A new security seal of approval is coming to your smart home gadgets
The
White House
has unveiled a groundbreaking initiative to enhance the security of internet-connected devices in American homes. The U.S. Cyber Trust Mark, a new cybersecurity safety label, is set to appear on smart products sold in the United States later this year. This program aims to help you make informed decisions about the safety of the smart devices you bring into your home.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
The U.S.
Cyber Trust Mark
is a label designed for consumer smart devices, including home security cameras, TVs, internet-connected appliances, fitness trackers, climate control systems and baby monitors. This mark signals that a device meets a set of security features approved by the National Institute of Standards and Technology (NIST).Vendors can label their products with the Cyber Trust Mark logo if they meet NIST's cybersecurity criteria. These criteria include:
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Consumers will be able to scan a
QR code
next to the Cyber Trust Mark label to access additional security information. This information includes:
ARE DATA BROKERS ENDANGERING YOUR RETIREMENT SECURITY?
There is a growing concern about cybercriminals remotely
hacking into home security systems
and malicious actors tapping into insecure home cameras. With the average U.S. household having 21 connected devices, according to a Deloitte study, the threat of cyberattacks is increasingly significant.
BEWARE OF THESE DOORBELL CAMERAS THAT COULD BE COMPROMISED BY CYBERCRIMINALS
The program is set to launch in 2025. Companies will soon be able to submit their products for testing to earn the label, and major retailers like Best Buy
and Amazon
have committed to highlighting labeled products. The program has garnered support from major electronics, appliance and consumer product makers, including Amazon, Google, Best Buy, LG Electronics U.S.A., Logitech and Samsung Electronics.While the U.S. Cyber Trust Mark aims to cover a wide range of smart home gadgets, not everything in your tech arsenal will be sporting this new seal of approval. Here's a rundown of what's left out:
GET FOX BUSINESS ON THE GO BY CLICKING HERE
And here's a surprise: Your trusty personal computer, smartphone and router won't be getting the Cyber Trust Mark either, at least not yet. The program is kicking off with wireless consumer IoT products, but who knows? It might grow to include more devices down the road. For now, NIST is cooking up some cybersecurity rules for those consumer-grade routers we all rely on.So, while you might not see the Cyber Trust Mark on everything in your tech toolkit, it's a solid start in making our connected homes a bit safer from digital ne'er-do-wells.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
HACKED CHROME EXTENSIONS PUT 2.6 MILLION USERS AT RISK OF DATA LEAK
The U.S. Cyber Trust Mark is a game-changer for you and me as consumers in our hyper-connected world. Let's face it: Understanding device security can be a headache. But this program cuts through the tech jargon, giving us clear, easy-to-grasp info about the gadgets we're considering bringing into our homes.How do you think the U.S. Cyber Trust Mark will impact your future purchasing decisions for smart home devices? Will you actively look for this label when shopping for new gadgets? Let us know what you think by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
10 tech upgrades to save your time, privacy and money this year
At its best,
today's tech
makes life easier. The trick is, you need to know the insider secrets. Luckily you have me.
Win a pair of $329 Ray-Ban Meta smart glasses.
Enter here
, no purchase necessary!
Here's one to make your AI results better.
With ChatGPT
or any other, the more constraints you give, the better your answer. It's called priming. Examples: "Limit your response to 250 words," "Give me the list in bullet points" and "Format the results as a table."Sweet. Let's keep going with 10 more tips and tricks.
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
1. Ctrl + Z (undo) isn't just for Word docs
Did you accidentally delete an email, close a browser tab or move a file?
Ctrl
+
Z
on a PC (
Cmd
+
Z
on a Mac) is the universal lifesaver. Use it everywhere, from editing spreadsheets to undoing changes in most apps. It's a superpower.
2. Screenshots for the win
Forget scrambling for a pen and paper - just take a screenshot! Whether it's a recipe, directions or an annoying error message, capturing your screen can save time and frustration. On your PC, hold down your
Windows key
+
Shift
+
S
. On a Mac, it's
Cmd
+
Shift
+
4
.
I have more time-saving keyboard tricks here.
3. Use your voice more
You'll be surprised by what you can tell your phone to do. For starters, forget fumbling for an app. Just say, "Hey, Siri, open Instagram" or, for
Google Assistant
, "Open Spotify." You can also tell your assistant to call someone in your contacts, set a reminder, take a photo, convert milliliters to ounces, turn on the flashlight, flip a coin - the list goes on.
Pro tip for voice texting:
To delete the last word you dictated, say, "Delete the last word." To delete the last sentence, say, "Clear sentence." If you want to get rid of everything you just said, say, "Clear all."
DON'T SCAM YOURSELF WITH THE TRICKS HACKERS DON'T WANT ME TO SHARE
4. Because you never have a pen
Snap a pic with your phone's camera, and you can copy, search or translate the text.
On iPhone:
Open the image in Photos. Tap and hold the text and select an option.
On Android:
Open a pic in Google Photos, then tap on the
Lens icon
. Select the
text
, then tap the action you want to take.
Phone photos a mess? How to delete duplicates
5. Bring your old laptop back to life
Install
ChromeOS Flex
, a free, cloud-based operating system. With processing done on Google's servers and a bare-bones interface, you'll get surprisingly good performance. Your PC needs to meet these minimum specs: x64 CPU, 4GB of RAM, 16GB of storage and a USB port for installation.
6. Calling back a random number?
Hide yours first. Punch in
star,
6
and
7
, followed by the number you're calling, and that's it. The caller will see "Private" or "Blocked." If you want your number hidden all the time, change the settings on your smartphone. On
an iPhone
, tap
Settings
>
Phone
>
Show My Caller ID
. Toggle it
Off
. On Android, the option is called
Hide Number
.
7. Instant podcasts about anything
Google's NotebookLM
lets you upload audio files, notes, documents or anything else, then search them, find citations (from your own docs) or produce a snazzy podcast you can listen to. It's impressive. Reader Bob told me after he heard about it on my show, he used it to create training modules for his employees.
Grandfluencers: Folks trading retirement for internet fame
8. Track the kids
Apple AirTags
(iOS) or
Tile trackers
(Android) let you keep tabs on your little ones. Attach a tracker to their backpack, shoelaces or belt loop.
Pro tip:
At somewhere very public, like a Disney park, give your child's tracker a unique name, like "Buzz Lightyear." That way, if someone gets a "Tracker Nearby" alert, your child's name won't pop up.
9. Every mail has its day
It's a game-changer for staying organized. In
Apple Mail
on your iPhone or iPad, compose your email as usual, then tap and hold
Send
. You'll see options like "Send Later," where you can select a specific date and time for delivery. In Gmail, after drafting your email, click the small arrow next to the
Send
button and select
Schedule Send
.
10. Stop getting lured in at the grocery store
With an Amazon Prime account, you get access to a rotating library of popular magazines for free.
Check them out here.
Now you can read the latest weird royal rumors without paying for the magazine.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Does your Windows 11 PC keep restarting? Let's fix that frustrating problem
Experiencing a Windows 11 boot loop can be incredibly frustrating, transforming your computer into a seemingly endless cycle of restarts that disrupts productivity. When your system continuously fails to load the login screen and instead repeatedly attempts to restart, you're facing a critical technical issue that demands immediate attention.This persistent reboot problem can stem from various causes. So, what do you do? Let's look at some ways to diagnose and resolve the Windows 11 boot loop, helping you restore your computer's functionality and get back to work.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
There's no single cause for a Windows 11 PC getting stuck in a reboot loop. A reboot loop can be caused by an issue with your computer's power supply, a
malware infection
, overheating or even hardware drivers. Here are the different things to check if your Windows 11 laptop or desktop keeps restarting.When you are troubleshooting any problem on your PC, you should boot your computer in safe mode. If your PC is in safe mode and no longer experiences the restart loop, this means that the default Windows 11 settings and drivers aren't causing the issue. This allows you to narrow down the sources of problems causing your Windows 11 PC to crash, making it easier to troubleshoot. Here's what you need to do to boot in safe mode:When your computer restarts, it will automatically restart in safe mode. If your computer restarting is making it difficult to follow these steps, you can also follow these steps at the sign-in screen:Now, when your PC restarts, you will be presented with a list of options. Select
4
or
F4
to start your PC in safe mode. If you need to use the internet while the computer is in safe mode, you can select option
5
or press
F5
.
WINDOWS 11 TIPS AND TRICKS YOU DIDN'T KNOW YOU NEEDED
If your automatic rebooting problem began after installing a new app, uninstall that app and monitor your PC. If you still notice your PC restarting, there's a chance that the app has infected your system settings before you uninstalled it. To fix this, you'll need to restore the system. To do a system restore, you should first boot your PC in safe mode and then follow these steps:An overheating laptop or desktop will try to prevent damage to critical hardware components by shutting itself down. This is one of the leading causes of a Windows 11 PC getting stuck in a restart loop. If you've noticed your desktop giving off a lot more heat than usual or a laptop feeling hot to the touch, chances are you have an overheating issue.A computer's CPU and GPU generate the most heat, so I recommend monitoring those hardware pieces to see if they are overheating. You don't need any additional software to monitor the temperatures of your GPU, as
some
temperature readings are built into Windows 11. Here's how to check your hardware temperatures in Windows 11:Unfortunately, the built-in temperature reading doesn't read your CPU temperature, and you'll need to manually go into the UEFI/BIOS to check the temperature without installing any additional software. However, there's a multitude of free-to-use apps that manufacturers have developed to measure your CPU temperature, including Core Temp, HWMonitor or Open Hardware Monitor.When you open one of these monitoring tools, you'll be able to view your PC's stats, including CPU and GPU temperatures and loads. If your CPU or GPU is running too hot, try cleaning the components to remove dust. For custom-built desktops, adding more exhaust fans to the case can improve airflow and cooling. Persistent overheating, especially in older laptops, may indicate that it's time to consider upgrading your machine.
TAKE YOUR WINDOWS PC'S SECURITY TO THE NEXT LEVEL
A computer will randomly restart when it has a failing power supply unit (PSU). If you have an issue with your power supply, you'll know if your computer won't restart or turn on. In addition to causing shut-offs and restart loops, a faulty power supply can also cause a blue screen of death error. In severe cases, you might even smell a burning scent or witness smoke coming from your PC's power supply exhaust vent. If you use a laptop with PSU issues, you cannot send your computer to a repair shop or the manufacturer for repair.Desktop PC owners have it a bit easier, assuming they have a pre-built PC that can be altered easily. If you do have a desktop, turn off and unplug your computer before going into the case to investigate if dust build-up is affecting your PSU. If your PSU fails, you must purchase and install a new one.Malware and other viruses are a common cause of a crashing or constantly restarting PC. The easiest way to do this is by using strong antivirus software.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.If your computer is stuck rebooting, you may need to boot in safe mode in order to run an antivirus application. Here's what you need to do to boot your PC in safe mode with Windows 11:Now, your computer should act more stable after booting in safe mode, allowing you to run an antivirus scan.
10 USEFUL WINDOWS KEYBOARD SHORTCUTS YOU NEED TO KNOW
If you have automatic restart enabled in Windows 11, your PC will restart every time it encounters a system failure. You can easily disable this future within the Windows 11 command prompt. Here's what you need to do:Keep in mind this isn't a fix for the problem, but it will help you further troubleshoot the restart loop problem by disabling automatic restarts.An issue with your Windows 11 system files may be causing your PC to constantly restart. If you think a corrupted system file is why your PC keeps restarting, there's a quick and easy fix you can do within the Windows Powershell. The System File Checker (SFC) is a built-in tool that will scan your Windows system files for corruption or any other changes. If a system file has been modified, it will automatically replace the file with the correct version. Here's how to run the SFC command:If there's no problem with your Windows system files, after the scan, you'll see a message that says, "Windows Resource Protection did not find any integrity violations." If you instead see a message saying, "Windows Resource Protection found corrupt files but was unable to fix some of them," you should try running SFC again but in safe mode.Your PC might be restarting itself because it doesn't have access to enough random access memory (RAM). Windows 11 may become unstable without enough RAM in your computer, causing the OS to randomly reboot. You can use the built-in Memory Diagnostics Tool in Windows 11 to check your computer for issues related to RAM. Here's what you need to do:When your PC restarts, the Windows Memory Diagnostics Tool will check for any RAM-related issues; if the test detects an error, take note of the error code. You can check the error code online to find the correct fix for that specific error.These are the best fixes for a computer that is constantly restarting. While you can perform these fixes at home, it might be your best bet to send your computer to a repair shop or back to the manufacturer if you continue having an issue with your Windows 11 PC being stuck in a restart loop after these fixes. It also may be time to invest in a new laptop if you are experiencing a system slowdown and random restarting on your Windows 11 PC, but I would recommend trying to fix the problem first before buying a new machine.What was the most challenging computer technical issue you've ever encountered, and how did you resolve it? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Sony's surprising entry into electric vehicle market
Sony has officially entered the electric vehicle (EV) market with its new model, the Afeela 1. This innovative vehicle, developed in partnership with Honda, aims to redefine the driving experience by integrating advanced technology and entertainment features. Unveiled at CES 2025, the Afeela 1 is now available for preorder, marking a significant milestone in Sony's expansion beyond consumer electronics into the automotive industry.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
Equipped with a powerful 482 hp all-wheel-drive powertrain, the Afeela 1 features a 91 kWh battery that offers an EPA-estimated range of 300 miles. It supports fast charging at 150 kW and is compatible with Tesla's Supercharger network, providing convenience for long-distance travel.
EV PARADISE OR CHARGING HELL? ALARMING ELECTRIC CAR SECRET EXPOSED
The Afeela 1 boasts an impressive array of 40 sensors and cameras, enabling Level 2+ ADAS features. These systems include lidar assistance for tasks like automated parking and real-time environmental monitoring. The vehicle's AI processing capabilities allow it to perform up to 800 trillion operations per second, paving the way for future updates that may enhance its autonomous driving capabilities.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
emphasizes creating an interactive experience within the Afeela 1. The car features:Moreover, certain functionalities will be available through a subscription model after an initial three-year complimentary period.
IS THIS PINT-SIZED VEHICLE ABOUT TO BE A BIG DISRUPTOR IN THE US?
The design of the Afeela 1 focuses on comfort and aesthetics. Its interior is crafted from high-quality materials, including plant-derived and recycled components. The cabin is optimized for entertainment, featuring strategically placed displays and noise-canceling technology to enhance the passenger experience.
SETTING UP APPLE CARPLAY ADAPTERS: STEPS AND TOP RECOMMENDATIONS
The Afeela 1 is available in two trims: the Origin, which starts at $89,900, and the Signature, priced at $102,900. Currently, preorders are open exclusively for California residents, requiring a refundable reservation fee of $200. The Signature variant is expected to ship in mid-2026, while the Origin will follow in 2027.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Sony's entry into the electric vehicle market with the Afeela 1 represents a significant shift towards integrating technology and mobility. With its high-performance specs, advanced driver assistance systems and focus on entertainment, it aims to appeal to tech-savvy consumers looking for more than just transportation.What features are most important in an electric vehicle, and how will that affect your decision to purchase one? Let us know what you think by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
How to manage photos, videos on new laptop with limited space
We recently received an email from Sylvia, who just got a new laptop that has significantly less space than her old laptop. She emailed us wondering how to store photos and videos on a computer with only 82GB of storage space:"
The newer laptop does not have as much storage space (indicates 82.1 GB free of 225GB) as the old one (indicates 322 GB free of 446 GB). What is the best way to store my photos and videos to free up space on the new laptop?"
Great question, Sylvia. This is a common issue for anyone who has purchased a lightweight laptop such as a Chromebook or Windows-based ultrabook. Fortunately, there are a few easy ways to store files off your hard drive.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
82 GB should be more than enough for basic tasks like web browsing, using office applications or streaming video. However, if you plan to store large files such as high-resolution photos, videos or games, or if you're using software that requires a lot of space, 82GB might fill up quickly. Here's a rough breakdown of how much space different types of files typically take:It's also important to leave enough space on your computer for the operating system to run smoothly. As a rule, keep at least 10%-15% of your hard drive free to prevent application slowdowns. An
external hard drive
is an excellent option for storing photos and videos to free up space on your new laptop. Another great way to save space is by storing your photos in
cloud storage
. Whether it's a hard drive or cloud space, having a backup is a good idea.As you can see from the breakdown above, photos and videos can take up a significant amount of storage space on your laptop. If you are a photographer who deals with RAW images, this amount could be even higher, as with video professionals who work with 4K content.Even if you're not a video professional or photographer, having a lot of home videos and photographs can take up a lot of space. You will need a secondary storage solution with less than 100GB of space left. Here are a few options you might consider.
BEST LAPTOPS FOR 2025
An
external hard drive
is one of the most practical and reliable solutions for expanding your laptop's storage capacity, especially if you have many media files like photos, videos or other data-intensive content. These portable storage devices connect to your computer via USB (and increasingly via USB-C for faster transfer speeds), offering the flexibility of storing and backing up massive amounts of data without consuming your laptop's internal space.There are two main types of external hard drives:
HDD (hard disk drive)
and
SSD (solid state drive)
. HDDs are typically more affordable and come in larger capacities (up to several terabytes), making them an excellent option for those needing vast storage space on a budget. However, their mechanical components make them slightly slower in data transfer speeds and more prone to physical damage.SSDs, on the other hand, are faster, more durable and lighter, though they tend to be more expensive per gigabyte of storage than HDDs. SSDs are ideal if you frequently transfer large files, work with high-resolution media like 4K videos or require speedy access to your data. They are also less prone to damage from drops or movement, which makes them perfect for on-the-go use.External hard drives come in various sizes, from modest capacities like 256GB to massive options exceeding 10TB. The amount of storage you need will depend on the types of files you're dealing with. For example, a 1TB drive can store over 200,000 high-resolution images if you need space for photos. A larger capacity drive might be necessary for video files, especially HD or 4K, as these files can easily consume tens or even hundreds of gigabytes.
BEST DESKTOPS COMPUTERS FOR 2025
One key advantage of external hard drives is their portability. Compact and easy to carry, they provide an excellent solution for photographers, videographers or anyone needing access to large files while moving. Some models are designed to be ultra-durable, with rugged, shockproof and waterproof features, ideal for outdoor and travel use.Many professionals label and organize their drives by project or period, allowing for easy archiving and retrieval. As mentioned earlier, a simple organizational system, such as labeling your drives with the dates or types of content they contain, can help keep your data structured and easily accessible. This is especially important when you accumulate multiple drives over time.
See Kurt's picks for the best external hard drives here
.Cloud storage services like
Google Drive
,
Dropbox
and
Microsoft OneDrive
offer convenient, flexible options for storing large files without consuming your laptop's limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance,
Google Drive
offers 15GB of free storage shared across Google services, while
Dropbox
provides 2GB for free with options to upgrade for more space.
OneDrive
provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage. They enhance productivity and allow seamless file sharing with friends, family or colleagues.Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would always be best to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe.
Kurt's favorite cloud services can be seen here
.
iCloud
offers 5GB of free storage to all users, which is sufficient for basic services like iCloud Keychain, testing other features and storing some files. However, for users who need more storage, iCloud+ subscriptions are available.
These plans include
:iCloud is tightly integrated with Apple devices, making it highly convenient for Apple users. Files stored on the desktop and in documents folders on Macs are automatically synced to iCloud Drive, which is especially useful for devices with limited storage space like the MacBook Air. iCloud Drive can also be accessed from Windows machines through a dedicated file folder and files can be managed via icloud.com.iCloud provides robust automatic syncing and backup features. iCloud Backup automatically backs up important data on iPhones and iPads when connected to power and Wi-Fi, ensuring that your device's data is always up to date. This backup can be used to restore your device or set up a new one seamlessly.iCloud uses 128-bit AES encryption to secure all files. Additionally, iCloud+ subscriptions include advanced privacy features such as iCloud Private Relay, which protects your browsing history and identity, Hide My Email, which generates random email addresses, and Custom Email Domains for personalized email addresses.While iCloud is highly user-friendly for Apple users, it can be less reliable and glitchy for non-Apple users. Collaboration is limited to Apple users, but files can be shared and accessed across different Apple devices using the Files app on iOS and iPadOS, the Finder on Mac or File Explorer on Windows PCs.
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
When storing your photos, videos and other important files, it's crucial to prioritize data security. Here are some essential steps to protect yourself and your valuable information.1)
Use strong passwords:
Create unique, complex passwords for all your accounts and devices. Consider using a
password manager
to generate and store secure passwords.2)
Enable encryption:
Encrypt
your external hard drives and cloud storage accounts to add an extra layer of protection to your data.3)
Implement two-factor authentication (
2FA
)
: Enable 2FA on all accounts that offer this feature, especially for cloud storage services.4)
Install and maintain strong antivirus software
: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.5)
Regularly update your operating system and applications
: Keep your devices and software
up to date
to ensure you have the latest security patches.6)
Be cautious with public Wi-Fi
: Avoid accessing sensitive information when connected to
public networks
or use a VPN for added security. Using a
VPN (virtual private network) service
can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don't directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your
Windows, Mac, Android and iOS devices
.7)
Back up your data regularly
: Create
multiple
backups
of your important files, including at least one offline copy.8)
Use secure file transfer methods
: When sharing files, use encrypted transfer methods or
password-protected links
.By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Managing storage on a laptop with limited space requires thoughtful planning, especially when dealing with large files like photos and videos. While 82GB may be sufficient for basic tasks, media files can quickly add up. By leveraging external hard drives or cloud storage services, you can keep your laptop running efficiently while ensuring that your important files are safely stored and accessible. Whether you opt for physical or cloud-based solutions, remember to prioritize data security using strong passwords and encryption where necessary. With the right strategy, you can make the most of your laptop's storage without sacrificing performance or losing precious memories.Do you have a way of storing photos and videos that we didn't mention? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Chinese electric hypercar jumps over spikes, potholes while driving itself
The Yangwang U9 has become a sensation in the automotive world, not just for its impressive specifications but also for its remarkable capabilities. This electric hypercar from BYD's premium Yangwang brand boasts a staggering 1,287 horsepower and has recently been showcased performing extraordinary feats of autonomous driving.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
Launched with a price tag of approximately $236,000, the Yangwang U9 is designed to redefine performance in the electric vehicle sector. Equipped with four independent electric motors, it delivers an astonishing 1,287 hp and 1,680 Nm of torque, allowing it to accelerate from 0 to 60 mph in just 2.36 seconds. The vehicle's top speed reaches an impressive 243.54 mph, making it one of the fastest electric cars on the market today.
CHINESE AUTO GIANT WANTS TO MAKE FLYING CARS YOUR NEXT COMMUTE OPTION
One of the standout features of the U9 is its DiSus-X suspension system, which enables the car to adjust its height dynamically. This system combines Intelligent Damping Body Control with Intelligent Hydraulic Body Control, allowing for real-time adjustments that enhance handling and stability. During recent demonstrations, the U9 showcased its ability to autonomously navigate obstacles such as potholes and road spikes while maintaining high speeds.
BEST CAR ACCESSORIES
TOP 13 EMERGENCY CAR ESSENTIALS
In a recent demonstration, the U9 was seen autonomously jumping over various obstacles at speeds up to 74.5 mph. The car successfully cleared an 8-foot water-filled pothole and a stretch of metal spikes without any human intervention, highlighting the advanced autonomous driving technology integrated into this hypercar. This capability raises questions about the future of driving. How much autonomy can we expect from vehicles? Will jumping capabilities become standard in future models?With its unique features and performance metrics, the Yangwang U9 challenges traditional notions of what hypercars can achieve. However, there remains uncertainty about whether these jumping capabilities will be available to consumers or if they are merely a marketing gimmick.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
angwang U9 is a testament to BYD's commitment to innovation in electric vehicles. As we witness advancements like autonomous driving and dynamic suspension systems, it's clear that the future of automotive technology is rapidly evolving. The U9 may just be the beginning of a new era where hypercars not only deliver speed but also redefine mobility.What do you think about the integration of autonomous features in high-performance vehicles? Let us know what you think by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
How to stop robocalls on your flip phone
Robocalls can be a real headache
, no matter what type of phone you use. If you're like many people who prefer the simplicity of a flip phone, you might be wondering how to tackle this issue. Donna reached out to us with a simple but great question, asking, "Is there a way to eliminate robocalls from a flip phone?"We've reported extensively on how to stop spam calls from coming to your smartphone, but what if you don't like using a smartphone and prefer a flip phone? While flip phones are generally harder to block spam calls from, it's not impossible, but it's not as easy as dealing with robocalls on your smartphone.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
rget=_new href="https://www.foxnews.com/tech/what-is-ai-artificial-intelligence" target="_blank" rel="noopener">
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Dealing with robocalls on a
flip phone
can be challenging, but you can take a few steps to minimize them. You'll have to make some phone calls, so it won't be as simple as blocking spam callers on a smartphone. But if you're willing to place a few phone calls and do some extra work, you can live happily without spam calls on your flip phone. Here are the steps you can take:
1. Avoid answering unknown numbers:
If you don't recognize the number, let it go to voicemail. Legitimate callers will leave a message.
2. Be cautious with your number
: Be mindful of where you share your phone number to reduce the chances of it being added to robocall lists.
3. Register on the Do Not Call List:
Register your phone number on the
National Do Not Call Registry
. This can help reduce the number of legitimate telemarketing calls you receive. You can register a phone number with the National Do Not Call Registry online at donotcall.gov or by calling 1-888-382-1222 from the phone you want to be registered with the Do Not Call Registry.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
rget=_new href="https://cyberguy.com/privacy/an-alarming-spike-in-scam-calls-originating-from-robocalls/" target="_blank" rel="nofollow noopener">
AN ALARMING SPIKE IN SCAM CALLS COMING FROM ROBOCALLS
4. Contact your carrier:
Many carriers offer
call-blocking services
. Contact your carrier (e.g., Verizon, AT&T, T-Mobile) and ask if they provide robocall-blocking features for flip phones. Many carriers do, but it depends on the brand of flip phone you have and which carrier you have.
5. Manual call blocking:
If your flip phone has the option, you can manually block specific numbers. Check your phone's user manual for instructions on how to do this. While this feature is common with all smartphones, many newer flip phones can also manually block callers, but, as we mentioned, you'll need to check your instruction manual.
END OF ANNOYING ROBOCALLS? FTC CRACKS DOWN ON DECEPTIVE PRACTICES
6. Report robocalls to the FTC:
Report unwanted calls to the Federal Trade Commission (FTC). This helps authorities track and take action against robocalls. While this method doesn't block robocalls from calling your flip phone, it does help the FTC locate robocalls and prevent them from calling. It's a good way to help the FTC fight back against robo-spam callers. Here's what you need to do to report a robocall to the FTC:
7. Consider using a data removal service:
Regrettably, there is a high probability that your phone number is readily available on many lists sold by data brokers to hundreds of people search websites. However, removing it from the web can reduce the likelihood of spammers and telemarketers obtaining your number and contacting you.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
Robocalls can be a real nuisance, especially for flip phone users. To tackle this issue, consider registering your number on the National Do Not Call List and avoid answering unknown numbers. Additionally, check with your carrier for any call-blocking services it may offer. With a few proactive steps, you can significantly reduce those pesky interruptions.What do you find most frustrating about robocalls, and how do you typically handle them? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener">
Ask Kurt a question or let us know what stories you'd like us to cover
Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Who's really behind that random strange text from nowhere?
These days,
our phones
are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. "A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with 'I like to make friends with polite people.' The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more
sinister scheme
. Let's dive into the world of text message scams and learn how to protect ourselves.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Text message scams, also known as
"smishing,"
a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:
Unfamiliar numbers:
The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.
Unsolicited contact:
The text arrives unexpectedly, often with a friendly or urgent tone. Example:
"Hey! Long time no see. How have you been?"
Personal touch:
The scammer might use your name or reference a common activity to seem legitimate. Example:
"Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"
Too good to be true:
Offers of prizes, invitations, or other enticing propositions are common. Example:
"Congratulations! You've won a $500 gift card. Click here to claim your prize!"
Requests for information:
The scammer may ask for personal details, either directly or indirectly. Example:
"This is your bank. We need to verify your account. Please reply with your account number and PIN."
Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:
Phishing for information:
Gradually collecting personal details that can be used for
identity theft
.
Malware distribution:
Eventually sending a link that, when clicked, installs malicious software on your device.
Financial scams:
Building trust to eventually request money or financial information.
HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID
To protect yourself from text message scams, follow these steps:
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE
If you believe you've received a scam text, here are six steps to follow:
1. Don't respond:
Avoid engaging with the scammer to prevent further attempts.
2. Block the number:
Use your phone's built-in blocking features to prevent further contact.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
3. Report the message:
Forward the suspicious text to
7726
(SPAM). Also, report it directly to the FTC at
ReportFraud.ftc.gov
.
4. Keep your information safe:
Never click on links or provide personal information in response to unsolicited texts.
5. Have strong antivirus software:
Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
6. Invest in personal data removal services:
Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Fake job interview emails installing hidden cryptocurrency mining malware
The job market hasn't been great in the last few years, especially in tech, leaving a lot of people actively looking for jobs. Scammers are taking advantage of this. They have come up with a new trick where they pretend to be recruiters to spread
crypto miners
on people's devices. It starts with an email inviting the person to schedule an interview for a job. But when they click the link, it installs a malicious app that secretly mines cryptocurrency. This app hijacks your PC's resources, like the CPU and GPU, which slows down its performance significantly.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
This malicious campaign begins with an email that tricks victims into thinking it is part of a recruitment process, as reported by
Dark Reading
. In most cases, these emails are pretending to be from recruiters at the cybersecurity company CrowdStrike.The fraudulent email contains a link claiming to take the recipient to a site where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed "CRM application."
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The site provides download options for both
Windows and macOS
. Regardless of which option the victim selects, the download will be a Windows executable written in Rust. This executable then downloads the XMRig cryptominer.The executable performs several environmental checks to analyze the device and avoid detection. It scans running processes, checks the CPU and more. If the device passes these checks, the executable will display a fake error message while secretly downloading additional payloads needed to run the XMRig miner.
HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS
A cryptomining app can significantly impact your PC's performance. Once installed, it hijacks your computer's resources, including the CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computational power, which can cause your system to slow down drastically. You might notice your computer becoming unresponsive, running hotter than usual, or consuming more power. In some cases, prolonged use of cryptominers can also lead to hardware damage due to the increased strain on your components. Additionally, these miners often run in the background without your knowledge, making it harder to detect the issue until the damage is already done.
CrowdStrike is aware of the scam
and advises individuals to stay vigilant. "This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files,
"
the
company said in a blog post
. "Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity."
GET FOX BUSINESS ON THE GO BY CLICKING HERE
BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU
1. Check if you applied for the job:
If you receive an unsolicited interview invitation, think back to whether you actually applied for that job or company. Scammers often target jobseekers randomly, hoping someone takes the bait. If you didn't apply, it's likely a scam. Always confirm directly with the company before proceeding.
2. Verify recruiter credentials:
Always double-check the recruiter's details before responding to an email or clicking any links. Verify their email address, LinkedIn profile and company association. Legitimate companies will use official email domains, not free services like Gmail or Yahoo.
3. Avoid downloading unsolicited files:
Be cautious of emails asking you to download any files or applications. Legitimate recruitment processes rarely require you to install software. If unsure, contact the company directly to confirm the request.
4. Inspect links before clicking:
Hover over any links in the email to see their actual URL. Scammers often use URLs that mimic legitimate sites but have subtle differences. If a link looks suspicious, avoid clicking on it.
5. Use strong antivirus software:
Use strong antivirus or endpoint protection software to detect and block malicious downloads. Regularly update your security tools to ensure they can handle new threats effectively.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED
Cybercriminals always manage to come up with new ways to exploit people. While this particular scam is more focused on using your computer's resources than stealing data, it is still very dangerous. It shows that if a hacker can easily install software on your PC, they can also go ahead and steal your financial information and other personal data. Always verify the emails you receive, and try not to download anything you don't trust.Have you ever received a suspicious email that looked like a job offer? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Fox News AI Newsletter: China gains ground
IN TODAY'S NEWSLETTER:- US must win AI race as China gains ground: 'Lead is not as big as it once was,' OpenAI exec warns
- How does AI keep the US safe amid world conflict?
- AI scammers pretending to be Brad Pitt con woman out of $850,000
AMERICA MUST WIN:
OpenAI's Chris Lehane is warning of
America's shrinking lead in the artificial intelligence
space as the company releases its economic blueprint and policy proposals for the U.S.
KEEPING US SAFE:
Booz Allen Hamilton CEO Horacio Rozanski unpacks global unrest in the Middle East despite the Israel-Hamas deal and the impact of
artificial intelligence on defense
on "The Claman Countdown."
'ONCE UPON A TIME':
A happily-ever-after with someone a woman believed was Hollywood hunk
Brad Pitt
quickly turned into a living nightmare.
AI TRANSFORMER HOMES:
AC Future, a leading developer of
AI-enabled
sustainable living solutions, has partnered with world-renowned Italian design house Pininfarina to create a groundbreaking collection of transformable living spaces. This innovative collaboration has resulted in three distinct products: AI-THd (AI Transformer Home Drivable), AI-THu (AI Transformer Home Unit) and AI-THt (AI Transformer Home Trailer).
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
That Apple ID disabled message? It's a dangerous scam
Let's talk about something that's been
popping up in inboxes lately
- those sneaky "Your Apple ID has been disabled" emails. Like many people who've reached out to us, you might have gotten one that looks pretty legit, saying something like, "Your Apple ID has been temporarily disabled. Verify your
Apple ID Information
." Spoiler alert: It's most likely a scam, and we're going to break down why.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
So, here's how these tricksters operate. You get an email that looks totally legit with an Apple logo and creates a sense of urgency, claiming your Apple ID is in trouble. They'll say something like, "If you do not verify your account within 48 hours, it will be permanently locked." Yikes, right? That's exactly what they want you to think. So, you'll "Click the button below to verify as soon as possible." They want you to click where it says, "Go to Apple ID."Once you do that, you're directed to a fake Apple website designed to look almost identical to the real one. This fraudulent site prompts you to enter your username, password and other sensitive information, which the scammers can then use to access your Apple account and potentially
steal your personal data
or make unauthorized purchases.
NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE'S HOW TO STAY SAFE
Urgent language:
They're trying to scare you into acting without thinking. Classic scammer move.
Vague claims:
"Missing or invalid information"? That's purposely unclear to make you doubt yourself.
Threats of lockout:
Nothing like a good threat to get your heart racing, huh?
Terms of service talk:
They throw this in to sound official, but it's just smoke and mirrors.
Grammar goofs:
Real Apple emails are polished. Scammers? Not so much.
Fishy sender address
: Always check if it's actually from @apple.com (spoiler: it's probably not). Any legitimate email from Apple will come from a domain ending in "@email.apple.com. As you can see from the scam email below, it's from a fake email: mfrasier@wavecable.com, not Apple.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
HOW TO SECURELY LOCK YOUR IPHONE AND IPAD FROM PRYING EYES
You might wonder, "Why are these scammers so obsessed with Apple IDs?" Well, there are a few reasons:
5 THINGS TO DO FIRST IF YOU GOT A NEW MAC
To keep scammers at bay and secure your Apple ID, follow these comprehensive steps:
1. Enable Two-Factor Authentication (
2FA
):
This crucial security feature adds an extra layer of protection to your Apple ID. Set it up by going to
Settings
>
[your name]
>
Sign-In & Security
on your iPhone or iPad, or
Apple menu
>
System Settings
>
[your name]
>
Sign-In & Security
on your Mac.
2. Use strong passcodes:
Opt for alphanumeric passcodes instead of simple PINs. When in public, use biometrics (Face ID or Touch ID) and be cautious when entering your passcode.
3. Enable Stolen Device Protection:
If you're using iOS 17.3 or later, turn on
this feature
for additional security against theft.
4. Keep software updated:
Regularly
update your operating system
and apps to ensure you have the latest security patches.
5. Don't click on suspicious links, use strong antivirus software
: If the email asks you to click a link, don't do it right away. Hover over the link to see the actual URL. If it doesn't look like an official Apple website (or any site you trust), don't click it.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
6. Use a password manager:
Generate and store strong, unique passwords for all your accounts by using a
password manager.
7. Enable Find My:
Turn on
Find My iPhone
to help locate your device if it's lost or stolen.
8. Use a personal data removal service:
Consider using a service that finds and removes your personal information from data broker sites. These services can help reduce your digital footprint, making it harder for scammers to obtain your data to target you in the first place. Look for a service that offers automated removals from hundreds of data aggregators and provides detailed verification of removals.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
9. Don't click on suspicious links
: If the email asks you to click a link, don't do it right away. Hover over the link to see the actual URL. If it doesn't look like an official Apple website (or any site you trust), don't click it.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR APPLE DEVICES
Apple will never email you asking for your password or threaten to lock your account. If there's a real issue, you'll usually get a notification on your trusted device or be asked to sign in to your Apple ID account page directly. Remember, Apple will never ask for your password via email, phone or text message. Always access your account through official Apple websites or apps.These scammers are getting craftier, but with a bit of know-how and caution, you can keep your Apple ID (and all the good stuff connected to it) safe and sound. Remember, if something feels fishy, trust your gut. When in doubt, go straight to Apple's official website or give their support team a call. Keep your digital life secure, and don't let those scammers take a bite out of your Apple.Have you ever fallen victim to a digital scam, and what steps did you take to protect yourself afterward? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
These mistakes could tank your credit score
Do you know the difference between 550 and 780? Yes, they're 230 digits apart, but they're also examples of bad and good credit scores, respectively.
Win a pair of $329 Ray-Ban Meta smart glasses.
Enter here
, no purchase necessary!
If you don't check yours regularly, now's the time to start. Small mistakes are a lot more common than you think, and they can do some serious damage to your credit score. I'll let you in on some of the most common credit report mistakes and what you can do to fix them.
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
Step 1: Get your free credit report
The three credit reporting agencies (TransUnion, Experian and Equifax) are required
by law
to provide you with one free credit report a year. Sweet. There are a few ways you can request a copy from each agency.Online is the fastest route. If you submit a request
via phone
or mail, expect to wait two weeks after the paperwork is received.
Pro tip:
Grab your report from the
fourth credit bureau, Innovis
, too.
Step 2: Look for the most common mistakes
Typos or wrong info:
Anything from your name spelled incorrectly to your address or your birthdate off by one number. Tiny mistakes can mix up your credit with someone else's.
Accounts you don't recognize:
If you see something you don't recognize, don't ignore it! This includes credit cards you never applied for, loans in your name
or purchases
you didn't make.
Duplicates:
It's not normal to see a debt twice on a credit report. This includes things like the same collection account, transferred debts showing as separate accounts or paid-off debts still sitting there.
Incorrect account info:
Sometimes, payments can mistakenly show up as late, or closed accounts may still show as active. Other times, reports may show the wrong credit limit or mess up your payment history.
AI ISN'T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER
Outdated info:
Bankruptcies older than 10 years, late payments older than seven years and outdated collections accounts should not be showing on your credit report.
Make sure websites are following your rules: How to check permissions
Step 3: Report anything strange
Don't panic! Write down and make copies of anything that looks off, then file a dispute with the credit reporting company by mail, phone or online.If you're filing online or by mail, explain in writing exactly what's wrong and why, and include copies of documents with proof. Make sure to include your contact info, credit report confirmation numbers and a copy of your version of your credit report.And always follow up! Bureaus are required to look into your disputes within 30 days. Track its progress until you have a resolution in writing. If your dispute is valid, the bureau has to fix it and tell the other bureaus as well.A lot of these issues boil down to good old-fashioned human error. It happens, but don't let that stop you from taking charge.
Related:
How to run a 5-minute privacy check on your phone
While you're at it, find your job number
Equifax also runs a database of 716 million income and
employment records
, including, potentially, yours. It's called The Work Number, and employers use it to make sure you are who you say you are.Your Employment Data Report (EDR) includes things like where you've worked, when you worked there and your exact past salary numbers.
TECH TIP: SAVE YOUR MEMORIES BEFORE IT'S TOO LATE
Trying to get a new job? An employer could use your EDR to find your past salary range and lowball you in negotiations. And, of course, Equifax will sell your EDR to anyone who's buying, including debt collectors.
Money smarts:
It's not just bogus calls and emails putting your bank info at risk
How to stop it
You can
freeze your EDR
just like a credit report. You can also see who's tried to access it within the past two years. You'll need to make an account with The Work Number to do it. Once you register, look over your report and make sure it's accurate. Fill out this
data dispute form
if you find anything fishy.Then, head back to the dashboard and click
Freeze Your Data
. Fill out the
Data Freeze Placement Form
and submit it
.
The Work Number will send you a freeze confirmation letter, along with a
PIN
. Save your PIN in your password manager. You'll need it if you ever want to unfreeze your report.You can always log into The Work Number or call them to unfreeze your report.
If you can't find your employer:
They may not be registered with The Work Number. Call the freeze helpline at 1-800-367-2884 to double-check.Unless you're actively applying for a loan or
government benefits
, or unless an employer actively requests your EDR, it's a no-brainer to freeze it. And if a potential employer insists on checking your EDR to hire you, maybe it's not the right fit after all.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Best ways to give your old iPhone a second life
Before tossing out your
old iPhone
, consider it a treasure trove of potential waiting to be unlocked. Your seemingly outdated device isn't just electronic waste. It's a versatile gadget ready for an exciting second life. From transforming into a smart home hub to becoming a dedicated digital companion, an old iPhone can be repurposed in countless creative ways that breathe new life into technology you may not have considered. Here are some of the best ways to use your old iPhone.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Smartphones are incredibly powerful
, but they can also be overwhelming. The constant notifications and social media updates can make it hard to focus or enjoy the present moment. If you're finding that your iPhone is more of a time-waster than a tool for productivity, why not transform it into a "dumb phone"? A "dumb phone" is a basic mobile device that focuses on essential communication functions like calling and texting, while minimizing digital distractions through limited internet access and app capabilities, helping you reduce screen time and stay more present.
Disable notifications:
Delete unwanted apps:
Factory reset
(Optional):
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Eventually, you may want to give your child their own smartphone. While a new phone can be expensive, handing down your old iPhone is a great way to
introduce them to technology
while also being mindful of your budget. By using Family Sharing and parental controls, you can carefully monitor what apps and content your child accesses. Plus, it's an excellent way to bring them into the Apple ecosystem.
Set up Family Sharing:
Enable Parental Controls:
This process will help you manage your child's device usage effectively while ensuring they have access to appropriate content.
24 MOST AMAZING GIFTS FOR KIDS
In recent years, Apple's Continuity Camera feature has made it easy to use an iPhone as a webcam for your Mac or Apple TV. While newer models work well for this purpose, older iPhones can still serve as excellent webcams, especially for online meetings and video calls. Instead of purchasing an external webcam, your old iPhone can deliver superior video quality. iOS 18 even allows older iPhones to work as dedicated continuity cameras for Apple TV, which is ideal for FaceTime or Zoom calls with family and friends.Instead of purchasing an external webcam, your old iPhone can deliver superior video quality.Why use your main iPhone for music when you can repurpose your old one as a dedicated MP3 player? With your old iPhone set up as a music player, you can enjoy your favorite tunes or podcasts without the distractions of text messages or social media notifications. It's a perfect solution for workouts, long drives or when you just want to zone out with music.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
If you own an Apple TV, you already know that your iPhone can function as a remote control. However, keeping your main phone tied up with the remote can be inconvenient. By making your old iPhone a dedicated Apple TV remote, you can still enjoy controlling your TV without using your primary phone.
Set up Apple TV remote feature:
Manage smart home devices:
Your old iPhone can even be a hub for all your smart home devices, from adjusting lights and thermostats to checking security cameras.
10 SMART HOME DEVICES WE LOVE
Smartphones have transformed mobile gaming, and your old iPhone could be an ideal portable gaming console. Many classic and modern games run smoothly on older iPhone models, and with subscription services like Apple Arcade, you can access a huge library of high-quality games. This is a fun, low-cost way to enjoy mobile gaming without draining your main iPhone's battery life.For book lovers, using an old iPhone as a dedicated e-reader is a great option. You can install apps like Kindle or Apple Books from the App Store. The iPhone's display is perfect for reading books and graphic novels, and since you're not using your main iPhone, there are no distractions like notifications to interrupt your reading. You can disable all apps and notifications on the old device, making it a peaceful reading experience. Plus, you can still connect your AirPods to listen to audiobooks while on the go.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Just because you've upgraded to a new iPhone doesn't mean your old one has to be discarded. There are countless ways to repurpose it, from boosting your productivity to controlling your smart home. This way, you can extend its lifespan and maximize the value of your purchase. What other devices would you like tips on breathing new life into? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Chinese tech firm shares robot training secrets with the world
AgiBot, a pioneering Chinese
artificial intelligence
and robotics company, has introduced a transformative open-source dataset called AgiBot World Alpha. This comprehensive collection represents a significant milestone in humanoid robot training, capturing intricate data from over 100 robots across diverse real-world scenarios. By providing an unprecedented window into
robotic movement
and interaction, AgiBot has created a multidimensional resource that promises to reshape our understanding of robotic learning and adaptation.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
The
t World Alpha dataset
is more than a simple data collection. Researchers and developers can now access an extensive repository containing over 1 million robotic movement trajectories. The dataset spans multiple industries, including home environments, restaurants, industrial settings, offices and supermarkets, providing unprecedented diversity in robotic training scenarios.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
WOULD YOU BUY ART FROM THE WORLD'S FIRST HUMANOID ROBOT ARTIST?
Historically,
robotics training
has been constrained by limited real-world data and controlled environments. AgiBot's dataset addresses this fundamental challenge by offering comprehensive, authentic scenario representations. The collection includes complex movements such as fine-grained manipulation, sophisticated tool usage and advanced multi-robot collaboration techniques.
CHINESE HUMANOID ROBOT COULD BE THE FUTURE OF AFFORDABLE IN-HOME CARE
t has integrated cutting-edge technological components to capture high-quality data. The dataset leverages array-based visual tactile sensors, durable six-degree-of-freedom hands and mobile dual-arm robotic systems. These advanced hardware configurations enable researchers to explore nuanced robotic learning methodologies.
THE CREEPY YET HELPFUL HUMANOID ROBOT READY TO MOVE INTO YOUR HOME
The dataset is strategically hosted on GitHub and Hugging Face, ensuring broad accessibility for researchers and developers. However, the Creative Commons CC BY-NC-SA 4.0 license restricts usage to academic and research purposes, preventing commercial applications.
AI-POWERED ROBOT SINKS SEEMINGLY IMPOSSIBLE BASKETBALL HOOPS
t has outlined an ambitious future development strategy. Planned releases include AgiBot World Beta, expected in early 2025, which aims to expand the dataset to approximately one million high-quality robotic trajectories. The company also anticipates launching the AgiBot World Colosseum platform and a potential global robotics challenge.The release of AgiBot World Alpha could fundamentally transform robotics research and development. By providing authentic, diverse training data, the dataset enables more sophisticated approaches to:
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Generative AI has dramatically accelerated robotics development, allowing more intelligent software capable of understanding contextual scenarios. AgiBot's dataset represents a critical step in creating more adaptable, intelligent robotic systems that can process and respond to diverse environmental challenges.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
By providing a comprehensive, open-source dataset that spans multiple industries and scenarios, AgiBot has made advanced robotic learning very accessible. This means that instead of expensive, exclusive research being limited to a few well-funded labs, now more people can contribute to and learn from cutting-edge robotic data. As we look to the future, this dataset stands as a collaborative innovation, promising to bridge the gap between theoretical robotics and practical, context-aware artificial intelligence.Do you trust a Chinese AI robotics company with open access to advanced robotic learning data? Let us know what you think by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
What to do if you think your PC has a virus
If you suspect
your PC
has a virus, it's important to act quickly to remove it and protect your data. Keep reading to discover the key warning signs and the steps you can take to address the issue.There are several red flags that could signal your computer may have a virus. One of the most common is if your computer starts running unusually slow.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Another warning sign is the appearance of unfamiliar apps or programs that you don't remember installing. Additionally, if your
usual programs start crashing
frequently or behaving oddly, it's a cause for concern. Finally, an overheating computer is a good reason to start investigating further.
WINDOW USERS ARE BEING TRICKED BY SNEAKY MALWARE SCHEME
Realizing you have a virus can be scary, but there's no need to panic. Here's what to do next.
1. Disconnect from the internet:
2. Enter safe mode
:
3. Run a virus scan
:
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
4. Delete or quarantine infected files
:
5. Clear temporary files
:
6. Reset browser settings
:
7. Check Startup Programs
8. Update your software
:
9. Backup your data
:
HOW TO REMOVE MALWARE ON A PC
Here's how to be proactive about protecting your PC from viruses down the road.
Use safe browsing practices:
Avoid clicking on suspicious links or downloading files from untrusted sources.
Enable firewall
: Make sure your firewall is enabled to block unauthorized access to your computer.
Download apps and software from trusted sites only:
Check the number of downloads, as more suggests greater reliability.
Use a secure VPN connection:
Mask your IP address with a trusted VPN (virtual private network) service to secure your online activity. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your
Windows, Mac, Android and iOS devices
.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
By following these steps, you can effectively remove a virus from your PC and protect your data. Staying vigilant and practicing good cybersecurity habits will help safeguard your system from future threats.What other PC issues would you like help with? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Soft robotic armband gives prosthetic hand users natural control
Prosthetic hands have long struggled to replicate the dexterity and functionality of natural hands, often limiting users to a single grasp function at a time. This limitation has made everyday tasks, such as typing on a keyboard or braiding hair, challenging for those who rely on prosthetics. However, a groundbreaking study from Florida Atlantic University (FAU) offers promising advancements that could transform the experience of prosthetic hand users.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Researchers at
FAU's College of Engineering and Computer Science
, in collaboration with the Charles E. Schmidt College of Science, conducted an innovative study that combined haptic feedback, electromyogram control and a wearable soft robotic armband. This study aimed to investigate whether users could control grip forces applied to two different objects simultaneously with a dexterous artificial hand.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The study's findings, published in Scientific Reports, demonstrated that multiple channels of
haptic feedback
allowed participants to successfully grasp and transport two objects at once without dropping them, even when visual feedback was obstructed.For example, participants managed to pinch a card between their fingers while simultaneously unscrewing a water bottle lid or toggling a light switch with their little finger.
NEW PROSTHETICS RESTORE NATURAL MOVEMENT VIA NERVE CONNECTION
A key innovation in this research was the development of a multichannel soft
robotic armband
designed to convey artificial sensations of touch. This armband included soft actuators that provided proportional contact force feedback and vibrotactile stimulators that alerted users if they were about to drop or break an object. The armband's design allowed it to deliver haptic feedback at three critical points corresponding to the thumb, index and little fingers, effectively enhancing the user's ability to control multiple objects simultaneously.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Participants in the study reported that haptic feedback was significantly more important than visual feedback, especially since visual cues often failed to indicate when an object was about to be lost. This insight underscores the necessity of integrating tactile sensations into prosthetic technology.
BREAKTHROUGH PROSTHETIC FINGERS REVOLUTIONIZE THE LIVES OF AMPUTEES
The implications of this study extend beyond immediate user benefits; they suggest a paradigm shift in how prosthetic hands could be controlled in the future. By enabling refined dexterous control through enhanced sensory feedback, this research opens new pathways for individuals with upper limb loss to engage in complex tasks traditionally deemed impossible with current prosthetics. This includes activities such as playing musical instruments or performing intricate surgical procedures.In addition,
the researchers
noted that participants with limb loss performed as well as able-bodied subjects in key performance metrics during the tasks. This finding is particularly encouraging for clinical applications and indicates that advancements in technology can bridge gaps in functionality for users.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
COULD THESE EXOSKELETON 'POWERED PANTS' MAKE OUTDOOR ACTIVITIES EASIER IN THE FUTURE?
As researchers continue to refine these prosthetic technology systems, we may soon see prosthetic hands that not only replicate but exceed the capabilities of natural hands, empowering users to reclaim their independence and engage fully in both everyday activities and specialized tasks. This innovative approach not only addresses existing limitations but also paves the way for future developments in assistive technologies for individuals with disabilities.What personal experiences or stories do you have related to the use of prosthetics or assistive devices? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Powerful Webb Telescope captures photos of one of the earliest supernova ever seen
NASA's James Webb Space Telescope
(JWST) has captured photos of one of the earliest supernovas ever seen, with features appearing like grains and knots found in a cut of wood."Once upon a time, the core of a massive star collapsed, creating a shockwave that blasted outward, ripping the star apart as it went," NASA said on its website. "When the shockwave reached the star's surface, it punched through, generating a brief, intense pulse of X-rays and ultraviolet light that traveled outward into the surrounding space."Now, nearly 350 years later, scientists are getting a view of the aftermath as the pulse of light reaches interstellar material and causes it to glow.The infrared glow created was captured by JWST, revealing details that look like knots and whorls found in wood grain.
POWERFUL WEBB TELESCOPE CAPTURES MOST DISTANT KNOWN GALAXY, SCIENTISTS SAY
"Even as a star dies, its light endures-
echoing across the cosmos
. It's been an extraordinary three years since we launched NASA's James Webb Space Telescope. Every image, every discovery, shows a portrait not only of the majesty of the universe but the power of the NASA team and the promise of international partnerships. This groundbreaking mission, NASA's largest international space science collaboration, is a true testament to NASA's ingenuity, teamwork, and pursuit of excellence," NASA Administrator Bill Nelson said. "What a privilege it has been to oversee this monumental effort, shaped by the tireless dedication of thousands of scientists and engineers around the globe. This latest image beautifully captures the lasting legacy of Webb-a keyhole into the past and a mission that will inspire generations to come."While beautiful in nature, the observations also give astronomers the ability to map the 3-dimensional structure of the interstellar dust and gas for the first time."We were pretty shocked to see this level of detail," Jacob Jencson of Caltech/IPAC in Pasadena, the principal investigator of the science program, said.Josh Peek of the Space Telescope Science Institute in Baltimore is also a member of the team and said they see layers like those of an onion.
POWERFUL WEBB TELESCOPE SPIES SPECTACULAR STAR BIRTH CLUSTER BEYOND THE MILKY WAY
"We think every dense, dusty region that we see, and most of the ones we don't see, look like this on the inside," he said. "We just have never been able to look inside them before."The images produced from the JWST near-infrared camera (NIRCam) highlight a phenomenon called light echo, NASA said, which is created when a star explodes or erupts before flashing light into surrounding masses of dust and causing them to shine.The visible light echoes are caused when the light reflects off interstellar material, where those at infrared wavelengths are caused when the dust is warmed by energetic radiation, causing it to glow.Scientists targeted a light echo previously observed by NASA's retired
Spitzer Space Telescope
, and it is one of dozens found near remains of the Cassiopeia A supernova.
MERGER OF MASSIVE BLACK HOLES FROM EARLY UNIVERSE UNCOVERED BY WEBB TELESCOPE, SCIENTISTS SAY
The Webb images show tightly packed sheets, with filaments displaying structures on what NASA called "remarkably small scales," of about 400 astronomical units, or less than one-hundredth of a light year. One astronomical unit is the average distance between the Earth and the Sun, and Neptune's orbit is 60 astronomical units in diameter."We did not know that the interstellar medium had structures on that small of a scale, let alone that it was sheet-like," Peek said.The discovery was compared by scientists to a medical CT scan."We have three slices taken at three different times, which will allow us to study the true 3D structure. It will completely change the way we study the interstellar medium," Armin Rest of the Space Telescope Science Institute, and member of the team, said.The team's findings will be presented this week at the 245th American Astronomical Society meeting in Washington, D.C.The Webb Telescope, the successor to the Hubble and the largest telescope ever launched into space, is a joint project of NASA and the European Space Agency. |
Fox News AI Newsletter: AI health tech will transform your fitness routine
IN TODAY'S NEWSLETTER:- Best cutting-edge health and fitness tech from CES 2025- Nvidia pushes back on Biden admin's 'misguided' AI order- Biden White House announces 'final rule' on AI chip exports before Trump hand-off, drawing industry blowback
FUTURE HEALTH TECH:
CES 2025 has once again showcased a remarkable array of
health and fitness
technology that promises to transform our well-being.
'UNPRECEDENTED AND MISGUIDED':
Tech giant Nvidia is pushing back on a new executive order by the Biden administration that seeks to prevent
artificial intelligence
technologies developed in the U.S. from falling into the hands of adversarial countries.
'CHIP' ON THEIR SHOULDER:
The Biden White House on Monday announced its "final rule" placing export controls on
artificial intelligence chips
before President-elect Donald Trump takes office next week, drawing swift condemnation from industry leaders who argue the Democratic administration is effectively undermining America's leadership in the emerging technology.
'LEAD THE WORLD':
President Biden on Tuesday signed an ambitious executive order that he says will keep both national security and climate change in mind while fast-tracking the build-out of large-scale
artificial intelligence
infrastructure in the United States.
HOTTEST TICKET IN TOWN:
A select group of tech industry titans and venture capitalists will gather in
Washington, D.C.,
this week to welcome the incoming Trump administration and celebrate new opportunities for global innovation in artificial intelligence and entrepreneurship.
CUTTING-EDGE HUMANOID TECH:
Chinese startup
Pudu Robotics
has unveiled its latest creation, the D9 humanoid robot, designed to revolutionize the way we work and interact with machines.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
Mac malware mayhem as 100 million Apple users at risk of having personal data stolen
Apple's Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. I
reported on this malware in 2024 as well
. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
Cybersecurity company
Check Point
has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.Check Point says this malware evolved in September after being exposed. This time, its developers had "stolen" a string encryption algorithm from Apple's own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apple's legitimate security tools, they weren't flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices.
4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH
BanShee Stealer is a prime example of how advanced malware has become. Once it's on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of
two-factor authentication (2FA)
extensions to grab credentials. On top of that, it collects details about the device's software and hardware, as well as the external IP address.The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.The malware's creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didn't just target macOS users with BanShee. They also hit Windows users with a different
malware called Lumma Stealer
. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files.
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.1)
Have strong antivirus software:
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.2)
Be cautious with downloads and links:
Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.3)
Keep your software updated
: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my
guide on keeping all your devices updated
.4)
Use strong and unique passwords:
To protect your Mac from malware, it's also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A
password manager
can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don't have to remember them yourself. By reducing the number of passwords you need to recall, you're less likely to reuse them, which lowers the risk of security breaches. Get more details about my
best expert-reviewed password managers of 2025 here
.5)
Use two-factor authentication (2FA):
Enable
2FA
for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
No device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It's crucial to know what you're downloading, ensure it's from a trusted source and carefully review the permissions you grant to any online service or application.When downloading new software, how do you determine if it's safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Get ready to experience thrill of eVTOL racing
You might have heard about electric vertical takeoff and landing aircraft (eVTOL). Well, there's some exciting news coming from Jetson, a Swedish startup that's making waves in the air racing scene. While Australia's Airspeeder has been working on crewed eVTOL races, Jetson founder and CTO Tomasz Patan recently took the spotlight with a demonstration that many are calling the start of the world's first eVTOL air racing.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
Airspeeder has been building momentum since 2017, aiming to establish world championship races with their striking eVTOL aircraft. However, their current races involve remote-controlled vehicles, with pilots safely on the ground. Enter Jetson, who has now demonstrated a crewed flight around a racing pylon, albeit with just one aircraft.
EVTOL PROTOTYPE PROMISES 150 MPH CITY-TO-CITY HOPS
The star of this show is the Jetson One, a personal eVTOL designed for agility and performance. In a recent video, Patan showcases the aircraft's nimble capabilities by navigating around a 26-foot-tall pylon. While this demonstration does not quite constitute a full race, it offers a tantalizing preview of what eVTOL racing could look like. Here are some key features of the Jetson One:
THIS FLYING ELECTRIC VEHICLE BREAKS RECORD WITH 523-MILE NONSTOP FLIGHT
The market response to the Jetson One has been remarkable. The company has already confirmed sales of more than 470 units and is now taking orders for the 2026 batch. To secure your place in line, you'll need to make a non-refundable deposit of $8,000, with the full price tag coming in at $128,000.Jetson claims that their eVTOL is user-friendly, stating that pilots can master the aircraft in under 60 minutes of flight practice, along with eight simulator sessions. This accessibility could be a game-changer in the personal aviation market.
REVOLUTIONARY FLYING CAR PROMISES HIGHWAY SPEEDS AND 3-HOUR FLIGHTS
While the prospect of personal eVTOLs and air racing is thrilling, it also raises important safety and regulatory questions. Jetson has implemented several safety features, including:In terms of regulations, Jetson has made progress, securing two flight permits in Italy for personal eVTOL travel in uncontrolled airspace in fall 2023. However, comprehensive racing regulations are yet to be defined.While Jetson has made headlines with this demonstration, it's worth noting that Airspeeder isn't far behind. They have already created teams and held aerial events, albeit with remote-controlled eVTOLs. Their aircraft boasts impressive specifications, including a top speed of 124 mph and a power-to-weight ratio comparable to Formula 1 cars.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
The demonstration by Jetson marks a significant milestone in the evolution of personal aviation and air racing. While it does not yet represent a full-fledged race, it is a tangible step towards a future where eVTOL racing could become a reality. As we look to the skies, it is clear that the race for eVTOL supremacy is just beginning.What are your thoughts on the future of eVTOL racing and personal aviation after reading about Jetson and Airspeeder? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Hackers claim massive breach of company that tracks and sells Americans' location data
When we talk about data privacy, tech giants like Google and Facebook are often blamed for using personal data to show ads and recommendations. Less discussed are the businesses whose entire business model revolves around collecting your data and selling it to other companies and governments. These companies often operate in legal gray areas, with the consent required to collect user data buried deep in the fine print.What's even more concerning is that these data brokers fail to adequately protect the data they collect. Last year, National Public Data made headlines for
failing to secure 2.7 billion records of individuals whose data it had harvested
. Now, hackers have reportedly stolen data from Gravy Analytics, the parent company of Venntel, which has sold vast amounts of smartphone location data to the U.S. government.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
Hackers claim to have breached Gravy Analytics, a major location data broker and parent company of Venntel, a firm known for selling smartphone location data to U.S. government agencies. The compromise is massive, including sensitive location data that tracks precise smartphone movements, customer information and even internal infrastructure, according to a
404
Media
report.The hackers are threatening to make the stolen data public. The files contain precise latitude and longitude coordinates of the phone and the time at which the phone was there. Some even indicate what country the data has been collected from.Hackers have claimed access to Gravy's systems since 2018. If true, this represents a serious security lapse on the company's part. It is baffling how companies that collect and sell user data (a practice that arguably shouldn't be allowed in the first place) failed to protect it from being leaked.404 Media also suggests that the hackers gained deep access to the company's infrastructure, including Amazon S3 buckets and server root access. The exposed customer list reportedly includes major companies like Uber, Apple and Equifax as well as government contractors like Babel Street.
HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS
This data breach highlights the serious security flaws in the location data industry. Companies like Gravy Analytics and Venntel have been profiting from collecting and selling sensitive location data, often without proper user consent. They've prioritized profit over security, and now the privacy of millions is at risk. This data could end up on black markets, endangering individuals, especially those in vulnerable situations, by making them targets for harassment or worse.The FTC's recent crackdown on Gravy, announced in December, underscores their negligence. The proposed order will prohibit these companies from selling or using location data, except in specific cases like national security or law enforcement. The implications are worrying. Sensitive locations like schools and workplaces could become easy targets for those with malicious intent.
BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU
The Gravy Analytics breach serves as a sobering reminder of the vulnerabilities in the digital age. While it's impossible to control how every company handles data, you can take steps to minimize your exposure and protect your privacy. Here are five actionable tips to stay safe.
1) Limit app permissions:
Many apps request access to location data, contacts and more, even when it's not necessary for their functionality. Regularly review the permissions for apps on your smartphone and revoke access to anything that feels excessive. For instance, a weather app doesn't need access to your microphone or camera.
2) Use a VPN:
Virtual private networks (VPNs) can mask your IP address and encrypt your internet activity, making it harder for data brokers and hackers to track your online behavior. A good VPN adds an extra layer of security, especially when using public Wi-Fi networks.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your
Windows, Mac, Android and iOS devices
.
3) Opt out of data sharing where possible:
Some companies allow you to opt out of having your data collected or shared. Services like Your Ad Choices and privacy settings within platforms like Google can help you reduce the amount of data collected. Check for opt-out options with any apps or services you use frequently.
4)
Avoid free apps that monetize data:
Free
apps
often generate revenue by selling user data. Instead, consider paid versions of apps that explicitly prioritize privacy. Research the company behind the app to understand its data handling policies before downloading.
5) Invest in data removal services:
Data removal services can help you regain some control over your personal information by identifying and removing it from people-search websites, data broker platforms and other online databases.
Check out my top picks for data removal services here
.
WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED
Companies that collect and sell user data pose a significant threat to privacy, and when they fail to protect this data, it often ends up in the hands of even worse actors. Cybercriminals, and even some governments, can exploit this information to target individuals. It is crucial to implement stringent repercussions for these companies when they fail in their duty to safeguard user data. A mere slap on the wrist is not enough. We need real accountability to deter negligence and protect individual privacy rights.Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
First 15 things to do or try first when you get a new iPhone
Apple announces new iPhones every year, and I often wonder if that's truly necessary. A launch every two years seems more reasonable, especially since the new iPhones are often only marginally better than the ones released the year before. This has been the case since the iPhone 12. However, in 2024, Apple introduced a range of interesting features with the
iPhone 16
. While these features don't necessarily justify an upgrade if you already own the iPhone 15 or even the iPhone 14, they make the
iPhone 16
a worthy purchase if you're using an older model or an Android phone.If you've already made the purchase, or if you've bought another iPhone, here are the first things you should do and try when you fire up your new phone.
(First things to do if you got a new Android)
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
First things first, let's update your software to iOS 18.2 or later:
HOW TO PROTECT YOUR IPHONE, IPAD FROM MALWARE
To add a passcode or biometric authentication to your new iPhone after updating to iOS 18.2 or later, follow these steps:
For Face ID:
IS IT TIME FOR ME TO UPGRADE TO NEW IPHONE?
Create or sign in to Apple ID:
Enable iCloud:
MUST TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE
Customize Display:
Customize sound preferences:
Manage Privacy Settings:By default in iOS 18, you get flashlight and camera shortcuts on the lock screen, but now you can finally customize them. Here's how to enable Family Sharing on your iPhone:There are millions of apps available, such as
Maps
,
Google Maps
and
even apps to plan a party
in the App Store. To download useful apps on your new iPhone, follow these straightforward steps:Having a strong spam filter on your iPhone is beneficial to protect yourself from unwanted text messages and scams. But beware that this may also filter out some legitimate messages from people who are not in your contacts list.On all iPhone 16 models, you can use Camera Control with visual intelligence to quickly learn more about the stuff around you. Just press and hold the Camera Control, which is a new button on the right side of the device, and you can do things like look up info about a restaurant or business, translate text, get a summary, have it read out loud and more.You can even use it to find details about a business, like its hours, services and contact info. Depending on the place, you might also be able to check reviews, make a reservation or order for delivery.To use this feature, point your iPhone camera at the business in front of you, then press and hold the Camera Control. Next, either tap the Camera Control again or select the business name at the top of the screen. Depending on the business, you can:
HOW TO SCHEDULE FREE SESSION WITH APPLE SUPPORT
made several changes to the iPhones with its iOS 18 update, including updates to the Journal app. You don't need the latest iPhone 16 to try the app's mindfulness option for journal entries; any iPhone with iOS 18 will do. When you open the Journal app, tap the icon that looks like a
tiny tree
, and you'll be able to log your mood for each day and see how it changes over time.The
Action
Button
is part of the iOS 17 operating system for the iPhone 15 series and continues into iOS 18 for the iPhone 16 series. This customizable side button lets you choose a specific function to perform when pressed, such as turning on silent mode, focus, camera, flashlight, voice memo, recognize music, translate, magnifier, controls, shortcut and accessibility, depending on your settings. Essentially, it acts as a quick access key for a chosen action. Here are the steps to customize the Action button on supported iPhone models:I always stress the importance of using a password manager to store your passwords. Let's be honest, we all have a ton of apps and services that require an account and password. If you use the same password everywhere, you risk having your important info stolen by cybercriminals. But it's also impossible to come up with a unique password for every app and remember them all. Password managers make life easier by storing your passwords and filling them in when you log into apps. But they usually charge a monthly or yearly fee. That's where Apple's Passwords app comes in. It works just like a password manager but without the extra cost. Open the app from the App Library, and it'll keep your login details encrypted and synced across all your devices.While Apple's new Passwords app in iOS 18 offers a convenient and cost-free solution for password management, it's important to consider its limitations. These include its exclusivity to the Apple ecosystem, lack of compatibility with Android or Linux devices and limited functionality outside of Safari and Apple apps. For those seeking a more comprehensive password management solution that works across various browsers and apps, check out my
best expert-reviewed password managers of 2025 here
.Apple introduced Apple Intelligence for iPhone 15 Pro and newer models running iOS 18.2, bringing a range of AI tools and ChatGPT support. ChatGPT is now built into various parts of iOS, and if you have an iPhone 15 Pro or above, you can take full advantage of this integration.You can use Apple's enhanced Writing Tools to access ChatGPT directly in apps like Notes, Mail and any other text input field. Whether you need help spicing up your notes or generating complex programming scripts, ChatGPT is up for the task. Here's how to get started; you'll need to enable ChatGPT integration.
Antivirus
software
can help protect your new iPhone from malware, phishing and other threats. The best way to protect yourself from having your data breached is to install antivirus protection on all your devices. Having strong antivirus software on your devices will alert you of any known malware that is targeting you, warn you against clicking on any known malicious links in phishing emails and ultimately help protect you from being hacked.
Get my picks for the best 2025 antivirus protection winners for your iPhone, Mac, Windows and Android devices
.Making data
backups
a regular part of your iPhone maintenance is crucial. This way, you can protect yourself against uncertainties. Whether it's a hardware malfunction or a security breach, having a recent backup will let you recover quickly.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
When you get your new iPhone, there are several essential steps to take to ensure you're getting the most out of your device. Start by updating to iOS 18.2 or later to access the latest features. Next, security measures like a passcode or biometric authentication should be set up for added protection. Personalize your settings by customizing your display and sound preferences, and don't forget to enable Family Sharing if you want to connect with loved ones. Also, explore the App Store to download useful apps. Additionally, make sure to give the Action Button a test run for quick access to your favorite functions. With these tips, you'll be well on your way to maximizing your new iPhone's capabilities.How do you feel about the annual iPhone releases? Do you think they provide enough value each year? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Shape-shifting AI Transformer homes will leave you wanting one
AC Future, a leading developer of AI-enabled sustainable living solutions, has partnered with world-renowned Italian design house Pininfarina to create a groundbreaking collection of transformable living spaces. This innovative collaboration has resulted in three distinct products: AI-THd (AI Transformer Home Drivable), AI-THu (AI Transformer Home Unit) and AI-THt (AI Transformer Home Trailer).
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
The AI-THd is an intelligent, self-sufficient, drivable version of the AI Transformer Home that provides unprecedented mobility and flexibility. Drivers can expand the vehicle from a compact recreational vehicle into a large mobile living space with remarkable ease. The innovative design allows the cockpit to convert into a mobile office or secondary bedroom, creating a versatile living environment. Advanced AI-enabled smart technologies enhance the overall living experience, supporting a range of lifestyle needs and preferences.
YOU'VE HEARD ABOUT THE CYBERTRUCK. WHAT ABOUT THE CYBERTRAILER?
The AI-THu represents a stationary AI-enabled sustainable smart home that transforms to offer 400 square feet of intelligent living space. Its flexible main living area can seamlessly shift between a comfortable lounge, productive office or additional bedroom, maximizing functional utility. The design includes a convertible front expansion for additional living space and a private primary bedroom with extendable wardrobe options. Integrated AI smart home technology, solar panels, energy storage systems and a water generator ensure sustainable and efficient living. Priced starting at $98,000, the AI-THu can be installed anywhere - on-grid or off-grid - while maintaining the comforts of a traditional home.
TOWABLE TRAILER TRANSFORMS INTO RUGGED TINY HOME IN 2 MINUTES
The AI-THt is a 24-foot-long transformer home trailer that expands to offer up to 400 square feet of sophisticated internal living space. Utilizing patented expansion living technologies, this trailer provides flexible living spaces that adapt to various lifestyle needs. Smart AI enhancements and an aerodynamic design distinguish the AI-THt from traditional trailer homes. The unique construction eliminates the need for a front driving cabin, resulting in a more premium and spacious interior environment that doubles in size when fully expanded.
THIS OFF-ROAD TEARDROP TRAILER ADDS LUXURY CAMPING TO THE MOST REMOTE LOCATIONS
All three AI-TH products exemplify a commitment to cutting-edge engineering, sustainable innovation and refined design. They push the boundaries of conventional standards and elevate the concept of adaptable living. Francisco Barboza, Pininfarina's senior design manager, emphasizes the challenge of maintaining an efficient floor plan while accommodating complex opening systems, resulting in an iconic design that authentically embraces the future.
THE BEST TRAVEL GEAR FOR 2025
The AI-THd, AI-THu and AI-THt are more than just innovative products. They're like a crystal ball showing us how we might live, work and explore the world without compromising our environment. AC Future and Pininfarina aren't just thinking outside the box. They're creating an entirely new box. Or should we say, an expandable, AI-powered, eco-friendly box on wheels? Their partnership is laying the groundwork for a revolution in housing and mobility that could change the way we think about home in the future.What worries, if any, do you have about using AI in our homes? Let us know what you think by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
5-minute cleanup for your phone and computer
Digital junk
piles up faster than clutter in real life. There are files you don't need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.
Win a pair of $329 Ray-Ban Meta smart glasses.
rget=_new href="https://www.komando.com/win/" target="_blank" rel="nofollow noopener">
Enter here
, no purchase necessary!
It all adds up, slowing your devices down and making everything feel messy. The good news?
Cleaning it up
is easier than you think. Let's do a quick declutter that will make you say, "Ahhh, that feels better."
Step 1: Update your devicesrget=_new href="https://www.foxnews.com/tech/how-kindly-ask-people-not-post-your-kids-social" target="_blank" rel="noopener">
HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA
There are too many dangerous bugs out there to skip security patches.
Start with your phone
Scroll through your app list and delete any you're not using anymore. If it's been months, you're not going to use it. Trust me. And even if you do want it later, great, download it again.
YOUR SSN IS ON THE DARK WEB - HERE'S WHAT TO DO ABOUT IT
While you're at it, move the apps you want to spend less time using (Instagram for me) off your phone's home screen. You can hide the app or just move it to another page or folder.
On iPhone:
On Android:
TECH TIP: SAVE YOUR MEMORIES BEFORE IT'S TOO LATE
On iPhone or iPad, the Photos app makes this a breeze. On an Android, open the
Files by Google
app, select
Clean
, then:
Onto your computer
Here's the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it.
Pro tip:
Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure
your computer automatically
locks when you're away and requires a password on startup, too.
Quick lock:
For Windows, hit the
Windows key
+
L
. On a Mac, use
Ctrl
+
Cmd
+
Q
.They take up a decent amount of space, so regularly clear out anything you're not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you're potentially leaving a door wide open for cybercriminals to slip in.On a Windows PC:On a Mac:
Don't forget the outside
We're aiming for quick, so let's tackle those fingerprint-covered screens.
On your phone
, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.A microfiber cloth works, but I prefer screen-cleaning wipes. They're just so easy. Skip paper towels. They're too rough for delicate jobs like this.I always come back to this
210-pack of screen cleaning wipes
. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They're scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
|
800,000 VW electric vehicle owners' data exposed by software bug
German automaker Volkswagen isn't having a great time. The company is planning to cut capacity at five factories, reducing production by about 700,000 vehicles, while also laying off more than 35,000 workers in its home country. Now, reports suggest the company had a massive data leak at its subsidiary software company Cariad, which exposed personal data, including geolocation data, of around 800,000 EV owners online and accessible for months. Such information could be valuable to criminals for extortion purposes. What's interesting is that a hacker association informed the company about this data leak after receiving a tip from an anonymous hacker.
I'M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my
free newsletter
.
As reported by Germany's Der Spiegel magazine, Volkswagen is facing a major data security issue after movement data from 800,000 electric cars and the personal contact information of their owners were left exposed on the internet. This data revealed sensitive details, such as the precise locations where cars were parked, including private locations like people's homes, government buildings and even questionable spots like brothels.The exposed data includes detailed movement patterns of these vehicles, allowing for the creation of comprehensive profiles of individuals' daily activities. This could be particularly concerning for public figures or anyone with privacy concerns.Several car brands under the Volkswagen group, including VW, Audi, Seat and Skoda, were affected by the breach, which exposed sensitive data across multiple countries. The information was stored on Amazon cloud servers without adequate protection, leaving it vulnerable for months before the issue was discovered.For around 466,000 of the 800,000 affected vehicles, the location data was detailed enough to map out drivers' daily routines. Spiegel reported that the list of affected users included German politicians, business leaders, the entire EV fleet used by Hamburg police and even suspected intelligence agents.The breach came to light when an anonymous hacker tipped off the Chaos Computer Club. While Volkswagen left the data easily accessible during this time, there is no indication so far that anyone misused or accessed it maliciously.We reached out to Volkswagen for comment but did not hear back by our deadline.
THE AI-POWERED GRANDMA TAKING ON SCAMMERS
The Volkswagen data leak is more than just a tech issue. It is a real concern for anyone who values their privacy. With precise location data out in the open, someone could figure out where you live, work or spend your free time. This information could be misused in many ways, from targeted scams where hackers pretend to be Volkswagen or its partners to trick you into giving up sensitive information, to more personal threats like stalking or harassment.Imagine someone knowing your daily routine or identifying places you visit that you would prefer to keep private. Visits to clinics, legal offices or other sensitive locations could expose you to embarrassment or blackmail. The breach also raises concerns for business leaders, government officials and military personnel as their movements linked to high-security or restricted areas could be exposed, increasing the risk of corporate espionage or national security threats. Moreover, when paired with other vulnerabilities, such as app credentials, hackers could potentially exploit the data to unlock or even control vehicles remotely.
THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE
In light of the recent Volkswagen data breach, it is crucial to take proactive measures to safeguard your personal data. Here are 6 ways you can stay safe after this leak:
1) Check your app settings:
Review the permissions and data-sharing settings in your car's companion app. Disable features that track or share your location if they are not essential for your use. Regularly update the app to ensure you have the latest security patches.
2) Be alert to scams:
Keep an eye out for suspicious emails, messages or calls pretending to be from Volkswagen or related services. Avoid clicking on links or sharing sensitive information without verifying the sender.
3) Consider data opt-out options:
Many vehicles with online features allow you to limit or disable certain data-sharing functionalities. Check your car's settings to reduce the amount of personal data being collected.
4) Strengthen your online accounts:
If you use the same email or password across multiple accounts, update them immediately. Enable
two-factor
authentication
wherever possible to add an extra layer of security to your accounts.
5) Beware of snail mail scams:
While most people focus on digital threats, physical mail scams can also follow a data breach like this. If your contact information was exposed, you might receive fraudulent letters pretending to be from Volkswagen or related services. These could ask for payments, personal details or even encourage you to visit fake websites.
6) Install strong antivirus software
: Ensure that you have strong antivirus software installed on all your devices, especially those connected to your vehicle or its apps. This can help protect you from malicious links that install malware, potentially accessing your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
30% OF AMERICANS OVER 65 WANT TO BE REMOVED FROM THE WEB. HERE'S WHY
The Volkswagen data leak is a glaring example of how companies need to take user data security more seriously. Exposing personal details and precise locations is not just a technical mistake. It is a massive breach of trust. While VW has patched the issue, the damage shows how important it is for businesses to be more responsible with the data they collect. People deserve to know their information is safe and used only when necessary. If companies cannot protect their customers' privacy, they risk losing their confidence altogether. It is time for the industry to step up and do better.Do you think stricter regulations should be in place for companies that handle user data? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
|