Technology News Articles on Fox News

Robots get a feel for human touch, no artificial skin required

In a groundbreaking development, scientists have found a way to give robots a sense of touch without relying on expensive artificial skin. This innovation, spearheaded by a team from the German Aerospace Centre, could revolutionize human-robot interactions and make robots more adaptable and intuitive to use. GET SECURITY ALERTS AND EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Instead of using costly biometric skins and sensors, the researchers harnessed the power of artificial intelligence to interpret signals from a robot's existing internal sensors. This clever approach allows robots to accurately detect external force and pressure, mimicking the human sense of touch.The team's concept includes virtual buttons, switches and slider bars that can be placed anywhere on the robot's structure. This flexibility opens up new possibilities for human-robot interaction. THE 6-WHEEL ROBOT THAT CHECKS OUT DANGEROUS SITUATIONS SO HUMANS DON'T HAVE TO The machine learning algorithms developed by the team are so accurate that the robot can even detect numbers traced on its surface. This capability could lead to entirely new ways for humans to communicate with robots. WOULD YOU TRUST A ROBOT WITH YOUR SMILE? The researchers believe this technology will enable a shift towards more adaptable, flexible and intuitive handling of robots. As they wrote in their study, "This opens up unexplored opportunities in terms of intuitive and flexible interaction between humans and robots." The study, titled "Intrinsic sense of touch for intuitive physical human-robot interaction," was published in the journal Science Robotics . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES By eliminating the need for expensive and complex external sensors, this technology could make advanced robots more accessible and practical for a wide range of applications. The ability to interact with robots through touch, just as we do with other humans, could transform fields ranging from health care to manufacturing, opening up exciting new possibilities for collaboration between humans and machines.How do you feel about the idea of robots being able to "feel" and interact with us more naturally? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Selling on the internet? Beware of sneaky tactics scammers use to trick you

Selling stuff online can be tempting. You don't have to go out and hunt for buyers. Instead, you can just post an ad on platforms like eBay or Facebook Marketplace and wait for people to reach out to you. But along with the ease of online selling comes the risk of getting scammed.One of the popular scams to watch out for is the Google Voice verification scam. This scam preys on unsuspecting sellers by exploiting their trust and the convenience of online communication. Scammers pose as potential buyers and use seemingly innocent requests to gain access to your personal information. Their ultimate goal is to hijack your phone number and use it for fraudulent activities.Here's how it works: A scammer will send you a text with a Google Voice verification code and ask you to share it with them. If you do, they'll use that code to create a Google Voice number linked to your phone number. Once they've got that, they can use your number for all sorts of shady stuff, like identity theft.Recently, I received an email from Allen C., a resident of Island Park, New York, explaining how he almost fell prey to the Google Voice scam. Below, I share Allen's story, discuss the impact of such scams and provide tips on how you can protect yourself. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Allen told me he was trying to sell an item on eBay when he received a message from someone saying they were interested in buying the item. The person asked for his number, saying she was at work and her husband would contact him. Allen gave his contact number, but then she asked him to share a code. "At first I thought it was legit, but then she told me she needs to confirm I was real, so she sends me this code through Google Voice, it gave me a 6 digit code which I was supposed to send back," Allen told me. "After thinking about it, I was trying to figure out why she needed to know if I was real, when we didn't even discuss the item I was selling! I did some checking and she started spelling words wrong, she said she didn't get the return code, I know she did, she begged me to let her send another one. My research confirmed it was probably a scam." Allen realized it was a scam just in time, refused to give the scammer his cell number and deleted the message. DON'T FALL PREY TO ELECTION SEASON'S CRAFTIEST SCAMS Once you provide scammers with your Google Voice verification code, they can create a Google Voice number that is linked to your phone number. This gives them significant control over a virtual phone number associated with your real one, which poses serious risks.One of the main dangers is that scammers can intercept verification codes sent by banks and financial institutions. When these institutions send a verification code to authorize a transaction, it may be redirected to the scammer's Google Voice number instead of your phone. This allows the scammer to authorize fraudulent transactions, reset passwords and gain access to your financial accounts, effectively bypassing your security measures.Additionally, by controlling a number linked to your identity, scammers can engage in identity theft. They may open a new credit card or loan account in your name, impersonate you to access other services that rely on phone verification and exploit your phone number as a recovery option for various accounts.Furthermore, scammers can use the Google Voice number to conduct additional scams while appearing to have a legitimate U.S.-based number. This tactic helps them hide their true identity and makes it more challenging for authorities to trace their actions.Ultimately, by gaining control of a number associated with your identity, scammers acquire a powerful tool that undermines common security measures that rely on phone verification. This can lead to financial losses, damage to your credit score and a complicated process of reclaiming your identity and securing your accounts. TV HOST ANDY COHEN SWINDLED IN COSTLY BANK SCAM: HOW TO AVOID BECOMING A VICTIM YOURSELF HOW TO AVOID BECOMING A MOVING SCAM VICTIM If you've given a scammer the verification, your linked number has been claimed, and someone else is using that number with another Voice account. If you still own the linked number, you can reclaim it by following these steps:Scammers don't only use Google Voice to scam you. They have plenty of other tactics, such as making you install malware to steal your data and passwords. Below are some tips to avoid getting scammed. 1) Check the email address: When you're trying to sell something online, scammers might reach out to you via email and try to get you to click on malicious links. These links may look harmless, but they can give scammers access to your device and important data. Do not click on any links or attachments in the email and do not reply to it. Remember, you don't need to click any links to sell an item online.The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . 2) Avoid the sense of urgency: Many online selling scams create a sense of urgency or panic to trick you. Scammers might tell you that there's a problem with your account, claim that you owe money, suggest that there's an issue with your listing or even offer you a prize.They may pressure you to act quickly, asking you to send money, provide personal information or buy gift cards. Don't let them rush or pressure you. Take a moment to think carefully before you respond. If you're unsure, consult someone you trust, such as a friend, family member or financial adviser. Remember, legitimate buyers or platforms will never ask you to pay with gift cards, wire transfers or cryptocurrency. 3) Verify buyer or seller's identity: If you receive a message or call from someone claiming to be a buyer, a platform representative or an organization related to your online sale, don't trust them blindly. Scammers may use fake names, phone numbers or email addresses to deceive you. They might also have some information about you, such as your name or listing details, which doesn't mean they are legitimate. This information could be obtained from public sources or previous scams.Do not provide any additional personal information, such as your bank details, password or Social Security number. Avoid agreeing to any unusual requests, like sending money, buying gift cards or sharing codes. Instead, verify their identity by contacting the organization or platform directly using a known, official contact method. You can also check the organization's website for any alerts or warnings about scams. 4) Invest in personal data removal services: Removing yourself from the internet is an important step in protecting your personal information from scammers and cybercriminals. Even if you're not selling anything online, removing your personal information from the web is crucial. This prevents scammers from obtaining your data to make fraudulent calls or create convincing scams. By limiting your online presence, you reduce the chances of scammers finding and exploiting your personal details. Additionally, deleting yourself from the internet ensures that scammers cannot access your personal information to call you or make you believe they have some of your credentials, making their scams seem legitimate.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here . ALERT: 4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH ng items online can be easy, but it comes with risks, such as the Google Voice scam. If someone asks you for a verification code or personal details during a sale, be extra cautious. Always verify their legitimacy and use official channels for communication. Only use trusted platforms to sell anything online and take steps to protect yourself from identity theft, which can impact your finances for years.Have you ever fallen victim to an online scam? What did you learn from the experience? Let us know by writing us at Cyberguy.com/Contact .For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover .Follow Kurt on his social channels: Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Apple's bold move into AI: New iPhone 16, AirPods and watches

Apple Inc. held its most significant event of the year today, where the tech giant unveiled its latest iPhone 16, Apple Watch 10 and AirPods lineup and previewed its new artificial intelligence platform, Apple Intelligence. This early Sept. 9 launch comes just ahead of other major global events, allowing Apple to seize the spotlight before the U.S. presidential debate and an important decision from the European Commission about a $14 billion tax dispute with Ireland. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE I've been at and reported on nearly every Apple launch since the iPod, and this is something entirely new in direction. The iPhone 16 series was the star of the show, featuring four new models: the iPhone 16, 16 Plus, 16 Pro and 16 Pro Max. While the standard models will see minor upgrades in processor speed and memory, the Pro models promise more significant improvements. IS IT TIME FOR ME TO UPGRADE TO A NEW IPHONE? With slightly larger, slimmer bezels and a new camera system, these devices are designed to attract both casual and professional users alike.Notably, Apple is introducing a new touch-sensitive button on the Pro models for capturing photos and video, mimicking a DSLR camera's shutter. This feature is expected to become a standout selling point for the Pro devices, alongside their enhanced AI capabilities, supported by 8 GB of memory and a faster neural engine optimized for Apple Intelligence. ASK ANY TECH QUESTION AND GET KURT'S FREE CYBERGUY REPORT NEWSLETTER HERE HOW TO SCHEDULE FREE SESSION WITH APPLE SUPPORT At the heart of Monday's event was Apple's growing AI strategy. Apple Intelligence, which will power updates across devices, is poised to transform how users interact with their gadgets. While it's still early days for this platform, its initial focus will be on streamlining notifications and summarizing messages. However, many features won't fully launch until next year, highlighting the ongoing development of this AI ecosystem.The "It's Glowtime" theme for the event hints at a major redesign of Siri, which will be central to Apple's AI experience. Despite its slow start, Apple Intelligence is a pivotal step in the company's efforts to keep pace with competitors in the artificial intelligence race.The launch of the iPhone 16 integrates advanced features like Apple Intelligence, which is designed to enhance the user experience while prioritizing privacy. Performance: With its A18 chip, the iPhone 16 delivers remarkable performance, offering up to 60% faster processing compared to its predecessor, the A16 Bionic. This chip not only improves speed but also enhances battery life, allowing for up to 27 hours of video playback on the iPhone 16 Plus. Camera innovations: The camera system has also received a substantial upgrade, featuring a 48MP Fusion camera capable of capturing stunning images with improved low-light performance. The new ultra-wide camera allows for expansive shots and intricate macro photography, making it easier than ever to capture every detail. Action Button: The introduction of the Action button provides users with quick access to their favorite features, streamlining everyday tasks. Focus on user privacy: Apple ensures that personal data is processed on-device, safeguarding user information from unauthorized access. Availability and pricing: The iPhone 16 is available in five vibrant colors, starting at $799, and will be available for pre-order on Sept. 13, with official release on Sept. 20. HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE The iPhone 16 Pro is designed to also integrate seamlessly with Apple Intelligence. Here are some of the standout features: Design and display: The iPhone 16 Pro features a Grade 5 titanium design, available in four colors: Black Titanium, White Titanium, Natural Titanium and the new Desert Titanium. It features the thinnest borders yet, providing a larger 6.3-inch Super Retina XDR display that enhances visual engagement. Camera innovations : Equipped with a new 48MP Ultra Wide camera and advanced Camera Control, users can capture stunning photos and videos, including 4K 120 fps Dolby Vision. The phone's four studio-quality microphones and innovative audio features elevate recording quality, making it ideal for content creators. Performance: Powered by the A18 Pro chip, the iPhone 16 Pro delivers unparalleled performance with a faster Neural Engine and improved graphics capabilities, allowing for enhanced gaming experiences and efficient multitasking. Battery life: The device offers a significant increase in battery life, with up to 33 hours of video playback on the Pro Max model, thanks to optimized internal design and energy-efficient processing. Privacy and accessibility: Apple Intelligence emphasizes user privacy through on-device processing and Private Cloud Compute, ensuring that personal data remains secure. New accessibility features, such as Eye Tracking and Music Haptics, make the iPhone 16 Pro more inclusive than ever. Pre-order and availability: Pre-orders for the iPhone 16 Pro begin on Sept. 13, with availability starting Sept. 20, starting at a price of $999 or $41.62 per month for 24 months. GOOGLE'S AI POWER PLAY: IS APPLE FEELING THE HEAT? has unveiled significant updates to its AirPods lineup, introducing new models and innovative features. Apple introduced two new AirPods 4 models, both featuring a refined open-ear design: AirPods 4 (standard model), priced at $129, and AirPods 4 with Active Noise Cancellation, priced at $179.These new models represent Apple's most advanced and comfortable open-ear design to date. Powered by the H2 chip, they offer improved sound quality and new features like Adaptive Audio and Conversation Awareness.Apple also introduced the AirPods Max, which received a refresh with five new colors, including midnight, starlight, blue, purple and orange. The refresh also included USB-C charging capability for increased convenience.The new AirPods 4 and updated AirPods Max are available for pre-order starting today, with in-store availability beginning Sept. 20.Apple announced groundbreaking hearing health capabilities coming to AirPods Pro 2 this fall. It includes hearing protection, which actively reduces loud, intermittent noises to prevent hearing damage, and a hearing test, which is a scientifically validated test conducted through AirPods Pro 2. Also, the AirPods Pro 2 is upgraded with clinical-grade, over-the-counter hearing aid functionality for mild to moderate hearing loss. These features will be available as a free software update in over 100 countries and regions, marking a significant step in Apple's commitment to hearing health. APPLE RUSHES SURPRISE IOS SECURITY UPDATE TO IPHONE AND IPAD For the first time in two years, all Apple Watch models will receive updates, including a new entry-level Apple Watch SE, the flagship Series 10 and the Ultra 2.The Apple Watch Series 10, available for pre-order starting Sept. 20 at a price of $399, introduces several innovative features and enhancements. It is the thinnest model yet, boasting the largest display in the Apple Watch lineup, with a wide-angle OLED screen that is brighter and easier to read from different angles.Key health features include new sleep apnea notifications, advanced heart rate monitoring and the ability to track various fitness activities with precision. The watch also includes new sensors for water temperature and depth, making it suitable for aquatic activities. Fast charging capabilities allow for 80% battery in just 30 minutes.The Series 10 is available in various finishes, including Jet Black aluminum and polished titanium options, and is designed with sustainability in mind, utilizing recycled materials. It also offers enhanced connectivity features, allowing you to stay connected without needing your iPhone nearby.Meanwhile, the new Apple Watch Ultra 2 features a sleek black titanium case. The 49mm black titanium case is designed to withstand the harshest environments and is certified to the EN13319 standard for diving accessories. With a display brightness of 3000 nits, it boasts the brightest Apple display ever, along with WR100 water resistance and IP6X dust resistance. The customizable Action button offers precise control over your workouts, allowing you to start a session, mark a segment or move to the next interval with ease.No matter where you are, the Ultra 2 ensures you won't have to worry about battery life. It's built to perform at peak conditions for longer, supporting up to 36 hours of normal use, 72 hours in Low Power Mode and up to 17 hours of outdoor workouts in Low Power Mode.Though the spotlight was on the iPhone, AirPods and Apple Watch, other products are in the pipeline. Apple is working on transitioning its Mac lineup to M4 chips, with updates to the MacBook Pro, Mac mini and iMac likely scheduled for a later event this fall. A new version of the iPhone SE, an upgraded AirTag and refreshed iPads are also in development with their own launches expected next year. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES This event comes at a crucial time for Apple, as the company seeks to rebound from its longest sales slump in decades. With roughly 60% of Apple's revenue tied to its device ecosystem, this latest lineup of products will not only drive sales but also encourage more spending on services, a key growth area for the company.By introducing new AI-driven features and updates across its flagship products, Apple is positioning itself for the next era of tech innovation. The question remains whether Apple Intelligence will live up to the hype and how quickly the company can deliver on its promises. For now, all eyes are on Cupertino as Apple takes another step into the future of artificial intelligence.Which product or feature from Apple are you most curious about and what questions do you have regarding its functionality? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

5-minute phone privacy audit to stop the snoops

We've all got a load of sensitive info on our phones - texts with loved ones, banking details , passwords and family photos.  We're giving away a brand-new iPhone 16 (a $1,500 value).  Enter to win here. No purchase necessary! You don't want anyone snooping around, whether it's an app maker on the other side of the world or the guy sitting behind you at the coffee shop. Take five minutes to run this privacy audit, and then pat yourself on the back for a job well done. Check your permissions When you download apps , they often request a variety of permissions to access different parts of your phone - think your location, camera, microphone, contacts and text messages. Some are essential for the app to function properly (like a navigation app needing access to your location) but others are absolutely unnecessary.  3 SECURITY AND DATA CHECKS YOU SHOULD DO ONCE A YEAR The most critical permissions to pay attention to are your phone's location, camera and microphone. Only trust apps that have a clear, legitimate need for these permissions.Use your common sense, too. Ask yourself: Does a shopping app really need access to my contacts? Should a photo editing app know my current location? For me, the answer is no. Granting unnecessary permissions increases your privacy exposure, so it's better to err on the side of caution.To check what permissions each app have:You've probably granted permissions to apps on your computer, too, that you forgot about.  Here's how to check those while you're at it. DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT'S TOO LATE Lock down everything Your lock screen is the first line of defense against unwanted eyes. You can use a PIN, pattern, fingerprint, facial recognition, whatever. No matter which method you choose, it's far better than leaving your phone unsecured. If you're using a PIN, stay away from anything obvious like 1234, your birthday or address, or the last digits of your phone number.You'll also want your phone to lock as soon as possible when you're not using it. I find around 30 seconds is the sweet spot between safety and annoyance. Keep out strangers The short-range transfer tech built into iOS and Android is super handy when you need to share something with a friend or relative. But you don't want strangers pinging you with unwanted photos, videos and other files. ELECTION FRAUD ALERT: STEPS TO SAFEGUARD YOUR VOTE This happened to me once at the airport. In my case, it was just teenagers pranking me with silly pictures, but this can end a lot worse.  Browse the web  Open your phone's browser and say hello to instant tracking, unless you do something about it.That wasn't so bad, right? Now, do your loved ones a solid and pass it along so they can stay safe, too. Yes, that includes teenagers! Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

The dangerous intersection of people search sites and scams

It's no secret cybercriminals thrive on personal information to pull off scams, commit bank fraud and engage in identity theft. But did you know that a lot of the information they need is readily available on people search sites? It might surprise you to learn that these companies gather and sell your personal data - everything from your contact details to information about your family - often without you even realizing it.What's more, this data can become even more vulnerable to breaches simply by being stored on these sites. For instance, I recently discussed an alarming incident where 2.7 billion records were stolen from a background search site called National Public Data and then shared for free on a cybercrime forum.Having your personal information floating around on these people search sites and data broker databases significantly increases your risk of falling victim to scams. But don't worry. I'll dive into the details of how this happens and, more importantly, what you can do to protect yourself and stop it. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE People search sites like Whitepages, Spokeo and BeenVerified are designed to help users find and connect with others, but they've become a goldmine for cybercriminals. Despite warnings against using the data for stalking, harassment or harm, these sites offer a wealth of information that can be exploited by malicious actors.Scammers can access a wide range of personal details, including addresses, phone numbers, email addresses, birthdates, family information, employment history and even religious beliefs or political affiliations . They can also find property records, court and police records and information about hobbies and interests.This comprehensive data allows cybercriminals to build detailed profiles of potential victims, making it easier to craft convincing scams or carry out identity theft. The abundance of personal information available through these sites poses a significant risk to individuals' privacy and security.Let's talk about how scammers are using people search sites to find their next victims . It's pretty alarming, but understanding how this works can help us stay one step ahead.Cybercriminals can easily browse people search sites to dig up information about random individuals. They can look up names and uncover a treasure trove of details - like email addresses, phone numbers and other contact info. This is where things start to get a bit dicey. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Once they have access to this information, scammers can create detailed profiles of their targets. They might find out about someone's job history, whether they have kids or even if they're single and looking for love. They can also determine if someone is elderly, which can make them more susceptible to confusing tech jargon. Research indicates that a staggering 60% of cybercrimes against seniors - who are particularly vulnerable - are at least partly fueled by the personal information available online, often through data brokers and people search sites.With all this information in hand, scammers can launch targeted phishing attacks to trick victims into revealing sensitive information. They can create scams designed to steal money or even commit identity theft. There are countless stories of individuals falling prey to these scams and losing their identities. In many cases, the scammers likely sourced their information from people search sites. In some shocking instances, certain data brokers - like Epsilon, Macromark and KBM - have been caught red-handed selling personal information directly to scammers, giving them the tools they need to exploit vulnerable individuals. MOST TARGETED CITIES FOR TRAVEL BOOKING SCAMS With the threat data aggregators like people search sites pose, it's definitely a good idea to keep your information off their databases. While it won't put a definitive stop to scammers, it will make it harder for them to find the information necessary to target you. It will also limit the number of places your data can be found online, thereby reducing the chances of it ending up in a data breach. That said, removing your information from people's search sites can be easier said than done. It's not impossible, though. Here's what to do.The first and most obvious step is to track down people search sites that sell your personal information and make them remove it. Fair warning: This requires a time commitment and ongoing maintenance.You'll first have to look up your own name, phone number, email address or home address on any popular search engine. You'll likely see a bunch of people search sites in the search results. From there, you go through the results pages, visit each website that shows up and send individual opt-out requests to each one.Since they refresh their databases often, most people search sites will add your personal information again after some time, though. So if you want to keep your data offline, you'll have to check back every few months and remove it again.If you have a few bucks to spare, I recommend using an automated personal information removal service. These services remove your data from people search sites and tons of other data broker types. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HERE You should also exercise some good digital hygiene practices. Like being more discerning about the online tools and services you use. Many of them actually harvest your personal information and sell it to third parties, including people search sites and data brokers.Even something as seemingly benign and widely used as extensions can be leaking your data online. A study conducted by researchers over at Incogni revealed 44% of Chrome extensions collect your personally identifiable information (PII) . Even if they don't sell it, this increases the risk of data breaches and malicious activity if the extension goes rogue.You should reevaluate the apps, extensions and online accounts you use. Remove anything you don't really need. For those that you do need, check the privacy policies for their data collection and sharing practices. You can always find more privacy-conscious alternatives.Living in the digital age, I know it's not really possible to go without any online tools. To sign up for most, you need to share at least an email or phone number. Unfortunately, those details are often shared with third parties, end up with people search sites and data brokers, circulate the web and ultimately result in increased spam and malicious attacks.It's a lot safer to use burner numbers and masked or throwaway accounts . This allows you to sign up, receive communication and maintain control of your online accounts while keeping all of the associated data and activity from being linked to your real identity.Browsers and search engines are another big source of data. Most of them track and share at least some of your online activity. Thankfully, there are plenty of browsers and search engines designed with privacy in mind.I've previously recommended a few privacy-conscious search engine alternatives . They come with their own benefits and drawbacks but they all keep your search history private. The same goes for the browser itself.It's clear that while people search sites can be useful for reconnecting with friends or finding information, they also pose significant risks to our privacy and security. By taking proactive steps to protect our personal data, we can make it much harder for cybercriminals to exploit our information.In your opinion, what should be the responsibility of companies that collect and sell personal data regarding user privacy? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.  All rights reserved.

Sleep your way to your destination with this futuristic self-driving sleep pod

Have you ever had one of those overnight trips that you just couldn't wait to be over? The kind that leaves you feeling exhausted before you even reach your destination, with cramped seats and noisy cabin passengers disrupting your sleep? We've all been there. Well, there's some new technology being explored that could someday turn those dreaded journeys into something you'll actually look forward to.We're talking about the Swift Pod , a futuristic concept that could not only change the game but rewrite the entire rule book of long-distance travel. Intrigued? I thought you might be. So, let's dive in and see what makes this pod so cool, shall we? GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Say goodbye to cramped airplane seats and the chaos of airport security. Instead, you'll be snuggled up in a cozy bed, drifting off to sleep as the world whizzes by outside. No, you're not on a fancy sleeper train. You're in the Swift Pod, a sleek futuristic autonomous vehicle that's part car, part hotel room. This cool concept contraption, designed by Peter Stulz, head designer at xoio GmbH, lets you wake up at your final spot feeling fresh as a daisy and ready to roll. CLICK HERE FOR MORE U.S. NEWS IS THIS PINT-SIZED ELECTRIC VEHICLE ABOUT TO BE A BIG DISRUPTOR IN THE US? Booking a Swift Pod is as easy as ordering your favorite late-night snack. Just hop online, punch in your details, and - voila - your pod will show up right at your doorstep, ready to whisk you away on your nighttime adventure. Once you're settled in, the pod's brainy navigation system takes over. It figures out the perfect speed to get you to your destination on time while keeping things eco-friendly . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   THIS CRAZY TWO-IN-ONE ELECTRIC VEHICLE COMES EQUIPPED WITH A TWO-SEAT AIRCRAFT HIDDEN INSIDE  The Swift Pod might look compact from the outside, but don't let that fool you. This future concept vehicle can comfortably fit two travelers, with space for sitting upright during the day and a plush bed when it's time to hit the hay. And because no road trip is complete without snacks, the pod comes stocked with drinks and nibbles to keep you fueled up. There's even a nifty media system to keep you entertained. Netflix and chill, anyone? GET FOX BUSINESS ON THE GO BY CLICKING HERE REVOLUTIONARY FLYING CAR PROMISES HIGHWAY SPEEDS AND 3-HOUR FLIGHTS  Here's where things get really cool. The Swift Pod doesn't just zoom you from A to B. It can make pit stops along the way. Craving a coffee or snack with a view? The pod's got you covered with a constantly updated list of scenic spots to choose from. However, let's pump the brakes a bit because it is still very much just a concept, and it would likely take years to turn this all into reality. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The Swift Pod could really shake things up in the travel world. It combines comfort, convenience and cool technology to make overnight trips something you'll actually enjoy. No more dreading those long journeys. Just think about settling into your cozy pod and waking up refreshed at your final destination. As we look to the future, it's interesting to think about how this innovative concept could change our travel experiences forever.Would you feel safe enough to trust an autonomous pod like the Swift Pod to get you from point A to point B for overnight travel? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.  All rights reserved.

Iranian hackers ramp up digital attacks on US political campaigns

Elections are coming up, and threat actors are ramping up efforts to manipulate voters and attack political campaigns. Cybersecurity researchers have discovered new network infrastructure set up by Iranian hackers, aimed at targeting U.S. political campaigns. They use phishing emails and links to trick users into installing malicious software, often pretending to be cloud services. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE The infrastructure has been discovered by Recorded Future's Insikt Group , which has been tracking it since June 2024. The cybersecurity company has linked the infrastructure to GreenCharlie, an Iran-nexus cyberthreat group with connections to Mint Sandstorm, Charming Kitten, and APT42."GreenCharlie's phishing operations are highly targeted, often employing social engineering techniques that exploit current events and political tensions," Recorded Future said.The hackers have set up their systems very carefully, using specific services to create websites for phishing attacks . These fake websites often look like they belong to cloud services, file-sharing platforms or document-viewing tools to trick people into sharing personal information or downloading harmful files.Some examples of these fake website names include "cloud," "uptimezone," "doceditor," "joincloud" and "pageviewer." Most of these sites were registered with the .info domain, which is a change from the other domains like .xyz, .icu and .online that hackers used in the past. DON'T FALL PREY TO THIS ELECTION SEASON'S CRAFTIEST SCAMS The threat actors are known for launching highly targeted phishing attacks , where they use sophisticated social engineering tricks to infect users with malware. Some of the malware they use includes POWERSTAR (also known as CharmPower and GorjolEcho) and GORBLE, which was recently identified by Google's Mandiant as being used in attacks against Israel and the U.S."Iran and its associated cyber-espionage actors have consistently demonstrated both the intent and capability to engage in influence and interference operations targeting U.S. elections and domestic information spaces. These campaigns are likely to continue utilizing hack-and-leak tactics aimed at undermining or supporting political candidates, influencing voter behavior, and fostering discord," the cybersecurity company said. HACKED, SCAMMED, EXPOSED: WHY YOU'RE 1 STEP AWAY FROM DISASTER ONLINE A phishing email or message is often the start of a cyberattack. Hackers send you a link that is designed to look legitimate, but it's not. Instead, it delivers malware to your computer, giving hackers access to your system and allowing them to steal your money and data. You can't blame yourself if you don't recognize a phishing link.Earlier this month, I reported on malware called "Voldemort," which tricks people into clicking malicious links by pretending to be a government agency. This highlights how clever these scammers are in using deceptive techniques to infect your devices.The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices .To protect yourself from phishing attacks that use fake cloud services and other deceptive tactics, here are some specific steps you can take. 1) Verify website URLs: Always check the URL of a website before entering any sensitive information. Look for signs of a secure connection, such as " https: //" and a padlock symbol in the browser's address bar. Be cautious of slight misspellings or unusual domain extensions like .info. 2) Invest in data removal services: Hackers target you based on your publicly available information. That could be anything from your leaked info through a data breach to the information you provided to an e-commerce shop. Check out my top picks for data removal services here. 3) Keep software and systems updated: Regularly updating your operating system, browsers and security software is crucial to protect against vulnerabilities that hackers could exploit. Updates often include security patches, bug fixes and performance improvements. Enable automatic updates to ensure you don't miss important patches. Manually check for updates if automatic options aren't available. Staying current helps maintain device security and functionality. 4) Use strong, unique passwords: Employ strong, unique passwords for each account to prevent unauthorized access. Create passwords with a mix of letters, numbers and symbols, and avoid using the same password for multiple accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Get more details about my best expert-reviewed Password Managers of 2024 here . 3 MOST DANGEROUS TECH THREATS TO 2024 ELECTIONS U.S. elections not only matter to Americans but also to the rest of the world, which is one reason foreign adversaries are attempting to manipulate the campaigns. Hackers are working hard to infect people's devices to conduct espionage, spread misinformation and cause financial losses. The best thing you can do is stay alert, avoid clicking any links you don't trust and invest in antivirus software. Hackers are changing their methods, so it's important to take advantage of the available tools to protect yourself.Do you verify the authenticity of a website or email before clicking on links or providing personal information? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Chinese robo-helper can clean, cook, even shoot hoops

Chinese startup Astribot has officially launched its latest creation, the S1 humanoid robot, in a video that showcases its impressive range of household capabilities. The S1 can be seen making waffles, feeding a cat, serving tea and even shooting hoops. This launch follows the robot's initial reveal in April, where only the upper half was shown, leaving many curious about its complete design. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Unlike many humanoid robots that focus on bipedal movement for industrial applications, the S1 is designed for domestic tasks. It features a wheeled base and a single flexible "leg" that bends at the knee, opting for a more reliable and straightforward setup. The robot is not solely battery-operated, as it is shown connected to a power source in the video. 6-WHEELED ROBOT THAT CHECKS OUT DANGEROUS SITUATIONS SO HUMANS DON'T HAVE TO The S1 has a top speed of approximately 22.4 feet per second. Each arm has seven degrees of freedom and can handle payloads of up to 22 pounds. Instead of a traditional humanoid hand, the S1 is equipped with a dual-digit gripper that allows it to perform a variety of complex tasks. The AI-driven capabilities of the S1 enable it to learn and adapt, making it proficient in chores such as vacuuming, martial arts instruction and even remote play with pets using virtual reality goggles. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET YOUR NEXT TAKEOUT BURGER COULD ARRIVE AT YOUR DOORSTEP VIA ROBOT DELIVERY The Astribot S1 humanoid robot is designed to excel in various domestic tasks, showcasing its versatility and advanced AI-driven capabilities. Here are some of its specific tasks and capabilities. DON'T HAVE ANYONE TO PLAY PING-PONG WITH? NO PROBLEM WITH THIS CREEPY COMPETITIVE ROBOT Cooking: The S1 effortlessly prepares waffles, carefully managing each step, from pouring the batter to flipping the waffle with a seamless wrist rotation. It even scoops out the waffle when it's finished cooking and places it on a plate. Preparing tea: It also excels at making kung fu tea and handling different tools and materials with varying sensitivities. The robot adapts its grip and force on the fly, preventing damage to delicate items like fragile ceramic cups while maintaining control over sturdier ones such as heavier metal kettles. Cleaning: It is proficient in vacuuming and other cleaning tasks, ensuring a tidy living space. Pet care: The robot can feed pets, such as cats, and engage in remote play using virtual reality goggles. Sports: The S1 can shoot hoops, showcasing its dexterity and coordination. It is also capable of practicing Wing Chun martial arts, highlighting its agility and ability to manage complex sequences of motion. Music: The S1 also performs complex musical pieces, such as playing the yangqin, a traditional Chinese hammered dulcimer. This task requires precise control of the striking instruments and the ability to adjust based on the instrument's feedback, showcasing the robot's advanced sensory integration.The launch video claims that all footage is genuine and recorded at normal speed, with no teleoperation involved. While the S1's capabilities are impressive, the company has yet to provide detailed information about the hardware specifications or the AI learning methods used to train the robot. We reached out to Astribot for this information but did not hear back by our deadline.While the demonstration of the robot's capabilities is impressive, it is important to note that the video showcases carefully selected tasks performed in controlled environments. The real-world performance and adaptability of the S1 remain to be tested, raising questions about how well it will function in everyday situations. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES With its unique design and impressive range of skills, the Astribot S1 really shows how AI-powered assistants could become a big part of our everyday lives. As we look forward to more updates from Astribot, it's clear that the S1 is setting a new benchmark in the competition for versatile and capable household robots.After learning about the Astribot S1 and its impressive capabilities, would you consider having a robot like this in your home to assist with daily tasks? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

4 best ways to save on bills

Are you feeling the pinch of those monthly bills ? Well, you're not alone. From internet and cellphone charges to utilities and security expenses, it seems like everyone's looking for ways to trim the fat from their budget. But here's the good news: You've got more power to slash those costs than you might think.We're going to dive into some clever tricks and insider tips to help you save big on your essential services. Whether you're dealing with internet monopolies, considering a cellphone switch, navigating utility options or thinking about home security, we've got you covered. So, let's explore how you can keep more money in your pocket without sacrificing the services you need. Ready to become a bill-busting pro? Let's get started. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Unfortunately, certain companies have a monopoly in particular areas as an internet service provider. In fact, some locations only have one choice of an internet service provider. Where there is more than one provider, use one company's offer and pricing against the current provider. You can ask your current provider to terminate your service, and they will usually try to keep you as a customer by giving you discounts to lower your bill. Some companies, such as Spectrum, give you deeper discounts if you bundle your services and sign up for additional services, such as mobile or TV services.While the Affordable Connectivity Program (ACP) has ended, there are still other ways to save on your internet bill.  The Lifeline Program is a federal initiative that offers a monthly discount on phone or internet service for eligible low-income households. Although the discount is smaller than the ACP, it can still help reduce your monthly costs. Additionally, many internet providers offer their own discounted plans for low-income households. Companies like AT&T, Spectrum and Xfinity have programs that provide reduced rates if you meet certain income requirements or participate in federal programs like SNAP or the National School Lunch Program. By exploring these options, you can still find ways to reduce your internet bill and keep more money in your pocket. TOP 6 HIDDEN WAYS A VPN CAN SAVE YOU MONEY NOW Gone are the days when you had to keep your cellphone provider if you wanted to keep your mobile phone number. Now, with a surge of new cellphone providers , there is no better time to save. While it is easiest to stay with your current cellphone provider, it likely will not save you the most money. Most cellphone providers focus their biggest savings on attracting new customers, not their current ones. You can use this to your advantage by moving to a new provider for huge cost savings for nearly identical provisions. Additionally, some legacy cellphone providers own smaller cellphone providers. For instance, Verizon owns Visible. The cost difference, however, between them is pretty stark, with Verizon often costing upwards of $70 per month, depending on the plan, whereas Visible starts at $25 per month for unlimited talk, text and data. If you're looking for affordable cellphone plans, there are several providers that offer budget-friendly options without sacrificing quality. Companies like Consumer Cellular, AT&T, Verizon, Mint Mobile, Visible, Tello, Cricket Wireless, Boost Mobile and US Mobile provide a range of plans to suit different needs and budgets. For example, Mint Mobile offers plans starting at $15 per month, while Visible provides unlimited data for just $25 per month. By exploring these options, you can find a plan that fits your budget and helps you save money on your cellphone bill. Check out the top affordable cellphone plans. CLICK HERE FOR MORE U.S. NEWS 6 WAYS TO SEARCH BEYOND THE COUCH CUSHIONS FOR HIDDEN MONEY Depending on where you live, some states have deregulated the utility service marketplace, which gives the consumer a great advantage . If your state permits it, you will be able to choose between a variety of companies for your utility services. Most states publish the energy rates across providers at the beginning of the month. You can use this information to either lock down a favorable rate or switch providers. Extreme temperatures this year have led to higher electricity prices, especially during peak hours. To save money on your electricity bill, consider using less energy, finding out your electric company's peak hours, programming your thermostat, investing in smart plugs and upgrading to energy-efficient appliances. These strategies can help you reduce your electricity usage and lower your monthly bills, regardless of the season. Check out the 7 best ways to save money on your electricity bill. GET FOX BUSINESS ON THE GO BY CLICKING HERE 5 EASY WAYS TO SAVE MORE MONEY NOW While there are many security services out there, the most cost-effective option is security systems you can install yourself . If monitoring services are included in the system, make sure to double-check the cost. Unless these systems offer low-cost monitoring services, it could end up costing you a lot more in the long run. Home security camera systems are available from companies such as Vivint, ADT, SimpliSafe and Comcast, complete with monitoring and a variety of packages and financing options. Check out our picks for the best home security systems. 6 BEST OUTDOOR SECURITY CAMERAS Whether it is your internet or utility bill, there is always an opportunity to save more money. Comparing costs and calling your provider takes a little bit of work, but if you're willing to make the effort, the savings can really add up.What strategies have you found most effective in negotiating or managing your bills? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: AI version of dead actor

IN TODAY'S NEWSLETTER:- 'Alien: Romulus' director defends AI version of dead actor's likeness after fan backlash
- Nvidia is 'one of best companies ever' to adapt with market landscape: Adam Kobeissi
- Buy Nvidia between $95 and $104: D.R. Barton 'ALIEN' RESURRECTION: Fans of the "Alien" franchise had a few concerns about the appearance of beloved actor Ian Holm brought back to life by artificial intelligence . CHANGING MARKET: Kobeissi Letter editor-in-chief Adam Kobeissi said to expect volatility with AI-focused Nvidia's stock, and that the dips are buying opportunities, on FOX Business' "Making Money." WHEN TO BUY: Woodshaw Financial Group principal D.R. Barton analyzes Nvidia and reveals when he would buy the stock on FOX Business' "Varney & Co." NOT DONE YET: Rob Luna Wealth Academy founder Rob Luna discussed what's behind Nvidia's stock plunge on FOX Business' "Making Money." FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

The mystery behind those creepy 'Unknown' spam calls

Scammers are becoming more sophisticated in their attempts to steal your sensitive data. One particularly concerning trend is the rise of targeted phone scams, where callers possess just enough information to seem legitimate but are actually phishing for more details to exploit.Recently, we received an email from James in LA detailing his unsettling experience with a series of suspicious phone calls. His story serves as a stark reminder of the importance of vigilance in protecting our personal information. Here's what James shared with us:"I have received multiple random unknown calls (in the past two months), and they always start with the person calling me on the phone (listed as unknown) and providing my full name. Absolutely Correct. Then, ask if I am that 'name, in (insert city). Then, when I say no, you have the wrong guy, they provide a birthdate and ask if it is mine, which, of course, it is Not. Then, they politely apologize, say thank you, and hang up. At that point, you realize that they never told you who they are representing. Maybe I'm paranoid, but it just seems strange."James' experience is not unique. Many people across the country are reporting similar incidents, where callers seem to have a partial set of personal information and are attempting to verify or expand upon it. This tactic, known as "social engineering," is a common method used by scammers to gain trust and extract valuable data. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE The mystery behind these creepy 'Unknown' spam calls often begins with data breaches or information leaks. Scammers obtain partial information from various sources, including public records, social media profiles or purchased data from the dark web . They then use this incomplete data as a starting point for their phishing attempts, aiming to fill in the gaps and create a more complete profile of their targets. 4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH Let's break down the tactics used in these calls: Partial Knowledge: The scammer starts with some correct information, like a full name and city. This creates an illusion of legitimacy and can catch you off guard. However, they might be phishing for more details, like your birthdate. Verification requests: By asking to confirm additional details like a birthdate, the scammer is attempting to gather more valuable personal information. Vague identity: The caller never identifies themselves or their organization, making it difficult to verify their legitimacy or report them later. Polite disengagement: The quick, polite end to the call is designed to leave the recipient feeling that nothing suspicious has occurred, reducing the likelihood of immediate suspicion or action .These tactics are carefully crafted to exploit human psychology. The initial correct information builds trust, the request for verification seems reasonable and the polite exit leaves the recipient with a positive final impression. WORLD'S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM You might wonder, "What harm can come from confirming my birthdate?" Unfortunately, in the wrong hands, even small pieces of information can be dangerous. Scammers can use these details to:Data is a valuable commodity these days, and every piece of personal information should be guarded carefully. MASSIVE DELL DATA BREACH HITS 49 MILLION USERS - WHAT THIS MEANS FOR YOUR PRIVACY AND SECURITY In light of the sophisticated tactics employed by scammers, it is important to protect your personal information. Here are some measures you can implement:It is essential to never provide personal information over the phone to unknown callers. Always use caller ID and refrain from answering calls from numbers you do not recognize. If you do answer a call, avoid confirming or denying any information the caller claims to have. Be particularly wary of callers who create a sense of urgency or use fear tactics to manipulate you.When you receive a suspicious call, ask for the caller's name, the company they represent and a callback number. However, do not call back immediately; instead, take the time to research the company independently. Look up official contact information online and call that number to verify the legitimacy of the initial call.To further protect yourself, enable spam-blocking features on your phone. You may also consider using call blocking apps which can help screen calls and identify potential spam. Additionally, regularly updating your phone's operating system will ensure that you benefit from the latest security features and protections. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? If you encounter suspicious calls, it is important to report them to your phone carrier. You should also file a complaint with the Federal Trade Commission (FTC). If you believe you have been a victim of fraud, consider reporting the incident to local law enforcement to help protect yourself and others in your community.To reduce your online presence, consider using a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Additionally, make it a habit to regularly Google your name and phone number to see what information is publicly available about you. GET FOX BUSINESS ON THE GO BY CLICKING HERE Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft. To enhance the security of your online accounts, use strong and unique passwords for each one. It is also wise to avoid using easily guessable information, such as birthdates, in your passwords. Consider using a password manager to generate and store complex passwords. Also, enabling two-factor authentication wherever possible on your devices adds an extra layer of security.When using social media, review and tighten your privacy settings to limit who can see your personal information. Be mindful of the details you share publicly, as scammers often use social media to gather information. Additionally, avoid accepting friend requests or messages from unknown individuals to reduce the risk of falling victim to scams.By implementing these comprehensive steps, you will significantly reduce your risk of falling victim to phone scams and identity theft. Remember that protecting your personal information is an ongoing process that requires vigilance and regular attention. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES ers are constantly evolving their tactics, making it crucial for us to stay one step ahead. James' experience serves as a wake-up call for all of us. It's not just about being cautious; it's about being proactively defensive with our personal data.Remember, every piece of information you share, no matter how small, can be a puzzle piece for scammers. Your birthdate, your city, even your social media posts - they're all potential tools in a scammer's arsenal. But don't let this paralyze you with fear. Instead, let it empower you to take control of your digital footprint. By implementing the steps we've discussed - from being alert on phone calls to using data removal and identity protection services - you're not just protecting yourself. You're also making it harder for scammers to operate, potentially saving others from falling victim.What's the most unusual or clever scam attempt you've encountered, and how did you handle it? Your experiences could help others recognize and avoid similar scams in the future. Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved.

The military robot protecting soldiers from chemical, biological dangers

Have you ever wondered how our brave soldiers deal with nasty stuff like chemical and biological weapons? Currently, it's a risky and time-consuming process. Soldiers have to suit up in cumbersome NBC (nuclear, biological, chemical) protective gear and spend about an hour decontaminating a single vehicle. It's not just uncomfortable, it's downright dangerous, putting our troops directly in harm's way.However, that's all about to change because the Army is rolling out some seriously cool robot tech that's about to change the game. So, instead of soldiers suiting up in those bulky hazmat suits to clean contaminated vehicles, they've got smart robots doing the dirty work. This new system, called the autonomous equipment decontamination system , is all about keeping our troops safe. Let's look into how this new technology is revolutionizing military operations and making the battlefield a whole lot safer for our men and women in uniform. GET SECURITY ALERTS AND EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Nuclear, chemical and biological (NBC) weapons have long been a source of fear and deterrence in global conflicts. While their use has been limited since World War I, the potential for deployment by rogue states or in near-peer conflicts remains a constant concern. Countries like Iraq and Syria have demonstrated that these weapons still exist and can be used, prompting NATO and other military organizations to conduct regular anti-NBC drills to prepare for potential threats. NEW BREED OF MILITARY AI ROBO-DOGS COULD BE THE MARINES' SECRET WEAPON Decontaminating vehicles and equipment exposed to chemical or biological agents is a daunting task that poses significant challenges. The process is not only time-consuming but also extremely dangerous for the soldiers involved. It can take up to an hour and require the efforts of 30 soldiers, all of whom must wear cumbersome NBC suits designed to protect them from exposure. These suits, while theoretically capable of being worn for extended periods, can be uncomfortable and restrictive, making the decontamination process even more arduous. THIS IS THE WAY CLEAN FREAKS GET THEIR FILTHY TECH SPOTLESS COULD THESE CREEPY, DEAD, STUFFED BIRDS BE USED AS DRONES FOR THE MILITARY? To address these challenges, the Army is developing the autonomous equipment decontamination system. This innovative robotic system utilizes cameras and a mobile platform to identify contaminated areas and clean them without putting soldiers at risk. By taking on the dangerous task of decontamination, the system promises to enhance safety for military personnel in the field. HOW TO STOP ANNOYING ROBOCALLS U.S. MILITARY JET FLOWN BY AI FOR 17 HOURS: SHOULD YOU BE WORRIED The autonomous equipment decontamination system employs a camera-equipped unmanned ground vehicle that scans the contaminated vehicle's surface. As it circles the vehicle, the camera transmits contamination data back to operators who are safely positioned at a computer. A robotic arm then uses this data to apply a special cleaning solution to the identified hot spots. This approach not only protects soldiers from hazardous exposure but also conserves valuable decontaminants, which are often in limited supply during military operations.At a recent testing event called MSPIX (Maneuver Support and Protection Integration eXperiments), soldiers from the 1st Armored Division had the opportunity to operate the system and provide crucial feedback. Their insights will play an important role in refining the technology and ensuring it meets the needs of those on the front lines. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The soldiers expressed their enthusiasm about the system, emphasizing that it allows them to remain safe while effectively managing decontamination tasks. They appreciated the user-friendly interface and the opportunity to communicate directly with the technology developers, ensuring that their requirements were taken into account.The autonomous equipment decontamination system offers several significant advantages. By keeping soldiers away from dangerous contaminants, it reduces the risk to human life during decontamination operations. Additionally, the system minimizes the time and soldiers required for these tasks, allowing military personnel to focus on their primary missions. Furthermore, by conserving water and decontaminant resources, the system enhances operational efficiency. What's more, the ability to operate the system from a safe distance ensures that soldiers can maintain their safety while effectively managing potential threats. GET FOX BUSINESS ON THE GO BY CLICKING HERE The development of the autonomous equipment decontamination system is a game-changer when it comes to keeping our soldiers safe from the dangers posed by chemical and biological weapons. By harnessing the power of robotics and autonomous technology, the military is not only reducing the risks to human life but also making decontamination procedures much more efficient. As this technology advances, it's becoming an essential tool in modern warfare. It allows our military personnel to operate safely and effectively, even in hazardous environments.In a world where the threat of nuclear, chemical and biological weapons is still very real, innovations like this are vital for ensuring the safety and effectiveness of our armed forces. It's reassuring to think about how these advancements can help protect those who serve and keep them out of harm's way.How do you feel about the impact of technology on soldier safety? Do you think robotic systems are the future of military operations? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Turn any bike into an e-bike in seconds with this nifty gadget

For all you bike riders out there, I bet you never thought you could turn your regular bike into an e-bike. It's now possible without the hassle of tools or complicated installations. Let me introduce you to Clip, the world's first plug-and-play solution that makes upgrading your ride a breeze.Founded by Som Ray and Clem De Alcala, this innovative startup from Brooklyn believes that electric biking should be accessible and affordable for everyone. With Clip, you can easily transform your bike into an e-bike and enjoy the benefits of electric assistance without breaking the bank. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE With 80% of urban trips being between six and eight miles, traditional e-bikes often feel like overkill. Clip offers just the right amount of assistance, making it perfect for short commutes. Attach it to your bike in seconds and enjoy the extra boost when needed. Whether you're navigating city streets or tackling a few hills, Clip provides just the perfect amount of extra power to make your ride smooth and enjoyable. CLICK HERE FOR MORE US NEWS MY #$%^ ACHING [INSERT AILMENT] This innovative device attaches to your bike's front fork, easily turning it into an e-bike. Clip is compatible with all city, road and bikeshare bikes with 26-inch to 28-inch tires. Weighing just 8.8 pounds for the Commuter model and 9.8 pounds for the Explorer model, it uses a friction-drive principle to provide propulsion, and its Bluetooth remote lets you control the ride-assist feature.The Clip allows for a top speed of 15 mph and a range of up to four to six miles on the Commuter model and 10 to 12 miles on the Explorer model. It has a state-of-the-art lithium-ion battery pack designed to maximize performance and Clip. The Clip's innovative regenerative braking system also recharges the battery while riding. Plus, the Clip can be conveniently charged from a standard outlet, making it easy to power up just about anywhere. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET ELECTRIC CARGO BIKE AIMS TO REPLACE YOUR SUV Starting at just $499, Clip is a game-changer for anyone looking to upgrade their bike without breaking the bank. Traditional e-bikes can often cost between $1,500 and $6,000, making them a significant investment. Even e-bike upgrades usually range from $650 to $1,200. Clip, however, offers a cost-effective alternative that makes electric biking accessible to a wider group of bikers. GET FOX BUSINESS ON THE GO BY CLICKING HERE HOW E-BIKES ARE EXPLODING AND KILLING PEOPLE Clip plans to introduce a low-cost version called BOLT in emerging markets like India. By partnering with cities and bikeshare programs, Clip is poised to play a significant role in reducing urban congestion and CO2 emissions. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Clip is pretty cool and could be a game-changer for anyone looking to upgrade their regular bike to an e-bike. With its easy installation and affordable price, it opens the door for more people to enjoy the benefits of electric biking without the hefty price tag of traditional e-bikes. Whether you're commuting to work or just taking a leisurely ride, Clip is designed to make your journey smoother and more enjoyable.How do you feel about the shift towards electric mobility solutions like Clip versus traditional bikes? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

11 Android tips, tricks for getting most from your phone

Android phones are packed with features and customization options, making them incredibly versatile and user-friendly. Even seasoned Android users might not be aware of all the cool tricks their devices can perform. Here are some tips and tricks to help you get the most out of your Android phone, including some hidden gems you may not know about. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Split-screen mode allows you to use two apps simultaneously, perfect for multitasking. Here's how to enable it:S ettings may vary depending on your Android phone's manufacturer  Now, you can drag the divider to adjust the screen space for each app. BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024 rget=_new href="https://www.foxnews.com/tech" target="_blank" rel="noopener"> Quick Settings allow you to access essential features quickly. You can customize the layout to include your most-used settings:S ettings may vary depending on your Android phone's manufacturer  This ensures your Quick Settings panel is tailored to your needs. HOW TO CROP OR ROTATE A PHOTO ON YOUR ANDROID One-handed mode makes it easier to use large screens with one hand. To enable it:S ettings may vary depending on your Android phone's manufacturer  Now, you can swipe down from the center of the bottom edge or double-tap the Home button (depending on your choice) to shrink the screen for easier one-handed use.Android allows you to customize notifications for different apps to prioritize important alerts. This helps ensure you don't miss critical notifications while reducing unnecessary interruptions. Here's how:S ettings may vary depending on your Android phone's manufacturer rget=_new href="https://cyberguy.com/privacy/best-services-for-removing-your-personal-information-from-the-internet/" target="_blank" rel="nofollow noopener"> HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  Adding emojis or GIFs to your messages can make your conversations more fun and expressive. Here's how to do it:S ettings may vary depending on your Android phone's manufacturer rget=_new href="https://www.foxnews.com/tech/what-is-ai-artificial-intelligence" target="_blank" rel="noopener"> WHAT IS ARTIFICIAL INTELLIGENCE (AI)? rget=_new href="https://cyberguy.com/tech-tips-tricks/emojis-for-dummies-how-to-add-emojis-into-your-text-messages-and-emails/" target="_blank" rel="nofollow noopener"> EMOJIS FOR DUMMIES: HOW TO ADD EMOJIS INTO YOUR TEXT MESSAGES AND EMAILS Google Assistant Routines can automate multiple actions with a single command. To set up a routine:S ettings may vary depending on your Android phone's manufacturer rget=_new href="https://cyberguy.com/kurts-picks/best-accessories-for-your-android/" target="_blank" rel="nofollow noopener"> BEST ACCESSORIES FOR YOUR ANDROID Dark Mode can help save battery life and reduce eye strain. Here's how to enable it:S ettings may vary depending on your Android phone's manufacturer  Some apps may or may not support Dark Mode, so keep that in mind. This can be enabled/disabled within their respective settings. GET FOX BUSINESS ON THE GO BY CLICKING HERE rget=_new href="https://www.youtube.com/c/KurttheCyberGuy?sub_confirmation=1" target="_blank" rel="nofollow noopener"> SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Autofill makes it easier to enter passwords and other information. To enable or disable it:S ettings may vary depending on your Android phone's manufacturer rget=_new href="https://cyberguy.com/how-to/how-to-easily-enable-and-disable-autofill-on-your-android/" target="_blank" rel="nofollow noopener"> HOW TO EASILY ENABLE AND DISABLE AUTOFILL ON YOUR ANDROID Android offers several accessibility options to make your phone easier to use. Here's how to find and adjust them:S ettings may vary depending on your Android phone's manufacturer  These features can enhance your phone's usability if you have vision or hearing impairments. SUBSCRIBE TO KURT'S FACEBOOK PAGE FOR QUICK TECH TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Creating custom stickers from your photos can be a fun way to personalize your messages. Here's how:S ettings may vary depending on your Android phone's manufacturer  Now, you can use your custom stickers in messages and other apps. HOW TO TRANSFORM YOUR PHOTOS INTO FUN STICKERS ON YOUR ANDROID Edge Panels provide quick access to your favorite apps, contacts and more. To enable and customize Edge Panels:S ettings may vary depending on your Android phone's manufacturer  Customize your panels by adding the apps and shortcuts you use most. These panels make it easy to access your favorite features with a swipe. GET QUICK ACCESS TO YOUR FAVORITE APPS WITH ANDROID'S EDGE PANELS Android phones have loads of cool features that can help you customize your phone to fit your needs and preferences. Note, though, that even though most Androids have more or less the same settings, they can look slightly different depending on the model, what version of Android is running, etc. If you need help, you can search for how to do something based on your specific phone online, and you should find the answer. Or, go to your local phone store and ask for help.What Android features do you love most? Are there any new tips you plan on trying from this list? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

The privacy predicament of NYC's Traffic Cam Photobooth site

On the streets of New York City , an interesting yet slightly unsettling trend is unfolding, where technology meets the ever-present eyes of surveillance. This is the world of the Traffic Cam Photobooth, a website brought to life by Brooklyn artist Morry Kolman . The website allows you to take selfies using the city's traffic cameras, offering a quirky twist on capturing your city adventures.However, while it might seem like harmless fun, this innovation also sparks a significant conversation about privacy and security. In a city where surveillance is omnipresent, this website challenges us to rethink what privacy means in public spaces and how comfortable we are with being constantly watched. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE So, how does this website work? Trafficcamphotobooth.com gives you access to over 900 traffic cameras scattered across New York City. With just a few clicks, you can select a camera from various locations and snap a photo in either a filmstrip, Polaroid or neon-green format. The Polaroid frame includes the caption: "I'm being watched." The innovation behind this website lies in the New York City Department of Transportation's (DOT) live camera feeds, which update every two seconds. CLICK HERE FOR MORE U.S. NEWS Kolman was inspired by a creative challenge in a class he was taking to snap a picture without being behind the camera, leading to this innovative use of public infrastructure. It's a playful twist on traditional photography that quickly captures the public's imagination. But as fun as it sounds, it also raises some important privacy concerns. DON'T EMBARRASS YOURSELF BY SENDING THESE TYPES OF PHOTOS So, let's talk privacy. While the idea of using public traffic cameras to take personal photos might sound harmless, it blurs the line between public surveillance and individual privacy. Yes, the camera feeds are publicly accessible, but using them to capture personal moments raises questions about privacy rights in public spaces.Critics argue that even though there's no expectation of privacy on public streets, the active use of surveillance for personal purposes can feel intrusive. Imagine walking down the street and realizing that someone could be taking a photo of you without your knowledge. It's a bit unsettling, isn't it? This website forces us to confront the broader issue of consent and the ethical use of surveillance technology in our everyday lives. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   THE AI CAMERA STRIPPING AWAY PRIVACY IN BLINK OF AN EYE Security experts also have raised concerns about the potential misuse of this website. The ease of access to traffic camera feeds might invite unauthorized surveillance activities, leading to potential breaches of privacy for individuals who unknowingly appear in these feeds. The broader implications of such surveillance technology include the risk of mass data collection and potential misuse by authorities or private entities.As more data is collected, the potential for breaches increases, posing risks not only to individual privacy but also to public safety. It's a classic case of technology outpacing regulation, and it highlights the need for clear guidelines and oversight. POLICE ARE USING INVASIVE FACIAL RECOGNITION SOFTWARE TO PUT EVERY AMERICAN IN A PERPETUAL LINEUP Despite its popularity, with over 10,000 photos taken and 30,000-40,000 visits, the DOT has remained silent on this use of its infrastructure. Kolman suggests that the DOT's setup inadvertently facilitates such applications, but the lack of an official response leaves room for speculation about future regulatory actions.Public opinion is divided. Some people love the creative use of technology, while others are concerned about privacy implications. The absence of a formal stance from the DOT highlights the challenges that arise when public infrastructure is used in unexpected ways. As cities grapple with the rapid pace of technological advancement, the need for adaptive policies and regulations becomes increasingly apparent. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Kolman has expressed interest in expanding the project to other cities and is open to collaborations, indicating a potential for wider adoption. However, this expansion could further complicate privacy and security considerations, as different cities may have varying regulations and public sentiments regarding surveillance. GET FOX BUSINESS ON THE GO BY CLICKING HERE The potential for open-source collaboration also raises questions about the control and oversight of such technology. As the project grows, it will be essential to engage with local communities and stakeholders to address concerns and ensure that the technology is used responsibly.We reached out to Kolman, who emphasized the site's commitment to privacy and security. He said, "As a site intended to highlight how our privacy is invaded every day by surveillance cameras, the site is designed to be as safe, privacy-respecting and secure as possible." He went on to say that as far as the functionality of the website:1. "No data ever leaves the user's device. Finding the nearest camera, taking the picture and saving the photo are all done completely locally. Even I, the person running the site, can't see what pictures people take or where they take them."2. "I track nothing besides hits on my home page and how many photos are taken on the Photobooth page. I deliberately built my own solution for this so [that] I would not subject users to an analytics tool like Google Analytics that would be much more invasive."Kolman acknowledged concerns regarding potential misuse of the tool, saying, "They fundamentally misunderstand what the tool does and direct their worry at the wrong place. I did not make these cameras public, I do not record any locations, and there is no way to use these cameras to 'track' someone unless you already had information about their whereabouts by some other means."He added, "You should be uncomfortable with the amount of cameras that exist around the city. The purpose of the site is to draw attention to that sprawling surveillance regime, and if learning about it unnerves you, it is because you are finally paying attention."Kolman concluded by saying, "I'm an artist and a developer; I think deeply about these topics, and it's important to me that this project provides an interesting and engaging gateway to address the serious and omnipresent topic of mass surveillance."While it's fascinating to see how technology can be creatively repurposed, we must also consider the implications of being constantly watched. The ability to capture personal moments using public infrastructure blurs the lines between public and private life, raising important questions about consent and the ethical use of surveillance. As we move forward, it's crucial to strike a balance between embracing technological innovation and safeguarding our privacy rights. After all, in a world where every street corner might have a camera, it's worth asking: How much of our personal space are we willing to give up?Do you believe the convenience and creativity offered by websites like Traffic Cam Photobooth justify the potential invasion of privacy by using public surveillance cameras for personal use? Let us know by writing us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Holy See calls for end to autonomous weapons

IN TODAY'S NEWSLETTER:- Holy See urges 'moratorium' on development of autonomous killing weapons at United Nations- Online graphic design platform hit with backlash over 'insane' price hikes that reach 300%- Autonomous car bombs, online recruitment: Experts worry how AI can transform terrorism 'PROPER HUMAN CONTROL': A delegation representing the Holy See urged the United Nations this week to put a moratorium on autonomous weapons designed to kill without human decision-making. 'INSANE': Canva is facing pushback from customers over plans to increase subscription prices by more than 300% in some instances. TIME TO ACT: Experts worry that terrorists will find novel and problematic uses for artificial intelligence , including new methods of delivering explosives and improving their online recruitment initiatives.  ROBOT INSPECTOR: Developed by Beca, a leading engineering firm in New Zealand, PIPE-i is a robotic survey vehicle that boldly ventures into hazardous and confined spaces like culverts and tunnels.  FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

New Harry Potter-named malware strikes, revealing global espionage campaign

A new malware has been detected by security researchers that is suspected of conducting espionage. Hackers infect devices by impersonating government agencies, usually tax agencies such as the Internal Revenue Service (IRS). Once the malicious software is on a PC, it can gather intelligence (collecting personal data, passwords and more), download additional malicious software and upload data to the hacker's server. It does all this while using Google Sheets to avoid suspicion and store data. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE The hackers behind the malware, called "Voldemort," have cleverly designed it to avoid getting caught. Just like the name Voldemort spelled trouble in J.K. Rowling's Harry Potter series, it's causing issues in the cybersecurity world, too.The cyberattack kicks off when you receive an email that looks like it's from a government tax agency. According to Proofpoint , the hackers behind this campaign have been impersonating tax agencies in various countries, including the U.S. (IRS), the U.K. (HM Revenue & Customs), France (Direction Générale des Finances Publiques), Germany (Bundeszentralamt für Steuern), Italy (Agenzia delle Entrate) and, as of Aug. 19, India (Income Tax Department) and Japan (National Tax Agency). Each email lure was customized and written in the language of the tax authority being impersonated.Proofpoint analysts found that the hackers tailored their phishing emails to match the target's country of residence based on publicly available information rather than the organization's location or the language suggested by the email address. For example, some targets in a European organization received emails impersonating the IRS because they were linked to the U.S. in public records. In some cases, the hackers mixed up the country of residence when the target shared a name with a more prominent individual.The email also tries to mimic the email of the government agency. For example, the U.S. folks were sent fake emails using "no_reply_irs[.]gov@amecaindustrial[.]com."In the fake email, hackers impersonating the government warn you about changes in the tax rates and tax systems and ask you to click a link to read a detailed guide. Clicking on the link brings you to a landing page, which uses Google AMP Cache URLs to redirect you to a page with a "Click to view document" button.After you click the button, the hackers check if you're using a Windows device. If you are, you'll be redirected to another page. When you interact with that page, it triggers a download that looks like a PDF file in your PC's download folder, but it's actually an LNK or ZIP file hosted on an external server.When you open the file, it runs a Python script from another server without actually downloading the script to your computer. This script collects system information to profile you, while a fake PDF opens to hide the malicious activity.Once the malware has successfully infected your Windows device, it can:The malware uses Google Sheets as its command center, where it gets new instructions and stores stolen data. Each infected device sends its data to specific cells in the Google Sheet, marked by unique IDs to keep everything organized.Voldemort interacts with Google Sheets through Google's API, using an embedded client ID, secret and refresh token stored in its encrypted settings. This method gives the malware a reliable way to communicate without raising suspicion since Google Sheets is widely used in businesses, making it hard for security tools to block it. HOW TO RECOGNIZE AND AVOID BEING A VICTIM OF VACATION RENTAL SCAMS Hackers are releasing increasingly sophisticated malware, but that doesn't mean you're defenseless. Below are some tips to help protect yourself from such attacks. 1) Read sensitive emails carefully: The best way to spot fake emails that deliver malware is to check them carefully. While hackers may be tech-savvy, their language skills often aren't perfect. For example, in the screenshots above, you can see typos like "Taxplayers" instead of "Taxpayers." Government agencies don't usually make these kinds of mistakes. 2) Check email domain: Verify that the email domain matches the organization it claims to represent. For example, an email from the IRS should come from an address ending in "@irs.gov." Be cautious of slight misspellings or variations in the domain. 3) Invest in data removal services: Hackers target you based on your publicly available information. That could be anything from your leaked info through a data breach to the information you provided to an e-commerce shop. Check out my top picks for data removal services here . 4) Have strong antivirus software: If you have strong antivirus software installed on your device, it can protect you when you receive these types of scam emails or accidentally open the attachment or click a link. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES While researchers can't say for sure, many of the techniques used by the malware are similar to those employed by hackers suspected of espionage. Even if this assessment turns out to be incorrect, the scale and sophistication of the attack are concerning. Anyone without technical knowledge could easily fall victim and lose personal data and money. This attack specifically targets Windows users, which also raises questions about Microsoft's security framework.What measures do you think organizations should implement to better protect individuals from malware attacks? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Solar-powered blimp could bring high-speed internet to your area

Have you ever felt the frustration of losing internet access while camping, hiking or living in a remote area? Whether you're trying to connect with family, access important information or simply enjoy your favorite streaming service, losing internet access can be a real bummer. For many, this is a daily struggle. However, new technology from a company called Sceye could be the answer to these connectivity woes, offering a solution to the digital divide that leaves so many people in the dark. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE The Sceye HAPS is not your average aircraft. This 213-foot-long uncrewed helium-filled behemoth is designed to soar to stratospheric heights, hovering between 60,000 and 65,000 feet above the Earth's surface. What makes it truly special is its ability to beam high-speed internet to areas that traditional infrastructure cannot reach. IS THIS 656-FOOT AIRYACHT THE LUXURY TRANSPORTATION OF THE FUTURE? One of the most impressive features of the Sceye HAPS is its power source. The aircraft is covered in a "solar cape" made of gallium selenide and gallium arsenide solar cells, allowing it to harness the sun's energy to stay aloft for months at a time. This sustainable power approach enables the HAPS to perform its critical tasks continuously, from providing internet access to monitoring environmental conditions. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET THIS FLYING ELECTRIC VEHICLE BREAKS RECORD WITH 523-MILE NONSTOP FLIGHT The Sceye HAPS is already making waves in the real world. It set a long-range record by maintaining a data connection across a distance of over 87 miles, far exceeding the typical LTE range. This achievement has significant implications for bridging the digital divide, especially in areas like the Navajo Nation, where the HAPS is part of a project to provide universal broadband access. By demonstrating its ability to connect over such vast distances, the Sceye HAPS is proving its potential to revolutionize internet access in remote and underserved communities. NASA'S DRAGONFLY DRONE CLEARED FOR FLIGHT TO SATURN'S MOON, TITAN While providing internet access is a key function of the Sceye HAPS, its capabilities extend far beyond that. The aircraft is also being used for climate and environmental monitoring, disaster response, forest fire detection, and tracking and measuring methane emissions as part of an EPA study.The Sceye HAPS continues to impress with its technological advancements. In a recent flight, it demonstrated its ability to charge its batteries during the day and use that power to stay airborne overnight, a crucial step towards long-duration missions. With 20 test flights under its belt and commercial deployment planned for 2025, the future looks bright for this stratospheric innovation. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The Sceye HAPS is shaking things up in the world of global connectivity. Think of it as a high-tech blimp that's on a mission to bring the internet to places that have been left in the digital dark ages. By floating way up in the stratosphere, this clever contraption is tackling problems that have stumped tech experts for years. This flying innovation could be a game-changer in making our world more connected and better prepared for whatever Mother Nature throws our way. Sure, there are still some kinks to work out. But the way things are going, it looks like the Sceye HAPS is proving that when it comes to solving big global problems, sometimes the best solution is to aim high, really high.Do you have any concerns about high-altitude aircraft like the Sceye HAPS floating in the stratosphere? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

Beware of this Social Security scam by crooks trying to trick you

If there is something you can count on, it is that there seems to be a new scam every day. While we've covered different types of Social Security scams over the years, Jeanne from Hackensack, New Jersey, forwarded a new one to share with you."I received this email (displayed below) yesterday. I did not open the attachment. I hovered my mouse over the name of the Sender and immediately saw it as a lie."This vigilant approach by Jeanne demonstrates the importance of being cautious and skeptical when dealing with unsolicited emails, especially those claiming to be from official sources. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE A phishing scam is when a person or group pretends to be an established organization, such as a governmental agency, financial institution or legitimate company. The scammer uses what looks like a legitimate email address and usually attaches what looks like an official invoice or letter. They usually approach with a sense of urgency. In this instance, her Social Security number was compromised. The desired outcome is to get you to open the attachment, which can download a virus or malware onto your device or reach out to them to get your personal information, in this case, over the phone. Luckily, Jeanne knew better, did not open the attachment and reported it to the governmental agency being impersonated. HOW TO RECOGNIZE AND AVOID BEING A VICTIM OF VACATION RENTAL SCAMS Now that you know what types of emails to be wary of, what should you do when you receive them? Below are several methods to protect yourself.Mark the email as junk or spam so your email service provider will learn to flag such emails. This should also make it harder to open the attachments accidentally.Jeanne smartly did not open the attached letter. She hovered her cursor over the attachment and saw it was suspicious. Remember, opening attachments or links from a scammer can download viruses or malware to your device. It can also take you to another website that can glean more of your personal information or release viruses or malware.This will simply validate that they have an actual victim to harass further. Additionally, if you do call them with the number they provided, they can connect your email address to the phone number you use to call them. If there is a problem with a person's Social Security number or record, Social Security will typically mail a letter. You can learn more about recognizing Social Security-related scams, including how to report a scam quickly and easily online to Social Security's Office of the Inspector General, by reading more at  www.ssa.gov/scams . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Preventing yourself from being a target of a scam can save you loads of anxiety and trouble. Below are 8 ways to prevent yourself from being a victim in the first place.Whether you already have an account or not, regularly verifying your Social Security account is crucial. For those who haven't, visit the official Social Security Administration website to create one. Since only one account can be registered per Social Security number, securing yours prevents others from fraudulently claiming it. If you already have an account, ensure it's linked to a secure email that you check often and review your account statements to spot any discrepancies. This proactive approach helps safeguard your personal information and alerts you to any unauthorized activity.Always enable two-factor authentication (2FA) for your online accounts. 2FA adds an extra layer of security by requiring two or more verification methods. It's not just a password; it could be a code sent to your phone, a fingerprint or a facial scan. This makes it much harder for scammers to gain unauthorized access.Cybercriminals often exploit vulnerabilities in outdated software. Regularly updating your operating system, antivirus software and other applications can protect you from these threats. You can also set your devices to update automatically so you don't have to remember to do it manually.Be cautious about sharing personal information online. Think twice before entering sensitive details on websites, especially if you're unsure they're legitimate. Use privacy settings on social media to control who can see your information and be wary of unsolicited requests for your personal data.If you have strong antivirus software installed on your device, it can protect you when you receive these types of scam emails or accidentally open the attachment or click a link. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices .Scammers are becoming increasingly sophisticated in their methods of obtaining personal information. They often scour the web for publicly available data, piecing together details from various sources to create targeted phishing attacks . These personalized scams can be alarmingly convincing, making it crucial to limit the amount of personal information accessible online.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Remove your personal data from the internet with my top picks here. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses . See my tips and best picks on how to protect yourself from identity theft.   Just like Jeanne did, contact the government agency, financial institution or company directly using contact information from their official websites. Ensure that you never use any contact details provided in unsolicited communications, as these can be falsified by scammers to mislead you and become a potential victim.By incorporating these strategies, you can significantly reduce the risk of becoming a victim of phishing scams. Stay vigilant and proactive in protecting your personal information. HEARTLESS SCAMMERS ARE PREYING ON PEOPLE'S LOST PET ANGUISH When it comes to protecting yourself from scammers, you can never be too prepared. Let's face it: These fraudsters are getting craftier by the day. They're like those pesky weeds in your garden; just when you think you've got them all, a new one pops up. But don't let that get you down. With the tips we've covered, you're now armed and ready to spot these scams from a mile away. Stay skeptical of those fishy emails, and when in doubt, reach out to the real organizations directly. And hey, if you ever feel overwhelmed, just think of Jeanne from Hackensack. She didn't fall for the scam and neither will you. You've got this.Have you received a scam email from anyone pretending to be from a governmental agency? How did you respond? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

You'll now be able to charge your devices on the moon

As we gear up to return to the moon with NASA's upcoming Artemis missions, we're not just aiming to set foot there again. This time, we're planning to stay. The Artemis program is focused on establishing a sustainable human presence on the moon, which will serve as a crucial stepping stone for future journeys to Mars.This ambitious mission involves more than just landing astronauts. It requires a whole new level of infrastructure, and that's where Honeybee Robotics steps in with its cutting-edge solutions, contributing to the development of essential technologies needed for living and working on the moon. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Humans haven't set foot on the moon in more than 50 years. As NASA and its partners work to change that, Honeybee Robotics is focused on ensuring we have the power systems necessary for long-term habitation and exploration. In collaboration with mPower Technology, Honeybee Robotics has been selected to develop the Lunar Array Mast and Power System (LAMPS), a key component of the lunar power grid.This system will consist of towers as tall as the Statue of Liberty, equipped with solar panels and batteries, providing power, communications, and even street lighting on the moon. LAMPS utilizes Honeybee's DIABLO technology and mPower's DragonSCALES solar modules, enabling flexible and efficient energy solutions in the harsh lunar environment. CRAZY-STRONG ROBOTIC DOGS GEAR UP FOR MOON MISSION Honeybee Robotics' LUNARSABER initiative complements the lunar power grid by providing deployable towers, approximately 328 feet tall, that integrate solar power, storage and communication capabilities. These towers capture and store solar energy during the lunar day, ensuring power availability during the two-week lunar night.The design includes innovative solar panels that offer 360-degree sunlight capture and large sails that track the sun's position, ensuring nearly 95% solar light access throughout the year. This technology supports lunar operations and lays the groundwork for similar systems that could be used on Mars. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET NASA'S DRAGONFLY DRONE CLEARED FOR FLIGHT TO SATURN'S MOON, TITAN The LUNARSABER towers can function independently or as part of a network, beaming energy and communication signals over long distances. This capability effectively creates a lunar grid, connecting various outposts and vehicles. In emergencies, such as a lunar rover running out of power during the lunar night, a nearby LUNARSABER could direct a concentrated beam of sunlight to recharge its solar panels, ensuring continuous operation. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES THE RACE TO FLOAT TOURISTS TO EDGE OF SPACE IS HEATING UP The idea of having a power grid on the moon is quickly shifting from a far-off notion to something we can actually see taking shape. Honeybee Robotics is playing a big role in making this happen with its LUNARSABER initiative. While there are still hurdles to overcome, the potential for a bustling lunar economy is becoming somewhat more realistic. As these technologies continue to evolve, the moon could possibly become a vibrant center of human activity, setting the stage for future trips to Mars and beyond.If given the opportunity, would you want to be among the first people to live and work on the moon? Why or why not? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt: Copyright 2024 CyberGuy.com. All rights reserved.

This sneaky malware is after your passwords and personal data

Apple Macs have historically been targeted less by hackers than Windows devices, but this trend is shifting. In recent months, there has been an increase in malware specifically targeting macOS while leaving Windows systems unaffected. Security researchers uncovered a new threat called "Cthulhu Stealer," which has emerged, impersonating popular apps to harvest passwords and steal data from macOS users.The perception of Macs being inherently more secure is evolving as cybercriminals increasingly develop malware for Apple's operating system. While Macs still face fewer overall threats compared to Windows PCs, the gap is narrowing. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Cthulhu Stealer malware has been available under a malware-as-a-service (MaaS) model for $500 a month since late 2023, Cado Security discovered."Cthulhu Stealer is an Apple disk image (DMG) that is bundled with two binaries, depending on the architecture," Cado Security researcher Tara Gould said. "The malware is written in Golang and disguises itself as legitimate software."The malware pretends to be legitimate software, mimicking programs like CleanMyMac , Grand Theft Auto IV and Adobe GenP. Adobe GenP, in particular, is an open-source tool used to bypass Adobe's Creative Cloud service and activate apps without paying.Once you install the malware disguised as a legit app and try to open it, macOS will warn you that it isn't reliable. Ignoring the warning and continuing will prompt you to enter your password. After that, you'll see a second prompt asking for your MetaMask password. The malware then creates a directory in '/Users/Shared/NW' and stores the credentials in text files. Chainbreak is used to dump Keychain passwords, which are saved in a file called Keychain.txt.With the required permissions in place, Cthulhu Stealer can grab a wide range of sensitive data, including saved passwords from iCloud Keychain, web browser cookies and even Telegram account details. "The main functionality of Cthulhu Stealer is to steal credentials and cryptocurrency wallets from various stores, including game accounts," Gould explained. 4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH There has been an increase in malware and vulnerabilities affecting Mac users. Recently, researchers at Cisco Talos discovered a vulnerability in Microsoft apps that could allow hackers to steal all your data and gain control of your system.Plus, a stealer malware called Banshee is targeting over 100 browsers on Mac devices to steal passwords, cryptocurrency and personal data. These threats are in addition to the numerous data breaches we've seen throughout the year. This should act as a reminder that you need to take your cybersecurity seriously. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious Cthulhu Stealer.1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . GET FOX BUSINESS ON THE GO BY CLICKING HERE 2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.3. Keep your software updated : Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated .4. Use strong and unique passwords: To protect your Mac from malware, it's also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack.It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don't have to remember them yourself. By reducing the number of passwords you need to recall, you're less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2024 here. 5. Use Two-Factor Authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Macs aren't as safe from hackers as they used to be. With malware like Cthulhu Stealer and Banshee targeting Mac users, it's a good reminder to step up your cybersecurity game. These threats can steal your passwords, data and even cryptocurrency, so investing in solid antivirus software and being cautious with what you download is more important than ever.When downloading new software, how do you determine if it's safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channels Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.  All rights reserved.

California's first electric train could be what's coming to your city

All aboard. California's transportation landscape is getting a major upgrade as Caltrain, the oldest continuously operated railroad in the West, ushers in a new age of electric trains. This isn't just any old train ride. It's a journey into the future of public transit.Picture this. It's a sunny day in San Francisco, and a sleek, modern train pulls into the station. But there's something different about this one. No diesel fumes, no rumbling engine. Just a quiet hum of electricity. That's right, folks. After nearly a decade of construction and 160 years of history, Caltrain is going electric. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE On a momentous day, Caltrain was joined by federal, state and local officials, along with transportation, business and labor leaders, to celebrate the inaugural electric train ride. This VIP tour allowed participants to experience firsthand the cutting-edge electric fleet that represents a landmark shift toward a faster, more frequent and environmentally friendly public transportation network along the San Francisco Peninsula.The first regular electric train service kicked off Aug. 11. More electric trains will be introduced each week until the full electrified service launches Sept. 21. KURT'S PICKS: LABOR DAY DEALS EV PARADISE OR CHARGING HELL? ALARMING ELECTRIC CAR SECRET EXPOSED You might be wondering, "So what? It's just a train, right?" Wrong! This is a game-changer. These new electric trains can zip between San Francisco and San Jose in under an hour. Plus, they're increasing service by 20% because they can speed up and slow down faster than their diesel counterparts. This means more robust and flexible access to cities throughout the rail system, with 16 stations seeing trains every 15-20 minutes during peak hours and all stations receiving service every 30 minutes on weekends.Comfort is king on these new trains. They come equipped with Wi-Fi, digital onboard displays, power outlets at every seat, improved climate control, baby-changing tables in the bathrooms and expanded storage under the cantilevered seats. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   THIS FLYING ELECTRIC VEHICLE BREAKS RECORD WITH 523-MILE NONSTOP FLIGHT  By switching from diesel to electric, Caltrain is cutting a whopping 250,000 metric tons of carbon dioxide emissions annually. That's like taking 55,000 cars off the road each year. This transition not only reduces greenhouse gas emissions but also improves air quality and relieves traffic congestion, contributing to ambitious regional and state climate action goals. GET FOX BUSINESS ON THE GO BY CLICKING HERE GIANT BATTERY-POWERED DUMP TRUCK DUMPS DIESEL FOR ELECTRIC  The Caltrain Electrification Project isn't just about transportation. It's also a significant economic driver. The project has created 33,000 jobs across 36 states, fueling economic growth and innovation within local communities and nationwide. This collaborative effort to manufacture the electric trains and infrastructure underscores a commitment to sustainability and job creation.Moreover, the electrification project advances equity along the corridor by reducing noise and air pollution while increasing access and service for equity-priority communities by 26%. It's a win-win for both the environment and the community. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES THE BEST TRAVEL GEAR FOR 2024  U.S. Transportation Secretary Pete Buttigieg summed it up perfectly."The future of California's rail systems will be powered by clean, renewable energy," setting a standard for other rail systems to follow in the effort to reduce carbon pollution across the country, he said.With enhanced amenities, increased service frequency and a commitment to sustainability, these trains are set to transform the daily travel experience. So, whether you're a commuter or a curious traveler, now is the perfect time to hop on board and witness the future of transit in action. CLICK HERE FOR MORE U.S. NEWS As we stand on the brink of this new era in public transportation, the launch of California's first electric train marks a significant milestone not just for Caltrain, but for the entire Bay Area. This transition to electric service promises not only faster and more reliable commutes but also a cleaner environment, reduced emissions and improvement in air quality for generations to come.What features or improvements would you like to see in future public transit initiatives to enhance your commuting experience? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.  All rights reserved.

Windows update flaw could be a hidden gateway to zombie vulnerabilities

Researchers have discovered a new way hackers could use to exploit Windows devices . They have found a vulnerability in your PC's operating system that could let threat actors downgrade it to an older version of Windows. So, if you're on Windows 11, they could roll it back to Windows 10, which would expose a bunch of old vulnerabilities they could use to take full control of your system. Microsoft told CyberGuy it is working on a fix and claims the vulnerability is still just theoretical - the company hasn't seen anyone try to exploit it yet. I'll go over the details of this security flaw and share some tips to help you protect your PC. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Alon Leviev, a researcher at SafeBreach, spotted the security flaw . Leviev says he started digging into downgrade attack methods after noticing that a big hacking campaign last year used malware called the "BlackLotus UEFI bootkit" that worked by downgrading the Windows boot manager to an old, vulnerable version.Leviev found a way to downgrade Windows - either the whole operating system or just certain parts of it. He then created a proof-of-concept attack using this method to turn off a Windows protection called Virtualization-Based Security (VBS) and target the highly privileged code running in the computer's core, known as the "kernel." WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Normally, when your PC requests an update , it communicates with a secure Microsoft server that controls the update process. Leviev couldn't directly alter the server-controlled files, but he found that one key - "PoqexecCmdline" - was not locked, allowing him to manipulate the update process.Using this control, Leviev was able to downgrade critical Windows components - including drivers, dynamic link libraries and the NT kernel - to older versions with known vulnerabilities. He also found ways to downgrade important security features like the Windows Secure Kernel, Credential Guard, the hypervisor and Virtualization-Based Security (VBS).To make it clearer, older versions of Windows have unpatched issues that hackers can exploit to steal your data or take control of your PC. These issues get fixed when you update to the latest software version. But if hackers manage to downgrade your PC to an old, vulnerable version, they can easily break into your system. BEST POWER STRIPS AND SURGE PROTECTORS 2024 Microsoft has acknowledged the security flaw and is actively working on a fix. In response to an inquiry from CyberGuy, a company spokesperson provided the following statement:"We appreciate the work of SafeBreach in identifying and responsibly reporting this vulnerability through a coordinated vulnerability disclosure. We are actively developing mitigations to protect against these risks while following an extensive process involving a thorough investigation, update development across all affected versions, and compatibility testing, to ensure maximized customer protection with minimized operational disruption."The Redmond, Washington-based company said it is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this threat. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. The company added:"We are not aware of any attempts to exploit the technique outlined in this report and are continuing to monitor the threat landscape as it evolves." GET FOX BUSINESS ON THE GO BY CLICKING HERE WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI Learn how to update your Windows software Microsoft says that hackers haven't exploited the vulnerability yet, and even if they do, there's little you can do from your side. Still, as general cybersecurity hygiene, keep your operating system and other software up-to-date .It is one of the most effective ways to safeguard your devices from known vulnerabilities and security flaws. To update your Windows software and benefit from the latest security patches, follow these simple steps: HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  The report says that even if the downgrade flaw is quite undetectable, hackers still need a way to get remote access to your computer. This is where you can stop them. Here are some steps you can take: 1. Install a strong antivirus program: Hackers often gain access to devices by sending infected emails or documents or tricking users into clicking a link that downloads malware. You can avoid this by installing strong antivirus software that will detect any potential threat before it can take over your device or router. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . 2. Recognize urgent requests as potential scams: Always be wary if someone is urgently requesting you to do something like send money, provide personal information or click on a link - chances are it's a scam. 3. Use strong and unique passwords: Create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you're logging into an account so that you never have to remember them yourself.  The fewer passwords you remember, the less likely you will be to reuse them for your accounts. Get more details about my best expert-reviewed Password Managers of 2024 here. 4. Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.  HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  This latest Windows vulnerability is a major concern, exposing your PC to potential risks by allowing hackers to downgrade your system to an older, less secure version. By exploiting this flaw, attackers could access outdated vulnerabilities and take full control of your machine. While Microsoft is aware of the issue and is working on a fix, the fact that this vulnerability even exists is a stark reminder of how critical it is to stay on top of system updates and security measures. Keep an eye on your system's security and be cautious as more details emerge.Do you regularly check for and install updates to avoid security threats like this? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Movie star on what AI can't do

IN TODAY'S NEWSLETTER:- 'Beetlejuice Beetlejuice' star says AI can't 'duplicate' Hollywood director Tim Burton's vision
- Nvidia's earnings beat Wall Street's estimates as AI momentum continues
- Experts warn AI could generate 'major epidemics or even pandemics' - but how soon? HOLLYWOOD VISION: Hollywood actor Justin Theroux argued that artificial intelligence cannot match famous director Tim Burton's vision. AI BOOM: Artificial intelligence giant Nvidia released its latest second-quarter earnings report on Wednesday, which beat analysts' estimates as the company's AI-driven momentum continued. ELECTION SEASON FRAUD: Billions of dollars are pouring into the 2024 House , Senate, and presidential elections. I bet you've received a call or 10 from folks asking you to pull out your wallet. The pleas come in text form, too, plus there are videos, social media posts and DMs. Here are a few dos and don'ts for keeping your money safe. AI-GENERATED PANDEMIC?: Experts researching advancements in artificial intelligence are now warning that AI models could create the next "enhanced pathogens capable of causing major epidemics or even pandemics."  FUTURE OF FAST FOOD: So, you're hit with a craving for a mouthwatering Shake Shack burger . Instead of jumping in your car and braving the traffic, you simply grab your phone and place an order through an app. But here's the twist: Rather than a delivery driver showing up, a friendly little robot rolls right up to your doorstep with your order. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

New battery has double the power and fraction of the dangerous chemicals

In our tech-driven world , batteries are the unsung heroes powering everything from your smartphone to electric cars. But here's the catch: Traditional battery manufacturing can be pretty harsh on the environment and our health due to those problematic "forever chemicals" called PFAS.These chemicals sneak into countless everyday products and have even made their way into the bloodstream of most Americans, bringing along a host of health concerns . That's where Ateios Systems comes in. Based in Newberry, Indiana, this innovative company is shaking things up by developing a new way to make batteries without these harmful substances. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Ateios Systems has developed an innovative electrode manufacturing process that not only removes forever chemicals but also offers a 20% reduction in costs, a 50% increase in energy density and an 82% decrease in energy consumption during production. This breakthrough is not just about creating a cleaner battery; it's about making batteries more efficient and cost-effective, which is crucial as the global battery market continues to grow rapidly. CLICK HERE FOR MORE U.S. NEWS BEST RECHARGEABLE BATTERY CHARGERS 2024 The company's proprietary RaiCure Technology, developed in collaboration with Oak Ridge National Laboratory, replaces traditional high-temperature curing with a radiation-based process using energy-curable polymers . This method not only enhances battery performance but also significantly reduces environmental impact.By focusing on improving the manufacturing process rather than creating entirely new battery chemistry, Ateios is able to quickly adapt its technology for a wide range of applications, from small electronics to potentially even electric vehicles. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   WHICH APPS ARE DRAINING YOUR PHONE'S BATTERY? With 95% of batteries currently relying on polymers that are categorized as forever chemicals, Ateios' innovation represents a major step forward in reducing pollution and protecting public health. By eliminating these harmful substances, Ateios is setting a new standard for environmentally friendly manufacturing practices in the battery industry. GET FOX BUSINESS ON THE GO BY CLICKING HERE SHOULD YOU REPLACE YOUR PHONE BATTERY OR BUY A NEW PHONE? As electric vehicles (EVs) become increasingly popular, the demand for cleaner, more efficient batteries is growing. Ateios' technology not only promises to enhance the performance of existing battery-powered devices but also holds the potential to further reduce the environmental impact of EVs. This aligns with broader efforts to transition to cleaner energy solutions, which are supported by government incentives and consumer demand. SUBSCRIBE TO KURT'S FACEBOOK PAGE FOR QUICK TECH TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES By ditching those harmful forever chemicals and streamlining the manufacturing process, Ateios Systems is doing its part to create a cleaner planet while also boosting the performance of the devices we rely on every day. As they continue to grow and refine their technology, it's clear that Ateios is set to play a major role in the future of clean energy and sustainable manufacturing.How do you feel about the role of electric vehicles in reducing environmental impact, and what factors influence your decision to switch to one?  Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved.

Distributed by aarss.com.