health insurance plan, be on the lookout for scammers that take advantage of this. They'll call offering fake health insurance plans or services, pretending to be health insurance brokers or what have you, often requesting personal information to "see what you're eligible for." Verify any health insurance offer with your provider directly.It's not uncommon for elderly people to be generous with their giving. But you don't want to give too much or give it to a charity that's not really a charity! Another tactic by fraudsters is to manipulate elders by soliciting donations for fake charities, especially after natural disasters. In this day and age, it's not very common for these charities to call, but they could. Never give out your information or money right away. Thank them for their call, take the time to research an organization and make sure it is legitimate before deciding what to do.Finally, scammers build fake romantic relationships online to extract money from seniors. A senior who's feeling lonely and wants to build a connection with someone may fall for this scam without realizing it, assuming the person is genuine. If they do ask for money, they justify it by feeling connected to the person until it's too late. Though plenty of seniors find genuine love online, sometimes meeting lifelong partners, be cautious about sharing personal information or sending money to someone you've only met online. There could be ulterior motives.Artificial intelligence (AI) scams are becoming increasingly sophisticated and pose a significant threat to seniors. These scams use AI technology to create convincing fake audio, video or text messages that appear to come from trusted sources. Here are some key points about AI scams targeting the elderly:To protect against AI scams, seniors should be cautious of unsolicited communications, verify identities through trusted channels, and stay informed about the latest AI-based fraud techniques. It's crucial to educate older adults about these evolving threats and encourage them to report suspicious activities to the National Elder Fraud Hotline . BEST TECH FOR SENIORS As scams targeting seniors become increasingly sophisticated, it's crucial for older adults to arm themselves with knowledge and caution. The following 12 tips can help seniors stay one step ahead of fraudsters and protect their financial well-being and personal information. 1) Be wary of unsolicited calls, emails or messages . Never give out personal information or send money to unknown individuals. 2) Take your time and don't act quickly under pressure. Scammers often create a false sense of urgency. 3) Verify the identity of callers claiming to be relatives in distress . Contact other family members to confirm the story before taking any action. 4) Be suspicious of requests for unusual payment methods like gift cards or wire transfers. 5) Keep computer and smartphone security software up to date and use two-factor authentication when possible. 6) Carefully review bills and credit card statements for unauthorized charges. 7) Be cautious of "free" offers that require payment for shipping or other fees. 8) Don't trust caller ID alone , as scammers can fake legitimate numbers. 9) Be skeptical of unsolicited investment opportunities or deals that seem too good to be true. 10) Report suspected scams to local law enforcement, the National Elder Fraud Hotline (833-372-8311) or the Federal Trade Commission. 11) Don't click on links in emails or text messages from unknown sources. If you're unsure, go directly to the official website by typing the address into your browser. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . 12) Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of continuously removing your information from hundreds of sites over a longer period. Remove your personal data from the internet with my top picks here . By staying vigilant and following these precautions, seniors can better protect themselves from falling victim to fraudulent schemes.Scammers generally don't care who their victims are, but they know who they can target to execute their tactics better. Don't fall for them. If anything in your gut tells you the situation is unusual, it probably is. After all, you've gained much life experience to know if something isn't right. The general rule of thumb is that the more urgent the situation is that they are asking for money, chances are it is a scam. Don't let your emotions get involved, and take a minute to figure out what's really going on.Have you ever been in a situation like this where you realized it was a scam? Or, have you maybe even fallen for one of these before? What happened? What did you do? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

AI bicycle safety device could warn of dangerous car collision

The roads are becoming increasingly dangerous for cyclists, and the numbers paint a grim picture. Recently, we hit a heartbreaking milestone: the highest number of bicycle fatalities ever recorded in the United States. The National Highway Traffic Safety Administration reported that 1,105 cyclists lost their lives on public roads. It's a stark reminder that, despite well-intentioned efforts from various government agencies, we still fall short in keeping cyclists safe.But here's how things could improve. A game-changing gadget called Survue could keep cyclists safe on the roads. Sure, we've seen bike radar systems before, but Survue? It appears to be in a league of its own. By tapping into the power of artificial intelligence, this device is taking cyclist protection to a whole new level.Let's be honest. I am sure there are a lot of you out there who would love to hop on a bike more often but are held back by safety worries. Who can blame you? With Survue hitting the road, we might just see a shift in how you view cycling safety. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Developed by Maine-based entrepreneur Josh Fox, Survue is an innovative device that looks to address the limitations of existing bicycle radar systems. While conventional systems primarily focus on the speed of approaching vehicles, Survue takes a more holistic approach by considering multiple factors to assess potential risks.While Survue is not the first AI-based bicycle safety device to enter the market, it intends to differentiate itself through its comprehensive approach and compact design. Survue's key features include AI-powered vehicle detection, 3D location and path prediction, vehicle type identification, automatic video recording and an enhanced taillight alerting system.In case you are wondering what Survue actually means, it is derived from two French words: sûr, meaning safe, and vue, meaning view. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET A PEDAL-ELECTRIC HYBRID THAT'S HALF BIKE, HALF CAR Unlike traditional radar-based systems, Survue utilizes a camera and sophisticated AI algorithms to analyze the road behind the cyclist. The device can detect approaching vehicles, determine their speed and location, and even predict their trajectory. This advanced analysis allows Survue to differentiate between passing vehicles and those that pose a potential collision risk. HOW THIS EXERCISE BIKE IS GENERATING BACKUP POWER IN WAR ZONES When Survue detects a potentially hazardous situation, it alerts the cyclist in multiple ways. These include an audible alarm on the device, notifications via an optional iOS/Android app, and visual displays on a handlebar-mounted smartphone. It alerts motorists or distracted drivers by increasing the flashing frequency of the integrated 80-lumen tail light. ELECTRIC CARGO BIKE AIMS TO REPLACE YOUR SUV Survue weighs 125 grams and measures 3.5 inches by 2 inches x 1.5 inches. Its battery life is up to six hours between charges. It can detect vehicles at a range of up to 360 feet and features an 80-lumen light visible from one mile away. The device also supports Bluetooth connectivity for integration with third-party apps. It is also compatible with most bike computers.One of Survue's standout features is its ability to automatically record video footage of approaching vehicles from the rear that trigger elevated alerts. This feature provides cyclists with valuable evidence in case of accidents or legal proceedings.Survue is currently available through a Kickstarter crowdfunding campaign. With a modest goal of $5,000, the campaign has already surpassed expectations. Head over to Survue's Kickstarter page to learn more about the pledge tiers and be among the first to experience this AI-powered cycling safety device.By combining AI-powered detection, predictive analysis and automatic video recording, Survue offers cyclists a more comprehensive and proactive approach to road safety. As cycling continues to grow in popularity, innovations like Survue may play a crucial role in making roads safer for all users. However, the actual test of Survue's effectiveness will come once it reaches the hands of everyday cyclists.Would an AI-powered safety device like Survue make you feel safer and bike more often? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

The best free sites for sharing photos and videos with your family

In a world where every moment is captured, the question isn't just about taking photos and videos. It's about sharing them with those who matter most. Kim from Tinton Falls, New Jersey, echoes a common concern: How can a family share digital memories , both past gatherings and present moments, in a way that's secure, private and shareable? Here's her question to us:"My extended family wants to find a way to share lots of photos and videos (from days of older and also when we gather). We are hoping to find a free site, and a site that won't be pervasive or have dangerous privacy policies. We would like everyone in our family to have access to upload into their own folders that they can name, and everyone in the family to download them." - Kim, Tinton Falls, New JerseyKim's dilemma is one many families face. They seek a platform that's free, non-invasive and respectful of privacy. A virtual space where each family member can contribute to their personalized folders, with the freedom to download cherished memories at will. Ideally, this platform would empower users to set expiration dates on their shared content, ensuring their digital footprints don't linger indefinitely in the cloud.Here are some recommended solutions that meet Kim's criteria for privacy, security and ease of use for family photo sharing. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE GET FOX BUSINESS ON THE GO BY CLICKING HERE How to set up Google Photos How to create a shared Google Photos album How to set up Dropbox How to upload files How to create a shared folder How to organize files How to set up Box How to upload files How to create a shared folder How to organize files While these solutions directly address Kim's needs for family photo sharing, it's also worth considering device-specific options and additional cloud storage services. These can complement your chosen family-sharing platform or provide alternative solutions depending on your devices and preferences. Also, with the solutions of sharing with family members, you should be aware of the need to increase storage space if needed. ▶️ SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The solution you choose may also depend on the devices your family uses. Whether you're an Apple owner, have an Android device or use a mix of both, there are options tailored to your needs. Let's explore some device-specific and cloud-storage solutions: Apple iCloud offers a free tier with 5 GB of storage, featuring seamless integration, automatic backup and shared albums. Paid tiers include 50 GB for $0.99 per month, 200 GB for $2.99 per month, and 2 TB for $9.99 per month. Google Photos provides an unlimited free tier at limited resolution, with smart search, automatic organization and shared albums. Google One plans offer 15 GB for free with various paid pricing options. Amazon Prime Photos is included with an Amazon Prime subscription and offers unlimited full-resolution storage and family sharing. For a fee, Amazon Photos provides additional storage options. CAN AI MAKE PHOTOS OF YOU LOOK BETTER THAN YOU DO IN REAL LIFE? With iCloud Photos , you can make more space available on your device and still have access to your entire full-resolution collection wherever you go. To get started with iCloud Photos:When Optimize Storage is turned on, full-resolution photos and videos are stored in iCloud, and space-saving copies are stored on your device when needed. As long as you have enough space in iCloud, you can store as many photos and videos as you want. CLICK HERE FOR MORE U.S. NEWS HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   S ettings may vary depending on your Android phone's manufacturer  Dropbox offers 2 GB of free storage with features like file syncing, easy sharing and a mobile app. It also has paid plans such as Plus, which provides 2 TB for $9.99 per month, and a family plan that offers a shared 2 TB for $16.99 per month. Box provides 10 GB of free storage and includes collaboration tools and secure sharing options. It offers business plans that come with more storage and additional features. IDrive gives you 5 GB for free and is designed for backing up multiple devices, along with file versioning. Its personal plans include 2 TB of storage for $69.50 per year.   Flickr allows users to store up to 1,000 photos or videos for free and is known for its community and photo organization features. It offers a pro subscription with unlimited storage for $7.99 per month. 500px permits only limited uploads for free users but is a platform dedicated to the photography community and includes portfolio features. Its Awesome plan is priced at $6.49 per month, and the Pro plan is available for $12.99 per month. SAY IT WITH PHOTOS: THE BEST DIGITAL PHOTO FRAMES These days, sharing family memories securely is both a challenge and a necessity. For Kim and families like hers, platforms such as Google Photos, Dropbox and Box offer free, secure solutions that balance privacy with ease of use. While device-specific options provide seamless integration, cloud services ensure cross-platform accessibility. Remember to regularly review privacy settings, use strong passwords and consider the 3-2-1 backup rule for your precious memories. By choosing the right platform and following best practices, you can create a private, shared digital space to cherish your moments together, both past and present.What challenges or benefits have you experienced in trying to balance convenience, privacy and meaningful connection when sharing photos and videos with loved ones? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Robots take the wheel as San Francisco opens streets to driverless taxis

The future of urban transportation is here, and it's taking the form of sleek, autonomous vehicles traveling through city streets. Across the United States, self-driving car companies are racing to revolutionize how we move, promising safer roads, reduced traffic and a new era of mobility. But it's in San Francisco that this future is suddenly now a reality for thousands.Waymo, the Google-owned autonomous vehicle pioneer, is available to everyone in the city by the bay. Imagine cruising through the iconic streets of San Francisco without worrying about parking, navigating steep hills or designating a driver after a night out. That's the promise Waymo is offering. But what does this sudden availability of autonomous rides mean for daily commutes, weekend plans and the very fabric of urban life in one of America's most dynamic cities? GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Remember when you needed an exclusive invite to ride in a Waymo ? Well, those days are now in the rearview mirror. Now, anyone in San Francisco can hail a driverless Waymo ride. Just download the app , and you're good to go. But here's the thing. Nearly 300,000 people - that's more than a quarter of San Francisco's population - had already signed up on Waymo's waiting list. Talk about pent-up demand. It seems like everyone wanted to try out the self-driving robotaxi service. GET FOX BUSINESS ON THE GO BY CLICKING HERE IS THIS PINT-SIZED ELECTRIC VEHICLE ABOUT TO BE A BIG DISRUPTOR IN THE US? Waymo isn't just changing how people get around. It's potentially reshaping the city's social and economic landscape. Did you know that about 30% of Waymo rides in San Francisco are to local businesses? That's a potential boost for the local economy right there.And get this. Over half of Waymo riders surveyed said they've used the service for medical appointments. Plus, 36% use it to connect to other forms of transit like BART or Muni . It's not just a taxi service; it's becoming an integral part of the city's transportation ecosystem.Oh, and for the eco-conscious among us, here's a fun fact. Waymo's fleet is all-electric and uses 100% renewable energy from the city's CleanPowerSF program. It claims to have helped curb carbon emissions by an estimated 570,000 kilograms since August 2023. HOW TO STOP ANNOYING ROBOCALLS CRAZY TWO-IN-ONE ELECTRIC VEHICLE COMES EQUIPPED WITH A TWO-SEAT AIRCRAFT HIDDEN INSIDE  Waymo isn't just cruising the famously steep hills of San Francisco. It's also got wheels on the ground in the sunny streets of Los Angeles and the desert landscapes of Phoenix. And guess what? Austin, Texas, you're next on the list. Looks like the robotaxi revolution is spreading faster than you can say "autonomous vehicle." THE TINY ELECTRIC CAR THAT COMES DISASSEMBLED AND DELIVERED IN BOXES Now, I know what you're thinking. "Is it safe?" Well, Waymo sure thinks so. It boasts about its "unparalleled" safety record, claiming it's even safer than human drivers. With over 20 million miles logged since 2009, it's got some serious road cred.But it's not just talk. Waymo cites statistics suggesting its driverless cars are safer than human-operated vehicles. It claims to have been involved in 17 fewer crashes with injuries and 12 fewer police-reportable crashes compared to human drivers over 3.8-plus million rider-only miles in San Francisco.Before you get too excited and toss your driver's license in the shredder, the National Highway Traffic Safety Administration (NHTSA) has opened an investigation into Waymo. It's looking into 22 incidents involving the self-driving tech. We're talking about collisions with objects, parked cars and some traffic control hiccups. Yikes.The NHTSA's probe covers 444 of Waymo's vehicles. That's a lot of robots under the microscope. It's a reminder that even as we race toward a driverless future, there are still some speed bumps to overcome. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET It's not just Waymo in the spotlight. Other companies like Zoox, owned by Amazon, are also under the NHTSA's microscope. Even big names like Ford and Tesla are feeling the heat as autonomous technology becomes more widespread. Meanwhile, GM's Cruise is planning a comeback after suspending its service due to safety concerns. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? On one hand, the idea of hopping into a car without a driver could mean safer roads, less traffic and more accessibility for those who can't drive. But, on the other hand, are we ready to trust our lives to algorithms and sensors? The NHTSA investigation shows there are still kinks to work out. And let's not forget the potential impact on jobs in the transportation sector. It's not just about cool tech; it's about how it affects real people's livelihoods. One thing's for sure. The future of getting from point A to point B is changing rapidly. Whether you're excited or skeptical, it looks like robotaxis are here to stay.Would you take a spin in a Waymo, or are you sticking to human-driven rides for now? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Beware of TikTok's danger that could be a malware menace to your life

TikTok is having a tough time, and hackers are working hard to add to its misery. A malicious code took over accounts on TikTok and compromised the official presence of celebrities and brands, including Paris Hilton and CNN.The hackers behind this sent malware via direct messages (DMs) on the platform. Users didn't have to click any links or download any files to get hacked. Just opening the message was enough for a device to be infected. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Hackers are apparently targeting high-profile TikTok accounts. So far, accounts from CNN, Sony and Paris Hilton have been targeted. CNN was the first account that got hacked, and it was reportedly down for several days after the incident.The attack reportedly happens without the account owner needing to click on or open anything, known as a zero-click attack. All they need to do is open a DM, and the account can be taken over, leaving the rightful owner locked out. The vulnerability might lie in how content is processed when a DM is opened. Similar weaknesses have been identified before, such as vulnerabilities in the Chromium browser triggered by fabricated images. RETAIL PRICES CAN JUMP IN SECONDS WITH HIGH-TECH STORE PRICE TAGS We reached out to TikTok, and a spokesperson told CyberGuy, "Our security team is aware of a potential exploit targeting a number of high-profile accounts. We have taken measures to stop this attack and prevent it from happening in the future. We're working directly with affected account owners to restore access, if needed."The hack appears to be a "zero-day" attack, which means the bad actors discovered the vulnerability in TikTok's code before the developers did. TikTok had zero days to prevent it.
ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA This is not TikTok's first hacking incident. In 2023, over 700,000 accounts in Turkey were hacked because TikTok's two-factor authentication system wasn't secure enough. This all happened right before an important presidential election in Turkey , which made things even messier.In 2022, security experts at Microsoft found a major flaw in the TikTok app. All it took was clicking a bad link and hackers could hijack your account. Concerns about TikTok's data security and its connection to ByteDance, its Chinese parent company, have also captured the attention of lawmakers. The U.S. government fears China uses the app to spy on Americans or to influence the messages they see. President Biden has even signed a bill forcing ByteDance to either sell its U.S. TikTok operations or face a ban in the country. HOW TO PROTECT YOURSELF WHEN YOUR CELLPHONE NUMBER IS EXPOSED ON DARK WEB ANDROID USERS AT RISK AS BANKING TROJAN TARGETS MORE APPS To make sure your TikTok account doesn't get hacked by malicious DMs, follow these steps. 1. Use strong antivirus software to protect against phishing attempts: Stay vigilant when it comes to emails, phone calls or messages from unknown sources asking for personal information. Avoid clicking on suspicious links or providing sensitive details unless you can verify the legitimacy of the request.The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . 2. Use strong and unique passwords: Create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you're logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts. Get more details about my best expert-reviewed password managers of 2024 here. 3. Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. 4. Keep your TikTok app up to date . Regularly update your TikTok app to avoid getting hacked. While you're at it, update your antivirus software, web browsers and other applications to ensure you have the latest security patches and protections. 5. Review and adjust privacy settings: Ensure that your TikTok privacy settings are appropriately configured. Limit who can send you direct messages, comment on your videos and view your profile. This reduces the risk of unwanted interactions with potential hackers. 6. Monitor account activity: Regularly check your account activity for any unusual behavior or unauthorized access. TikTok provides a log of devices that have accessed your account. If you notice any unfamiliar devices, immediately change your password and log out of all devices. Also, to report suspicious activity on your account, TikTok provides channels to report a problem in its app . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  TikTok needs to strengthen its system to ensure hackers don't access users' accounts. While the latest incident seems to be affecting celebrities and high-profile accounts, bad actors may also start targeting common users. Given these security concerns, it should come as no surprise that I advise against using TikTok, or at the very least, to use it with extreme caution. Meanwhile, be cautious. If someone messages you asking you to click on something or send them something, don't just do it. Scammers love pressuring people to act fast. So, take a breath and think twice before you click. HUMANPLUS ROBOT CAN GO FROM PLAYING PIANO TO PING-PONG TO BOXING Do you think government intervention is necessary to improve the security of social media platforms? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.
 

CARMEN the robot companion can help boost your memory and cognition

Have you ever walked into a room and forgotten why you're there? Or misplaced your keys for the umpteenth time this week? If you've been noticing these little memory hiccups more often, you're not alone.As we age, our cognitive functions can start to slow down, and for some, it might be a sign of mild cognitive impairment. But don't worry. Help is on the way in an unexpected form. Say hello to CARMEN, a new robot designed to give your brain the workout it needs. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE TOYS 'R' US AI-GENERATED AD SPARKS FEAR, FASCINATION CARMEN stands for Cognitively Assistive Robot for Motivation and Neurorehabilitation. Fancy name, right? But don't worry, CARMEN's job is simple - to help people with mild cognitive impairment (MCI) sharpen their mental skills from the comfort of their own homes. This small, tabletop robot was developed by researchers at the University of California San Diego. Think of CARMEN as a personal trainer for your brain, ready to guide you through exercises that can boost your memory, enhance your attention and improve your problem-solving skills. What makes CARMEN special is that it's the only robot out there that focuses on teaching compensatory cognitive strategies. In other words, it helps you find clever workarounds for cognitive challenges. THIS MIND-READING TECH USING AI CAN CONVERT BRAIN ACTIVITY INTO TEXT    Here's the deal. About 20% of folks over 65 have MCI, which is like a middle ground between normal aging and dementia. It's not just a minor inconvenience. Up to 15% of people with MCI transition to dementia each year. While there aren't any miracle pills to stop MCI from progressing, behavioral treatments can make a real difference. That's where CARMEN comes in. As Laurel Riek, a professor at UC San Diego and the project's senior author, puts it, "We wanted to make sure we were providing meaningful and practical inventions." HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   HOW ELON MUSK'S NEURALINK BRAIN CHIP WORKS Imagine having a personal trainer for your brain right on your tabletop. CARMEN leads you through fun, interactive games and activities designed to boost your memory, attention and problem-solving skills. If you need help remembering where you put your keys, CARMEN can teach you to create routine places for important objects.If you're struggling to keep track of appointments, CARMEN's got note-taking strategies for that. These aren't just random exercises. They're part of a well-validated compensatory cognitive training (CCT) intervention, which CARMEN delivers autonomously. SIMPLE STEPS TO BUILD YOUR OWN WEBSITE: A BEGINNER'S GUIDE
ELON MUSK'S CREEPY BRAIN-COMPUTER INTERFACE GETS GREEN LIGHT FOR HUMAN TRIALS   CARMEN wasn't born in a vacuum. The clever folks at the University of California San Diego teamed up with doctors , people with MCI and their caregivers to create this little robot. They wanted to make sure CARMEN would be truly helpful in real-life situations.The team designed CARMEN with some key features in mind. It's plug-and-play, with few moving parts, so you can use it without supervision. It works even with limited internet access. It communicates clearly and shows empathy. It gives you breaks after tough tasks to keep you engaged.After spending a week with CARMEN, users reported trying out new strategies they thought were impossible before. Most found CARMEN easy to use and understand, though one user did find it a bit challenging. The best part? Everyone wanted more time with their new robotic pal."We found that CARMEN gave participants confidence to use cognitive strategies in their everyday life, and participants saw opportunities for CARMEN to exhibit greater levels of autonomy or be used for other applications,"the researchers reported. HOW TO STOP ANNOYING ROBOCALLS CARMEN is built on the FLEXI robot platform from the University of Washington. However, the UC San Diego team made significant hardware modifications and wrote all the software from scratch. They're using ROS (Robot Operating System) to run CARMEN's brain. SCIENTISTS CREATE CREEPY LIFELIKE FACES WITH REAL HUMAN SKIN FOR ROBOTS The team is planning to test CARMEN in more homes. It also wants to teach CARMEN how to have conversations while keeping your privacy safe . This is both an accessibility issue and a response to people's expectations of being able to talk with home systems. The researchers are also exploring how CARMEN might help people with other conditions, like ADHD.But they're being careful too. As Riek notes, "We want to be mindful that the user still needs to do the bulk of the work, so the robot can only assist and not give too many hints."   While we don't know the eventual cost or exact release date yet, CARMEN's development shows promise for accessible, at-home cognitive support in the future. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES While CARMEN represents an exciting development in cognitive assistance for those with mild cognitive impairment, it's worth noting that it's not the only player in the field of brain training technology. We've previously covered another innovative system called Sens.ai, which offers a different approach to cognitive enhancement.Sens.ai is a 5-in-1 brain training system that uses a comfortable headset and a gamified app to help users achieve various cognitive goals. Unlike CARMEN, which is specifically designed for those with mild cognitive impairment, Sens.ai caters to a broader audience looking to improve sleep, cognition, well-being or meditation skills.The Sens.ai system employs a range of advanced technologies, including brainwave sensors, heart rate monitors, transcranial photobiomodulation, and objective functional brain testing. These tools work together to measure and enhance brain performance across different areas of cognitive function.While CARMEN is still in the research phase, Sens.ai is already available to consumers, offering a free trial of its membership program. It's backed by scientific research and has garnered positive testimonials from users.The existence of technologies like Sens.ai alongside research projects like CARMEN demonstrates the growing interest and investment in cognitive enhancement tools. As this field continues to evolve, we may see a variety of options become available to support brain health and cognitive function for different user needs and preferences. CARMEN represents an exciting step forward in how we approach cognitive health. By bringing clinically validated exercises into people's homes through a friendly, interactive robot, we're making brain health more accessible and engaging. While CARMEN is still in the research phase, it's not hard to imagine a future where these kinds of AI assistants become common household helpers, especially for our aging population. They could be a game-changer in extending independence and quality of life for many people.So, what do you think? Would you welcome a little robot like CARMEN into your home to help keep your mind sharp? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Cybercriminals taking advantage of CrowdStrike-linked global computer outage

The global IT outage triggered by a faulty CrowdStrike software update has created a perfect storm for cybercriminals to exploit. In the wake of this unprecedented disruption affecting Windows computers worldwide, threat actors are now launching phishing campaigns and distributing malware-laden links.These malicious actors are preying on individuals and organizations desperate for information and solutions, tricking them into clicking on contaminated links under the guise of offering updates or fixes for CrowdStrike-related issues. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE AUTO PARTS GIANT EXPOSED: 2.3 MILLION CUSTOMERS AT RISK IN MASSIVE DATA BREACH As airlines, banks, grocery stores, 911 emergency communications, medical centers and virtually every organization running Windows computers with CrowdStrike Falcon attempt to recover from what could be the most destructive tech tsunami, criminals are being observed attempting to offer fake help with a payload of trouble. BEST ANTIVIRUS FOR PCS - CYBERGUY PICKS 2024 The Department of Homeland Security's Cybersecurity & Infrastructure Security Agency, known as CISA, is tracking this online criminal activity, which now poses a secondary threat to Americans . Here is the CISA statement:"CISA has observed threat actors taking advantage of this incident for phishing and other malicious activity. CISA urges organizations and individuals to remain vigilant and only follow instructions from legitimate sources. CISA recommends organizations to remind their employees to avoid clicking on phishing emails or suspicious links."The massive outages started at 1:20 a.m. ET Friday when CrowdStrike began rolling out a faulty update to its Falcon security product that protects Windows hosts. Screens around the world turned blue, freezing on a crippling message known as the "blue screen of death." RETAIL PRICES CAN JUMP IN SECONDS WITH HIGH-TECH STORE PRICE TAGS CrowdStrike's CEO George Kurtz addressed the global glitch it caused, and an updated statement puts it in perspective:"We understand the gravity of the situation and are deeply sorry for the inconvenience and disruption. We are working with all impacted customers to ensure that systems are back up and they can deliver the services their customers are counting on." HOW TO GROUP TABS IN DIFFERENT BROWSERS TO STOP TAB OVERLOAD CrowdStrike is actively working through its official channels to roll out a previous version of its Falcon software, but not before the disruptive damage was done worldwide. If you have a Windows PC or laptop experiencing trouble, there are alternative workarounds to help you fix it. The company offers the following additional steps that can be taken if your Windows computer is still having trouble.Note: Bitlocker-encrypted hosts may require a recovery key. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Cybercriminals are quick to take advantage of tech troubles like this massive Windows disruption caused by CrowdStrike. The lesson is to take privacy and security into your own hands by being as resilient as possible to attacks. I recommend running good antivirus protection on every device in you and your family's lives. See the 2024 review of the Best AntiVirus Protection here for options.What measures do you believe governments and tech companies should implement to prevent and mitigate the impact of such large-scale IT disruptions in the future? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Retail prices can jump in seconds with high-tech store price tags

Have you noticed how technology is rapidly transforming our shopping experiences? From online marketplaces to self-checkout kiosks, the retail landscape is evolving at breakneck speed. Today, let's explore one of the latest innovations set to shake up the way we shop for everyday items: digital price tags. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Imagine walking into a store where prices change in real time, just like they do on your favorite shopping websites. Well, that future is closer than you might think. Retailers across the globe are experimenting with dynamic pricing systems, bringing the flexibility of online shopping to brick-and-mortar stores. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Several factors are propelling this shift towards digital pricing. Stores can update thousands of prices instantly, saving time and labor. This improves accuracy, eliminating discrepancies between shelf prices and checkout totals. The system also allows retailers to quickly respond to market changes or competitor pricing. Additionally, there's a sustainability angle, as digital tags reduce paper waste from traditional price tags. EXPOSING THE TOP SCAMS TARGETING COSTCO SHOPPERS Electronic shelf labels (ESLs) or digital shelf labels (DSLs) are at the heart of this retail revolution. These small, battery-powered e-paper displays are wirelessly connected to a central system, allowing for quick and easy price updates. But they're more than just digital price tags; they're a gateway to a more interactive shopping experience. 5 SECRETS TO SHOPPING SMARTER ON AMAZON These smart labels are multifunctional devices. They can display prices and product information, show QR codes for additional details, guide store employees for restocking and assist with order fulfillment for online purchases. It's like giving each product its own mini-computer.This new technology could bring both benefits and challenges for consumers. On the plus side, we can expect more accurate pricing and the potential for better deals on soon-to-expire items. Shoppers will have access to more product information right at their fingertips.There's also a possibility of lower prices due to increased store efficiency. However, it's not all rosy. We might see the introduction of dynamic pricing, similar to surge pricing in ride-sharing apps. This could lead to rapid price fluctuations. There are also privacy concerns with the increased data collection that comes with these systems. BEST HOME SECURITY SYSTEMS Now that we've covered the basics, let's look at some specific examples of how this technology is being implemented. America's largest retailer, Walmart, recently announced plans to introduce digital shelf labels in 2,300 stores by 2026. Given Walmart's massive market share in the U.S. grocery sector, this move could expose millions of shoppers to the technology.According to Daniela Boscan, a Walmart food and consumable team lead, "A price change that used to take an associate two days to update now takes only minutes with the new DSL system. This efficiency means we can spend more time assisting customers and less time on repetitive tasks."While Walmart's announcement made headlines, they're not the first to experiment with this technology. Other major players include Kroger, Whole Foods (owned by Amazon), Ahold Delhaize, and Schnucks, a Midwestern chain. A recent market study estimates that about 26% of grocers and general merchandisers were capable of using ESL technology in 2023, indicating a growing trend in the industry. HOW TO STOP ANNOYING ROBOCALLS When a store decides to make the leap from traditional paper tags to digital ones, it's not just a simple overnight change. It's a massive undertaking that requires careful planning and execution. Picture this: a small army of workers descending upon the store, armed with digital price tags and determination.These "price tag transformers" swarm the aisles, systematically replacing each paper tag with its high-tech counterpart. Shelf by shelf, aisle by aisle, the store undergoes a visible transformation. The familiar sight of paper tags gradually gives way to the sleek, uniform appearance of digital displays. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The adoption of digital price tags in grocery stores is part of a larger trend toward dynamic pricing in various industries. We've already seen this in ride-sharing apps like Uber and Lyft, airline tickets, live music, event sales and fast food, as evidenced by the recent Wendy's controversy. This shift raises questions about how consumers will adapt to more fluid pricing structures in their day-to-day purchases.As we stand on the brink of this digital revolution in retail, it's important to consider both the opportunities and the challenges it presents. On one hand, the increased efficiency and flexibility could lead to better shopping experiences and potentially lower prices. On the other hand, the introduction of dynamic pricing to everyday purchases might require a shift in how we approach our shopping habits.As this technology rolls out, it's crucial for you to stay informed and adapt your shopping strategies accordingly. Monitor price trends, take advantage of additional product information and provide feedback to retailers about your experiences.What's your take on this digital retail revolution? Are you excited about the potential benefits or concerned about the challenges? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to group tabs in different browsers to stop tab overload

If you're anything like me, you probably have several tabs open on your browser. I often have tabs open dedicated to my emails, research for work, articles I'm writing and additional tabs off to the side for news.A simple way to keep everything organized is by creating group tabs. Today, we will show you how to create group tabs in our favorite browsers: Chrome, Edge, Safari and Firefox, but first let's go over the basics of tab browsing.Tab browsing allows you to have multiple websites open in the same browser window. This multitasking capability is essential for keeping track of various online resources simultaneously, whether it's your email, research, work articles or the latest news. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Creating a new tab is like adding another piece of paper to your desk. It's simple:Once you have all your tabs open, it's time to organize them. Here's how to group tabs in Google Chrome, Microsoft Edge, Safari and Firefox browsers:Grouping tabs in Google Chrome is quick and easy to do: HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET The process of creating tab groups in Microsoft's Edge browser is also easy to do: BEWARE OF BING CHAT AND ITS AI CONVERSATIONS THAT LURE YOU INTO MALWARE TRAPS Creating a tab in Apple's Safari browser is a bit different from the two above. Follow these steps to create a tab group: HOW TO TELL IF YOUR BROWSER HAS BEEN HIJACKED While tab groupings are a built-in feature in most browsers, Firefox doesn't support them by itself. The easiest way to do this is by using one of our favorite browser extensions: OneTab . OneTab is available for Chrome , Edge , Safari , in addition to Firefox , and you may like its features more than the built-in tab grouping features of the browsers we've already highlighted.Here's how to install and setup OneTab for Firefox:OneTab is a great browser extension that allows you to save all the tabs you have open as a list, making it easy to restore them whenever you want. As an added bonus, OneTab helps cut down on browser RAM costs, helping your online browsing experience function faster. OneTab also lets you:Available on: Chrome , Firefox , Edge , Safari SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES OneTab is one of our favorite browser extensions, but now that Chrome, Safari and Edge have introduced tab groupings, it's now only a must-have if you use any other browser such as Firefox. Luckily, installing and setting up OneTab is just as easy as creating tag groups in any browser. Browser tabs are a great way to keep yourself organized, especially if you work with multiple browser windows open at once. I've always been a browser hoarder, and creating groups of tabs is a great way to keep everything under control.How do you balance the convenience of having multiple tabs open with the need to maintain focus and efficiency in your digital workspace? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to securely lock your iPhone, iPad from prying eyes

Keeping your personal information safe is more important than ever. Your iPhone and iPad contain a wealth of sensitive data, from personal photos to financial information. This guide will walk you through the process of securing your Apple devices from prying eyes. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE The first line of defense for your device is a strong passcode. Here's how to set one up: HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE For an additional layer of security, enable biometric authentication, if your device supports it: TOP IPHONE CASES OF 2024 To further protect your iPhone and iPad, follow these additional security measures. 1) Make sure to use a password manager to keep track of all your passwords. It will also help you generate and store complex passwords.  2) Use two-factor authentication (2FA) as an extra shield to prevent hackers from getting into your accounts.  3) Keep your operating system and all software up to date to protect against security threats. 4) Regularly backup your data in case you need to restore it in the future. 5) Have strong antivirus software. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Securing your iPhone and iPad is a crucial step in protecting your personal information. By following these steps to set a strong passcode and enable biometric security, you've significantly increased the security of your device. Remember that security is an ongoing process, so regularly updating your software and backing up your data are essential practices to maintain the safety of your digital life. Stay vigilant and keep your devices locked away from prying eyes.What additional steps do you take to secure your mobile devices, and have you ever experienced a situation where these security measures proved crucial? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Vacation goal: Take family pictures that don't suck

We've all had that moment. You open up your phone's gallery to swipe through the family pictures you shot on your beach vacation, at the lake or on some random day with the kids.Womp womp, they're blurry, everyone looks caught off guard, and there's a random guy and his dog in the background of the one good option. You poor thing. I can help. 20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER I'm giving away a $1,000 gift card to your favorite airline.  Try my free tech newsletter to enter!   Use your phone's timer Both iPhones and Android have built-in photo timers. Using a timer, you don't have to ask some random stranger to take a photo, which could lead to something worse. My friend handed her phone to someone to take a picture of her and her daughter, and the guy ran away with her phone.For your iPhone:On Android: Stability, people Tripods are one pro secret to getting amazing shots. No more balancing your phone on something and hoping it stays. You don't need to be anything close to a pro to use this secret yourself. CHARGING AND TRAVEL: 5 MALWARE MISTAKES MOST PEOPLE MAKE Get better smiles "Say cheese" is the classic photo prompt, but it can result in fake-looking smiles. Your best bet is to make a joke about eight seconds into that 10-second timer to get everyone to smile. I like this one: "I love to go Komando!" Otherwise, try a word that ends with an -uh sound, like "yoga." It always works best to pick a word to make your people laugh or smile. Clean up your pics At a family barbecue? You might not want that beer bottle or red plastic cup spoiling your pic.Facetune ( iOS Android ) is the big app everyone's using these days - so much so that when people think a pic is edited, they accuse it of being "Facetuned," not "Photoshopped!"If you're on a Mac , a touch-up tool is built right into the Photos app.  AI EXPERT: CHATGPT PROMPTS YOU'LL WISH YOU KNEW SOONER On a PC, you can use the new Generative Erase tool in the Windows Photos app. It uses AI to remove something you don't like in a pic (a rando in the background) and fill it in with something you want (the sunset). One final word of advice: Genuine smiles and real moments always make the best photos. Encourage your family to relax. That means no more yelling "Hold still and smile," OK? Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. CLICK HERE TO GET THE FOX NEWS APP Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Apple hits record high as analysts bullish on AI push

IN TODAY'S NEWSLETTER:- Apple hits all-time high as Morgan Stanley touts stock as 'top pick' for AI- Toys 'R' Us AI-generated ad sparks fear and fascination- Are you ready to trust your next ride to a robot chauffeur? 'TOP PICK': Apple shares rose to a record high during Monday's trading session after Morgan Stanley designated the stock as a "top pick" due to the company's artificial intelligence push to boost device sales. AI AD DEBATE: The iconic toy retailer, Toys "R" Us, is back, and it's not just reopening stores. It's embracing cutting-edge artificial intelligence technology to tell its origin story in a way that's as innovative as it is nostalgic. AI CAR CHAUFFEUR: Scientists at the University of Tokyo, led by Dr. Kento Kawaharazuka, have taken a novel approach to driverless cars. Instead of creating a fully autonomous vehicle, they've developed a robot that can drive a regular car. CREEPY LEGO ROBOT: Imagine a Lego creation that can not only move but also see, hear and talk back to you. That's exactly what Creative Mindstorms has achieved with Dave, the world's most advanced artificial intelligence Lego robotic head. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Auto parts giant exposed: 2.3 million customers at risk in massive data breach

Advance Auto Parts, an auto parts retailer with stores throughout the U.S. , has been affected by a data breach impacting over 2.3 million people. The incident is reported to be related to other breaches, such as the recent one at Ticketmaster. Advance Auto Parts has confirmed that cyberattackers managed to access information , including Social Security numbers, driver's licenses and other government ID numbers. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE On June 19, Advance Auto Parts confirmed that it had been impacted by a data breach , but it only puts current and former employees and job applicants at risk. Advance has now completed its internal investigation into the incident and has determined that it has impacted 2,316,591 people. GET FOX BUSINESS ON THE GO BY CLICKING HERE "Our investigation determined that an unauthorized third party accessed or copied certain information maintained by Advance Auto Parts from April 14, 2024, to May 24, 2024," states the notice sent by Advance Auto Parts to affected individuals. "We conducted a detailed review and analysis of the affected information to determine the types of information contained therein and to whom the information relates."The company has confirmed that the breach has exposed data, such as full names, Social Security numbers, driver's licenses and government ID numbers, to hackers. This data is collected as part of Advance's hiring process, so it seems only employee and applicant data has been leaked. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  While Advance didn't name the hacker responsible for the attack, a threat actor known as "Sp1d3r" began selling a massive 3TB database on June 5, 2024. This database allegedly contains 380 million Advance customer records, including orders, transaction details and other sensitive information. Although the number claimed by Sp1d3r is significantly lower than the 2.3 million figure reported by Advance, it's possible that Sp1d3r was behind the attack.Hackers gained access to Advance Auto Parts' data stored on Snowflake, a cloud storage service, for over a month starting in mid-April 2024. This incident reportedly was part of a larger attack targeting Snowflake accounts with stolen credentials. Other companies impacted by this campaign include Pure Storage, Ticketmaster and more. CLICK HERE FOR MORE US NEWS HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS ce Auto Parts says it promptly terminated the unauthorized access and took proactive measures to prevent future unauthorized access. The company also notified law enforcement and is collaborating with third-party cybersecurity experts to further harden its systems.The impacted individuals have also been offered free credit monitoring and identity theft protection for 12 months. They can enroll by Oct. 1, 2024.We contacted Advance Auto Parts for a comment on this story but did not hear back before our deadline. WORLD'S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM If you think you have been affected by the Advance Auto Parts data breach, follow these steps to protect yourself and your personal data. 1. Stay informed: Keep up to date with the latest news from Advance Auto Parts data breach and other reliable sources to know the status of the systems and services. 2. Monitor your accounts and transactions: You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud. 3. Use identity theft protection: Identity theft protection companies can monitor personal information, like your home title, Social Security Number, phone number and email address, and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft . 4. Change your passwords: Although Advance Auto Parts says your personal details like phone number and email address haven't been leaked, it's still advisable to change your passwords. Consider using a password manager to generate and store complex passwords. 5. Vigilance against phishing : Be extra cautious of phishing attempts as cyberattacks often lead to an increase in phishing emails and calls trying to exploit the situation. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have strong antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . 6. Be wary of mailbox communications : Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. 7. Invest in personal data removal services:  While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here . PHARMA GIANT'S DATA BREACH EXPOSES PATIENTS' SENSITIVE INFORMATION Hackers are launching campaigns that target big corporations. Recently, we saw a cyberattack that paralyzed CDK Global , and now, again in the automobile industry, Advance Auto Parts has been targeted. These companies need to fortify their systems so that they don't get affected by such attacks. Also, the government needs to come up with required laws that should ban the retention of customers' personal details, unless necessary.How important is a company's cybersecurity track record to you when deciding where to shop? Let us know in the comments below. Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Toys 'R' Us AI-generated ad sparks fear, fascination

Remember the days of walking into a Toys "R" Us store? The endless aisles of toys, the excitement of spotting the latest must-have item and the towering presence of Geoffrey the Giraffe?Well, the iconic toy retailer is back, and it's not just reopening stores. It's embracing cutting-edge artificial intelligence technology to tell its origin story in a way that's as innovative as it is nostalgic.In a move that's turning heads in both the marketing and tech worlds, Toys "R" Us has partnered with creative agency Native Foreign to create a groundbreaking brand film. But this isn't your average promotional video. It's been crafted using OpenAI's Sora, a text-to-video AI tool that's pushing the boundaries of what's possible in content creation. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Sora is a technological innovation capable of generating up to one-minute-long videos featuring realistic scenes and multiple characters, all from text instructions. It's like having an entire film studio at your fingertips, ready to bring your wildest ideas to life with just a few well-chosen words. FINAL HOURS: KURT'S PRIME DAY 2024 PICKS The 66-second promo takes us on a journey back to the 1930s, following young Charles Lazarus, the visionary founder of Toys "R" Us. We're transported to an old-time bicycle shop, where we see Lazarus dreaming of transforming the toy industry. As he drifts off to sleep, the video seamlessly transitions into a magical dreamscape filled with toys of all shapes and sizes, presided over by the beloved mascot, Geoffrey the Giraffe.It's a clever narrative device that not only tells the Toys "R" Us origin story but also captures the childlike wonder and imagination that the brand has always represented. By blending historical elements with fantastical imagery , the video manages to appeal to both nostalgic adults and wide-eyed children. FCC NAMES ITS FIRST EVER AI SCAMMER IN THREAT ALERT Creating this film was no simple task, despite the advanced capabilities of Sora. The team at Native Foreign, led by chief creative officer Nik Kleverov, wrote lengthy, detailed prompts for each scene. They had to carefully balance historical accuracy with modern appeal, ensuring that early scenes captured the essence of the 1920s and 1930s while later dreamscape sequences felt contemporary enough to resonate with today's young audiences.This meticulous attention to detail highlights an important point: while AI tools like Sora are incredibly powerful, they still require skilled human guidance to produce truly compelling content. The technology may be new, but the art of storytelling remains a fundamental human endeavor. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET This innovative video project is more than just a technological showcase; it's part of a broader turnaround plan for Toys "R" Us. After filing for bankruptcy in 2018 and closing its stores, many thought the beloved brand was gone for good. But in 2021, Toys "R" Us was acquired by WHP Global, a firm specializing in managing and expanding retail companies.Now, Toys "R" Us is making a comeback that's as much about reimagining the brand for the 21st century as it is about rekindling nostalgia. They've opened new flagship stores in high-profile locations like Minnesota's Mall of America and New Jersey's American Dream Mall. Perhaps most significantly, they've partnered with Macy's to open Toys "R" Us sections in every Macy's location across the United States. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? This multipronged approach - combining innovative marketing, strategic partnerships and a carefully curated retail presence - demonstrates the brand's commitment to remaining relevant in an ever-changing retail landscape.As with any technology, the AI-generated film has sparked diverse reactions on social media. Some viewers have praised it as an innovative and creative way to tell stories that would be difficult or impossible to capture through traditional filmmaking methods. They see it as an exciting glimpse into the future of content creation, where imagination is the only limit.Others, however, have expressed reservations. Some found the AI-generated characters "creepy," falling into the infamous "uncanny valley" where digital renderings of humans are close to realistic but just off enough to be unsettling. Others noticed inconsistencies in the AI-generated images, highlighting the current limitations of the technology.These mixed reactions underscore the ongoing challenges and opportunities in AI-generated content. As the technology continues to evolve, it will be fascinating to see how creators address these issues and refine their techniques. GET FOX BUSINESS ON THE GO BY CLICKING HERE The Toys "R" Us AI-generated brand film represents more than just a single company's marketing strategy: It's a significant milestone in the evolving landscape of content creation and brand storytelling.As AI tools like Sora become more sophisticated and widely available, we will likely see an increase in AI-generated content across various industries. This could democratize content creation, allowing smaller brands and creators to produce high-quality visual content at a fraction of the traditional cost.However, it also raises important questions about the future of creative industries. Will AI-generated content supplement or replace human-created work? How will we navigate issues of copyright and intellectual property in an age where any image or scene can be conjured from a text prompt? And how will audiences' expectations and perceptions of visual media evolve as AI-generated content becomes more commonplace?The Toys "R" Us AI-generated brand film represents a bold step into a new frontier of marketing, one where the lines between human creativity and artificial intelligence are increasingly blurred. As we move forward, it will be fascinating to see how brands balance the efficiency and innovation of AI with the human touch that connects with audiences on an emotional level. The most successful campaigns are likely to be those that use AI as a tool to enhance and amplify human creativity, rather than replace it entirely.One thing's for sure, whether you're excited or skeptical about AI in marketing, this project has certainly got people talking. And for a brand looking to recapture the public's imagination after a period of uncertainty, that might be the most valuable outcome of all.What do you think about AI-generated content like this Toys "R" Us video? Do you embrace it or have reservations about its impact on creative industries? Let us know in the comments below. Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels: Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Elon Musk says he's moving SpaceX headquarters to Texas amid frustration with California laws

Elon Musk said he plans to move the California headquarters for SpaceX to Texas, after Gov. Gavin Newsom signed a bill into law that will bar school districts from notifying parents if their child uses different pronouns or identifies as a gender that's different from what's on school records. With the signing of AB 1955, Newsom has limited authority of public schools in the state and the rights of parents, critics have said. On Tuesday, Musk said he warned the Democratic governor a year ago "that laws of this nature would force families and companies to leave California to protect their children.""This is the final straw," he wrote on X, his social media platform, in explaining his decision. "Because of this law and the many others that preceded it, attacking both families and companies, SpaceX will now move its HQ from Hawthorne, California, to Starbase, Texas." CALIFORNIA LAWMAKER'S MIC CUT OFF WHILE READING BILL TO END SANCTUARY STATE LAWS, SAYS DEMS 'DON'T CARE' SpaceX has a sprawling headquarters just outside Los Angeles where employees build and test rocket engine components, spacecraft and satellites. In 2021, Musk moved Tesla's headquarters from Northern California to Texas. California remains that company's engineering hub. " Gavin Newsom 's anti-parent agenda isn't just bad for families - now it's doing serious damage to California's economy," California Assembly Republican Leader James Gallagher said in a statement. "With the highest unemployment rate in the nation, you'd think our governor would be doing everything possible to protect jobs. Instead, he's pandering to extremists in his party by cutting parents out of their kids' education and driving even more businesses to pack up for other states."Newsom's press office has disputed criticism of the legislation. "The bill 'DOES NOT allow a student's name or gender identity to be changed on an official school record without parental consent. DOES NOT limit a student's ability to discuss their gender identity with their own family,'" it said in a Monday X post. "DOES NOT take away or undermine parents' rights. Parents have a crucial role in discussions about a student's LGBTQ+ identity, & AB 1955 does not prevent families from having these conversations."In response to Musk's announcement, Newsom wrote on X: "You bent the knee," above the image of a social media post by former President Trump with a photo of him and Musk in the White House. Assemblyman Chris Ward, who proposed AB 1955, said Musk has threatened to take his business elsewhere before. "We've heard this heretical threat before when Mr. Musk announced he was moving business out of California during the pandemic only in reality to expand his operations in Silicon Valley," Ward said in a statement. "The fact is California has one of the most robust and productive economies in the world, and a talent base of skilled workers to match. We are proud to have a state that both stands up for the civil rights of others, while also providing a thriving environment in which to learn skills and prosper in entrepreneurial life -- just like the conditions that have helped his companies succeed." TRANSGENDER ATHLETE COMPLAINS ABOUT LACK OF SPORTSMANSHIP FROM FELLOW RUNNERS AFTER WINNING GIRLS STATE TITLE Assemblyman Bill Essayli, a Republican who vehemently opposed the legislation, told Fox News Digital that "radical gender ideologues" in Sacramento, the state capital, are costing the state thousands of jobs and millions in tax revenue. "They show no sign of stopping," he said. " Democrats in Sacramento are to blame for the ongoing attack on families, businesses, and common sense across California. I have committed my tenure in the Legislature to fight against the radical Democrat agenda that is pushing leaders like Elon Musk to leave our once Golden State. We must restore common sense in Sacramento."Fox News Digital has reached out to Newsom's office. After Musk's announcement, Newsom took a swipe at the SpaceX founder. The California governor posted a screenshot of Trump two years ago saying he could make Musk "drop to his knees and beg" when he was in the White House asking for subsidies for his business projects. "You bent the knee," Newsom posted a few hours after Musk made the announcement to pull his companies out of California.Trump's scathing remarks were posted on Truth Social in 2022, punching back at Musk for saying he was too old to run for a second term.The announcement by Musk came days after he endorsed former President Trump, after the former president was shot during a Pennsylvania campaign rally.

It never ends! What to do after a data breach

Ticketmaster, Advance Auto Parts, Santander Bank, ATT, Bank of America, file transfer service MOVEit, Trello and Discord. Those are just some of the major companies targeted in data breaches so far this year. I'm giving away a $1,000 gift card to your favorite airline.  Try my free tech newsletter to enter!   It's easy to ignore news of a data breach, I know. There are just so many that it all turns into white noise. The Change Healthcare hack alone exposed one-third of Americans. That's either you or someone you love dearly.So, what do you do if your data is exposed? Your No. 1 goal is to protect yourself from future scams.  OWN A HOME? SHOPPING OR SELLING? YOU'RE A SCAM TARGET Make a list of your data that was exposed .Keep a document, Post-it, a note on your phone or whatever works for you. Be suspicious of anyone who references it in an email or phone call to prove they're legit. Say your home address was leaked and someone contacts you about an issue with your mortgage. Yep, it's probably a scam. Watch your money.  Update your PIN and banking login credentials. Even if they weren't involved directly in the breach, hackers can use your personal info to access it. Keep an eye on your bank and credit card statements. Freeze your credit.  This will keep scammers from opening a credit card or loan in your name. Like setting up a fraud alert, you'll need to  contact each of the three credit bureaus . It takes a little work, but it's a solid defense against criminals trying to ruin your financial future. Crooks love to play the long game They'll wait until your guard is down and target you months after the initial breach. This is part of the reason so many people fall for phishing scams. The crooks are going into text, call and email exchanges with a lot of ammo. 10 VOICE SCAMS TO WATCH OUT FOR - AND YOUR QUICK ACTION PLAN What about when passwords are revealed? On July 4, Hackers posted a file  named RockYou2024.txt to a dark web forum. The file includes a mind-numbing 9,948,575,739 passwords. And there's a very good chance it puts you at risk. The RockYou2024 leak is made up of passwords from both old and new data breaches.It's one thing when criminals have your name, phone number and financial details . Having access to your passwords is a whole different ball game. The tactic is called credential stuffing This is when crooks take your leaked passwords and try to break into as many services, sites, accounts and apps as they can. They're hoping you got lazy at least once and reused that password somewhere else.Any system that isn't protected against brute-force attacks is at risk, and this goes beyond smartphones and computers . Even internet-connected cameras and industrial equipment are on the hackable list. What are your next steps? Visit Cybernews'  Leaked Password Checker to see if your passwords were exposed.  HaveIBeenPwned is another option. Enter your email address into either one, and I'll bet you'll find yourself on the list.Now the hard part: Reset the passwords for every single account associated with those leaked passwords.  20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER Your browser can help Your browser's password manager can alert you if your passwords have been involved in a breach. Here's how to view or enable this feature in three popular browsers:Oh, and this is important to remember: Any  random two-factor authentication (2FA) codes you receive via email or text that you didn't ask for could mean someone is trying to access your accounts.Share this tip with someone you care about. Protecting others from scams starts with knowledge. Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

Simple steps to build your own website: A beginner's guide

Remember when you were young and dreamed of opening up that store one day or starting that business? For many retirees, there is no time like the present. Many retired people still like to keep themselves active and busy, and what better way to do that than realizing a passion you've always had? For some people, this may seem like a daunting task, but the internet has made it much easier to open up shop from the comfort of your home. And the start-up costs are also much more affordable than doing it the brick-and-mortar way.Still, opening a store online, whether you'd describe yourself as tech-savvy or not, can be challenging if you don't know the correct steps to take. The good news is that today, we're going to walk you through it all in this beginner's guide to building an online presence and finally pursuing that post-retirement passion project (that could also earn you some bucks). GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Deciding what to sell is the first step in setting up an online store. Perhaps you've already known the answer to this for a long time, and that's what inspired the store in the first place. But if you're not quite sure, consider your expertise, interests and what's in demand in the market.For retirees, it's often beneficial to choose products or services that align with your passions or past experiences, as it's not just something you're interested in but, by now, you're likely already an expert in it, too. And, being an expert in your niche will help you establish yourself as a trusted authority in the industry, which is something that potential customers look for.And, it's not just products you can sell; you can also sell services like coaching or consulting or even create a blog that can be monetized. The options are endless, but it's important to have some direction before you get started. Get my picks for the best website builders to easily set up . HOW TO PICK THE PERFECT LAPTOP IN 2024 Knowing what you want to sell is one thing, but knowing who to sell it to is another. Understanding who your potential customers are is essential for effective marketing and product development. Therefore, take some time to research and understand your target demographic. Consider factors such as age, gender, location, interests and purchasing behavior. A good idea is to start off in your own community.If you know anyone who would be interested, talk to them and see who they can connect you with. You can even create a research survey to get feedback on your audience and what they are looking for. In fact, some people do this step first if they are not sure what to sell but are certain they want to start an online store. Get my picks for the best website builders to easily set up . BEST DESKTOP COMPUTERS FOR 2024 When it comes to doing your passion project online, the options are endless. But if you're not sure, there are various types of online stores you can establish to cater to diverse needs and preferences. Start with an idea that you are passionate about. Below are some examples: E-commerce store : This is the most common type of online store, where you can sell physical products ranging from clothing and electronics to groceries and furniture. Digital products store : If you specialize in creating digital goods such as e-books, software, music or online courses, you can set up a digital products store to distribute your creations. Subscription box service : Subscription-based businesses are gaining popularity, offering curated boxes of products delivered to customers' doorstep on a recurring basis. Examples include beauty boxes, snack boxes and pet subscription services. Marketplace platform : Instead of selling your own products, you can create a marketplace platform where multiple vendors can list and sell their items. Etsy and eBay are prime examples of successful marketplace platforms. Service-based store : Beyond physical and digital products, you can offer various services through an online store, such as consulting, tutoring, freelance services or event planning. Dropshipping store : With dropshipping, you can sell products without holding inventory. When a customer makes a purchase, the order is fulfilled by a third-party supplier who ships the product directly to the customer. Print-on-demand store : This model allows you to sell custom-designed merchandise, such as T-shirts, mugs and phone cases, without the need for inventory. Products are created and shipped on demand. Membership-based store : Create a store where customers pay a membership fee to access exclusive products, discounts or content. This model fosters customer loyalty and recurring revenue. Blog : Combine content creation with e-commerce by creating a blog where you share valuable information or insights related to your niche, such as health and exercise, and integrate it with an online store to sell related products or services. Get my picks for the best website builders to easily set up . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  Selecting the right website builder is crucial if you are looking to set up an online store. A good website builder should have a user-friendly interface and customizable templates, making it accessible even to those who aren't tech-savvy. Look for a platform that requires no coding knowledge and offers a variety of professionally designed templates that can be easily customized to create a unique and visually appealing website for your online store.Additionally, the website builder should offer built-in e-commerce features, making it easy to manage inventory, process payments and track orders all in one place. Before you start building your online store, you'll need to select a plan that best suits your needs and budget. Many website builders offer a range of plans, from free options with basic features to premium plans with advanced e-commerce capabilities.Consider factors such as storage, bandwidth and the number of products you plan to sell when choosing a plan. If you're just starting out, you may want to start with a basic plan and upgrade as your business grows. With flexible pricing options, you can easily scale up your plan as needed to accommodate your growing online store. Get my picks for the best website builders to easily set up . Choosing the right name and domain for your online store is crucial as it's the first thing customers will see and remember about your brand. Your name should be catchy, memorable and reflective of your brand identity. When selecting a domain, try to keep it simple and easy to spell to ensure that potential customers can easily find and remember your website.You can use various domain search tools to check the availability of your desired domain name and explore different options until you find the perfect match for your online store. While some platforms offer free domains, upgrading to a premium plan often allows you to connect your own domain and remove any platform-specific branding from your URL. Get my picks for the best website builders to easily set up . Now, it's time to start designing your website. There are many platforms that offer a wide range of professionally designed templates that you can customize to create a unique and visually appealing online store. Choose a template that best fits your brand identity and industry, then use the platform's intuitive drag-and-drop editor to customize it to your liking. Add your logo, change colors and fonts and rearrange elements to create a website that reflects your brand personality and effectively showcases your products or services. A good tip is to start off simple; you can always add to your design as you go. Get my picks for the best website builders to easily set up . STOP THINKING ABOUT RETIREMENT BY TAPPING TECH TO REDISCOVER WHAT GETS YOU EXCITED When building your online store, blog or business, you'll want to have useful pages on your website. This not only helps people find your website, but once they are there, it gives them all the information they need.Common pages for an online store include a home page, product or service pages, an "about us" page, a contact page and a blog (unless, of course, this is the focus of your site, in which case the blog page may be the home page). Generally speaking, the fewer steps it takes for someone to engage in a call to action the better.You may also want to consider adding pages for shipping and return policies, FAQs and customer testimonials to build trust and credibility with your audience, as well as a privacy policy, disclaimer, regulatory compliance and other legal notices. Get my picks for the best website builders to easily set up . Search engine optimization (SEO) is a buzzword that you may have heard going around. SEO is essential for driving organic traffic to your online store and improving your visibility in search engine results. You can optimize your website for search engines by adding relevant keywords to your content, optimizing your meta tags and descriptions, and improving your site's loading speed and mobile responsiveness. Many website builders offer built-in SEO tools and guides to help you optimize your website for search engines and improve your chances of ranking higher in search results. Get my picks for the best website builders to easily set up . Email marketing is a powerful tool for engaging with your audience, promoting your products or services and driving sales for your online store. But it doesn't have to be complicated. If you already have email contacts, consider reaching out to them to tell them about your project. Most people want to support their friends and family with their pursuits, even if it's just by spreading the word.Otherwise, in order to collect more emails, consider offering a discount or incentive in exchange for signing up for your email list to encourage visitors to subscribe, like an e-book or a downloadable such as a brochure. Then use an email marketing platform to design and send professional-looking emails that direct them to products, services or blog posts on your website. Get my picks for the best website builders to easily set up . BEST PRIVATE AND SECURE EMAIL PROVIDERS 2024 The above are some of the most common steps to opening an online store, but it will look different for everyone. There may be steps you skip and steps you add, and some good advice is to perhaps talk to other retirees you know who have already done it. Maybe they have some suggestions, especially if there's anything they can share that they wish they had known before they started down that path.When launching a website, you have a variety of choices to suit your specific needs, whether you're seeking simplicity, customization or advanced features. Explore these top website builders to find the perfect fit for your online presence: Wix, Squarespace, Weebly, Shopify and WordPress. Learn more about these options by clicking here .Starting an online shop or launching a website for your passion project might seem a little overwhelming, but many of these sites have wizards, resources and customer support teams that can help. Once you get started, you'll be on your way to running your online store or project while enjoying your retirement.Have you started an online store or blog? What was your experience? If you haven't, is it something you would consider? Why or why not? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Scientists create creepy lifelike faces with real human skin for robots

Researchers from the University of Tokyo have developed a groundbreaking method to cover robotic surfaces with genuine, living skin tissue. The idea of robots with skin isn't just about creating a more lifelike appearance. This innovation opens up a world of possibilities, from more realistic prosthetics to robots that can seamlessly blend into human spaces. As we delve into the details of this research, we'll uncover how these scientists are bridging the gap between artificial and biological systems, potentially revolutionizing fields ranging from health care to human-robot interaction. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE We're talking about robots that not only look human-like but also have skin that can heal, sweat and even tan. This isn't just about aesthetics; it's about creating robots that can interact more naturally with humans and their environment. AMAZON PRIME DAY IS HERE: KURT'S BEST AMAZON PRIME DAY 2024 DEALS  The secret lies in something called "perforation-type anchors." These clever little structures are inspired by the way our own skin attaches to the tissues underneath. Essentially, they allow living tissue to grow into and around the robot's surface, creating a secure bond.The researchers used a combination of human dermal fibroblasts and human epidermal keratinocytes to create this living skin. They cultured these cells in a carefully prepared mixture of collagen and growth media, allowing the tissue to mature and form a structure similar to human skin. THE REAL STORY BEHIND THE CREEPY HEAD-SWAPPING OPERATIONS BY ROBOTIC SURGEONS CHINA UNVEILS ITS FIRST FULL-SIZE ELECTRIC RUNNING HUMANOID ROBOT This groundbreaking research was conducted at the Biohybrid Systems Laboratory at the University of Tokyo, led by Professor Shoji Takeuchi. The team's work is pushing the boundaries of what's possible in robotics and bioengineering. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET One of the coolest demonstrations of this technology is a robotic face covered with living tissue that can actually smile. The researchers created a system where the skin-covered surface can be moved to mimic facial expressions.To achieve this, they designed a robotic face with multiple parts, including a base with perforation-type anchors for both a silicone layer and the dermis equivalent. This silicone layer mimics subcutaneous tissue, contributing to a more realistic smiling expression.Getting living tissue to stick to a robot isn't as easy as it sounds. The team had to overcome issues like making sure the tissue could grow into the anchor points properly. They even used plasma treatment to make the surface more "tissue-friendly."The researchers also had to consider the size and arrangement of the anchors. Through finite element method simulations, they found that larger anchors provided more tensile strength, but there was a trade-off with the area they occupied.This technology could be a game-changer for fields like prosthetics and humanoid robotics. Imagine prosthetic limbs that look and feel just like real skin or robots that can interact with humans in more natural ways.The ability to create skin that can move and express emotions opens up new possibilities for human-robot interaction. It could lead to more empathetic and relatable robotic assistants in various fields, from health care to customer service.While we're still a long way from seeing robots with fully functional living skin walking among us, this research from the University of Tokyo opens up exciting possibilities. It's a step towards creating robots that blur the line between machines and living organisms.As we continue to advance in this field, we'll need to grapple with the technical challenges and ethical implications of creating increasingly lifelike machines. Future research might focus on improving the durability of living skin, enhancing its ability to heal or even incorporating sensory capabilities. One thing's for sure: The future of robotics is looking more human than ever.How do you think society will react to robots that look and feel more human-like? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels: Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to protect yourself when your cellphone number is exposed on dark web

While it is easy to imagine what one would do if any of one's information hypothetically ended up on the dark web, it is quite another to be notified that your personal information, especially one you use every day, such as your cellphone, has been found on the dark web. That's why we are eager to dive into the exact scenario that Scott wrote to us about and that he is dealing with. "I was notified by the Credit Agencies that [my] cellphone number was found on the dark web. What specifically does one do in this case other than freeze credit and monitor credit and bills? Should you change your cell number to a different number?" - Scott, Santa Fe, New MexicoAs with any privacy and security breach, it's important to take immediate action to secure your personal information and prevent further damage if your cellphone number has been found on the dark web. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Unfortunately, if your phone number is found on the dark web, it's likely that other sensitive personal information like email addresses, physical addresses, social security numbers or bank account information may have been compromised. Below are some steps you can take if your cellphone number has been found on the dark web:  1) Change passwords: If any of your information, especially your cellphone number, ends up on the dark web, you should log in from a secure, virus- and malware-free device and change your passwords immediately. It is best to create unique and complex passwords, including letters, symbols and numbers, for each separate online account. In addition, consider using a password manager to generate and store complex passwords. 2) Keep an eye on all your accounts as well as credit consistently: Contact the three main credit bureaus to freeze your credit. This will prevent anyone, including hackers, from wreaking havoc on your credit. Make sure to report any errors on your credit reports with the credit agencies as well. Remember that you are allowed a free annual credit report. If there are too many accounts for you to keep track of regularly, a credit monitoring service can help by constantly monitoring and alerting you of any account changes or problems.Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft. BEST ANTIVIRUS FOR IPHONES - CYBERGUY PICKS 2024 3) Turn on two-factor authentication: enabling two-factor authentication (2FA) adds an extra step to your login process, it's a small price to pay for the robust security it provides. Just like it prevents unauthorized access by requiring an additional form of identification beyond your password, 2FA acts as a formidable barrier against potential hackers.By sending a one-time code to your phone or prompting for a biometric factor like your fingerprint, 2FA serves as an early warning system, alerting you to any suspicious login attempts. This gives you the chance to secure your account and thwart potential data breaches or identity theft . In today's digital landscape, where cyberthreats are ever-evolving, embracing 2FA is a proactive step towards fortifying your online presence and safeguarding your digital assets from malicious actors. 4) Get SIM-swapping protection added to your phone: SIM-swapping fraud is when someone gains control of your cellphone number by moving it to a new SIM card. If you want to add SIM-swapping protection to your phone, you can contact your provider to see if this feature can be added. 5) Report personal information or account theft: If your personal information has been hacked or stolen, file a report with the local authorities and the Federal Trade Commission. 6) Invest in personal data removal services: Unfortunately, much of your personal information is scattered across the internet, making it accessible to hackers and scammers who can harvest and sell this information. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for removal services here . 10 TELLTALE SIGNS THAT SOMEONE HAS STOLEN YOUR IDENTITY Now, unless your cellphone has been compromised, changing your number is unnecessary. If you decide to change your phone number, reach out to your service provider and explain your circumstances to get help changing your phone number and transferring contacts. Also, if you change your phone number, notify and update your contact information with all relevant accounts, such as financial institutions, and anywhere you used the old number as a part of the two-factor authentication process. HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS In the digital age, where our personal data can sometimes slip through the cracks and into the shadows, it's crucial to stay vigilant and proactive. Remember, if your cellphone number takes an unwelcome tour of the dark web, don't panic; equip yourself with the right tools and knowledge to safeguard your digital life. And hey, changing your number might just be the fresh start you need, but it's not always necessary unless you're experiencing direct threats or persistent issues.Have you ever encountered a breach of your digital privacy, and how did you navigate the aftermath? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Distributed by aarss.com.