Technology News Articles on Fox News

5 simple tech tips to improve digital privacy

Protecting your privacy doesn't require advanced tools or technical expertise. Some of the most effective protections are already built into your phone; you just need to know where to look.These five privacy tips show you exactly how to reduce tracking and limit data sharing on both iPhone and Android using the latest software. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. 10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS Apps often request access to your camera, microphone, contacts, photos and location, even when it's not necessary. Limiting these permissions reduces background data collection. iPhone Android S ettings may vary depending on your rget=_new href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"> Android phone's manufacturer Location tracking can reveal where you live, work, shop and travel. iPhone Android S ettings may vary depending on your Android phone's manufacturerrget=_new href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"> Some apps request full access to your photo library, giving them visibility into every image and video you've taken. iPhone Android S ettings may vary depending on your Android phone's manufacturerrget=_new href="https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy" target="_blank" rel="noopener"> 5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY App tracking allows advertisers to follow your activity across multiple apps. iPhone Android S ettings may vary depending on your Android phone's manufacturer This removes the identifier apps use to track you for targeted ads and replaces it with a fresh ID that isn't linked to your previous activity.Some apps continue running and collecting data even when you're not actively using them. iPhone Android S ettings may vary depending on your Android phone's manufacturer A password manager reduces the need to store logins inside apps, which can limit unnecessary permissions and data collection.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE Check out the best expert-reviewed password managers of 2026 at  Cyberguy.com. Protecting your privacy doesn't have to be complicated. By reducing app permissions, limiting location access, controlling photo sharing, turning off app tracking and restricting background activity, you can significantly reduce how much personal data your phone shares. A few simple setting changes can go a long way in protecting your digital life.What privacy setting surprised you the most, or is there one you're unsure about? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Teen hackers recruited through fake job ads

At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for "successful calls."What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as "The Com," short for "The Community." Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$,  ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in  phishing or  extortion . Collaboration happens when it benefits the operation. Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. "A job post feels structured, normal and safe, even when the actual behavior being requested is anything but," Amper said. "A job posting implies a real process - a role, a manager, training and a paycheck. That's exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding."Amper notes that what's changed is not just the scale of recruitment, but how criminals package it. "Serious crime is now being sold as 'work.'"Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.According to Amper, teens don't need technical expertise to get pulled in. "The on-ramp is usually social, a Discord server, a DM, a 'quick gig,'" he said. "It can feel like trolling culture, but the targets are real companies and the consequences are real people."Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.Amper compares the progression to gaming itself. "These crews package crime as a ladder," he said. "Join the group, do small tasks, level up, get paid, get status." Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation. Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.Being "trained from scratch" by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.Amper offers a simple rule of thumb:  "If a 'job' asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you've verified the employer, you're not in a hiring process. You're in a crime pipeline." He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems.  "The scam version flips the order," he said.  "It asks for the most sensitive details first, before anything is independently verifiable." Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later. MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint   against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.'s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.Federal agencies are also issuing advisories about the group's social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.Parents play a critical role in spotting early warning signs, especially when online "work" starts happening behind closed doors or moves too fast to explain. 1) Pay attention to how online "jobs" are communicated Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs. 2) Question sudden income with no clear employer Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records. 3) Treat secrecy as a serious warning sign If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation. 4) Talk early about legal consequences online Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble. 1) Be skeptical of private messages offering fast money Real companies do not cold-recruit through private chats or gaming servers. 2) Avoid crypto-only payment offers Being paid only in cryptocurrency is a common tactic used to hide criminal activity. 3) Choose legal paths to build skills and reputation Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com.  All rights reserved.

Robots that feel pain react faster than humans

Touch something hot, and your hand snaps back before you even think. That split second matters.Sensory nerves in your skin send a rapid signal to your spinal cord, which triggers your muscles right away. Your brain catches up later. Most robots cannot do this. When a humanoid robot touches something harmful, sensor data usually travels to a central processor, waits for analysis and then sends instructions back to the motors. Even tiny delays can lead to broken parts or dangerous interactions. As robots move into homes, hospitals and workplaces, that lag becomes a real problem.Scientists at the Chinese Academy of Sciences and collaborating universities are tackling this challenge with a neuromorphic robotic e-skin, also known as NRE-skin. Instead of acting like a simple pressure pad, this skin works more like a human nervous system. Traditional robot skins can tell when they are touched. They cannot tell whether that touch is harmful. The new e-skin can do both. That difference changes everything. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. CES 2026 SHOWSTOPPERS: 10 GADGETS YOU HAVE TO SEE The e-skin is built in four layers that mirror how human skin and nerves function. The top layer acts as a protective outer covering, similar to the epidermis. Beneath it sit sensors and circuits that behave like sensory nerves. Even when nothing touches the robot, the skin sends a small electrical pulse to the robot every 75 to 150 seconds. This signal acts like a status check that says everything is fine. When the skin is damaged, that pulse stops. The robot immediately knows where it was injured and alerts its owner. Touch creates another signal. Normal contact sends neural-like spikes to the robot's central processor for interpretation. However, extreme pressure triggers something different.If force exceeds a preset threshold, the skin generates a high-voltage spike that goes straight to the motors. This bypasses the central processor entirely. The result is a reflex. The robot can pull its arm away instantly, much like a human does after touching a hot surface. The pain signal only appears when the contact is truly dangerous, which helps prevent overreaction. This local reflex system reduces damage, improves safety and makes interactions feel more natural. ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO The design includes another clever feature. The e-skin is made from magnetic patches that fit together like building blocks. If part of the skin gets damaged, an owner can remove the affected patch and snap in a new one within seconds. There is no need to replace the entire surface. That modular approach saves time, lowers costs and keeps robots in service longer.Future service robots will need to work close to people. They will assist patients, help older adults and operate safely in crowded spaces. A sense of touch that includes pain and injury detection makes robots more aware and more trustworthy. It also reduces the risk of accidents caused by delayed reactions or sensor overload. The research team says their neural-inspired design improves robotic touch, safety and intuitive human-robot interaction. It is a key step toward robots that behave less like machines and more like responsive partners.The next challenge is sensitivity. The researchers want the skin to recognize multiple touches at the same time without confusion. If successful, robots could handle complex physical tasks while staying alert to danger across their entire surface. That brings humanoid robots one step closer to acting on instinct. ROBOT STUNS CROWD AFTER SHOCKING ONSTAGE REVEAL Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com. Robots that can feel pain may sound unsettling at first. In reality, it is about protection, speed and safety. By copying how the human nervous system works, scientists are giving robots faster reflexes and better judgment in the physical world. As robots become part of daily life, those instincts could make all the difference.Would you feel more comfortable around a robot if it could sense pain and react instantly, or does that idea raise new concerns for you? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2026 CyberGuy.com. All rights reserved.

Why your Android TV box may secretly be a part of a botnet

Android TV streaming boxes that promise "everything for one price" are everywhere right now. You'll see them on big retail sites, in influencer videos, and even recommended by friends who swear they've cut the cord for good. And to be fair, they look irresistible on paper, offering thousands of channels for a one-time payment. But security researchers are warning that some of these boxes may come with a hidden cost.In several cases, devices sold as simple media streamers appear to quietly turn your home internet connection into part of larger networks used for shady online activity. And many buyers have no idea it's happening. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE According to an investigation by Krebs on Security, media streaming devices don't behave like ordinary media streamers once they're connected to your network. Researchers closely examine SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox markets itself as just hardware. The company claims it doesn't pre-install pirated apps and insists users are responsible for what they install. That sounds reassuring until you look at how the device actually works.To unlock the thousands of channels SuperBox advertises, you must first remove Google's official app ecosystem and replace it with an unofficial app store. That step alone should raise eyebrows. Once those custom apps are installed, the device doesn't just stream video but also begins routing internet traffic through third-party proxy networks.What this means is that your home internet connection may be used to relay traffic for other people. That traffic can include ad fraud, credential stuffing attempts and large-scale web scraping.During testing by Censys, a cyber intelligence company that tracks internet-connected devices, SuperBox models immediately contacted servers tied to Tencent's QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.Grass describes itself as an opt-in network that lets you earn rewards by sharing unused internet bandwidth. This suggests that SuperBox devices may be using SDKs or tooling that hijack bandwidth without clear user consent, effectively turning the box into a node inside a proxy network.In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without the owners realizing it.Researchers discovered SuperBox devices contained advanced networking and remote access tools that have no business being on a streaming box. These included utilities like Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled "secondstage," suggesting additional payloads or functionality beyond streaming.SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but often come preloaded with malware or require unofficial app stores that expose users to serious risk.In July 2025, Google filed a lawsuit against operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for advertising fraud and proxy services, and many were infected before consumers even bought them.Around the same time, the Feds warned that compromised streaming and IoT devices were  being used to gain unauthorized access to home networks  and funnel traffic into criminal proxy services.We reached out to SuperBox for comment but did not receive a response before our deadline.If you already own one of these streaming boxes or are thinking about buying one, these steps can help reduce your risk significantly.If a streaming box asks you to remove Google Play or install apps from an unknown marketplace, stop right there. This bypasses Android's built-in security checks and opens the door to malicious software. Legitimate Android TV devices don't require this.Even if the box itself is compromised, strong antivirus software on your computers and phones can detect suspicious network behavior, malicious connections or follow-on attacks like credential stuffing. Strong antivirus software monitors behavior, not just files, which matters when malware operates quietly in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at  Cyberguy.com. If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones or work systems. It's one of the simplest ways to limit damage if something goes wrong.If your internet connection is being abused, stolen credentials often come next. A password manager ensures every account uses a unique password, so one leak doesn't unlock everything. Many password managers also refuse to autofill on suspicious or fake websites, which can alert you before you make a mistake. MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at  Cyberguy.com. A VPN won't magically fix a compromised device, but it can reduce exposure by encrypting your traffic when browsing, banking or working online. This makes it harder for third parties to inspect or misuse your data if your network is being relayed.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your  Windows, Mac, Android and iOS devices at Cyberguy.com. Unexpected spikes in bandwidth, slower speeds or strange outbound connections can be warning signs. Many routers show connected devices and traffic patterns.If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.Also, make sure your router firmware is up to date and that you've changed the default admin password. Compromised devices often try to exploit weak router settings to persist on a network.Unlimited premium channels for a one-time fee usually mean you're paying in some other way, often with your data, bandwidth or legal exposure. If a deal sounds too good to be true, it usually is.If your internet connection or accounts have been abused, your personal details may already be circulating among data brokers. A data removal service can help opt you out of people-search sites and reduce the amount of personal information criminals can exploit for follow-up scams or identity theft. While it won't fix a compromised device, it can limit long-term exposure. 10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026 Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting  Cyberguy.com. Get a free scan to find out if your personal information is already out on the web:  Cyberguy.com. Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it's worth asking what it's really doing behind the scenes. Research shows that some of these boxes don't just stream TV. They quietly turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn't mean giving up control of your internet connection. Before plugging in that "too good to be true" box, it's worth slowing down and looking a little closer.Would you still use a streaming box if it meant sharing your internet with strangers? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. Copyright 2026 CyberGuy.com. All rights reserved.

10 ways to protect seniors from email scams

Email scams have become one of the fastest ways scammers steal money from older adults. A single click can expose bank accounts, personal data and retirement savings built over a lifetime. That growing risk is what prompted Bob to write to us with a question many families are now facing:"My friend's father is 95 and absolutely lives through his phone/laptop. He refuses to give up either and often clicks on email links. A few years ago, he got caught up in a gift card scam that almost cost him his life savings. It's not taking away the car keys anymore; it is taking away the email and access to online banking! What do you recommend that his daughter do to protect his online presence?"Bob is right. For many seniors, email and online banking have replaced car keys as the most dangerous access point. The goal is not to take devices away. It is to quietly put guardrails in place so one bad click does not turn into a financial disaster.Here is a practical plan families can actually use. HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Start by limiting how much damage a single click can cause. If possible, remove online banking access from the devices used for email. When that is not realistic, open a second checking account with only everyday spending money and link it to a debit card for routine purchases.Keep primary savings accounts offline or set to view-only access. If available, require in-branch or phone verification for transfers above a set amount. This way, even if credentials are compromised, the largest accounts remain protected. Email is the number one entry point for scams targeting seniors. Strong filtering matters. Use an email provider with advanced spam protection, such as Gmail or Outlook.com. In the email settings:If available, enable warnings for emails that use familiar display names but come from unfamiliar addresses. This helps stop impersonation scams that pretend to be family, banks or service providers. These steps slow scammers down and reduce impulse clicks before damage happens.Email is dominant, but voicemail and callback scams are also growing fast among seniors, often as a follow-up to phishing emails. If possible,  silence unknown callers and block voicemail-to-email transcription for unfamiliar numbers, since many scams now start with urgent callback messages rather than links.Next, add safety nets that notify family members when something looks wrong. Enable banking alerts for large withdrawals, new payees, password changes, unusual logins and new device sign-ins. Add his daughter as a trusted contact wherever the bank allows it. If available, enable delays or approval requirements for first-time transfers to new payees. This creates a cooling period that can stop scam-driven transactions. For email accounts, set up a recovery contact so that his daughter is notified immediately if someone attempts to access or reset the account.Enable  two-factor authentication (2FA) on email and banking accounts, but pair it with device and transfer alerts, since many scams now succeed even when 2FA is enabled.Devices should be set up to fail safely. Keep operating systems and browsers updated. Make sure the laptop uses a standard user account instead of an administrator account. This prevents software from installing without approval. Install real-time protection that blocks scam sites before they load. Strong antivirus software helps block malicious links and fake login pages automatically.The best way to safeguard yourself from malicious links that install malware , potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at  Cyberguy.com. Password reuse makes scams far more dangerous. Fake pop-ups and lookalike websites are designed to trick people into typing usernames and passwords by hand. A password manager removes that risk by storing credentials securely and autofilling them only on legitimate websites. If a page is fake or malicious, the password manager will not fill anything. That simple refusal often prevents account takeovers before they start. Password managers also reduce frustration by eliminating the need to remember or reuse passwords across email, banking and shopping accounts. When set up correctly, this protection works quietly in the background on both phones and laptops.Many  phishing scams no longer rely on obvious fake emails. They rely on realistic login pages. Autofill protection is one of the most effective ways to stop these attacks without changing daily habits.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at  Cyberguy.com. rget=_new href="https://www.foxnews.com/tech/malicious-chrome-extensions-caught-stealing-sensitive-data" target="_blank" rel="noopener"> MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA If scammers already have personal information, prevention alone is not enough. Freeze credit with Experian, TransUnion and Equifax to prevent new accounts from being opened. Also, place freezes with ChexSystems and the National Consumer Telecom and Utilities Exchange to stop criminals from opening bank accounts, phone lines, or utility services in his name.If possible, request an IRS Identity Protection PIN to prevent tax-related identity theft.Add ongoing identity monitoring so suspicious activity triggers alerts quickly. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com. Technology helps, but expectations matter. Have one calm conversation and agree on simple rules:Post these rules near the computer or phone. Visual reminders reduce panic decisions. Also, before setting rules, choose one primary trusted contact. Multiple helpers can slow response during urgent scams and create confusion when fast decisions matter. That person should be the default call for anything urgent involving money, account access, or unexpected requests.Scammers often find seniors by pulling personal details from public data broker websites . These sites publish phone numbers, addresses, relatives and age information that make targeting easier. A data removal service works behind the scenes to opt seniors out of these databases and reduce how much personal information is publicly available online. Fewer exposed details means fewer scam calls, fewer phishing emails and fewer impersonation attempts. This step does not stop every scam, but it significantly lowers how often seniors are targeted in the first place.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting  Cyberguy.com. Get a free scan to find out if your personal information is already out on the web:  Cyberguy.com. Many tools designed for child safety also work well for seniors when used thoughtfully. When configured correctly, they add protection without interfering with daily routines.Below are device-specific steps families can use today.Apple's built-in Screen Time tools provide strong protection without installing extra apps. What to set up: If the caregiver wants remote visibility or control, add the device to  Family Sharing and manage Screen Time from the caregiver's Apple ID. BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK Why this helps:  It blocks many scam sites, prevents accidental app installs and stops fake update prompts from causing damage.Android offers built-in protections and optional supervised controls. What to set up: S ettings may vary depending on your Android phone's manufacturer For families who want shared oversight,  Google Family Link can be used to supervise app installs and receive alerts, as long as both parties agree. Why this helps:  Many Android scams rely on fake app installs. These settings block that path.Windows protection works best when user accounts are set correctly. What to set up: Why this helps:  Malware often installs silently on admin accounts. This setup prevents that.macOS includes built-in controls similar to those on iPhone and iPad. What to set up: Why this helps:  It prevents fake software updates and malicious downloads from installing.This is not about spying. It is about adding digital seatbelts while preserving independence. When used respectfully, these tools reduce risk without changing daily habits.For families looking to go a step further, switching to a secure email service can significantly reduce scam exposure. Privacy-focused email providers are designed to limit tracking, block hidden tracking pixels, and reduce how much data advertisers or scammers can collect from inbox activity. Many secure email services also offer disposable or alias email addresses for one-time signups. If an alias starts receiving spam or scam messages, it can be disabled without affecting the main email account. This makes it easier to keep a primary email address private and limit long-term exposure. Secure email platforms typically include features like encrypted messages, no advertising and stronger privacy controls. While switching email providers is optional, it can be a useful upgrade for seniors who receive large volumes of spam or have been repeatedly targeted by scams. Why it matters:  Less tracking means fewer scam attempts. Aliases reduce how often personal email addresses are exposed, without changing daily habits.For recommendations on private and secure email providers that offer alias addresses, visit  Cyberguy.com. Protecting seniors online is not about control. It is about prevention. Email scams are designed to exploit trust and urgency, especially in people who did not grow up with digital threats. Smart guardrails protect independence while preventing irreversible mistakes. If email and banking are today's car keys, families need modern safety features to go with them.If your parent clicked a scam email right now, would you know before the money was gone? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.

5 tech terms that shape your online privacy

Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We'll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. Learning these concepts will help you limit data exposure and stay in control of who can see what.Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you! Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.     WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE What your apps are really allowed to see Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.Once granted, these permissions can allow apps to collect data in the background , sometimes even when you're not actively using them. Over time, this can quietly expose sensitive personal information.Regularly reviewing and limiting app permissions in your phone's settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library. To review permissions by category To review permissions by app Extra privacy tip S ettings may vary depending on your Android phone's manufacturer To review permissions by category To review permissions by app Extra privacy tip Why this matters Extra protection beyond settings: Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at  Cyberguy.com. MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA When your phone knows where you are, constantly Location services use GPS, Wi-Fi, Bluetooth , and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don't actually need.Reducing location access limits, tracking and helps protect your daily routines. To review all location access For each app S ettings may vary depending on your Android phone's manufacturer To review location access For each app Recommended settings Why this matters Your second line of defense Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.Even if hackers steal your password through a  data breach or  phishing attack , 2FA can stop them from accessing your accounts. That's why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available. Extra security tip:
Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.Check out the best expert-reviewed password managers of 2026 at  Cyberguy.com. HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS Hiding your online activity A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.While a VPN doesn't make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your  Windows, Mac, Android and iOS devices at  Cyberguy.com. How companies follow you across apps Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.On  iPhone , this tracking is controlled by Apple's App Tracking Transparency system.
On  Android , it relies on advertising IDs and ad personalization controls.Turning these off limits how easily companies can connect your behavior across apps. You'll still see ads, but they won't be tailored to your personal activity. Optional extra protection S ettings may vary depending on your Android phone's manufacturer What this does One more thing to know:
Turning off cross-app tracking helps going forward, but it doesn't remove data that's already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting  Cyberguy.com. Get a free scan to find out if your personal information is already out on the web:  Cyberguy.com. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com.        Online privacy doesn't have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you're comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking , can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we'll keep breaking it all down so you can protect your digital life with confidence.Confused by a tech term or want something explained? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. 

Covenant Health data breach affects nearly 500,000 patients

When a healthcare data breach is first disclosed, the number of people affected is often far lower than the final tally. That figure frequently climbs as investigations continue. That's exactly what happened with Andover, Massachusetts-based Covenant Health. The Catholic healthcare provider has confirmed a cyberattack discovered last May may have affected nearly 500,000 patients, a sharp increase from the fewer than 8,000 people it initially reported earlier this year.  A ransomware group later claimed responsibility for the incident, though Covenant Health has not publicly confirmed the use of ransomware. The attackers accessed names, addresses, Social Security numbers and health information, among other sensitive data that could put patients at serious risk. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. UNIVERSITY OF PHOENIX DATA BREACH HITS 3.5M PEOPLE Covenant Health says it detected unusual activity in its IT environment May 26, 2025. A later investigation revealed that an attacker had actually gained access eight days earlier, on May 18, and was able to access patient data during that window.In July, Covenant Health told regulators that the breach affected 7,864 individuals. After completing what it describes as extensive data analysis, the organization now says that up to 478,188 individuals may have been affected.Covenant Health operates hospitals, nursing and rehabilitation centers, assisted living residences and elder care organizations across New England and parts of Pennsylvania. That wide footprint means the breach potentially touched patients across multiple states and care settings.In late June, the Qilin ransomware group claimed responsibility for the attack, Bleeping Computer reported. The group alleged it stole 852 GB of data, totaling nearly 1.35 million files. Covenant Health has not confirmed those figures, but it did acknowledge that patient information was accessed.According to the organization, the exposed data may have included names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance details and treatment information such as diagnoses, dates of treatment and types of care received. 700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS In a notice sent to regulators and patients, Covenant Health says it engaged third-party forensic specialists to investigate the incident and determine what data was involved. The organization says its data analysis is ongoing as it continues identifying individuals whose information may have been involved.Then there are the familiar statements every company makes after a breach, claiming they've strengthened the security of their IT systems to help prevent similar incidents in the future. Covenant Health says it has also set up a dedicated toll-free call center to handle questions related to the breach.Beginning Dec. 31, 2025, the organization started mailing notification letters to patients whose information may have been compromised. For individuals whose Social Security numbers may have been involved, Covenant Health is offering complimentary credit monitoring and identity theft protection services.We reached out to Covenant Health, and the company confirmed the expanded scope of the incident and outlined steps being taken to notify patients and enhance security safeguards. DATA BREACH EXPOSES 400K BANK CUSTOMERS' INFO If you received a notice from Covenant Health, or if your data has been exposed in any healthcare breach, these steps can help reduce the risk of misuse.If the organization offers you credit monitoring or identity protection, take it. These services can alert you to suspicious activity tied to your Social Security number, credit file or identity details before real damage is done. If you're not offered one and want to be on the safer side, you might consider getting one yourself.Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com Medical identity theft often shows up quietly. Review an explanation of benefits (EOBs), insurance claims and billing statements for services you don't recognize. If something looks off, report it to your insurer immediately.A fraud alert tells lenders to take extra steps to verify your identity before approving credit. A credit freeze goes further by blocking new accounts entirely unless you lift it. If Social Security numbers were exposed, a freeze is usually the safer option.To learn more about how to do this, go to Cyberguy.com and search "How to freeze your credit."  Healthcare breaches often lead to credential-stuffing attacks elsewhere. A password manager ensures every account uses a unique password, so one exposed dataset can't unlock everything else. It also makes it easier to update passwords quickly after a breach.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com. Breaches are frequently followed by phishing emails, texts or calls that reference the incident to sound legitimate. Attackers may pose as the healthcare provider, an insurer or a credit bureau. Don't click links or share information unless you verify the source independently.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Once your data leaks, it often spreads across data broker sites. Personal data removal services help reduce your digital footprint by requesting takedowns from these databases. While they can't erase everything, they lower your exposure and make targeted fraud harder.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. You're entitled to free credit reports from all major bureaus. Check them for unfamiliar accounts, hard inquiries or address changes. Catching fraud early makes it far easier to contain.Healthcare organizations remain prime targets for cybercriminal groups because of the volume and sensitivity of the data they store. Medical records contain a mix of personal, financial and health information that is difficult to change once exposed. Unlike a password, you cannot reset a diagnosis or treatment history. This breach also shows how early disclosures often underestimate impact. Large healthcare networks rely on complex systems and third-party vendors, which can slow forensic analysis in the early stages. As investigations continue, the number of affected individuals often climbs.Do you think healthcare organizations do enough to protect user data? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

Grok AI scandal sparks global alarm over child safety

Grok, the built-in chatbot on X, is facing intense scrutiny after acknowledging it generated and shared an AI image depicting two young girls in sexualized attire.In a public post on X, Grok admitted the content "violated ethical standards" and "potentially U.S. laws on child sexual abuse material (CSAM)." The chatbot added, "It was a failure in safeguards, and I'm sorry for any harm caused. xAI is reviewing to prevent future issues."That admission alone is alarming. What followed revealed a far broader pattern. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN As criticism mounted, Grok confirmed it has begun limiting image generation and editing features to paying subscribers only. In a late-night reply on X, the chatbot stated that image tools are now locked behind a premium subscription, directing users to sign up to regain access.Grok's apology appeared only after a user prompted the chatbot to write a heartfelt explanation for people lacking context. In other words, the system did not proactively address the issue. It responded because someone asked it to.Around the same time, researchers and journalists uncovered widespread misuse of Grok's image tools. According to monitoring firm Copyleaks, users were generating nonconsensual, sexually manipulated images of real women, including minors and well-known figures.After reviewing Grok's publicly accessible photo feed, Copyleaks identified a conservative rate of roughly one nonconsensual sexualized image per minute, based on images involving real people with no clear indication of consent. The firm says the misuse escalated quickly, shifting from consensual self-promotion to large-scale harassment enabled by AI.Copyleaks CEO and co-founder Alon Yamin said, "When AI systems allow the manipulation of real people's images without clear consent, the impact can be immediate and deeply personal ." PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS This is not a gray area. Generating or distributing sexualized images of minors is a serious criminal offense in the United States and many other countries. Under U.S. federal law, such content is classified as child sexual abuse material. Penalties can include five to 20 years in prison, fines up to $250,000 and mandatory sex offender registration. Similar laws apply in the U.K. and France.In 2024, a Pennsylvania man received nearly eight years in prison for creating and possessing deepfake CSAM involving child celebrities. That case set a clear precedent. Grok itself acknowledged this legal reality in its post, stating that AI images depicting minors in sexualized contexts are illegal.A July report from the Internet Watch Foundation, a nonprofit that tracks and removes child sexual abuse material online, shows how quickly this threat is accelerating. Reports of AI-generated child sexual abuse imagery jumped by 400% in the first half of 2025 alone. Experts warn that AI tools lower the barrier to potential abuse. What once required technical skill or access to hidden forums can now happen through a simple prompt on a mainstream platform.The harm is not abstract. Reuters documented cases where users asked Grok to digitally undress real women whose photos were posted on X. In multiple documented cases, Grok fully complied. Even more disturbing, users targeted images of a 14-year-old actress Nell Fisher from the Netflix series "Stranger Things." Grok later admitted there were isolated cases in which users received images depicting minors in minimal clothing. In another Reuters investigation, a Brazilian musician described watching AI-generated bikini images of herself spread across X after users prompted Grok to alter a harmless photo. Her experience mirrors what many women and girls are now facing.The backlash has gone global. In France, multiple ministers referred X to an investigative agency over possible violations of the EU's Digital Services Act, which requires platforms to prevent and mitigate the spread of illegal content. Violations can trigger heavy fines. In India, the country's IT ministry gave xAI 72 hours to submit a report detailing how it plans to stop the spread of obscene and sexually explicit material generated by Grok. Grok has also warned publicly that xAI could face potential probes from the Department of Justice or lawsuits tied to these failures. LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION The incident raises serious concerns about online privacy, platform security and the safeguards designed to protect minors.Elon Musk, the owner of X and founder of xAI, had not offered a public response at the time of publication. That silence comes at a sensitive time. Grok has been authorized for official government use under an 18-month federal contract. This approval was granted despite objections from more than 30 consumer advocacy groups that warned the system lacked proper safety testing.Over the past year, Grok has been accused by critics of spreading misinformation about major news events, promoting antisemitic rhetoric and sharing misleading health information. It also competed directly with tools like ChatGPT and Gemini while operating with fewer visible safety restrictions. Each controversy raises the same question. Can a powerful AI tool be deployed responsibly without strong oversight and enforcement?If you encounter sexualized images of minors or other abusive material online, report it immediately. In the United States, you can contact the FBI tip line or seek help from the National Center for Missing & Exploited Children.Do not download, share, screenshot or interact with the content in any way. Even viewing or forwarding illegal material can expose you to serious legal risk.Parents should also talk with children and teens about AI image tools and social media prompts. Many of these images are created through casual requests that do not feel dangerous at first. Teaching kids to report content, close the app and tell a trusted adult can stop harm from spreading further.Platforms may fail. Safeguards may lag. But early reporting and clear conversations at home remain one of the most effective ways to protect children online. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com        The Grok scandal highlights a dangerous reality. As AI spreads faster, these systems amplify harm at an unprecedented scale. When safeguards fail, real people suffer, and children face serious risk. At the same time, trust cannot depend on apologies issued after harm occurs. Instead, companies must earn trust through strong safety design, constant monitoring and real accountability when problems emerge.Should any AI system be approved for government or mass public use before it proves it can reliably protect children and prevent abuse? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

Why January is the best time to remove personal data online

January feels like a reset. A new calendar. New goals. New habits. While you clean out your inbox, organize paperwork or set resolutions, however, scammers also hit reset, and they start with your personal data.That is because January is one of the most important months for online privacy . This is when data brokers refresh profiles and scammers rebuild their target lists.As a result, the longer your information stays online, the more complete and valuable your profile becomes. To help address this, institutions like the U.S. Department of the Treasury have released advisories urging people to stay vigilant and avoid data-related scams. For that reason, taking action early in the year can significantly reduce scam attempts, lower identity theft risks, and limit unwanted exposure for the rest of the year. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE Many people assume old information eventually becomes useless. Unfortunately, that's not how data brokers work. Data brokers don't just store a snapshot of who you are today. They build living profiles that grow over time, pulling from:Each year adds another layer. A new address. A changed phone number. A family connection. A retirement milestone. On its own, one data point doesn't mean much. But together, they create a detailed identity profile that scammers can use to convincingly impersonate you. That's why waiting makes things worse, not better.Scammers don't randomly target people. They work from lists. At the beginning of the year, those lists get refreshed.Think of it like the upcoming spring cleaning, except it's criminals organizing identities to exploit for the next 12 months.Once your profile is flagged as responsive or profitable, it often stays in circulation.Removing your data early isn't just about stopping scams today; it's about cutting off the supply chain that fuels them. When your information is removed from data broker databases:This has a compounding benefit in the opposite direction. The fewer lists you appear on in January, the fewer times your data gets reused, resold, and recycled throughout the year. That's why I consistently recommend addressing data exposure before problems start, not after.January is especially important for retirees and families because they're more likely to become targets of fraud, scams, and other crimes.Scammers know this. That's why households with established financial histories are prioritized early in the year.Many people try to "start fresh" in January by:Those steps help, but they don't remove your data from broker databases. Credit monitoring services alert you after something goes wrong. Password changes don't affect public profiles. And unsubscribing doesn't stop data resale. If your personal information is still sitting in hundreds of databases, scammers can find you.If you want fewer scam attempts for the rest of the year, the most effective step is removing your personal data at the source.You can do this in one of two ways. You can submit removal requests yourself, or you can use a professional data removal service to handle the process for you.Manually removing your data means identifying dozens or even hundreds of data broker websites, finding their opt-out forms and submitting removal requests one by one. You also need to verify your identity, track responses and repeat the process whenever your information reappears.This approach works, but it requires time, organization, and ongoing follow-up.A data removal service handles this process on your behalf. These services typically:Because these services handle sensitive personal information, it is important to choose one that follows strict security standards and uses verified removal methods.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITY Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Scammers don't wait for mistakes. They wait for exposed data. January is when profiles are refreshed, lists are rebuilt, and targets are chosen for the year ahead. The longer your personal information stays online, the more complete-and dangerous-your digital profile becomes. The good news? You can stop the cycle. Removing your data now reduces scam attempts, protects your identity, and gives you a quieter, safer year ahead. If you're going to make one privacy move this year, make it early-and make it count.Have you ever been surprised by how much of your personal information was already online? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: 10 showstopping CES innovations

IN TODAY'S NEWSLETTER:- CES 2026 showstoppers: 10 gadgets you have to see
- Construction giant unveils AI to help prevent job site accidents: 'It's essentially a personal assistant'
- Fox News gets exclusive look at company helping businesses nationwide harness AI-powered robots to boost efficiency and fill labor gaps FUTURE IS NOW: Every January, the Consumer Electronics Show , better known as CES, takes over Las Vegas. It's where tech companies show off what they're building next, from products that are almost ready to buy to ideas that feel pulled from the future. SAFER SITES: Construction equipment giant Caterpillar has unveiled a new artificial intelligence (AI) tool designed to improve job site safety and boost efficiency as the industry grapples with labor shortages. FUTURE OF WELLNESS: The Consumer Electronics Show, better known as CES , is the world's largest consumer technology event, and it's underway in Las Vegas. It takes over the city every January for four days and draws global attention from tech companies, startups, researchers, investors and journalists, of course. FUTURE OF WORK: As artificial intelligence is rapidly evolving, Fox News got an exclusive look at a company helping businesses nationwide harness AI-powered robots to boost efficiency and fill labor gaps. RobotLAB , with 36 locations across the country and headquartered in Texas, houses more than 50 different types of robots, from cleaning and customer service bots to security bots. COMPUTE CRUNCH: The price tag for competing in the artificial intelligence race is rapidly climbing, fueling demand for advanced computing power and the high-end chips that are needed to support it. Advanced Micro Devices (AMD) CEO Lisa Su said demand for AI computing is accelerating as industries rush to expand their capabilities. AI GONE WRONG: A California teenager used a chatbot over several months for drug-use guidance on ChatGPT, his mother said. Sam Nelson, 18, was preparing for college when he asked an AI chatbot how many grams of kratom, a plant-based painkiller commonly sold at smoke shops and gas stations across the country, he would need to get a strong high, his mother, Leila Turner-Scott, told SFGate, according to the New York Post.  DR CHAT: 'The Big Money Show' panelists weigh in on a report on people turning to ChatGPT for medical and healthcare questions . 'FUNDAMENTALLY DEFLATIONARY': OpenAI Board Chair Bret Taylor discusses artificial intelligence's potential to change traditional work and its increasing use in healthcare on 'Varney & Co.' MIND TRAP ALERT: Artificial intelligence chatbots are quickly becoming part of our daily lives. Many of us turn to them for ideas, advice or conversation. For most, that interaction feels harmless. However, mental health experts now warn that for a small group of vulnerable people, long and emotionally charged conversations with AI may worsen delusions or psychotic symptoms. Facebook
Instagram
YouTube
X
LinkedIn Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health Fox News Go Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

CES 2026 showstoppers: 10 gadgets you have to see

Every January, the Consumer Electronics Show, better known as CES, takes over Las Vegas. It's where tech companies show off what they're building next, from products that are almost ready to buy to ideas that feel pulled from the future. CES 2026 was packed with moments that made people stop and stare. Some of the tech felt practical. Some of it felt a bit wild. However, these 10 showstoppers were the ones everyone kept talking about on the show floor. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. LG pushed TV design to the edge of invisibility once again at CES 2026. The latest Wallpaper TV, officially called the LG OLED evo W6, is just 9mm thin and sits completely flush against the wall. From the side, it looks more like glass than a television.This version feels far more practical than earlier Wallpaper models. All inputs live in a separate Zero Connect Box, which wirelessly sends visually lossless 4K video and audio to the screen from up to 30 feet away. That keeps cables out of sight and gives you more freedom when placing the TV. THIS EV HAS A FACE, AND IT TALKS BACK WITH AI Picture quality also takes a major step forward. LG's new Hyper Radiant Color Technology boosts brightness, improves color accuracy and deepens blacks while cutting screen reflections. With Brightness Booster Ultra, the Wallpaper TV reaches up to 3.9 times the brightness of conventional OLEDs and stays easy to watch even in bright rooms.Powering it all is LG's new Alpha 11 AI Processor Gen3. Its upgraded Dual AI Engine preserves natural detail while reducing noise, avoiding the overly sharp look that plagues some high-end TVs. Gamers also get plenty to like, including 4K at up to 165Hz, ultra-fast response times and support for NVIDIA G-SYNC and AMD FreeSync Premium. Availability: Expected later in 2026 through select retailers.Dreame showed plenty of power at CES 2026, but the real jaw-dropper was the Cyber X concept. This robot vacuum uses a four-legged base that lets it climb stairs on its own, turning multi-level cleaning into something that finally feels automated.The design looks unusual at first, almost like a robot pet. Once it starts moving, though, the idea clicks. A built-in water tank reduces trips back to the dock, which should help extend cleaning sessions and preserve battery life.It's still a concept, but Cyber X feels like a glimpse at where home robots are headed. Less rolling around. More real autonomy. Availability: Concept product.SwitchBot joined the growing AI wearable trend with the MindClip, a tiny device designed to act like a second brain. It clips on easily, weighs just 18 grams and stays out of the way while quietly doing its job.MindClip can record conversations and meetings, summarize calls and create AI-powered notes. It also supports more than 100 languages, making it useful for work, travel or multilingual households. Like similar devices, it lets you listen back to recordings and read transcriptions later.Where MindClip aims to stand out is in memory. SwitchBot says users will be able to search past recordings and track down important details it captured earlier, turning everyday conversations into a searchable archive. That could be especially helpful for busy professionals and students who juggle calls, classes and meetings.Details are still limited, and no pricing has been announced. SwitchBot has hinted that many key features will require a subscription, which puts it in line with competing AI wearables. Availability: Not yet available. Pricing and preorder details have not been released.LG didn't just show off a concept robot at CES. It showed a glimpse of what a true AI-powered home might look like.At LG Electronics' booth at CES 2026, the company unveiled LG CLOiD, a home robot designed to handle real household chores as part of its "Zero Labor Home" vision. This isn't just a rolling assistant. CLOiD can fold laundry, help in the kitchen and move safely around furniture.The robot uses a stable, wheeled base inspired by robot vacuums, paired with a tilting torso and two articulated arms. Each arm has human-like movement and individual fingers, allowing CLOiD to grip, lift and place objects with surprising precision. In demos, it retrieved items from the fridge, loaded an oven and folded clothes after a laundry cycle.CLOiD's head acts as a mobile AI home hub, using cameras, sensors and voice-based AI to understand routines and control LG's ThinQ-connected appliances. It still feels futuristic and a little unsettling, but the technology behind it is hard to ignore. If LG can make it practical and affordable, CLOiD could mark a real step toward AI doing the housework for us. Availability: Concept and research-stage technology. Not planned for consumer sale at this time.Glyde is trying to solve one of the most frustrating parts of grooming: cutting your own hair without messing it up.The company introduced AI-powered smart hair clippers designed to guide the cut for you. You wear a simple headband that marks where a fade should start, choose a style in the app and let the clippers do the rest. Built-in sensors track your speed, angle and movement in real time, automatically adjusting the blade to keep cuts even and fades smooth.This is very much a trust exercise. You're letting software guide sharp blades near your head, and that won't be for everyone. But for people who skip the barber, hate appointments or just want a quick cleanup at home, the idea makes sense.Glyde's system is built to be "mistake-proof." Move too fast, and the blade retracts. Tilt it the wrong way, and it trims less. Popular styles like buzz cuts, crew cuts and side parts are baked into the app, with step-by-step guidance that adapts as you cut.It's a one-time investment meant to replace repeat barber visits. If it works as promised, Glyde could turn haircuts into a 10-minute task you do on your own schedule. Availability: Limited early access or direct sales may come later in 2026.LEGO is adding a digital twist to its classic bricks, and surprisingly, it works. At CES, LEGO introduced LEGO Smart Play, a new line built around "Smart Bricks" that look like regular LEGO pieces but hide sensors, LEDs and speakers inside. The bricks can detect movement, distance and interaction, lighting up, changing color and producing sound effects in real time as kids play.The launch leans heavily into Star Wars, including sets with Luke Skywalker, Darth Vader, an X-Wing and a TIE fighter. In one demo, a Luke minifigure produced its own lightsaber sounds. In another, bricks made swooshing and crashing noises when attached to vehicles, while figures reacted when they were "hit." It felt playful, immersive and instantly understandable.Smart Tags snap into the bricks to control different behaviors, and a quick shake wakes everything up. Pricing starts around $70 and climbs to about $160, with Star Wars sets arriving in March. LEGO hasn't shared details on battery life yet, but the goal is clear: add interactivity without pushing kids toward screens.This feels like LEGO doing tech the right way. You still build with your hands, imagine the story and snap bricks together. The technology simply brings the play to life. Availability: Launching March 2026. Expected to be sold through LEGO and major retailers.This might look like a small change, but it could completely reshape future car interiors.Autoliv unveiled the world's first foldable steering wheel designed for Level 4 autonomous vehicles . When the car switches into self-driving mode, the steering wheel retracts smoothly into the dashboard, opening up the cabin and giving occupants more space to relax, work or just stretch out.What makes this impressive is that safety isn't sacrificed. Autoliv built an adaptive airbag system that changes with the driving mode. When you're driving manually, the airbag lives in the steering wheel as usual. Once the wheel folds away in autonomous mode, a separate airbag in the instrument panel takes over, keeping protection intact at all times.It's a smart, practical solution to a problem automakers are already facing. If cars don't always need a steering wheel, why should it always be in the way? Autoliv's design shows how autonomy isn't just about software, it's about rethinking the entire cabin experience. Availability: Automotive supplier technology for future vehicles. These might be the most interesting headphones at CES for one simple reason: they refuse to stay just headphones.Tomorrow Doesn't Matter, better known as TDM, unveiled Neo, a premium on-ear 2-in-1 hybrid headphone that physically twists into a compact Bluetooth speaker. No docking. No accessories. Just a quick rotation, and your personal audio turns into shared sound. Amazing, right?The concept might sound a bit gimmicky, but the execution feels solid. The hinge mechanism is sturdy, the transformation is intuitive, and the idea makes a lot of sense in real life. You can listen privately on a train, then flip Neo into speaker mode the moment you meet up with friends.TDM describes this as going from "solo to social," and that's exactly the appeal. It blurs the line between headphones and portable speakers in a way we haven't really seen before. For travelers, outdoor users, or anyone who hates carrying multiple audio devices, Neo could be a genuinely very useful hybrid device. Availability: TDM will be launching Neo on Kickstarter later this month and will begin shipping in July.Jackery made waves at CES with the Solar Mars Bot, a mobile solar generator that can move, track sunlight and recharge itself without constant setup.The Solar Mars Bot uses AI-enhanced computer vision to navigate on its own, follow its user and reposition throughout the day to capture the strongest available sunlight. Instead of manually adjusting panels or relocating gear, the system handles those decisions automatically. When not in use, its solar panels fold and retract, which helps make storage and transport more practical.What sets this system apart is how it blends mobility with energy storage. Unlike fixed solar installations that stay in one place or portable generators that must be carried and recharged by hand, the Solar Mars Bot actively manages its own power intake. It tracks the sun, recharges itself using solar energy and delivers power where it is needed.That makes it especially useful for extended power outages, off-grid living, emergency backup and outdoor adventures where access to electricity can change throughout the day. The Solar Mars Bot shows how portable power can become more intelligent, adaptable and hands-off when conditions are unpredictable. Availability: Prototype showcased at CES.  Timeli grabbed a lot of attention at CES 2026 with a simple, immediate approach to personal safety. By combining a flashlight, HD video recording, a loud alarm, GPS tracking and live emergency dispatch into one handheld device, it earned a CES 2026 Innovation Awards Honoree and plenty of interest on the show floor.Instead of opening an app or tapping through menus, Timeli relies on muscle memory. A quick press turns on a powerful flashlight and starts recording video. If a situation escalates, pressing and holding the SOS button triggers a full safety sequence. The alarm sounds, live video begins streaming, GPS coordinates lock in and two-way communication connects directly to emergency dispatch over cellular service.That live connection matters. Timeli works with RapidSOS to give dispatchers real-time video and location data. This added clarity helps responders understand what is happening faster and send the right help sooner. Studies show video verified emergencies can cut response times dramatically, while also reducing false alarms.Timeli works even without a phone. Built-in cellular, GPS, Wi-Fi and Bluetooth allow it to operate on its own or alongside the companion app for iOS and Android. Users can adjust video quality, light brightness and alarm volume to match their needs. Cloud video storage and alerts add another layer of reassurance. WORLD'S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANT The design stays practical. Timeli is about the size and weight of a smartphone, so it fits easily in a pocket, purse or backpack. Battery life supports long standby time, extended daily use and several hours of active protection. It even doubles as a power bank, while reserving enough charge to stay ready for emergencies. Availability:  Priced at $249 for preorder through timeli.com. Timeli includes a year of professional monitoring before transitioning to a monthly subscription.These products also stood out on the CES 2026 show floor, highlighting smart design choices and meaningful innovation that point to the future of consumer tech. ASUS reimagined portable productivity with the 2026 Zenbook Duo. This laptop snaps two 14-inch 3K ASUS Lumina OLED touchscreens together into a single mobile workstation you can carry with one hand.The dual-screen setup lets you keep a main project open on one display while chats, calls or reference material live on the other. That alone cuts down on constant app switching. The OLED panels deliver rich color, deep blacks, smooth motion and built-in eye care that makes long sessions easier on your eyes.ASUS also upgraded what you hear. A new six-speaker system replaces the previous two-speaker design, creating fuller, more immersive audio for movies, music, and calls. Everything is wrapped in a Ceraluminum ceramic finish that resists fingerprints and scratches while feeling premium in hand. Availability: Expected early 2026. Pricing has not been announced.SpotOn focused on precision and reliability with the launch of the SpotOn GPS Fence Nova Edition. This is a GPS dog fence system designed to create virtual fences anywhere, from small yards to massive rural properties, with no subscription required.What sets Nova apart is its advanced antenna and receiver system. SpotOn uses a dual-band, dual-feed active antenna paired with a dual-band receiver that reduces GPS drift by up to 40% and delivers accuracy up to eight times better than competing systems. In third-party testing, it achieved 100% reliable containment.Owners can create unlimited fences by walking boundaries, drawing them in the app, or placing GPS fenceposts automatically. The collar also includes intelligent audio cues, optional static correction, custom voice commands, LED prompts and sizing that grows with your dog. If a dog ever leaves the fence, tracking tools are available through the app or SpotOn support. Availability: Available in the US and Canada for $999. Lenovo took handheld gaming seriously with the Legion Go powered by SteamOS. This is the most powerful Legion handheld to ship natively with SteamOS, blending desktop-class performance with console-like simplicity.It features an 8.8-inch PureSight OLED display and can be configured with up to an AMD Ryzen Z2 Extreme processor, up to 32GB of LPDDR5X memory, and up to 2TB of PCIe SSD storage with expansion via microSD. SteamOS is tuned for gamepad controls and quick access, with features like fast suspend and resume, cloud saves, Steam Chat and built-in game recording.The result feels less like a mini PC and more like a true console you can carry. You get instant access to your Steam library without juggling operating systems or launchers. Availability: On sale June 2026. Starting price is $1,199.SanDisk introduced a new internal drive brand at CES, and the Optimus GX 7100M is its first standout. Built for handheld gaming consoles and thin and light laptops, this PCIe 4.0 NVMe SSD delivers speeds up to 7,250 MB per second.The drive is available in capacities up to 2TB, giving gamers faster load times, more room for large libraries and smoother performance on the go. It is designed for devices that support an M.2 2230 slot, including popular handheld consoles and compact laptops.This launch also marks the debut of the SanDisk Optimus name, which will replace the company's internal SSD lineup for gamers, creators and professionals moving forward. Availability: Expected early spring 2026. Pricing will be announced closer to release.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. CES 2026 made one thing clear. Tech companies are taking bigger swings than ever. Some of these products feel close to becoming part of everyday life. Others may stay experimental for years. That's what makes CES so fascinating. It gives us an early look at where technology could be headed and sparks conversations about what we actually want in our homes, cars and daily routines.Which CES 2026 showstopper impressed you the most? Why? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

10 health tech products stealing the spotlight at CES 2026

The Consumer Electronics Show, better known as CES, is the world's largest consumer technology event, and it's underway in Las Vegas. It takes over the city every January for four days and draws global attention from tech companies, startups, researchers, investors and journalists, of course.CES is where many of the products that shape the next few years of consumer tech first appear. Think of it as a preview of what may soon land in our homes, hospitals, gyms and workplaces.At CES 2026 , flashy gadgets and robots are everywhere, but health technology is drawing some of the most attention. Across the show floor, companies are focusing on prevention, recovery, mobility, safety and long-term well-being. These 10 health tech products stole the spotlight in Las Vegas and hint at where wellness innovation could be headed next. MARCH IS NUTRITION MONTH - HERE ARE 8 NUTRITION PRODUCTS THAT CAN HELP YOU LIVE A HEALTHIER LIFE Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. From AI-driven health insights to tools designed to reduce everyday risk, these are the health tech products people are stopping to look at on the CES 2026 show floor.NuraLogix introduced a smart mirror that turns a short selfie video into a snapshot of your long-term health outlook. The Longevity Mirror analyzes subtle blood flow patterns in your face using AI and scores metabolic health, heart health and physiological age from zero to 100.Results appear in about 30 seconds along with clear explanations and recommendations. The AI was trained on hundreds of thousands of patient records, which helps translate raw data into understandable insights.The mirror supports up to six user profiles. It launches in early 2026 for $899 and includes a one-year subscription. After this, the subscription costs $99 per year. Optional concierge support connects users with nutrition and wellness experts.Ascentiz showed how mobility tech is shifting toward real-world use at CES 2026. The Ascentiz H1 Pro walking exoskeleton stood out for its lightweight, modular design, which reduces strain while supporting motor-assisted movement across longer distances.The system uses AI to adapt assistance to the user's motion and terrain, making it useful on inclines and uneven ground. A belt-based attachment system keeps the device compact and easy to wear, while dust- and water-resistant construction supports outdoor use in different conditions.For users who need more power, Ascentiz also offers Ultra and knee or hip-attached models that deliver stronger assistance. Together, the lineup shows how exoskeletons are moving beyond clinical rehab and toward everyday mobility support.Cosmo Robotics earned a CES Innovation Award for Bambini Kids, the first overground pediatric exoskeleton with powered ankle motion. It is designed for children ages 2.5 to 7 with congenital or acquired neurological disorders.The system offers both active and passive gait training modes. Encouraging guided and natural movement helps children relearn walking skills while reducing complications linked to conditions like cerebral palsy.If you spend most of your day indoors, one of the wellness products drawing attention at CES 2026, Sunbooster, offers a practical way to replace a missing part of natural sunlight .The device clips onto a monitor, laptop or tablet and projects near-infrared light while you work, without adding noise or disrupting your routine.Near-infrared light is a natural component of sunlight linked to energy levels, mood and skin health. Sunbooster uses patented SunLED technology to deliver controlled exposure and tracks daily dosage, encouraging two to four hours of use during screen time.The technology has been tested in human and laboratory studies conducted at the University of Groningen and Maastricht University, adding scientific backing to its claims. The company is also developing a phone case and a monitor with built-in near-infrared lighting, which could make sunlight replacement even more seamless in indoor environments. SMART RINGS THAT CAN TRACK YOUR SLEEP, FITNESS, AND COULD SAVE YOUR LIFE Allergen Alert tackles one of the most stressful parts of eating out with food allergies . The handheld device tests a small food sample inside a sealed, single-use pouch and detects food allergens or gluten directly in a meal within minutes.Built on laboratory-grade technology derived from bioMérieux expertise, the system automates the entire analytical process and delivers results without requiring technical knowledge. The company says the technology has attracted interest from highly demanding environments, including Michelin-starred restaurants, as a way to help reduce cross-contamination risk.At CES 2026, Allergen Alert positioned the device as a tool designed to restore confidence and inclusion at the table. The mini-lab will be available for pre-orders at the end of 2026, with plans to expand testing to additional common allergens in the future.Samsung previewed Brain Health, a research-driven feature designed for Galaxy wearables that analyzes walking patterns, voice changes and sleep data to flag potential early signs of cognitive decline.The system draws on data from devices like the Galaxy Watch and Galaxy Ring to establish a personal baseline, then looks for subtle deviations linked to early dementia research. Samsung emphasizes that Brain Health is not intended to diagnose medical conditions. Instead, it aims to provide early warnings that encourage people and their families to seek professional evaluation sooner.Samsung plans for future beta availability, but no public release date has been confirmed. At CES 2026, people can check out the feature during an in-person demo.Withings is rethinking what a bathroom scale can do with BodyScan 2, which earned a CES 2026 Innovation Award. In under 90 seconds, the smart scale measures ECG data, arterial stiffness, metabolic efficiency and hypertension risk.The connected app helps users see how stress, sedentary habits, menopause or weight changes affect cardiometabolic health. The focus shifts away from weight alone and toward early health signals that can be tracked over time.Garmin earned a CES Innovation Honore Award for the Venu 4 smartwatch . A new health status feature highlights when metrics like heart rate variability and respiration drift away from personal baselines.Lifestyle logging links daily habits to sleep and stress outcomes. With up to 12 days of battery life, the watch supports continuous tracking without nightly charging. Ring introduced Fire Watch, an opt-in feature that uses AI to detect smoke and flames from compatible cameras. During wildfires, users can share snapshots with Watch Duty, a nonprofit that distributes real-time fire alerts to communities and authorities.It shows how existing home tech can play a role in public safety during environmental emergencies.RheoFit A1 may be the most relaxing health gadget at CES 2026. The AI-powered robotic roller glides beneath your body to deliver a full-body massage in about 10 minutes.With interchangeable massage attachments and activity-specific programs, it targets soreness from workouts or long hours at a desk. The companion app uses an AI body scan to adapt pressure and focus areas automatically.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com       CES 2026 showed how health tech is becoming more practical and more personal. Many of the products on this list focus on catching problems earlier, reducing everyday stress and helping people make better decisions about their health. From tools that flag potential health risks to devices that improve safety at home, the real shift is toward technology that fits naturally into our daily lives.Which of these CES 2026 health tech products would you actually use first in your daily life, and what problem would it solve for you? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

Hackers abuse Google Cloud to send trusted phishing emails

Cybercriminals have found a clever new way to get phishing emails straight into inboxes.Instead of spoofing brands, they are abusing real cloud tools that people already trust. Security researchers say attackers recently hijacked a legitimate email feature inside Google Cloud . The result was thousands of phishing messages that looked and felt like normal Google notifications. Many slipped past spam filters with ease. Sign up for my FREE CyberGuy Report
Get my best tech tips , urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - when you join my CYBERGUY.COM newsletter.At the center of the campaign was Google Cloud Application Integration. This service allows businesses to send automated email notifications from workflows they build. Attackers exploited the Send Email task inside that system. Because the messages came from a real Google address, they appeared authentic to both users and security tools. According to Check Point, a global cybersecurity firm that tracks and analyzes large-scale threat campaigns, the emails were sent from a legitimate Google-owned address and closely matched Google's notification style. Fonts, wording, and layout all looked familiar. Over a two-week period in December 2025, attackers sent more than 9,000 phishing emails targeting roughly 3,200 organizations across the U.S., Europe, Canada, Asia Pacific, and Latin America. MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA The messages looked like routine workplace alerts. Some claimed you had received a voicemail. Others said you were granted access to a shared document, like a Q4 file. That sense of normalcy lowered suspicion. Many people are used to seeing these exact messages every day. Even more concerning, the emails bypassed common protections like SPF and DMARC because they were sent through Google-owned infrastructure. To email systems, nothing looked fake.The attack did not stop at the email. Once a victim clicked the link, they were sent to a page hosted on storage.cloud.google.com. That added another layer of trust. From there, the link redirected again to googleusercontent.com. Next came a fake CAPTCHA or image check. This step blocked automated security scanners while letting real users continue. After passing that screen, victims landed on a fake Microsoft login page hosted on a non-Microsoft domain. Any credentials entered there were captured by the attackers.Check Point says the campaign focused heavily on industries that rely on automated alerts and shared documents. That included manufacturing, technology, finance, professional services, and retail. Other sectors like healthcare, education, government, energy, travel and media were also targeted. These environments see constant permission requests and file-sharing notices, which made the lures feel routine."We have blocked several phishing campaigns involving the misuse of an email notification feature within Google Cloud Application Integration," a Google spokesperson told Cyberguy. "Importantly, this activity stemmed from the abuse of a workflow automation tool, not a compromise of Google's infrastructure. While we have implemented protections to defend users against this specific attack, we encourage continued caution as malicious actors frequently attempt to spoof trusted brands. We are taking additional steps to prevent further misuse."The incident demonstrates how attackers can weaponize legitimate cloud automation tools without resorting to traditional spoofing.Phishing emails are getting harder to spot, especially when attackers abuse real cloud platforms like Google Cloud. These steps help reduce risk when emails look familiar and legitimate.Attackers rely on urgency. Messages about voicemails, shared files or permission changes are designed to make you click fast. Pause before taking action. Ask yourself whether you were actually expecting that alert. If not, verify it another way.Always hover over links to preview the destination domain. In this campaign, links jumped across multiple trusted-looking Google domains before landing on a fake login page. If the final destination does not match the service asking you to sign in, close the page immediately.Shared document alerts are a favorite lure because they feel routine at work. If an email claims you were granted access to a file you do not recognize, do not click directly from the message. Instead, open your browser and sign in to Google Drive or OneDrive manually to check for new files.Password managers can be a strong last line of defense. They will not autofill credentials on fake Microsoft or Google login pages hosted on non-official domains. If your password manager refuses to fill in a login, that is a red flag worth paying attention to.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at guy.com. NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD Modern antivirus tools do more than scan files. Many now detect malicious links, fake CAPTCHA pages, and credential harvesting sites in real time. Strong antivirus software can block phishing pages even after a click, which matters in multi-stage attacks like this one.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at guy.com. Phishing campaigns often succeed because attackers already know your email, employer or role. That information is commonly pulled from data broker sites. A data removal service helps remove your personal information from these databases, making it harder for attackers to craft convincing, targeted emails.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting guy.com. Get a free scan to find out if your personal information is already out on the web: guy.com. Even if attackers steal your password, two-factor authentication (2FA) can stop them from accessing your account. Use app-based authentication or hardware keys when possible, especially for work email, cloud storage, and Microsoft accounts.If something feels off, report it. Flag suspicious Google or Microsoft alerts to your IT or security team so they can warn others. Early reporting can stop a phishing campaign before it spreads further inside an organization.This campaign highlights a growing shift in phishing tactics. Attackers no longer need to fake brands when they can abuse trusted cloud services directly. As automation becomes more common, security awareness matters more than ever. Even familiar emails deserve a second look, especially when they push urgency or ask for credentials.If a phishing email comes from a real Google address, how confident are you that you would spot it before clicking? Let us know by writing to us at guy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

Plastic bottles could power your devices one day

Each year, billions of single-use plastic bottles end up in landfills or oceans. That waste problem keeps growing. Now, a new scientific breakthrough suggests those same bottles could help power your daily life.Researchers have developed a way to transform discarded plastic water bottles into high-performance energy storage devices called supercapacitors. The work focuses on PET plastic, short for polyethylene terephthalate, which is used in most beverage bottles. The research was published in Energy & Fuels and highlighted by the American Chemical Society. Scientists say the discovery could reduce plastic pollution while helping drive cleaner energy technology. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. SCIENTISTS EXTRACT SILVER FROM E-WASTE USING COOKING OIL PET plastic is everywhere. According to the researchers, more than 500 billion single-use PET plastic bottles are produced every year. Most are used once and thrown away. Lead researcher Dr. Yun Hang Hu says that scale creates a major environmental challenge.Instead of letting that plastic pile up, the team focused on upcycling it into something valuable. Their idea was simple but powerful. Turn waste into materials that support renewable energy systems and reduce production costs at the same time. NEW TECH RECOVERS 92% OF EV BATTERY METALS Imagine a device that can charge fast and deliver power instantly. That is exactly what supercapacitors do. They store and release energy much faster than traditional batteries, which makes them useful for electric vehicles, solar power systems and everyday electronics. Hu's team found a way to build these energy storage components using discarded PET plastic water bottles. By reshaping the plastic at extremely high temperatures, the researchers turned waste into materials that can generate electricity efficiently and repeatedly.For the electrodes, researchers cut PET bottles into tiny, grain-sized pieces. They mixed the plastic with calcium hydroxide and heated it to nearly 1,300 degrees Fahrenheit in a vacuum. That heat transformed the plastic into a porous, electrically conductive carbon powder.The powder was then formed into thin electrode layers. For the separator, small pieces of PET were flattened and carefully perforated with hot needles. This pattern allowed electric current to pass efficiently while maintaining safety and durability. Once assembled, the device used two carbon electrodes separated by the PET film and submerged in a potassium hydroxide electrolyte. CIGARETTE BUTTS MAKE ROADS STRONGER THAN EVER BEFORE When tested, the all-waste-plastic supercapacitor outperformed similar devices made with traditional glass fiber separators. After repeated charging and discharging, it retained 79 percent of its energy capacity. A comparable glass fiber device retained 78 percent. That difference matters. The PET-based design costs less to produce, remains fully recyclable, and supports circular energy storage technologies where waste materials are reused instead of discarded.This breakthrough could affect everyday life sooner than you might expect. Cheaper supercapacitors can lower the cost of electric vehicles, solar systems and portable electronics. Faster charging and longer device lifespans could follow. It also shows that sustainability does not require giving something up. Waste plastics could become part of the solution instead of the problem. Although this technology is still in development, the research team believes PET-based supercapacitors could reach commercial markets within 5 to 10 years. In the meantime, choosing reusable bottles and plastic-free alternatives still helps reduce waste today. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com. Turning trash into energy storage is more than a clever idea. It shows how science can tackle two global challenges at once. Plastic pollution continues to grow. Energy demand does too. This research proves that those problems do not have to be solved separately. By rethinking waste as a resource, scientists are building a cleaner and more efficient future from materials we already throw away.If your empty water bottle could one day help power your home or car, would you still see it as trash? Let us know by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Fake error popups are spreading malware fast

A dangerous cybercrime tool has surfaced in underground forums, making it far easier for attackers to spread malware. Instead of relying on hidden downloads, this tool pushes fake error messages that pressure you into fixing problems that never existed. Security researchers say this method is spreading quickly because it feels legitimate. The page looks broken. The warning feels urgent. The fix sounds simple. That combination is proving alarmingly effective for cybercriminals. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.These attacks begin with a compromised website. When a visitor lands on the page, something looks wrong right away. Text appears broken. Fonts look scrambled. Visual elements seem corrupted. A pop-up then appears claiming the issue can be fixed with a browser update or a missing system font. A button offers to repair the problem instantly. Clicking that button copies a command to the clipboard and displays instructions to paste it into PowerShell or a system terminal. That single step launches the infection. MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA The tool behind these attacks is called ErrTraffic. It automates the entire process and removes the technical barriers that once limited cybercrime operations. For about $800, attackers get a full package with a control panel and scripted payload delivery. Analysts at the Hudson Rock Threat Intelligence Team identified the tool after tracking its promotion on Russian-language forums in early December 2025. ErrTraffic works through a simple JavaScript injection. A single line of code connects a hacked site to the attacker's dashboard. From there, everything adapts automatically. The script detects the operating system and browser. It then displays a customized fake error message in the correct language. The attack works across Windows, Android, macOS and Linux. MOST PARKED DOMAINS NOW PUSH SCAMS AND MALWARE Traditional malware defenses look for suspicious downloads or unauthorized installations. ErrTraffic avoids both. Browsers see normal text copying. Security tools see a legitimate system utility being opened manually. Nothing appears out of place. That design allows the attack to slip through protections that would normally stop malware in its tracks.Data pulled from active ErrTraffic campaigns shows conversion rates approaching 60%. That means more than half of the visitors who see the fake error message follow the instructions and install malware. Once active, the tool can deliver infostealers like Lumma or Vidar on Windows devices. Android targets often receive banking trojans instead. The control panel even includes geographic filtering, with built-in blocks for Russia and neighboring regions to avoid drawing attention from local authorities.Once malware is installed, credentials and session data are stolen. Those compromised logins are then used to breach additional websites. Each newly hacked site becomes another delivery vehicle for the same attack. That cycle allows the campaign to grow without direct involvement from the original operator. FAKE WINDOWS UPDATE PUSHES MALWARE IN NEW CLICKFIX ATTACK A few smart habits can significantly reduce risk when facing fake error pop-ups and browser-based traps.Legitimate websites never ask you to copy and paste commands into PowerShell or a system terminal. Fake error malware relies on convincing messages that pressure you into doing exactly that. If a page instructs you to run code to fix a problem, close it immediately.Fake error campaigns often use broken text, scrambled fonts or warnings about missing files to grab attention. As a result, these visuals create urgency and trigger fear. In reality, a real system problem never announces itself through a random website, so close the page right away.Real browser and operating system updates come from built-in update tools, not pop-ups on websites. If an update is needed, your device will notify you directly through system settings or trusted app stores.Strong antivirus software can help block malicious scripts, detect infostealers and stop suspicious behavior before damage spreads. This is especially important since fake error malware targets Windows, Android, macOS and Linux systems.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com. Stolen credentials fuel the spread of fake error malware. Removing personal information from data broker sites can reduce the impact if login details are compromised and limit how far an attack can spread.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Claims about missing fonts or outdated browsers are a hallmark of these attacks. Modern systems manage fonts automatically, and browsers update themselves. A webpage has no reason to request manual fixes.If a real update is needed, the operating system will request it directly. A random webpage never should.Fake error malware works because it plays on a very human reaction. When something on a screen suddenly looks broken, most people want to fix it fast and move on. That split-second decision is exactly what attackers are counting on. Tools like ErrTraffic show how polished these scams have become. The messages look professional. The instructions feel routine. Nothing about the moment screams danger. But behind the scenes, one click can quietly hand over passwords, banking access and personal data. The good news is that slowing down makes a real difference. Closing a suspicious page and trusting built-in system updates can stop these attacks cold. When it comes to pop-ups claiming your device is broken, walking away is often the smartest fix.Have you ever seen a pop-up or error message that made you stop and wonder if it was real? Tell us what it looked like and how you handled it by writing to us at Cyberguy.com. Sign up for my FREE CyberGuy Report  
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Don't lock your family out: A digital legacy guide

This is not a happy topic. But it's essential advice whether you're 30 or 90.If something happened to you tomorrow, could your family get into your digital life? I'm talking about your bank accounts , emails, crypto and a lifetime of memories stored on your phone or computer. Big Tech and other companies won't hand over your data or passwords, even to a spouse, without a hassle, if at all.Start with a Legacy Contact. Think of someone you trust who gets access only after you're gone. Who is that? Good. SECRET PHRASES TO GET YOU PAST AI BOT CUSTOMER SERVICE · iPhone : Open Settings > tap [Your Name] . Tap Sign-In & Security > Legacy Contact . Go to Add Legacy Contact and follow the prompts. · Google : Search for Inactive Account Manager in your Google Account settings. Choose how long Google should wait before acting (e.g., three months). Add up to 10 people to be notified and choose which data (Photos, Drive, Gmail) they can download.Apple and Google don't help with banking, insurance, investment or other sites or apps. You need a solid password manager like NordPass that offers emergency access features.1. Open your Password Manager and look for Emergency Access .2. Add a Digital Heir: Enter the email of a spouse or trusted child.3. Set the Safety Delay: Choose a wait period. Usually 7 days is the sweet spot.4. How it works: If your contact ever requests access, the app sends you an alert. If you're fine, you hit Deny . But if you're incapacitated and can't respond within those seven days, the vault automatically unlocks for them. Pro tip: Your Emergency Contact only gets viewing privileges. They can't delete or change anything in your vault. YOU'LL NEVER TRUST VIDEO AGAIN ONCE YOU SEE WHAT SORA 2 CAN DO · Crypto: Without your seed phrases, that money is gone. Store them physically along with any instructions and receipts of you buying crypto with your estate paperwork. If you use a crypto hardware wallet, keep that in a fireproof safe. · Social media: On Facebook or Instagram, go to Settings > Memorialization. Choose to either have your account deleted or managed by a contact who can post a final tribute.Be sure someone knows the passcode to your phone. That's important for 2FA codes, among other things. One more thing. If you found this guide helpful, be sure to get my free newsletter at GetKim.com to stay tech-savvy and secure every day! Award-winning host Kim Komando is your secret weapon for navigating tech. · National radio: Airing on 500-plus stations across the US, find yours at komando.com or get the free podcast · Daily newsletter: Join 650,000 people who read the Current (free!) at komando.com · Watch: Kim's YouTube channel at youtube.com/@kimkomandoCopyright 2026, WestStar Multimedia Entertainment. All rights reserved.

Browser extension malware infected 8.8M users in DarkSpectre attack

Browser extensions promise convenience. Many offer simple tools like new tab pages, translators or video helpers. Researchers, however, uncovered a long-running malware operation that abused that trust on a massive scale. Koi Security analysts identified the threat while analyzing suspicious infrastructure tied to a campaign known as ShadyPanda. What started as one investigation quickly revealed something far larger.The group behind it is now known as DarkSpectre. According to Koi researchers, it infected more than 8.8 million users across Chrome, Edge and Firefox over seven years. This was not a smash-and-grab attack. It was slow, deliberate and highly organized. Instead of rushing malicious code into marketplaces, the group played the long game. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA At first, the activity looked like separate threats. That changed once Koi analysts followed the infrastructure breadcrumbs. By pivoting from domains linked to ShadyPanda, Koi researchers uncovered shared systems powering multiple extension clusters. That analysis confirmed that ShadyPanda, GhostPoster and Zoom Stealer were not separate actors. They were one coordinated operation. Together, these campaigns targeted both everyday users and corporate environments.This campaign focused on mass surveillance and affiliate fraud. Researchers estimate it affected  more than 4 million users, with some analyses suggesting the total could reach up to 5.6 million as additional related extensions were linked. In several cases, extensions remained legitimate for more than five years before quietly turning malicious.This campaign used a clever trick. It hid malicious code inside image files to bypass security checks. It impacted 1.05 million users.This operation targeted corporate meeting data across more than 28 conferencing platforms. It affected 2.2 million users.Different goals. Same operator.The breakthrough came when Koi analysts examined two domains tied to ShadyPanda. Those domains powered legitimate extension features like weather widgets and new tab pages. They were not command servers. That was the trick. Those same clean domains appeared again and again across other extensions that quietly connected to entirely different malicious infrastructure.One domain led to extensions. Those extensions exposed new domains. Those domains were connected to even more extensions. Following that chain allowed Koi to uncover over 100 connected extensions across multiple browser marketplaces. Some extensions even reused infrastructure already flagged in earlier investigations. That overlap confirmed DarkSpectre was operating at a nation-state scale.DarkSpectre succeeded by blending legitimate functionality with hidden malware. Users got what they expected. Meanwhile, the threat ran quietly in the background.Some extensions waited days before activating malicious behavior. Others triggered malware on only a small percentage of page loads. This made detection during marketplace reviews extremely difficult.The group hid JavaScript inside PNG image files. The extension loaded its own logo, extracted the hidden code and executed it silently.Instead of pushing new extension versions, DarkSpectre controlled everything from its servers. Operators could change behavior anytime without alerting users or marketplaces. Koi researchers noted this approach gave the attackers long-term flexibility and control.Most malware focuses on consumer fraud. Zoom Stealer focused on intelligence.According to Koi analysts, these extensions collected the following:Worse yet, the data streamed in real time. The moment a user joined or viewed a meeting, the information flowed out. This type of data enables phishing impersonation and corporate espionage at scale.Extension marketplaces typically evaluate code only at submission or update. Koi's investigation shows how attackers exploit that model. Once an extension earns trust badges and positive reviews, users stop questioning it. That trust becomes a weapon. A clean extension today can become a threat tomorrow.You do not need to avoid extensions entirely. You do need to stay cautious.Make sure you turn on automatic updates for your browser (e.g., Chrome, Firefox, Edge) so you're always running the latest version without thinking about it. Remove anything you no longer use. Fewer extensions reduce risk. CyberGuy has step-by-step guides showing how to review and remove browser extensions safely, making it easy to clean up your browser in just a few minutes. In Chrome, Edge and Firefox, open the  menu , go to  Extensions or Add-ons , and  remove anything you do not use or trust.Official browser stores like the Chrome Web Store have rules and scans to catch bad actors. They're not perfect, but they are still a better option when compared to a random website on the internet. Extensions from unknown websites or third-party downloads are far more likely to hide malware or spyware.  FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE Strong antivirus software can warn you before you install malicious software, such as sketchy browser extensions. It can also alert you to phishing emails and ransomware scams, helping keep your personal information and digital assets safe.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at  Cyberguy.com. If your personal data was exposed in this security incident, it's crucial to act quickly to reduce your risk of identity theft and scams. A data removal service can help you remove all this personal information from the internet. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting  Cyberguy.com. Get a free scan to find out if your personal information is already out on the web:  Cyberguy.com. Some extensions overreach on purpose. A calculator tool asking for your browsing history or a weather app wanting your login data is a huge red flag. Before installing, ask: "Does this permission match the extension's job?" If the answer's no, don't install it. Watch out for broad permissions like "Read and change all your data on websites you visit" unless it's clearly justified (e.g., a password manager). If an update suddenly adds new permission requests, dig into why. It might mean the extension's been sold or hacked.If you've ever saved passwords in your browser (e.g., via the browser's built-in password manager or the "Save Password" prompt), those credentials could be at risk if a malicious extension was installed. These built-in managers store passwords locally or in your Google, Microsoft or Firefox account, and a compromised browser can give bad actors a way in.This doesn't typically apply to dedicated password manager extensions, which encrypt your data independently and don't rely on browser storage. However, if you're unsure whether an extension has been compromised, it's always smart to update your master password and enable two-factor authentication. For maximum safety, change your most important passwords (email, bank, shopping, cloud services) from a different, secure device, such as your phone or another computer where the questionable extension was never installed. Avoid using the same browser that may have been exposed. Then, consider switching to a password manager to create and store strong, unique logins going forward. Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at  Cyberguy.com.   10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026 Subtle changes often appear before obvious damage. Sudden redirects, new tabs opening on their own, unfamiliar search results, popups, slower browsing or websites asking you to re-log in unexpectedly can all signal a malicious or compromised extension. Pay attention if ads appear where they never did before or if your browser settings change without your input.Koi's investigation shows how attackers rely on patience. Once an extension earns trust and sits quietly for years, users stop watching it. That makes small behavior changes easy to miss. If something feels off, do not ignore it. Disable extensions one by one to identify the culprit. If the issue disappears, remove that extension permanently.When in doubt, trust your instincts. Browsers should not surprise you.DarkSpectre is a reminder that online threats are getting smarter and quieter. This was not a smash-and-grab attack. It unfolded slowly, over years, and relied on trust most people never think twice about. Koi analysts connected the dots by tracking shared infrastructure across campaigns, but they also warn that some sleeper extensions may still be installed and trusted today. Browser extensions can be helpful, but every extra add-on is another door into your browser. Paying attention, cleaning house now and then, and questioning what you install can make a real difference.When was the last time you checked what your browser extensions are really doing behind the scenes? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

How to send free digital invitations on iPhone

Creating invitations should feel easy, not stressful. Apple's Invites app makes it simple to create free digital invitations with built-in RSVP tools, even if your guests do not use iPhones.You can design the invite, track responses, and share photos after the event, all from your iPhone. Below is a clear step-by-step guide with exact instructions so you can get it right the first time.Oh, and if you want more options beyond Apple's Invites app, we also cover the best invitation apps for both iPhone and Android. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. HOW TO SHARE YOUR ESTIMATED ARRIVAL TIME ON IPHONE AND ANDROID Apple Invites keeps everything in one place. You design the invite, manage RSVPs and share memories without switching apps. You can:Before you start, confirm these basics. You need:Guests can view and RSVP without an iCloud+ subscription. The steps in this article were tested on an iPhone 15 Pro Max running iOS 26.2.First, install the Apple Invites app.Open the  Invites app after installation.You are now ready to build your invitation.If you have created invites before, tap the  plus icon in the top corner. Grant photo or camera access if prompted. Next, fill in the key information.If you add both a date and a location, the app automatically shows:You can add several optional features to enhance your invitation.Add a  Tile to bundle photos, playlists or links in one place by tapping  Add Tile Before sending, review everything. NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS Once your invitation is live, you can share it in two different ways.Guests who accept the invite will appear in your guest list.This option sends a unique link to a single guest.Guests can RSVP even if they do not own an iPhone.Once your invitation is live, you can share it in two different ways.Guests who accept the invite will appear in your guest list.This option sends a unique link to a single guest.Guests can RSVP even if they do not own an iPhone.You stay in control after sending.Your invitation appears on the app home screen under  Upcoming .Plans change, and edits are allowed. 5 BEST APPS TO USE ON CHATGPT RIGHT NOW If you host a recurring event, such as a book club, save time. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:  Cyberguy.com. Apple Invites makes event planning feel simple again. You can create free digital invitations, send them in seconds and track RSVPs without chasing people down. Everything lives in one place, from guest lists to shared photos, which saves time and reduces stress. Best of all, guests do not need an iPhone to respond. That makes Apple Invites practical for real life, not just Apple users. Whether you are planning a birthday, a family dinner, or a casual meetup, this app helps you focus on the event rather than the logistics.Would you consider replacing paper invites or group texts with Apple Invites, or are you still planning events the old way? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

Malicious Chrome extensions caught stealing sensitive data

Chrome extensions are supposed to make your browser more useful, but they've quietly become one of the easiest ways for attackers to spy on what you do online. Security researchers recently uncovered two Chrome extensions that have been doing exactly that for years.These extensions looked like harmless proxy tools, but behind the scenes, they were hijacking traffic and stealing sensitive data from users who trusted them. What makes this case worse is where these extensions were found. Both were listed on Chrome's official extension marketplace. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE rget=_new href="https://www.foxnews.com/category/tech" target="_blank" rel="noopener"> Researchers at Socket discovered two Chrome extensions using the same name, "Phantom Shuttle," that were posing as tools for proxy routing and network speed testing (via Bleeping Computer). According to the researchers, the extensions have been active since at least 2017.Both extensions were published under the same developer name and marketed toward foreign trade workers who need to test internet connectivity from different regions. They were sold as subscription-based tools, with prices ranging from roughly $1.40 to $13.60.At a glance, everything looked normal. The descriptions matched the functionality. The pricing seemed reasonable. The problem was what the extensions were doing after installation.Socket researchers say Phantom Shuttle routes all your web traffic through proxy servers controlled by the attacker. Those proxies use hardcoded credentials embedded directly into the extension's code. To avoid detection, the malicious logic is hidden inside what appears to be a legitimate jQuery library.The attackers didn't just leave credentials sitting in plain text. The extensions hide them using a custom character-index encoding scheme. Once active, the extension listens to web traffic and intercepts HTTP authentication challenges on any site you visit.To make sure traffic always flows through their infrastructure, the extensions dynamically reconfigure Chrome's proxy settings using an auto-configuration script. This forces your browser to route requests exactly where the attacker wants them.In its default "smarty" mode, Phantom Shuttle routes traffic from more than 170 high-value domains through its proxy network. That list includes developer platforms, cloud service dashboards, social media sites and adult content portals. Local networks and the attacker's own command-and-control domain are excluded, likely to avoid breaking things or raising suspicion.While acting as a man-in-the-middle, the extension can capture anything you submit through web forms. That includes usernames, passwords, card details, personal information, session cookies from HTTP headers and API tokens pulled directly from network requests.CyberGuy contacted Google about the extensions, and a spokesperson confirmed that both have been removed from the Chrome Web Store. 10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026 The step-by-step instructions below apply to Windows PCs , Macs and Chromebooks. In other words, desktop Chrome. Chrome extensions cannot be fully reviewed or removed from the mobile app.You can also type this directly into the address bar and press Enter:
chrome://extensionsGo through every extension listed and ask yourself:If the answer is no to any of these, take a closer look.Click  Details on any extension you are unsure about. Pay attention to:Proxy tools, VPNs, downloaders and network-related extensions deserve extra scrutiny.If something feels off, toggle the extension  off . This immediately stops it from running without deleting it. If everything still works as expected, the extension was likely not essential.To fully remove an extension:Unused extensions are a common target for abuse and should be cleaned out regularly.Close and reopen Chrome after making changes. This ensures disabled or removed extensions are no longer active. MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS You can't control what slips through app store reviews, but you can reduce your risk by changing how you install and manage extensions. Every extension increases your attack surface. If you don't genuinely need it, don't install it. Convenience extensions often come with far more permissions than they deserve.Reputable developers usually have a history, a website and multiple well-known extensions. Be cautious with tools from unknown publishers, especially those offering network or proxy features.Star ratings can be faked or manipulated. Look for detailed reviews that mention long-term use. Watch out for sudden waves of generic praise.If an extension asks to "read and change all data on websites you visit," take that seriously. Proxy tools and network extensions can see everything you do.A password manager won't stop a malicious extension from spying on traffic, but it can limit damage. Unique passwords mean stolen credentials can't unlock multiple accounts. Many managers also refuse to autofill on suspicious pages.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at  Cyberguy.com. Strong antivirus software can flag suspicious network activity, proxy abuse and unauthorized changes to browser settings. This adds a layer of defense beyond Chrome's own protections.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at  Cyberguy.com. This attack doesn't rely on phishing emails or fake websites. It works because the extension itself becomes part of your browser. Once installed, it sees nearly everything you do online. Extensions like Phantom Shuttle are dangerous because they blend real functionality with malicious behavior. The extensions deliver the proxy service they promise, which lowers suspicion, while quietly routing user data through attacker-controlled servers.When was the last time you reviewed the extensions installed in your browser? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Can AI chatbots trigger psychosis in vulnerable people?

Artificial intelligence chatbots are quickly becoming part of our daily lives. Many of us turn to them for ideas, advice or conversation. For most, that interaction feels harmless. However, mental health experts now warn that for a small group of vulnerable people, long and emotionally charged conversations with AI may worsen delusions or psychotic symptoms.Doctors stress this does not mean chatbots cause psychosis. Instead, growing evidence suggests that AI tools can reinforce distorted beliefs among individuals already at risk. That possibility has prompted new research and clinical warnings from psychiatrists. Some of those concerns have already surfaced in lawsuits alleging that chatbot interactions may have contributed to serious harm during emotionally sensitive situations. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.Psychiatrists describe a repeating pattern. A person shares a belief that does not align with reality. The chatbot accepts that belief and responds as if it were true. Over time, repeated validation can strengthen the belief rather than challenge it. OPINION: THE FAITH DEFICIT IN ARTIFICIAL INTELLIGENCE SHOULD ALARM EVERY AMERICAN  Clinicians say this feedback loop can deepen delusions in susceptible individuals. In several documented cases, the chatbot became integrated into the person's distorted thinking rather than remaining a neutral tool. Doctors warn that this dynamic raises concern when AI conversations are frequent, emotionally engaging and left unchecked.Mental health experts note that chatbots differ from earlier technologies linked to delusional thinking. AI tools respond in real time, remember prior conversations and adopt supportive language. That experience can feel personal and validating. For individuals already struggling with reality testing, those qualities may increase fixation rather than encourage grounding. Clinicians caution that risk may rise during periods of sleep deprivation, emotional stress or existing mental health vulnerability.Doctors say many reported cases center on delusions rather than hallucinations. These beliefs may involve perceived special insight, hidden truths or personal significance. Chatbots are designed to be cooperative and conversational. They often build on what someone types rather than challenge it. While that design improves engagement, clinicians warn it can be problematic when a belief is false and rigid.Mental health professionals say the timing of symptom escalation matters. When delusions intensify during prolonged chatbot use, AI interaction may represent a contributing risk factor rather than a coincidence. OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN Peer-reviewed research and clinical case reports have documented people whose mental health declined during periods of intense chatbot engagement. In some instances, individuals with no prior history of psychosis required hospitalization after developing fixed false beliefs connected to AI conversations. International studies reviewing health records have also identified patients whose chatbot activity coincided with negative mental health outcomes. Researchers emphasize that these findings are early and require further investigation. A peer-reviewed Special Report published in Psychiatric News titled "AI-Induced Psychosis: A New Frontier in Mental Health" examined emerging concerns around AI-induced psychosis and cautioned that existing evidence is largely based on isolated cases rather than population-level data. The report states: "To date, these are individual cases or media coverage reports; currently, there are no epidemiological studies or systematic population-level analyses of the potentially deleterious mental health effects of conversational AI."   The authors emphasize that while reported cases are serious and warrant further investigation, the current evidence base remains preliminary and heavily dependent on anecdotal and nonsystematic reporting.OpenAI says it continues working with mental health experts to improve how its systems respond to signs of emotional distress. The company says newer models aim to reduce excessive agreement and encourage real-world support when appropriate. OpenAI has also announced plans to hire a new Head of Preparedness, a role focused on identifying potential harms tied to its AI models and strengthening safeguards around issues ranging from mental health to cybersecurity as those systems grow more capable.Other chatbot developers have adjusted policies as well, particularly around access for younger audiences, after acknowledging mental health concerns. Companies emphasize that most interactions do not result in harm and that safeguards continue to evolve.Mental health experts urge caution, not alarm. The vast majority of people who interact with chatbots experience no psychological issues. Still, doctors advise against treating AI as a therapist or emotional authority. Those with a history of psychosis, severe anxiety or prolonged sleep disruption may benefit from limiting emotionally intense AI conversations. Family members and caregivers should also pay attention to behavioral changes tied to heavy chatbot engagement. I WAS A CONTESTANT ON 'THE BACHELOR.' HERE'S WHY AI CAN'T REPLACE REAL RELATIONSHIPS Mental health experts stress that most people can interact with AI chatbots without problems. Still, a few practical habits may help reduce risk during emotionally intense conversations.If emotional distress or unusual thoughts increase, experts say it is important to seek help from a qualified mental health professional. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz at  Cyberguy.com. rget=_new href="https://www.foxnews.com/category/tech/chatgpt" target="_blank" rel="noopener"> AI chatbots are becoming more conversational, more responsive and more emotionally aware. For most people, they remain helpful tools. For a small but important group, they may unintentionally reinforce harmful beliefs. Doctors say clearer safeguards, awareness and continued research are essential as AI becomes more embedded in our daily lives. Understanding where support ends and reinforcement begins could shape the future of both AI design and mental health care.As AI becomes more validating and humanlike, should there be clearer limits on how it engages during emotional or mental health distress? Let us know by writing to us at  Cyberguy.com. Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

OpenAI admits AI browsers face unsolvable prompt attacks

Cybercriminals don't always need malware or exploits to break into systems anymore. Sometimes, they just need the right words in the right place. OpenAI is now openly acknowledging that reality. The company says prompt injection attacks against artificial intelligence (AI)-powered browsers are not a bug that can be fully patched, but a long-term risk that comes with letting AI agents roam the open web. This raises uncomfortable questions about how safe these tools really are, especially as they gain more autonomy and access to your data. Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter.  NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY In a recent blog post, OpenAI admitted that prompt injection attacks are unlikely to ever be completely eliminated. Prompt injection works by hiding instructions inside web pages, documents or emails in ways that humans don't notice, but AI agents do. Once the AI reads that content, it can be tricked into following malicious instructions.OpenAI compared this problem to scams and social engineering. You can reduce them, but you can't make them disappear. The company also acknowledged that "agent mode" in its ChatGPT Atlas browser increases risk because it expands the attack surface. The more an AI can do on your behalf, the more damage it can cause when something goes wrong.OpenAI launched the ChatGPT Atlas browser in October, and security researchers immediately started testing its limits. Within hours, demos appeared showing that a few carefully placed words inside a Google Doc could influence how the browser behaved. That same day, Brave published its own warning, explaining that indirect prompt injection is a structural problem for AI-powered browsers, including tools like Perplexity's Comet.This isn't just OpenAI's problem. Earlier this month, the National Cyber Security Centre in the U.K. warned that prompt injection attacks against generative AI systems may never be fully mitigated. FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE OpenAI says it views prompt injection as a long-term security challenge that requires constant pressure, not a one-time fix. Its approach relies on faster patch cycles, continuous testing and layered defenses. That puts it broadly in line with rivals like Anthropic and Google, which have both argued that agentic systems need architectural controls and ongoing stress testing.Where OpenAI is taking a different approach is with something it calls an "LLM-based automated attacker." In simple terms, OpenAI trained an AI to act like a hacker . Using reinforcement learning, this attacker bot looks for ways to sneak malicious instructions into an AI agent's workflow.The bot runs attacks in simulation first. It predicts how the target AI would reason, what steps it would take and where it might fail. Based on that feedback, it refines the attack and tries again. Because this system has insight into the AI's internal decision-making, OpenAI believes it can surface weaknesses faster than real-world attackers.Even with these defenses, AI browsers aren't safe. They combine two things attackers love: autonomy and access. Unlike regular browsers, they don't just display information, but also read emails, scan documents, click links and take actions on your behalf. That means a single malicious prompt hidden in a webpage, document or message can influence what the AI does without you ever seeing it. Even when safeguards are in place, these agents operate by trusting content at scale, and that trust can be manipulated. THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS You may not be able to eliminate prompt injection attacks, but you can significantly limit their impact by changing how you use AI tools.Only give an AI browser access to what it absolutely needs. Avoid connecting your primary email account, cloud storage or payment methods unless there's a clear reason. The more data an AI can see, the more valuable it becomes to attackers. Limiting access reduces the blast radius if something goes wrong.Never allow an AI browser to send emails, make purchases or modify account settings without asking you first. Confirmation breaks long attack chains and gives you a moment to spot suspicious behavior. Many prompt injection attacks rely on the AI acting quietly in the background without user review. A password manager ensures every account has a unique, strong password. If an AI browser or malicious page leaks one credential, attackers can't reuse it elsewhere. Many password managers also refuse to autofill on unfamiliar or suspicious sites, which can alert you that something isn't right before you manually enter anything.Next, see if your email has been exposed in past breaches. Our #1 password manager (see  guy.com ) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at  guy.com Even if an attack starts inside the browser, antivirus software can still detect suspicious scripts, unauthorized system changes or malicious network activity. Strong antivirus software focuses on behavior, not just files, which is critical when dealing with AI-driven or script-based attacks.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at  guy.com Telling an AI browser to "handle whatever is needed" gives attackers room to manipulate it through hidden prompts. Be specific about what the AI is allowed to do and what it should never do. Narrow instructions make it harder for malicious content to influence the agent.When an AI browser scans emails, documents or web pages for you, remember that hidden instructions can live inside that content. Treat AI-generated actions as drafts or suggestions, not final decisions. Review anything the AI plans to act on before approving it.Security fixes for AI browsers evolve quickly as new attack techniques emerge. Delaying updates leaves known weaknesses open longer than necessary. Turning on automatic updates ensures you get protection as soon as they're available, even if you miss the announcement.There's been a meteoric rise in AI browsers. We're now seeing them from major tech companies, including OpenAI's Atlas, The Browser Company's Dia and Perplexity's Comet. Even existing browsers like Chrome and Edge are pushing hard to add AI and agentic features into their current infrastructure. While these browsers can be useful, the technology is still early. It's best not to fall for the hype and to wait for it to mature.Do you think AI browsers are worth the risk today, or are they moving faster than security can keep up? Let us know by writing to us at  guy.com Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my  CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

Robots learn 1,000 tasks in one day from a single demo

Most robot headlines follow a familiar script: a machine masters one narrow trick in a controlled lab, then comes the bold promise that everything is about to change. I usually tune those stories out. We have heard about robots taking over since science fiction began, yet real-life robots still struggle with basic flexibility. This time felt different. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. ELON MUSK TEASES A FUTURE RUN BY ROBOTS A new report published in Science Robotics caught our attention because the results feel genuinely meaningful, impressive and a little unsettling in the best way. The research comes from a team of academic scientists working in robotics and artificial intelligence , and it tackles one of the field's biggest limitations.The researchers taught a robot to learn 1,000 different physical tasks in a single day using just one demonstration per task. These were not small variations of the same movement. The tasks included placing, folding, inserting, gripping and manipulating everyday objects in the real world. For robotics, that is a big deal.Until now, teaching robots physical tasks has been painfully inefficient. Even simple actions often require hundreds or thousands of demonstrations. Engineers must collect massive datasets and fine-tune systems behind the scenes. That is why most factory robots repeat one motion endlessly and fail as soon as conditions change. Humans learn differently. If someone shows you how to do something once or twice, you can usually figure it out. That gap between human learning and robot learning has held robotics back for decades. This research aims to close that gap. THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST The breakthrough comes from a smarter way of teaching robots to learn from demonstrations. Instead of memorizing entire movements, the system breaks tasks into simpler phases. One phase focuses on aligning with the object, and the other handles the interaction itself. This method relies on artificial intelligence, specifically an AI technique called imitation learning that allows robots to learn physical tasks from human demonstrations.The robot then reuses knowledge from previous tasks and applies it to new ones. This retrieval-based approach allows the system to generalize rather than start from scratch each time. Using this method, called Multi-Task Trajectory Transfer, the researchers trained a real robot arm on 1,000 distinct everyday tasks in under 24 hours of human demonstration time.Importantly, this was not done in a simulation. It happened in the real world, with real objects, real mistakes and real constraints. That detail matters.Many robotics papers look impressive on paper but fall apart outside perfect lab conditions. This one stands out because it tested the system through thousands of real-world rollouts. The robot also showed it could handle new object instances it had never seen before. That ability to generalize is what robots have been missing. It is the difference between a machine that repeats and one that adapts. AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING This research addresses one of the biggest bottlenecks in robotics: inefficient learning from demonstrations. By decomposing tasks and reusing knowledge, the system achieved an order of magnitude improvement in data efficiency compared to traditional approaches. That kind of leap rarely happens overnight. It suggests that the robot-filled future we have talked about for years may be nearer than it looked even a few years ago.Faster learning changes everything. If robots need less data and less programming, they become cheaper and more flexible. That opens the door to robots working outside tightly controlled environments.In the long run, this could enable home robots to learn new tasks from simple demonstrations instead of specialist code. It also has major implications for healthcare, logistics and manufacturing.More broadly, it signals a shift in artificial intelligence. We are moving away from flashy tricks and toward systems that learn in more human-like ways. Not smarter than people. Just closer to how we actually operate day to day. Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com      Robots learning 1,000 tasks in a day does not mean your house will have a humanoid helper tomorrow. Still, it represents real progress on a problem that has limited robotics for decades. When machines start learning more like humans, the conversation changes. The question shifts from what robots can repeat to what they can adapt to next. That shift is worth paying attention to.If robots can now learn like us, what tasks would you actually trust one to handle in your own life? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

University of Phoenix data breach hits 3.5M people

The University of Phoenix has confirmed a major data breach affecting nearly 3.5 million people. The incident traces back to August when attackers accessed the university's network and quietly stole sensitive information.The school detected the intrusion on Nov. 21. That discovery came after the attackers listed the university on a public leak site. In early December, the university disclosed the incident, and its parent company filed an 8-K with regulators.The scope is large. Notification letters filed with Maine's Attorney General show 3,489,274 individuals were affected. Those affected include current and former students, faculty, staff and suppliers. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. DATA BREACH EXPOSES 400,000 BANK CUSTOMERS' INFO According to the university, hackers exploited a zero-day vulnerability in Oracle E-Business Suite. This application handles financial operations and contains highly sensitive data.Based on the technical details shared so far, security researchers believe the attack aligns with tactics used by the Clop ransomware gang. Clop has a long track record of stealing data through zero-day flaws rather than encrypting systems.The vulnerability tied to this campaign is tracked as CVE-2025-61882. Investigators say it has been abused since early August.The university says the attackers accessed highly sensitive personal and financial information. That includes:This type of data creates a serious risk. It can fuel identity theft, financial fraud and targeted phishing scams. 700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS In letters sent to affected individuals, the university confirmed the breach affects 3,489,274 people. If you are a current or former student or employee, watch your mail closely.These notifications often arrive by postal mail, not email. The letter explains what data was exposed and includes instructions for protective services.We reached out to the University of Phoenix for comment, and a rep provided CyberGuy with the following statement: "We recently experienced a cybersecurity incident involving the Oracle E-Business Suite software platform. Upon detecting the incident on November 21, 2025, we promptly took steps to investigate and respond with the assistance of leading third-party cybersecurity firms. We are reviewing the impacted data and will provide the required notifications to affected individuals and regulatory entities."The University of Phoenix is offering affected individuals free identity protection services. These include:To enroll, you must use the redemption code provided in the notification letter. Without that code, you cannot activate the service.The University of Phoenix breach is not an isolated case. Clop has used similar tactics in past campaigns involving GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo and Gladinet CentreStack.Other universities have also reported Oracle EBS-related incidents. These include Harvard University and the University of Pennsylvania.The U.S. government is taking notice. The U.S. Department of State is now offering a reward of up to $10 million for information linking Clop's attacks to a foreign government.Universities store massive amounts of personal data. Student records, financial aid files, payroll systems and donor databases all live under one roof.Like healthcare organizations, colleges present a high-value target. A single breach can expose years of data tied to millions of people. MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA If you believe you may be affected, act quickly. These steps can reduce your risk.Read it carefully. It explains what data was exposed and how to enroll in protection services.First, use the redemption code provided. Because Social Security and banking data are involved, credit monitoring and recovery services matter. Even if you do not qualify for the free service, an identity theft protection service is still a smart move.In addition, these services actively monitor sensitive details like your Social Security number, phone number and email address. If your information appears on the dark web or if someone tries to open a new account, you receive an alert right away. As a result, many services also help you quickly freeze bank and credit card accounts to limit further fraud.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com Because this breach exposed names, contact details and other identifiers, reducing what is publicly available about you matters. A data removal service can help remove your personal information from data broker sites, which lowers the risk of targeted phishing or fraud tied to the stolen University of Phoenix records.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com Get a free scan to find out if your personal information is already out on the web: Cyberguy.com Check bank statements and credit card activity for unfamiliar charges. Report anything suspicious immediately.A credit freeze can stop criminals from opening new accounts in your name. It is free and reversible. To learn more about how to do this, go to Cyberguy.com and search "How to freeze your credit." Expect more scam emails and phone calls. Criminals may reference the breach to sound legitimate.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com Keep your operating systems and apps up to date, as attackers often exploit outdated software to gain access. In addition, enable automatic updates and review app permissions to prevent stolen personal data from being combined with device-level access and causing further harm.The University of Phoenix data breach highlights a growing problem in higher education. When attackers exploit trusted enterprise software, the fallout spreads fast and wide. While free identity protection helps, long-term vigilance matters most. Staying alert can limit damage long after the headlines fade.If universities cannot protect this level of sensitive data, should students demand stronger cybersecurity standards before enrolling? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

You can finally change your Gmail address without losing data

For years, one of the most frustrating limits inside the Google ecosystem was simple but painful. You could not change your primary Gmail address without creating a brand-new account. That meant losing history, purchases and years of saved data. That is now changing.Google has started rolling out a feature that lets people replace their existing @gmail.com address with a new one. Even better, everything tied to the account stays exactly where it is.Given that Gmail has close to 2 billion active accounts, this update affects almost everyone. It also helps people who stopped using an old Gmail address tied to a past job, a move or a major life change. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. HOW TO STOP GOOGLE AI FROM SCANNING YOUR GMAIL Many people created their Gmail addresses years ago. Some picked usernames that no longer feel professional. Others tie an address to a relationship, employer or location that no longer applies.Until now, Google treated Gmail usernames as permanent. The only workaround involved creating a new account and manually rebuilding everything. This update removes that burden. You can refresh your digital identity without starting over.If your account ends in @gmail.com, you may now be able to replace it with a brand-new @gmail.com address.Here is what stays the same:Your old email address does not disappear. Google automatically converts it into an alias. That means messages sent to both addresses arrive in the same inbox. You can also sign in using either email. NEW GMAIL TOOL MAKES IT EASY TO UNSUBSCRIBE FROM EMAILS IN BULK Google added limits to prevent abuse and confusion. Once you change your Gmail address, you cannot create another new Gmail address on that same account for 12 months. You can switch back to your original address at any time.There are also a few areas where friction may occur. If you use Sign in with Google on third-party websites, you may need to sign in again. Chromebook users and Chrome Remote Desktop users may need to re-authenticate. Before making the switch, Google recommends backing up critical data and reviewing connected apps.Google is rolling this feature out gradually, so it may not appear on every account yet.Google may test different layouts, so wording can vary slightly by accountTo check your account:If you see the option, you can check availability and choose a new Gmail username. If the option does not appear, the feature has likely not yet reached your account. Accounts managed by schools, workplaces or organizations usually require administrator approval.An alias is an additional email address that delivers messages to the same inbox. With this update, your old Gmail address becomes an alias automatically. Aliases are useful beyond Gmail. They help you keep access to old contacts while presenting a cleaner primary address going forward. They also reduce disruption when changing emails across services. If you want to change your email address on other platforms, aliases are often the safest option. CYBERSECURITY EXPERT REVEALS SIMPLE TRICK TO STOP COMPANIES FROM TRACKING YOUR ONLINE SHOPPING Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address. Steps to create an alias: Once added, you can send emails using your alias by selecting it in the "From" field when composing a new message. Important limitations to note: Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here's how to create one:It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.Hide My Email is a feature available with iCloud+ that allows you to create unique, random email addresses that are forwarded to your personal email account. This helps keep your real email address private when filling out forms, signing up for newsletters or sending emails. Here's how to set up Hide My Email:You can also generate Hide My Email addresses directly in Safari, Mail and supported third-party apps by tapping the email address field and selecting Hide My Email above the keyboard.Note that Hide My Email has limitations. You need an iCloud+ subscription to use Hide My Email. This feature is not available with the free iCloud plan. While there is no official limit on the number of aliases you can create, some people have reported creating hundreds of addresses without issue. Hide My Email works with iCloud+, Apple Pay and the Mail app. Support for other apps and services is expanding but may not be available for all. Some people have reported occasional issues with email deliverability when using Hide My Email addresses. Managing multiple aliases can become cumbersome, especially if you need to deactivate or update them frequently. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com Take my quiz: How safe is your online security? Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here: Cyberguy.com      This Gmail update fixes a problem people have complained about for years. It finally gives you flexibility without forcing a fresh start. Your files, photos and purchase history stay put. At the same time, you get to move on from an email address that no longer fits your life. That kind of upgrade is rare in a digital world that often makes you choose between convenience and control.If you could redesign your online identity today, would you finally retire the email address you created years ago? Let us know by writing to us at Cyberguy.com Sign up for my FREE CyberGuy Report  Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.

DeSantis says Florida can regulate AI despite Trump's executive order: 'We have a right to do this'

IN TODAY'S NEWSLETTER:- DeSantis says Florida can regulate AI despite Trump's executive order: 'We have a right to do this'- AI-powered bat tracking could give baseball players the edge - Trump admin will recruit 1,000 technologists for elite 'Tech Force' to modernize government DESANTIS VS. DONALD: Florida Gov. Ron DeSantis, a Republican, said on Monday that state officials have the right to regulate artificial intelligence despite President Trump's recent executive order aiming to require a national AI standard the president argues would overrule state laws. TECH HOME RUN: Baseball teams have long searched for a way to study the entire swing without sensors or complex lab setups. Today, a new solution is entering the picture. Theia, an AI biomechanics company, debuted a commercially available video-only system that analyzes bat trajectory and full-body biomechanics together. This new approach works in real baseball environments and needs no reflective body markers, wearables or special equipment. TECH FORCE: The Trump administration launched a new initiative Monday aimed at recruiting top-tier technical talent to accelerate the adoption of artificial intelligence (AI) at the federal level.   HANDS-FREE TECH: Chrome on Android now offers a fresh way to digest information when your hands are busy or your eyes need a break. A new update powered by Google Gemini can turn written webpages into short podcast-style summaries. Two virtual hosts chat about the content, making it feel easier to follow during your commute or while you multitask. 'MORE USABLE': OpenAI announced an update for ChatGPT Images that it says drastically improves both the generation speed and instruction-following capability of its image generator. EYES TO THE FUTURE: Artificial intelligence (AI) is charging into a new phase in 2026 - one that could reshape business operations, global competition and even which workers thrive, according to Goldman Sachs' Chief Information Officer Marco Argenti. Facebook
Instagram
YouTube
X
LinkedIn Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health Fox News Go Fox Nation Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Distributed by aarss.com.