Technology News Articles on Fox News

Three easy ways to clear out the junk on your phone

It used to be that you bought a new phone and got a fresh start. Now we just copy over all the junk from the old model onto the new one. Sure, it's faster and shinier , but it's packed with files you don't need, contacts you haven't talked to in years and photos you don't remember taking - or want to see again.It doesn't take much effort to clear things out if you know what to do. I've got your back. Set aside a few minutes. You'll thank yourself (and me) later. A SWAT TEAM STORMED MY HOUSE I'm giving away a $1,000 computer.  Enter now for your chance to get a Mac or Windows, your choice! Hurry, entries close soon. Use your phone's built-in tools The iPhone has a handy hidden folder most people don't know about: Duplicates. The Photos app identifies when you have multiple versions of a picture or video so you can clear all but the highest-quality version.Anything you merge will go to your Recently Deleted folder in case you want to get it back. Just hurry. On Android , the Files app from Google does something similar.  SIGNS YOU NEED A NEW PHONE, LIKE, NOW Want to dive deeper into your photos?  These apps do the hard work of clearing out the junk for you. Clear the inbox you forget about Nope, not your old Yahoo account . I'm talking about texts. All those messages - and the photos and videos you've sent and received - take up space and make it hard to find whom you really want to talk to.Just swipe on a chat to bring up the option to delete. You can also hold down on the chat to bring up options. Be sure to clear marketing texts, spam, one-time codes and anything else that's just taking up space. 7 THINGS YOU SHOULD NEVER ASK SIRI, GOOGLE ASSISTANT OR ALEXA Pro tip:  You can pin a conversation at the top of your text inbox so it's always right there at the top.  The nuclear option No kidding, one IT genius at Komando HQ wipes his phone once a year. It seems like a pain (and it is a bit), but it can keep yours running fast and smooth. Think about it - there's so much less junk piled up if you clear it all out regularly.Be sure to back your phone up first, and then a factory reset makes it easy to on-board all your important info.On iPhone:On Samsung: On Google Pixel : Keep your tech-know going  My popular podcast is called " Kim Komando Today. " It's a solid 30 minutes of tech news, tips, and callers with tech questions like you from all over the country. Search for it wherever you get your podcasts. For your convenience, hit the link below for a recent episode. PODCAST PICK:  The SWAT team raided Kim's house Plus, Madeline Smith has caught over 1,000 cheaters online. She shares her insights on spotting an unfaithful spouse. Kim and Andrew also talk about NASA's Mars simulator and demystify baffling Gen Z slang.Check out my podcast "Kim Komando Today" on  Apple, Google Podcasts, Spotify or your favorite podcast player. Listen to the podcast here or wherever you get your podcasts. Just search for my last name, "Komando."Sound like a tech pro, even if you're not! Award-winning popular host Kim Komando is your secret weapon.  Listen on 425+ radio stations or  get the podcast . And join over 400,000 people who get her  free 5-minute daily email newsletter . Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

Avoid public Wi-Fi by using your iPhone as a hot spot

Have you ever been tempted to connect to a public Wi-Fi network when you're out and about? Maybe you want to check your email, browse social media or stream some music.But before you do that, you should know that public Wi-Fi can be risky and expose your personal information to hackers and cybercriminals .That's why you should avoid suspicious public Wi-Fi and use your iPhone's hot spot instead. A hot spot is a feature that lets you share your iPhone's cellular data with other devices, such as your laptop or tablet. This way, you can enjoy a secure and private internet connection wherever you go. Before we get to how to set up a hot spot, you may want to check out Cellphone boosters vs. mobile hot spots: What's the difference and how do you choose? CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Setting up a hot spot on your iPhone is easy and quick. Just follow these simple steps: CLEVER TRICK TO MAKE A CONNECTION FASTER ON YOUR WI-FI NETWORK By default, the name of your iPhone's hot spot is called the same name as your iPhone. You can change the name of your iPhone by following the steps below:  GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: BEST PORTABLE PHONE CHARGERS OF 2024 Note that the hot spot feature can be hidden or disabled by your carrier, so if you don't see it or can't turn it on, you'll need to reach out and make sure your plan includes the ability to use your device as a hot spot. MORE: 5 BEST CELLPHONE BOOSTERS Using a hot spot can be a great way to stay connected and safe online. But remember, it uses your iPhone's cellular data, so you should keep an eye on how much you use. Here's how to check your data usage:If you have a limited data plan, you may want to limit your hot spot usage to avoid extra charges. You can also turn off your hot spot when you're not using it to save battery life. To do that, follow these steps: MORE: BEST ACCESSORIES FOR YOUR PHONE Hot spots suffer from the same risks that any public Wi-Fi connection does, such as data breaches or misuse by hackers and other nefarious actors. However, there is a way to keep yourself protected when using your iPhone hot spot, and that's by using a Virtual Private Network or VPN.It adds an extra layer of security and can keep you safe online. If you do decide to create and use a personal hot spot, remember to always make sure it's password-protected. We'll take you through the benefits of using a VPN with a hot spot and show you step-by-step how to set up a VPN by clicking here . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Using your iPhone as a hot spot can be a convenient and secure way to access the internet on the go. You can share your cellular data with other devices, control who can join your hot spot and customize your hot spot name and password. However, you should also be mindful of your data usage and battery life, and use a VPN to protect your privacy and security online.What are some situations where using an iPhone hot spot would be helpful to you? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Apple warns against using rice to dry out your wet iPhone; here's what to do instead

Cellphones getting water damage is nothing new. Before the iPhone, I had a flip phone that fell into a swimming pool. The first thing everyone told me to do was to dry the phone out with rice.The idea is that the rice will draw out any excess water, saving your phone from being destroyed by water damage.This method remains many people's tried-and-true method for saving a waterlogged phone, and I've seen it work firsthand. However, a new support document by Apple has just come out, and the company is asking people to please not place their iPhones in a bowl or bag of rice. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Apple is now warning customers that placing their iPhones into a bowl or bag of rice might actually slow down the drying process and damage their phone's internal components. In particular, the company warns that small particles of wet rice may end up in your iPhone, damaging the phone's logic board. REVOLUTIONARY DEVICE LETS YOU POINT, CLICK WITH YOUR TONGUE Next time your iPhone takes a dip in the swimming pool or the toilet, instead of running for the rice in the cabinet, Apple suggests doing this instead. GET FOX BUSINESS ON THE GO BY CLICKING HERE Apple suggests that your first immediate step should be lightly tapping the iPhone against your hand with the charging connector pointed down. This should pull some of the water inside your iPhone out. Don't be alarmed if only a few drops of water come from the connector port. Leave your iPhone somewhere dry, with some airflow. MORE: BEST ACCESSORIES FOR YOUR PHONE You should leave your iPhone alone for a period of 30 minutes. Once 30 minutes have gone by, you can attempt to charge your iPhone again. If your iPhone charges, congratulations. There's no water damage to your iPhone and you can resume using it. If you receive an alert saying " liquid detected in USB-C (or lightning) port ," you unfortunately still have water in your iPhone. However, luckily, hope isn't lost. MORE: 5 BEST PORTABLE PHONE CHARGERS OF 2024 rget=_new href="https://cyberguy.com/newsletter/" target="_blank" rel="nofollow"> CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER If you receive an alert saying "liquid detected in USB-C (or lightning) port," you unfortunately still have water in your iPhone. Apple warns against using a blow-dryer or any other heat gun device to dry your iPhone after it takes a splash. You should instead leave your phone in a dry area with some airflow and allow for 24 hours to pass. A room with a ceiling fan is a great place to leave your iPhone while it dries.After 24 hours have passed, you should try to charge your iPhone again. If your iPhone charges, you are all good. If it doesn't charge, Apple recommends removing the charging cable from the wall outlet and changing electrical sources for a moment. Apple recommends against trying to insert a cotton swab or any other foreign object into your charging port.If your iPhone's charging port is damaged or not working properly, you may want to consider alternative charging methods that do not rely on the port. For example, some iPhones support wireless charging, which uses a magnetic pad or stand to charge your phone without plugging in a cable. This way, you can avoid inserting anything into the port and prevent further damage. Now, if all that doesn't work and your iPhone still does not charge or shows signs of water damage, such as a wet screen, distorted audio or malfunctioning buttons, you may need to contact Apple for repair or replacement. You can check your warranty status and common issues not covered under warranty by clicking here .Remember to back up your data before sending your iPhone for repair, as you may lose some or all of your information. MORE: HOW TO PROTECT AN IPHONE & IPAD FROM MALWARE 2024 It's important to remember that all iPhones since the iPhone 12 are able to safely withstand submersion in water of up to 20 feet for 30 minutes. If you do end up dropping your iPhone in the water, just don't run for the rice.Do you think Apple should make their iPhones more water-resistant or waterproof? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow"> Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow"> Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

A SWAT team stormed my house

February 16th started like any typical Friday night. My husband and I decided to stay home , grill chicken and make a salad for dinner. At about 6:45 p.m., we heard some loud rumbling overhead.We walked onto the back patio, and two police helicopters were overhead - shining lights all over our property, and a recording echoed, "Police. You are under arrest. Stay right there and I won't shoot you." As I looked across the fence, a swarm of armed members of the Phoenix SWAT Team with a few dogs were circling our property. One of the guys said, "Yeah, there's a jammer right here." He picked it up. I leaned over the patio and asked, "What's going on?"  The police told me to go inside TECH SECURITY TO-DO: LOCK DOWN YOUR SMART STUFF A SWAT member said , "Ma'am, A South American gang is targeting homes to steal from. The jammer says you might have been next. Do we have permission to enter your property?" I said, "Yes!" and then he asked something like, "If we find anyone, will you pursue charges so we can arrest them?" I replied, "Of course!"I opened the driveway gates to our property and the guest house while Barry tossed the police keys to open the security gates. It turns out that when the gang saw we were home, they likely diverted their attention to the house next door. A house four doors down from us wasn't so lucky. The homeowner left at 5 p.m. to have dinner and got a notification his security cameras were offline at 5:05 pm. He thought the internet went down. The gang broke in and took $25,000 in cash and valuables worth $100,000. They were in and out in less than 10 minutes. How are they getting away with this? The gang places cellular and Wi-Fi jammers around the homes they're targeting. This way, security cameras and phones are useless. A Phoenix police officer told me the gang probably noticed nothing was down in our house.Our home's security cameras and internet are hard-wired. Even when the thieves tried to jam the Wi-Fi signals, the security camera's red lights showed they were recording everything. We also still have a landline.But how frightening is that? Your phone doesn't work. Your cameras aren't recording anything. On the upside, the gang doesn't carry guns. If they get caught, they'll spend about six months in jail before being extradited back to Chile.If you'd like to watch the action captured by my security cameras, I showed them during  a Kim Komando Today video stream . I am so thankful for our police force.  Nothing is random The gang thoroughly scopes out homes beforehand. They drive the neighborhood and look up homes on real estate sites to get an idea of where the primary bedroom is located. They look for dogs, too. 7 THINGS YOU SHOULD NEVER ASK SIRI, GOOGLE ASSISTANT OR ALEXA It's not only a problem in Phoenix. This is happening all over the country. A friend was robbed by a similar gang in a guard-gated community in California. Kudos to Phoenix Police - they arrested three members of the gang who were in my neighborhood that night. Invest in tech We built our home, so it was easy to install the wiring for the internet and almost everything connected to it for the fastest connection that also won't be susceptible to a jammer. Of course, you can hardwire after construction, but that's costly and often unrealistic. Here are some options: Get your house offline Check Zillow, Realtor.com and Redfin for photos of your house. The more crooks know about the layout, the better for them. Here's how to remove those pics. Zillow Realtor Redfin You're not done yet. It's a good idea to  blur your house from Google Maps and Apple Maps  while you're at it. SIGNS YOU NEED A NEW PHONE, LIKE, NOW PODCAST PICK:  Budget Ozempic, avoid return fees & online piracy amps up Plus, we're TikTok tips that pros warn are your plants' worst nightmare. Andrew has a wild story about getting scammed on a dating app. It's cold outside, so here are some top tricks for staying warm with your tech. And, as always, listener letters. You won't believe what one guy called me.Check out my podcast "Kim Komando Today" on  Apple, Google Podcasts, Spotify, or your favorite podcast player. Listen to the podcast here or wherever you get your podcasts. Just search for my last name, "Komando."Sound like a tech pro, even if you're not! Award-winning popular host Kim Komando is your secret weapon.  Listen on 425+ radio stations or  get the podcast . And join over 400,000 people who get her  free 5-minute daily email newsletter . Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Fox News AI Newsletter: Natalie Portman worries she'll be replaced

IN TODAY'S NEWSLETTER:- Natalie Portman says AI could put her out of a job 'soon': 'There's a good chance'
- Google Gemini backlash exposes comments from employees on Trump, 'antiracism' and 'White privilege'
- Don't think of our AI future as humans vs. machines. Instead, consider these possibilities OUT OF A JOB: Natalie Portman has some mixed feelings about artificial intelligence . In her new interview with Vanity Fair for its annual Hollywood issue, the "Star Wars" star was asked if she felt the technology was a threat to her livelihood. THE WOKE ALPHABET: Resurfaced videos and comments from Google employees have come to light amid backlash to the company's Gemini artificial intelligence (AI) chatbot. ENDLESS POSSIBILITIES: The thought of  AI replacing human intellect and creativity in the workforce can indeed be unsettling. But, is this fear truly warranted, or are we on the cusp of a collaborative revolution that could amplify human innovation and creativity? TRASHY ROBOT: Robots are taking over the dirty work of sorting through our trash and turning it into valuable resources. And not just any robots, but smart robots that use artificial intelligence to identify and separate different types of waste with incredible speed and accuracy. CONSTRUCTION ROBOTS: Monumental's bricklaying robots are agile, artificial intelligence-powered machines that navigate construction sites like self-driving cars. They work in teams of three. One grabs bricks, another fetches mortar and the third, the star of the show, lays them down with precision. 'PATRIOT ENTREPRENEURS': Military leaders have bought into advanced tech that "patriotic entrepreneurs" are inventing, but the Pentagon's bureaucratic slog has created major challenges to getting those innovations onto the battlefield, according to a defense expert. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

How to stop phone number spoofing and protect yourself from scammers

Tired of getting random calls from strangers, wondering whether or not it's something to be concerned about? What about when a person calls saying they've got a missed phone call from your number? Or, how about when you see a phone number that looks familiar (perhaps has the same area code), but when you answer, it's a telemarketer or someone trying to sell you something? CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Phone spoofing, also known as phone number spoofing, is a deceptive practice that scammers use to trick you into answering their calls. By using software or devices, they can make any number appear on the caller ID, even if it belongs to someone else. This can cause problems for both the owner of the spoofed number and the potential victims of the scam. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Here's what you need to know about phone spoofing and how to stop it so that you can protect yourself (and others) from scammers. MORE: HOW TO STAY INCOGNITO AND CONCEAL YOUR NUMBER WHEN CALLING SOMEONE Phone spoofing is when scammers get control of your phone number. They can then use your phone number to steal your data or use it to target other people. Instead of a strange phone number or company coming up in your caller ID, they can pass through scam detection by posing as a number you may recognize. This is known as "neighbor spoofing" because scammers will target people within the same - or nearby - area code, which people are less likely to ignore.But phone number spoofing can be even more sophisticated. Sometimes scammers can spoof the phone numbers of banks , government agencies, police departments, corporations and more. And when most people see those names come up on their caller ID, they generally feel like it's important or at least an organization they trust, prompting them to answer and not even think twice about who may be on the other line. MORE: HOW SCAMMERS USE GOOGLE VERIFICATION CODES TO STEAL YOUR IDENTITY AND MONEY Once scammers get their hands on your phone number, they can do all sorts of things. In one scenario, they may target you and say you owe a bill for something, prompting you to give up sensitive data about yourself.In more serious scenarios, they can call your phone and tell you they have your friend or family member who's in danger and that they need you to send money right away. And with AI voice technology that can replicate voices , this is becoming an even scarier reality. Other times, they use your spoofed number against you, committing identity theft as they'll have access to your number to get through to your accounts. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS If you have a feeling that your phone number has been spoofed, there are some things you can do to stop the situation from getting out of hand.One of the best ways to know that your number has been spoofed is if you're getting lots of calls from people who tell you they've received a missed call or phone call from your number. If you don't know them and you check your call history to see you've never called their number, there's a good chance that your number has been spoofed and was used to try and trick them.Your number may have been leaked in a data breach . Or you may have your number public somewhere online. You may have answered a spam call accidentally in the past. Or you may have permitted a company to sell your phone number (this is more common with telemarketers). At the same time, data brokers could be intentionally looking for this information, and they're good at finding it. Next, they hijack your number. They physically do this by: Port-out method: Once hijackers get your phone number via one of the methods above (in addition to other personal information), they contact your mobile carrier and pose as the account holder, aka you. Once they get in, they request a "port-out" of the phone number, which is when they ask the carrier to transfer your phone number to a new carrier or account. Generally, phone companies should see this as a red flag and ask follow-up questions, but savvy scammers can get around this. Once the port-out is approved, the phone number is activated on their new SIM card and they have total control. SIM-swap method: This is when a phone spoofer convinces the mobile service provider to issue a new SIM card with your phone number. All they need to do is pop the SIM card into their device to get the same access as the port-out method. Stealing your physical phone: One of the most straightforward ways to hijack your number is one of the most simple: stealing your mobile device and gaining access to it.Remember, once they have control of your phone number, they may use it to commit identity theft against you, not just as a phone spoof to harm others. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Even if your phone has been "hijacked," you can still do something about it. Here's how: Apologize to the victims: If people start calling you to let you know they've received a scam call from your number, apologize to them right away and let them know that your phone number has been spoofed and that it's being used to target them. This can help them decide what to do next (which we'll cover later). Create a voicemail message: If you're getting a lot of these calls nonstop, you might want to change your voicemail message to let them know what's happening. This essentially automates the process, and you don't need to spend your day answering the phone either. Notify your mobile carrier: Call your mobile carrier to let them know that you're confident your phone number has been spoofed. They can help you take the next steps to stop it in its tracks. Change your phone number: Whether or not your mobile carrier advises you to do so, it might be a good idea to consider changing your phone number. It may not stop scammers from using it to victimize others, but it will help you to stop getting notifications.If you end up changing your phone number, you'll want to be sure that you can prevent scammers from taking your number in the future. Here are a few things you can do: Don't publicize your phone number online: Don't ever provide your phone number to strangers or make it easy for them to get your phone number via a verification scam. Additionally, if you're creating an account for a new website, and they ask about your phone number, try to avoid giving it. It may be difficult with a bank, for instance, which may use your phone number to verify your identity. But if you can avoid giving your phone number, then you should. Use a data removal service: There are so many websites that can potentially have your data because you may have unknowingly permitted them to do so. By using a data removal service, you can get your number offline.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for personal data removal services here . Update passwords on your phone: It may go without saying, but make sure your phone's passwords are updated. You'll want to create a strong password for your phone and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Also, enable a PIN or biometrics to get into your phone. This is so that if someone steals your phone, they can't get access to your information. Stay calm and steer clear: If you have any hunch that you are being scammed, stay calm, don't panic and immediately hang up the phone. You can also try another tactic, which is asking the spammer a lot of questions to catch them off guard. Sometimes they'll realize you've set them in a trap and will hang up the phone themselves.Ultimately - no matter how convincing or familiar the story or phone number is - you want to be sure that you aren't giving any sensitive data or money to these people. If someone is saying you owe a bill, tell them you will call your bank and get back to them. Even if they already know some of your personal information, do not comply. If it's legitimate, they'll understand that you need to double-check. Alert the appropriate parties: Even if you recognize it's a scam, sometimes these people are relentless. So, if they continue to call you and harass you nonstop (and it's from the same number), you have some options: Don't get spammed again: You've probably noticed that when you get a call on your phone, it will say "scam likely" in red, prompting you to ignore it. Cellphones these days are pretty good at detecting calls from scammers. This makes it more challenging for scammers to do their dirty work. So, they need another strategy to get around it, which is why they phone spoof. But you can outsmart them, even when they use a familiar-looking number: MORE: HOW TO BLOCK THOSE UNWANTED AND ANNOYING SPAM EMAILS While phones may have gotten better at blocking spam calls, scammers will stop at nothing to try and trick you. This is why phone spoofing is a good idea for them; they have a much better chance of getting through spam blockers and connecting with you because you may think it's safe to answer the phone.We won't even be able to stop these scammers 100%. But by knowing what to do if your phone number has been hijacked or you're being targeted by someone else's phone number who has been spoofed, you can do your part in making sure these people know we're onto them.Have you ever had your phone number spoofed? Or have you ever picked up the phone because you recognized the area code, only to realize it was a potential scam? How did you handle it? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Activate auto reply for text messages on Android so you're not interrupted

Do you ever feel overwhelmed by the constant stream of text messages that are vying for your attention and response? Do you wish you could stay focused on what you are doing without being interrupted by your phone ? Well, we have just the answer.You might benefit from setting up an auto reply for your SMS messages. An auto reply is a feature that automatically sends a predefined message to anyone who texts you, letting them know that you are not able to reply at the moment and when you will get back to them. This way, you can avoid distractions, manage expectations and stay focused on your priorities. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER However, if you are an Android user , you might have noticed that your phone does not have a built-in aunt reply feature. This means that you have to manually reply to each message or ignore them altogether, which can be frustrating and time-consuming.Fortunately, there is a solution for this problem. You can use a third-party app called SMS Auto Reply /Autoresponder by LeMi Apps, which allows you to customize your own messages and lists of contacts. This app is easy to use and has many features that can help you win back some of your own time and reduce stress. MORE: TOP ANDROID PHONES OF 2024 BEWARE OF A NEW ANDROID THREAT TARGETING YOUR PHOTOS AND TEXTS WITHOUT EVEN OPENING THEM You can also specify numbers you don't want to auto respond to. For instance, you can exclude people with whom you expect to remain in contact, even while you're out of the office. MORE: HOW TO CHANGE YOUR PRIVACY SETTINGS ON ANDROID Next, you'll want to set up a schedule for the auto responder to run on. Run By Time: Lets you pick a time period when the auto responder should be active. Simply set a start time with From and an ending time with To . Run By Date: Will respond to messages during a period of dates (plus start and end times on those dates) that you choose. This is useful for setting up "out of office" text replies when you know you'll be away for a set number of days. Run by Week Days: Will activate the auto responder for the time period you choose on the specified days of the week. Check the Repeat Weekly box if you want to run the same way in the coming weeks. Run when your car Bluetooth connects: Lets you activate the profile when your phone connects to one or more Bluetooth devices of your choosing. Make sure that you have Bluetooth enabled and the device(s) paired before selecting this. *This option requires you to update via in-app purchase for $2.89 ( at the time of publishing ). GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: BEST ACCESSORIES FOR YOUR PHONE Setting up an auto reply for your SMS messages can be a great way to reclaim some of your own time and reduce stress. You can customize your messages and lists of contacts to suit your needs and preferences. We encourage you to try out the SMS Auto Reply/Autoresponder app and see how it can improve your productivity and well-being.What are some of the situations or reasons that make you want to use an auto reply for your SMS messages on your Android? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

What you need to know about VajraSpy RAT, the cyber espionage tool that infiltrated Google Play

You might think that downloading an app from the app store is safe and easy, right? Well, not always. Sometimes, you might actually end up with a nasty surprise: an app that is actually spyware hiding behind a fake name and icon.That's what the VajraSpy RAT does. It's a Trojan that targets Android devices and steals your data without you knowing. This is a real threat that has affected many Android users.Although VajraSpy has been removed from the Google Play Store, it's still lurking out there on third-party app stores. Also, VajraSpy and the Patchwork APT group behind it are still active. They may attempt to infiltrate other platforms or modify their tactics to evade Google's detection in the future.To protect yourself, here's what you need to know about VajraSpy RAT, the cyber espionage tool that's infiltrated Google Play on Android. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER VajraSpy is a remote access Trojan (RAT) , which is a type of malware that's designed to allow an attacker to control an infected device remotely. To get the RAT on your devices, scammers need you to download it to your system. Once the RAT is running on a compromised system - in this case, your Android - the attacker can send commands to it and receive data back in response. MORE: HOW TO CHANGE YOUR PRIVACY SETTINGS ON YOUR ANDROID DEVICES Some of VajraSpy's capabilities are accessing and taking your contacts, photos and messages. This even includes encrypted messages like those on WhatsApp. Also, searching and exfiltrating documents, images, audio and other types of files.In addition, it can listen in on and record your phone calls (if granted the appropriate permissions) and activate your device's camera to take pictures, turning it into a surveillance tool. MORE: BEWARE OF NEW ANDROID MALWARE HIDING IN POPULAR APPS VajraSpy gets onto an unsuspecting victim's device via a malicious app. When the RAT was first discovered, it was on apps that were found on Google Play sometime between April 1, 2021, through Sept. 10, 2023. ESET researchers uncovered the campaign report in 2022 when Patchwork APT - a hacking group primarily targeting people in Pakistan that's been around since 2015 - exposed their campaign after unintentionally infecting their own infrastructure with another RAT they were experimenting with.When this was leaked and VajraSpy was discovered, the infected apps on Google Play were taken down. But they can still be found in third-party apps, with some still getting through to Google Play anyway.VajraSpy has been disguising itself primarily in news and messaging apps on Android. Some of the apps that researchers know about include:Google Play Protect protects users by automatically removing apps known to contain this malware on Android devices with Google Play Services. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. If, for some reason, you still see these apps on your phone, be sure to manually uninstall them. Settings may vary depending on your Android phone's manufacturer.  We also recommend going beyond Google Play Protect to keep yourself from having your data breached. As we all know, free is not always the way to go, especially when we are talking about antivirus protection. Keeping hackers out of your devices can be prevented if you have good antivirus software installed. Find my review of Best Antivirus Protection here .Remember, the bad guys behind VajraSpy and similar malware perpetrators are pretty quick. They keep infecting new apps with this Trojan, so always keep an eye out by using the following tips: Tip #1 - To avoid getting your Android infiltrated by VajraSpy RAT, don't download any apps that are recommended by someone you don't know or don't know well . And if the message does come from someone you know, always be a little skeptical, especially if you have never heard of the app. Tip #2 - Make sure to only download apps from reputable app stores you're familiar with, too. Keep in mind, though, that these bad actors are able to get new apps to slip through the cracks of Google Play time and time again. Therefore, it's important to employ a mix of different strategies to keep yourself safe. Tip #3 - One way to know whether or not an app is safe is by looking at how many downloads it has . If it has a small number of downloads, chances are it could be a scam. Also, look at how many reviews it has and what those reviews are and do a quick check to see if someone mentioned it as a scam or not. A good rule of thumb is if you don't need it, and you're not sure, don't download it.The good news is that compared to other spyware apps, VajraSpy hasn't been that successful. We know this by looking at the amount of downloads/installations of the apps it disguises itself as. That being said, those third-party app stores where you can still find a lot of these malicious apps don't track downloads well, so it's hard to know how many victims fell for VajraSpy there. MORE: BEWARE OF THIS MCAFEE GOOGLE CHROME AD SCAM Though there are much bigger scams to be concerned with, letting your guard down could make you more vulnerable to attacks like this cyber espionage tool called VajraSpy RAT. To protect your Android and your data, just remember to be cautious if you see an invitation to download a messaging app from someone you don't know well. Also, invest in antivirus software to protect your Android.Have you ever received a strange message that asked you to download an app? What happened? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

A car-boat combo that can hit the road or the water with the same vehicle

Imagine cruising down the highway in your sleek electric vehicle, only to decide halfway through your journey that you'd rather be skimming across the waves. With the Trident LS-1, that's not just a fantasy, it's a reality. This innovative car-boat hybrid is poised to revolutionize the way we think about transportation, offering seamless land and water travel all in one vehicle. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The Trident LS-1 (L for land, S for sea) is a three-wheel vehicle that can drive on land and then launch right into the water from a launching ramp. No trailer is needed, leaving the hassle behind. It has an electric motor that provides sustainable, zero-emission travel.It also has hydrofoil technology that features blades or vanes that allow it to lift above the water surface about three feet, creating a smooth ride with reduced drag over the sea. It also makes steadier turns because the hull is out of the water. MORE: SCI-FI SOLAR EVE NEVER NEEDS TO PLUG IN FOR A RECHARGE The Trident LS-1 can go up to 35 mph on water or 15 mph without the hydrofoils. It can also handle waves of up to four feet, making it ideal for coastal travel. On land, it can reach speeds of up to 95 mph. What is even more incredible is that the Trident LS-1 is designed to prevent seasickness caused by a vessel's erratic motion on water. MORE: BEST DASH CAMS FOR YOUR CAR The Trident LS-1 can accommodate up to four people comfortably with three permanent seats, including a center driver seat and two rear ones, as well as an additional fold-down center. It also comes equipped with airbags, a safety cage and multiple cameras, giving you peace of mind.The Trident LS-1 is classified as a motorcycle/autocycle, which simplifies the regulations and registration process. With proper boat registration and a driver's license, anyone will be able to take the car-boat hybrid for a ride. You don't need a special license.The vehicle is only 7 feet long, so you can easily fit it in your garage, which is what the engineering company wanted. You also don't need a tow vehicle, which could end up in the water when you launch the boat.The Trident LS-1 offers you the freedom and versatility to explore both land and water, without compromising on performance, comfort or safety. Whether you want to escape the traffic and enjoy a relaxing cruise on the water or have some fun and adventure on the waves, the Trident LS-1 can make it happen.You can also be ready for any emergency situation with an amphibious vehicle that can save lives. And you can do all this while being environmentally conscious, thanks to its electric motor and zero-emission technology. The Trident LS-1 is the ultimate amphibious vehicle for anyone who wants to experience the best of both worlds. Poseidon AmphibWorks is the company behind the Trident LS-1. It is on a mission to create electric vehicles that can go from land to sea with ease. They have a team of experts who know how to design and build these amazing machines. The company was co-founded by Andy Langesfeld and Steve Tice, who have a lot of experience in amphibious vehicles and electrical engineering. They started working on their projects in 2021 and launched the company in 2022. They are still developing their prototypes, but they promise to deliver something awesome. MORE: IS IT A 3-WHEELER OR A 2-WHEEL E-SCOOTER? HOW ABOUT BOTH? You might be wondering when you can get your hands on this amphibious vehicle. Well, the creators are working hard to make it happen. They are finalizing the plan for the prototype, which should be ready by the end of this year. That's when they will start taking deposits for the vehicles. The target price of the vehicle starts at under $100,000.If you live in California, you can buy one around December 2025. They will also have a service center in San Diego to help you out. If you live outside of California, you can still pick up a Trident LS-1 in San Diego or wait until June 2026, when they hope to ship to other states.The Trident LS-1 is still under development, but it has the potential to reshape the transportation landscape. Its unique combination of features, affordability and environmental consciousness makes it a truly innovative product.Would you consider this type of vehicle for your future transportation needs? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Verification scams hitting Elon Musk's X after changing former Twitter check marks

X - formerly known as Twitter - has gone through more than a name change since it switched over. One of these has been with the account verification process. You know, that little blue check mark that certain profiles have that indicates it's verified. Without that blue check mark, it can be difficult to contact other people on X, get through certain groups and, essentially, use the platform to the fullest.It's no surprise that this little blue check mark has spurred a lot of controversy. But it's not just this. The changes going on with X's verification - aka X Premium or Premium+ - also open a whole new can of worms, specifically when it comes to cybersecurity concerns. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Before Elon Musk took over Twitter, there was only one way to get the blue check mark - or Twitter Blue - on Twitter. To do so, you had to be a well-known figure like a celebrity, politician, journalist or part of an organization. Generally, Twitter would reach out to the person directly to confirm their identity.Now, that's all changed. These days, just about anyone can get a blue check mark via X's subscription-based model if they're willing to pay a monthly subscription fee. (And paying more can also get you a gold check mark, which is usually reserved for businesses.)This fee not only gets you verified but also gives you the ability to do things on X that those without it can't, like editing tweets, exposure to fewer ads and possibly more visibility for your tweet. Some accounts have even enabled a setting to only be able to receive messages from verified accounts. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS Unfortunately, there is a downside to everyone being able to get that blue check mark. Not only do you now have to be concerned with getting yourself verified so that you can direct message others who have that setting enabled, but you also have to be on the lookout for scammers who are using the blue check mark to trick you. Here are three scams to look out for.A blue-tick scammer is a person who pays to get the blue-tick check mark verification on X and then uses that to scam people. But who do they scam and how? Blue-tick scammers have a very particular method and usually target users who complain about poor customer service on X. Maybe they are even complaining specifically about the issues getting their verification on X.Ultimately, the goal of these scammers is to trick you into disclosing your bank details by promising refunds to you. In June of last year, for example, passengers whose EasyJet flights had been canceled were targeted by cybercriminals on X in this exact way. These scammers were using fake profiles to target victims who had resorted to X to voice their complaints against the airline and demand a refund, only to potentially lose more money by being scammed.It's not uncommon to encounter fake accounts pretending to be well-known personalities - even Elon Musk. These accounts might lack official verification, but at first glance, they won't give unsuspecting users a reason to doubt that the profile is who it appears to be. These Elon Musk impersonators will try just about anything, but a popular scam is in the form of cryptocurrency ads.Here's how the scam goes down. An ad appears on X, which appears to be coming from one of Elon Musk's companies - or a blue-tick verified Elon Musk profile - advertising a new cryptocurrency that he's created and steps for people to get it, ultimately encouraging you to transfer money over to the scammer's wallet. MORE: PROTECT YOUR BACON: THE RISE OF PIG BUTCHERING SCAMS AND HOW TO AVOID THEM Not everyone will fall for this one, but it's a scam as old as time that's adapted to new rules on social media environments. If you get any direct messages from verified X accounts posing as a scantily clad woman, it could be a legitimate user. But, it could also be a scammer or even a "sexbot," which has increased in numbers since all the changes at X as well as the introduction of AI. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The changes on X highlight wider issues in online verification and the potential for misuse. Even if you don't use X, scammers may attempt similar tactics on other platforms you frequent. Being aware of these scams and how they work can help you stay safe online.The good news is that X is aware of these scams. Now, X's non-deceptive Twitter eligibility requirements for buying a Premium subscription require the user to not have recently changed their photo, display name or username. One of the best ways to protect yourself from scams on popular social media platforms like X is to simply be aware of what new scams are out there. By staying up to date, you can know your weapon to ward off these scammers.That being said, there are 10 steps you can take to ensure your safety on X.1) Protect your personal information: Do not share your full name, address, phone number, email, passwords or other sensitive information with strangers or people you do not trust on X.2) Be skeptical: If an X account seems fishy, investigate further. Check join dates, usernames and their activity history.3) Use a unique and strong password for your account and change it regularly: Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.4) Enable two-factor authentication: Two-factor authentication is just an extra shield that will prevent a hacker from getting into your accounts. 2FA requires you to enter a code that is sent to your phone or email or generated by an app in addition to your password when you log in. This way, even if someone knows your password, they cannot access your account without the code.5) Review your privacy settings: Limit who can see your posts, photos and profile information on X by changing your privacy settings .6) Verify the source and accuracy of information: Do not believe everything you see or read on social media. Always check the source and credibility of the information before you engage with the content and share it with others. Use reliable and reputable sources to verify the source and the facts.7) Have good antivirus software on all your devices: The best way to protect yourself from having your data breached by a scammer on X is to have antivirus protection installed on all your devices. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links, which may install malware on your devices, allowing hackers to gain access to your personal information. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices .8) Delete anyone who tries to trick you: If anyone tries to scam you, or you encounter any suspicious accounts, consider reporting them to X immediately. You can use X's reporting features to flag potential scams. This will also help others from being scammed.9) Stay informed about security updates: Keep your software and apps updated to protect yourself from the latest threats.10) Prevent strangers from following you, via X's privacy settings: This can be a good way to prevent some of those bots or scammers from getting to you.All you need to do is click on Settings , select Privacy and Safety , move the toggle for Protect Your Tweets and select Done . Now, only people whose accounts you approve have permission to follow you. You can also block and remove followers if the former is too strict for you. MORE: HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS Social media can be like the Wild West, especially when a bunch of new changes are happening every day. In terms of cybersecurity and protecting yourself online, it's important to be aware of scams like this. Just because something has a blue check mark (or, anything else that would make it seem "verified" in a certain context) does not mean that it is. It's so easy for scammers to pose as someone or something else, and chances are they'll keep coming along. So, it's OK to second-guess something if you're not 100% sure; and online, we never really can be.What are your biggest concerns about the potential for scams on the social media platforms you frequently visit? Let us know in the comments below. Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

This AI robot garbage picker can sort over 500 types of trash in seconds

Robots are taking over the dirty work of sorting through our trash and turning it into valuable resources. And not just any robots, but smart robots that use artificial intelligence (AI) to identify and separate different types of waste with incredible speed and accuracy. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER MORE: NO HUMAN NEEDED HERE - HOW THIS ROBOT BUILDS WALLS ALL BY ITSELF These robots are the brainchild of ZenRobotics , a global leader in smart robotic recycling. The company has recently launched its fourth generation of waste sorting robots, called ZenRobotics 4.0, which have new features and upgraded AI to optimize and improve the efficiency of waste sorting operations. So, what are these improvements, and how do they work? Let's take a closer look at the two models of ZenRobotics 4.0: the Heavy Picker 4.0 and the Fast Picker 4.0. MORE: 24 MOST AMAZING COOKING GADGETS The Heavy Picker 4.0 is a multipurpose waste sorting robot that can handle bulky materials such as wood, metal, plastic and cardboard. It is capable of sorting items weighing up to 88 pounds each, making up to 2,300 picks per hour for each robot on a sorting line. It has a compact individual recognition system (ZenBrain) that enhances precision and increases efficiency by 60%-100% compared to ZenRobotics' previous system.The Heavy Picker 4.0 also benefits from upgraded AI technology with an advanced global recognition database that empowers the robots to identify more than 500 waste categories. This significantly reduces setup times as the Heavy Picker 4.0 will come pre-trained to recognize various types of waste. The upgraded AI also improves motion control and gives the Heavy Picker 4.0 the ability to prioritize picking the item that has the most value to the customer. MORE: THE NEXT GENERATION OF TESLA'S HUMANOID ROBOT MAKES ITS DEBUT The Fast Picker 4.0 is a high-speed waste sorting robot that is ideal for lightweight materials such as paper, plastic and aluminum. It has the Heavy Picker beat at a rate of 80 picks per minute or 4,800 picks per hour. This is double the average pick rate of a human sorter, which is 30-40 picks per minute.However, the Fast Picker 4.0 has a maximum lifting capacity of 2.2 pounds. The upgraded AI on the Fast Picker 4.0 leverages higher rates of purity, accuracy and recovery, and like the Heavy Picker 4.0, it is able to recognize more than 500 waste categories.One of the key differences with the Fast Picker 4.0 is the customization it offers with adjustable widths and frame design for seamless integration into various picking stations. The Fast Picker 4.0 reaches the full width of the whole conveyor belt.The Fast Picker 4.0 can also be added at the end of a line of Heavy Pickers, incorporating into waste streams such as wood, scrap and rigid plastics, and sorting smaller material pieces once the Heavy Pickers have removed the bulky material. The Fast Picker can also be easily integrated into side streams, reject recovery lines and quality control. MORE: HOW THIS ROBOT HELPS YOU PROTECT AND CONNECT YOUR HOME Waste operators know how challenging it is to sort and recover valuable materials from the mixed waste streams. Manual sorting is slow, expensive and risky, and it often results in low-quality recyclables that end up in landfills or incinerators. That's where waste-sorting robots come in. They can reduce a company's carbon footprint, save natural resources and create a circular economy where nothing is wasted.ZenRobotics AI-powered robots can sort waste 24/7, with high speed and accuracy. They can identify and extract different types of materials, such as metals, plastics, wood, paper and more, and even find new value in waste that might be otherwise overlooked. By using ZenRobotics, companies can generate more revenue from waste, cut operational costs and meet the increasing recycling targets and regulations. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER As you can see, ZenRobotics 4.0 is a game-changer in the field of waste sorting and recycling. With its smart and fast robots, it offers a solution that is not only environmentally friendly but also economically viable and socially responsible.How do you feel about the role of robots in waste management? Do you think it's a step in the right direction or taking jobs away from humans who previously did it? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Construction workers being replaced by AI robot bricklayers

Imagine being a bricklayer. Working all day in the hot sun, bending your back and knees with every brick, hands raw from mortar. Not exactly a career on most young people's dream list. That's where Monumental comes in with its robot bricklayers that might just save the construction industry and a spine or two in the process. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER  Monumental's bricklaying robots are agile, artificial intelligence-powered machines that navigate construction sites like self-driving cars. They work in teams of three. One grabs bricks, another fetches mortar and the third, the star of the show, lays them down with precision. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? It does this with two tower cranes that allow it to lay bricks from the ground level up to the top of a building's ground floor. For higher floors, the robot is able to drive onto a scissor lift that raises it up.  MORE: BEST TOOLS FOR THAT HANDY PERSON IN YOUR LIFE Then, the bricklayer robot deposits the mortar and lays the bricks autonomously . The process still needs a human mason for pointing, mortar smoothing and wall tie installation. MORE: NO HUMAN NEEDED HERE - HOW. THIS ROBOT BUILDS WALLS ALL BY ITSELF  Monumental's robots are much more affordable than conventional ones, costing only $25,000 per unit. But Monumental does not sell its robots ; it sells its brick-laying services. It charges by the brick, just like human masons in Europe, and at a similar rate. It also provides a human mason to supervise the robots and handle the tasks they cannot do. However, Monumental's bricklaying robots can work faster than humans by forming swarms, which is not feasible with the human labor shortage. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: HUMAN ROBOTS ARE NOW DOING THE WORK OF HUMANS IN A SPANX WAREHOUSE   Now, don't panic about these robots stealing jobs . These bricklayers are more like helpful assistants, filling a crucial gap in the labor market. With over half million construction worker vacancies in the U.S. alone, including a serious lack of skilled bricklayers, there's plenty of work to go around. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS Monumental is a startup that wants to revolutionize the construction industry with its bricklaying robots. The company, based in Amsterdam, was founded by experienced entrepreneurs and AI experts who have been working secretly for two and a half years. Now, they are ready to unveil their solution - a fleet of robots that can work alongside humans, not against them, to build faster and smarter. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER  Who knew robots could be such helpful construction workers? While they might not be stealing anyone's job, they're definitely making bricklaying a whole lot easier on the back and the future of the industry. Let's not forget that there's still something special about a well-crafted brick wall built by human hands. These robots are here to help, not replace the craftsmanship of a human bricklayer.So, what other jobs do you think could benefit from this kind of "robot assistant" approach? Are there any tasks you wouldn't want a robot to take over, no matter how efficient they might be? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Uncomfortable reality leads to Vision Pro returns

Recent reports indicate a wave of returns for Apple's Vision Pro headsets with users citing discomfort, headaches and eye strain as primary concerns. This uptick in returns aligns with the closing of Apple's 14-day return window, suggesting initial excitement for the $3,500 device may be waning.The clunky design of the headset has been a critical factor for users. The front-heavy weight distribution has been linked to physical discomfort, with some users experiencing headaches and motion sickness.  While dry eyes and redness have been associated with VR headsets for years, the severity of these symptoms with the Vision Pro seems noteworthy. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER  Customers returning the Vision Pro headset to Apple stores are sharing their grievances with the employees. They report that while the device initially promises a magical experience, its cumbersome and unwieldy design overshadows this aspect. As a result, many find it uncomfortable to wear even for short periods. That discomfort eventually led to others posting about their experience online in their decision to return it. Additionally, several others share the sentiment of finding the headset too expensive to justify the persistent headaches and eye strain. AI CAN DETERMINE PERSONAL INFORMATION THROUGH AR, VR USERS' MOTION DATA, STUDIES SAY MORE: APPLE'S VISION PRO BRINGS A BURST OF BIZARRE TO ZOOM CALLS   The ergonomic challenges posed by wearable technologies are not new. With smartwatches, it's often a matter of case size relative to the wrist; with smart rings, the issue may be finger size or swelling. Smart glasses and headsets, like the Vision Pro, confront similar problems with fit and comfort, particularly for individuals with low nose bridges or those who need a device that adequately blocks out light. MORE: APPLE VISION PROS SKI-GOOGLE-LOOKING HEADSET GETS A BLACK EYE FROM YOUTUBE, NETFLIX AND SPOTIFY   Beyond the physical issues, the Vision Pro's utility has come under scrutiny. Users have reported productivity challenges, stating that the headset does not offer enough functionality to warrant its price. Complaints range from difficulties in viewing Figma screens to the inadequacy of the headset for work-related tasks. Programmers have noted the unsatisfactory experience with coding and focus issues leading to headaches. For some, the lack of games and entertainment options further diminishes the device's value. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS While a vocal group of early adopters is expressing dissatisfaction and intent to return the device, many are still open to the idea of a second-generation Vision Pro. They suggest the technology itself isn't at fault; rather, it's the absence of a compelling application and the need for improved comfort. MORE: THE BEST TRAVEL GEAR FOR 2024   The extent of the return phenomenon remains unclear, as does Apple's internal expectations for the headset's performance. However, the feedback from this outspoken minority could influence the future development and refinement of the Vision Pro headset.How do you think Apple should address the ergonomic issues of the Vision Pro headset? What are some features or improvements that you would like to see in the second-generation Vision Pro headset? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Beware of a new Android threat targeting your photos and texts without even opening them

Another day, another malware threat is trying to get your data. Well, brace yourself, because there's a virus that's been around for a while that's out there that's gotten even worse.It's called XLoader, and it's after your photos and texts on your Android device . Yes, you heard that right. Your precious memories and messages are in danger of being snatched by this malicious software. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO'S TO MAKE YOU SMARTER  Malware is technically any software that's designed to disrupt the system of its intended target. With malware, the person or entity behind the attack can gain access to your data, leak sensitive information, block you out and take control of other aspects of your privacy and security. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS According to McAfee , the XLoader malware - also known as MoqHao - has been around since 2015, targeting Android users in the U.S., Europe and Asia. Once it's on your device (which it's gotten much better at doing), it's able to run in the background, taking your sensitive data, whether it be photos, text messages, contact lists, hardware details and more. MORE: BEWARE OF NEW ANDROID MALWARE HIDING IN POPULAR APPS One of the reasons XLoader is such a major threat is because, unlike its previous strains and other malware, it can get on your device that much easier than before. Generally, malware gets onto your device via a phishing scam . However, because people are more skeptical about opening or clicking on suspicious files or links - and because there are integrated apps that help warn you of these files - it's more difficult for these traditional phishing scams to be effective, but XLoader has gotten clever.Like ordinary malware, XLoader often spreads through malicious links sent via text messages. This is a unique type of phishing scam known as "smishing." However, scammers are aware that most people don't click on texts from people they don't know. So, another way they attempt to be successful at this is by first gaining access to a phone number that has your number in their contacts, and they target you that way. You won't think twice when you receive a text from someone you know. Once it gets past this step, XLoader can get onto your Android device in two ways:Next, the unsuspecting victim would see a link in the text message. The link may look less suspicious than typical malware links because they are typically shortened and look less spammy and more legitimate, like a link that someone you know would send you. A RANSOMWARE REALITY CHECK AS US IS A TOP TARGET OF ATTACKS If you end up clicking on this link, it will direct you to download an Android APK file (standard file format for Android), which are files that are used to sideload apps outside the official Google Play Store. This method, therefore, bypasses Google's security measures and increases the risk of malware infections. It can happen in a matter of seconds, and if you click "install," then the XLoader malware will be on your phone before you know it.Once the malicious APK is downloaded and installed, XLoader can launch on its own without any further action from the user, silently running in the background and performing its malicious activities.If you decide you want to launch the app directly on your own, XLoader is already there waiting for you by impersonating Google Chrome. When you click "launch," the XLoader malware displays a very familiar-looking Chrome pop-up that will first ask you to grant it permissions by clicking "allow" or "deny." If you click "Allow" (thinking it'll lead you to the "app"), you'll be unknowingly giving it access to your SMS.Afterward, it will even display a pop-up that says, "Choose Chrome to prevent spam," giving you two options - your default SMS app or Chrome. Because these decoy pop-ups replicate Google's style completely, it gives the user a false sense of security that it can be trusted.Once it's there, it can grab your photos, texts and other sensitive data on your Android, most of the time, without you even realizing it.Now that you know what XLoader is and how it gets onto your Android device, be sure not to click on any links in text messages that are unusual. If the text came from someone in your contacts, reach out to them directly (via phone call or messaging on another app) and confirm that they meant to send you it before clicking on it. Here are some other ways to protect yourself from XLoader and other malware attempts. 1. Avoid sideloading apps and shortened URLs: Refrain from sideloading apps (installing apps from unofficial sources) and clicking on shortened URLs in messages, as these are common vectors for malware distribution. 2. Be careful granting permissions: Exercise caution when granting permissions to apps. The question is whether an app truly needs access to certain device functions or data. GET FOX BUSINESS ON THE GO BY CLICKING HERE 3 . Limit the apps you have on your phone: Sometimes, having a lot of apps on your phone can make it easy for you to be exposed to malware. These apps can let in malicious code over time, and the more apps you have to keep track of and update, the more likely your Android will be vulnerable. 4. Only download reputable apps: Additionally, when you download apps, make sure they are from reliable and legitimate developers. Check reviews and do some research before just hitting "install." 5. Don't neglect software updates: Your phone has a way of keeping itself safe with software and security updates . Don't forget to do them. 6. Have good antivirus software on all your devices: The best way to protect yourself from malware like this Xloader virus is to install antivirus protection on all your devices. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices. Malware is, unfortunately, inevitable. As we become more educated about how to prevent these threats, the hackers creating them are always working on ways to outsmart us, while the malware itself becomes more sophisticated. This new strain of XLoader is just one example of that. And, while it's currently focused on targeting Android users, it'll likely be just a matter of time before it begins targeting Macs and other devices.The best way to protect yourself, therefore, is to stay up-to-date with the latest cybersecurity trends and ensure your devices have good antivirus protection. Additionally, continue best practices for protecting yourself from suspicious links and downloads.How stressed are you these days with malware like XLoader or other types of viruses trying to steal your data?  Should more be done to stop these crooks? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Google's woke AI image fail

IN TODAY'S NEWSLETTER:- Google apologizes after new Gemini AI refuses to show pictures, achievements of White people
- AI poised to bolster workplace efficiency and security, Cisco exec says
- Robo-calls no more as federal ruling makes clear statement on annoying practice RACIAL BIAS: The latest version of Google's Gemini artificial intelligence (AI) will frequently produce images of Black, Native American and Asian people when prompted - but refuses to do the same White people. AI BOOST: The rise of artificial intelligence (AI) tools is poised to yield greater workplace efficiency and has the potential to boost security even as bad actors look to exploit those tools. REVOKE CONSENT: The Federal Communications Commission (FCC) put a final point on its reforms related to automatic or "robocalls" after deciding to ban the use of artificial intelligence (AI) generated voices for marketing calls. AI BOOM: Nvidia shares soared after the artificial intelligence powerhouse announced a massive jump in quarterly revenue from a year ago, reassuring investors that its AI edge is alive and well. GETTING 'TECH'NICAL: All the hype around generative artificial intelligence since the release of OpenAI's ChatGPT has companies scrambling to hire talent who knows how to implement and harness the rapidly developing technology. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

'Patriot entrepreneurs' fight against DOD bureaucracy to green light future tech: defense expert

Military leaders have bought into advanced tech that "patriotic entrepreneurs" are inventing, but the Pentagon's bureaucratic slog has created major challenges to getting those innovations onto the battlefield, according to a defense expert."Now we have this thing where this great landscape of patriot entrepreneurs that are devoting their whole life to building cool tech that helps the broader citizenry," said Doug Philippone , who invests in defense tech through his firm Snowpoint Ventures. The real challenge, he told Fox News, is getting the Department of Defense to adopt the inventions at a competitive speed."That's something that the DOD is just - I'm just thinking of some word to insult them - but they just cannot do it," Philippone said. WATCH MORE FOX NEWS DIGITAL ORIGINALS HERE Pentagon spokesperson Jeff Jurgensen, however, noted the speed DOD has moved since Russia invaded Ukraine and pointed to strategies military initiated this year and last to expand the defense industrial base."DOD remains committed to using the full range of acquisition and contracting tools Congress has provided in order to deliver capabilities that outpace the current and future threat environment - quickly, cost-effectively, and most importantly, at scale," Jurgensen said. "Since Russia's illegal invasion of Ukraine, DOD has shown it can - and is - moving rapidly, having obligated more than $30 [billion] on contract under the Ukraine Security Assistance Initiative and to replace equipment drawn down from U.S. stocks.""Contracts that used to take months are being awarded in a matter of weeks," Jurgensen added. "For example, a contract to accelerate Stinger production was awarded in just 22 days."Philippone, who's headed Palantir's Global Defense team since 2008, has a history of casting blunt judgment on the Pentagon, particularly when it comes to acquisition. PENTAGON TURNS TO SILICON VALLEY TO ACCELERATE AI TECH DEVELOPMENT, ADOPTION: REPORT "We started out politely, but now our basic message to them is, 'What you're asking for won't work and will waste money, so you're either stupid or corrupt,'" Philippone told Fortune in 2017 as Palantir was fighting to upend how the Defense Department doles out contracts.In one legal filing, Palantir called the Pentagon officials "irrational," driven by "a desire to cover up the failures of their own program" and motivated by "an instinct to preserve relationships with entrenched 'inside the Beltway' contractors (and perhaps the 'revolving door' relationships often entailed in those relationships," Fortune reported.While he told Fox News he owned those words, admitting he "was a younger, more immature version" of himself, Philippone also said he and Palantir "were fighting like hell to break in just to give soldiers something that they were already asking for, and bureaucrats were blocking us." HOW A LIZARD-LIKE ROBOT COULD HELP THE NAVY 'PREVENT CATASTROPHES': DECORATED VETERAN "They were reinforcing failing instead of buying something that the soldiers were saying, 'this works," continued Philippone, an Army veteran who commanded multiple Joint Special Operations Command outstations. "It's cheaper, faster, better, and just out of stubbornness [the bureaucrats] just weren't doing it."At the time, the Pentagon had decided to update what Fortune called "a deeply flawed system" created by some of the staple D.C. beltway defense contracts, including Raytheon, Lockheed Martin and Northrop Grumman. Palantir, a young outsider, was blocked from bidding on the contract.Philippone said the specs on Palantir's product "would lead a normal person to believe that you should just buy this thing.""But sometimes the Department of Defense does things, or the broader government does things that, you know, are not what normal citizens would think were rational decisions," he told Fox News. 'THIS SCARES ME': AS CHINA WATCHES, THIS DECORATED VETERAN SOUNDS ALARM ON AN AMERICA STRETCHED TO ITS LIMITS Since then, military leadership has accepted that start-ups can deliver game-changing tech, but "it's still harder than it needs to be by a long shot," Philippone said."I do think that the leadership landscape across the broader government, for the most part and across the DOD, for the most part, has bought into this," he continued. "It's just that either the frozen middle or the bureaucratic state, whatever you want to call it-we got to get through that."It's not just about Palantir and Snowpoint or its portfolio, Philippone said. A number of smaller firms are pushing to sell better -and cheaper - equipment to the military and "to help out the world.""Is it going to be hard? Yes," Philippone added. "But I guess that's my raison d'etre." 

Stop loading the dishwasher; this robot aims to do all the cleanup for you

Who couldn't use a little help cleaning up around the house? Right? Imagine a little helper robot that could clean up rooms around your home all by itself. Scientists at New York University and AI at Meta have joined forces to develop a robot to do just that.  They call it OK-Robot . It's like a smart vacuum that not only cleans but can pick up toys and other things around the house, putting them where they belong. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO'S TO MAKE YOU SMARTER  MORE: 24 MOST AMAZING KITCHEN GADGETS Someone uses an app on their iPhone that can map out a room in 3D-like drawing a detailed map, but for the robot. The app is smart enough to see the room as we do, with all the things in it, from kids' toys to furniture. The robot then uses this map to find and move stuff around the room. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS "Simply tell the robot what to pick and where to drop it in natural language, and it will do it," one of the NYU researchers , Lerrel Pinto, wrote in a post on X. The robot, named Stretch, is pretty good at this. It's like a tall pole on wheels with a handy arm that grabs and moves things. It does a great job when the room isn't too messy, finding and moving things correctly more than half the time. It's even better when things are neat and in order. MORE: EVE THE ROBOT CAN COOK, CLEAN AND GUARD YOUR HOME The brains of the robot come from what we call AI, or artificial intelligence, which is a way for machines to learn and do things like humans. This robot uses AI that anyone can get from the internet, which is why it's so special - it's using stuff that's out there for free.But it's not perfect. If it sees something it doesn't recognize, it just stops and doesn't know what to do next. So, it works best when the room is tidy, and there aren't too many things it might get confused by. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The people making the robot hope to teach it how to understand when we talk to it, which would make it even easier to use. They're excited because they think if we all start to believe that helper robots in our homes are possible, there will be a lot more cool robots in the future. MORE: HOW THIS HUMANOID ROBOT LEARNED TO MAKE COFFEE BY WATCHING VIDEOS The main point is that OK-Robot is a big step forward for robots that help us at home. It shows that robots can do more than just factory work. They can actually help us keep our homes clean and organized. As these robots get smarter, they'll become an even bigger part of our lives, making things easier for all of us if they don't kill us first.How do you feel about having a robot helper in your home? Would you trust it to do the chores for you? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

The app that lets you have a live conversation in any language even if you don't speak a word of it

Anyone who's traveled abroad knows how frustrating and limiting language barriers can be. But what if you could break those barriers with a simple app ? That's where a revolutionary augmented reality app called Navi, which is built for Apple Vision Pro, comes in. It allows you to translate conversations from a foreign language in real-time. It also floats subtitles and translations next to people in the "real" world so you can understand anyone, anywhere, anytime. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER  With the Navi app , you can see live captions of what people around you are saying through the built-in microphone of Apple Vision Pro. When you connect to other iOS devices running Navi, you can enable live translation from more than 30 languages. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The other person or persons can speak in their native language, and you will see their captions in your own language. You can also turn on the spoken translations feature to hear the translated captions. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS Navi is not just a cool app. Here are some of the four benefits of using Navi.1) Navi can help you overcome language barriers and connect with people from different cultures and backgrounds. You can have meaningful conversations, exchange ideas, share experiences and learn from each other.2) Navi can help you learn new languages. By seeing and hearing the captions and translations, you can improve your vocabulary, grammar, pronunciation and comprehension. You can also practice speaking with native speakers and get instant feedback. Navi can make language learning fun and easy. GET FOX BUSINESS ON THE GO BY CLICKING HERE 3) With Navi, you can watch movies, shows, news, podcasts and more in any language and understand them in your own language. You can also explore the rich and diverse content that the world has to offer and expand your knowledge and perspective.4) You can discover new words, expressions, idioms, jokes and stories that enrich your communication and understanding. You can also celebrate the differences and similarities that make us human. MORE: APPLE VISION PRO BRINGS A BURST OF BIZARRE TO ZOOM CALLS Navi was made to help people communicate more easily, which is why the regular captions feature is free to use in your native language. To enable the live translation feature, you can choose a flexible subscription plan that provides unlimited translations. These are priced at $3.99 for a weekly subscription or $8.99 for a monthly subscription.To use the translation feature, you will need to connect to another iOS device running Navi. To access the translation feature, both users require an active subscription, ensuring uninterrupted and high-quality translation services. MORE: AI TOOL TRANSLATES WHAT YOUR BABY'S CRIES MEAN  Navi's live translation feature supports an extensive range of languages, including Bulgarian, Chinese, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Greek, Hungarian, Indonesian, Italian, Japanese, Korean, Latvian, Lithuanian, Norwegian, Polish, Portuguese, Romanian, Russian, Slovak, Slovenian, Spanish, Swedish, Turkish and Ukrainian. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Navi is easy to use and works on all platforms. Here are the steps to get started:For those of us who have been frustrated trying to communicate with someone in another language, the Navi app seems like it is definitely a game changer. Of course, you have to have the Apple Vision Pro and another Apple device like an iPhone, but if you do, it could be the bridge between different languages. What I think is cool is that the Navi app can help you communicate with anyone, anywhere and anytime. So, there's virtually no one you can't talk to.What do you think of the Navi app? Would you use it to break language barriers and connect with people who speak a different language? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

AT&T cell phone outage hits the US: How to use Wi-Fi calling

AT&T on Thursday confirmed an outage affecting thousands of cell phone users, including some customers on other networks who attempted to call AT&T users."Some of our customers are experiencing wireless service interruptions this morning," AT&T said Thursday. "Our network teams took immediate action and so far three-quarters of our network has been restored. We are working as quickly as possible to restore service to remaining customers." If it wasn't bad enough to find yourself unable to make phone calls from your mobile device, some iPhones are reported to be stuck in Emergency SOS mode as a result of the outage. There are a few steps that have been reported to restore cellular connections on some phones.   CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO'S TO MAKE YOU SMARTER  Outages were reported by tens of thousands of users across the country. In particular, some iPhone users are being hit, leaving devices on SOS mode, preventing them from making calls, sending SMS text messages or using their cellular data.iPhone's SOS mode is triggered when your cellular connection is lost, which means you can only complete SOS calls or texts to emergency services. However, there are several things you can do to get your smartphone back online if you are affected by the outage.If you have a problem enabling "Wi-Fi Calling": MORE: WATCH OUT FOR THIS NEW MALICIOUS RANSOMWARE DISGUISED AS WINDOWS UPDATES You can also switch to Data Roaming to regain service, but this feature may cost extra money, depending on your cellular carrier and plan. Find these settings in the same Cellular area described above.Or you may want to force-restart your iPhone if it isn't responding: MORE: RANSOMWARE RAMPAGE HITS RECORD HIGH WITH THE U.S. ITS TOP TARGET This should be a wake-up call to check your own digital security and protection. One weak device in your world can take down the rest of your technology at home .Several emergency 911 call centers throughout the US are being overloaded with calls from people simply testing to see if their phones are working. Fire and police departments are asking that people not call 911 unless they have an emergency.Whether this event was a cyberattack or not, be prepared by adding antivirus security protection to all of your devices.The best way to protect yourself from malicious attacks and disruptions is to have antivirus protection installed on all of your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails and ultimately protect you from being hacked.  Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBER CROOKS A cellular network outage is a reminder of how heavily we all rely on staying connected with our mobile phones.  There are steps you can take to circumvent cellular networks so you can still make and receive calls when a disruption strikes.  By using Wi-Fi calling, you can communicate with our loved ones and emergency services without relying on cellular service. By installing antivirus software, you can safeguard your devices and data from unexpected malicious attacks that can also prevent you from keeping your device operating.How do you feel about the current state of cybersecurity in the world?? Were you ready for this outage? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question, or let us know what stories you'd like us to cover. Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

A ransomware reality check as US is a top target of attacks

While you might think, as many people do, that ransomware attacks are a worldwide problem, a new report reveals hackers are targeting specific countries, and the United States is one of the top targets.According to critical infrastructure security company Dragos , 44% of ransomware attacks last year targeted North American industrial organizations. Europe was also a top threat, with 32% of attacks targeting organizations there. Industrial ransomware attacks spiked nearly 50% on a global scale, growing to 905 last year compared to 600 in 2022. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER In a ransomware attack, hackers will encrypt data on a system and demand a ransom to restore access to the owners. They may also threaten to delete or leak the data if you don't pay. While these attacks tend to target large organizations, some hacker groups will also target individuals.In fact, anyone who uses a computer or a device connected to the internet can be a potential victim of ransomware. This means that your personal files, such as your photos, videos, documents and emails, could be locked by hackers who demand a ransom for their release. MORE: RANSOMWARE RAMPAGE HITS RECORD HIGH WITH US ITS TOP TARGET Ransomware criminals will try to get you to pay money to them to get your files back. However, paying the ransom does not guarantee that you will regain access to anything a criminal takes from you and will only permit them to do it more.Your best bet is to prevent an attacker from gaining access to your files altogether so that you don't have to try to fight to get them back. Here are some of my tips for avoiding having your data stolen in a ransomware attack. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS If you receive an email from an address you do not recognize, don't open it. If you open it by mistake, avoid clicking any links or opening any attachments inside the email. Cybercriminals use this to try to trick you into thinking that the message is from someone important.Good antivirus software is a major help when it comes to keeping hackers out of your devices. It makes sure you don't click any potentially malicious links or download malware or ransomware. Plus, it's designed to tell you if there's already malware on your device so that you can immediately work towards getting rid of it. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices .You should create backups of your information on an external hard drive and store it securely in a safe location. This process involves regularly making backup copies from your Windows or Mac computer and then disconnecting the external drive from your computer for added safety. You should store the disconnected drive in a secure place like a fireproof safe or a safe deposit box. By keeping the drive unplugged when not in use, you significantly minimize the risk of unauthorized access to your data by hackers. Check out my top recommendations for external hard drives here . Regularly update your operating system , antivirus software, web browsers and other applications to make sure you have the latest security patches and protections.Create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. This will make it harder for hackers to access your data or infect your devices with ransomware. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you're logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts. Get more details about my best expert-reviewed Password Managers of 2024 . MORE: WATCH OUT FOR THIS NEW MALICIOUS RANSOMWARE DISGUISED AS WINDOWS UPDATES Do not pay the ransom. Paying the ransom does not guarantee that you will get your data back, and it may encourage the attackers to target you again. Disconnect your device from the internet and any other networks. This may prevent the ransomware from spreading to other devices or encrypting more data. Contact law enforcement and report the incident. They may be able to help you recover your data or track down the attackers. You can find a list of law enforcement contacts for ransomware attacks on the CISA website . Restore your data from backups . If you have backups of your important data, you may be able to restore them to a clean device. Make sure that your backups are not infected by the ransomware and that you scan them for malware before restoring them. Use identity theft protection. If you are a victim of a ransomware attack, you may want to consider investing in identity theft protection.If you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft service. See my tips and best picks on how to protect yourself from identity theft . MORE: HOW TO TELL IF YOUR BROWSER HAS BEEN HIJACKED So, it sounds like even though we might think of ransomware as a global issue, it seems hackers have their favorite targets, with the US and Europe leading the pack. So, you should take ransomware seriously. Are you setting yourself up to be a target? Although most hackers target large organizations, some still hone in on individuals like you and me. Keep in mind the ways we mentioned to protect yourself and your precious data.Have you ever come close to falling victim to a ransomware attack? What did you do and what happened? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Never fumble through paper instructions ever again with this killer Apple Vision Pro 3D app

Have you ever bought something that came in a box and felt overwhelmed by the complicated instructions? Have you ever wished there was a better way to assemble, install or repair your products without hiring someone else or wasting hours of your time? If you answered yes, then you're not alone. Many people struggle with the challenges of DIY projects, especially when they involve complex or unfamiliar products.But what if I told you there is a solution that will make your life easier and more enjoyable? A solution that will let you see and interact with 3D models of your products in your own space and guide you step by step through the process with clear and simple instructions. A solution that will save you time, money and frustration. Sounds too good to be true. Well, it's not. It's real, and it's called BILT. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER BILT is an app that works with the Apple Vision Pro headset, the latest and most advanced device for spatial computing. Spatial computing is a technology that allows you to blend digital and physical worlds and create immersive and interactive experiences. With the Apple Vision Pro headset, you can see and manipulate 3D images in your real environment and access a variety of apps that will enhance your productivity, creativity and entertainment. MORE: BEST TOOLS FOR THAT HANDY PERSON IN YOUR LIFE One of these apps is BILT, the ultimate app for DIY projects. BILT is an app that provides 3D immersive instructions for thousands of products from hundreds of brands. Whether you want to assemble a Weber grill, install a Nest thermostat or repair a Dyson vacuum, BILT has you covered. BILT is not just a collection of videos or PDFs. It's a smart and dynamic app that adapts to your needs and preferences and gives you the best guidance possible. MORE: APPLE VISION PRO BRINGS A BURST OF BIZARRE TO ZOOM CALLS 3D overlay guidance: You can overlay a digital twin onto real equipment to highlight instruction animations, leaving virtually no room for error. Hands-free control: Voice and gesture commands keep your hands free from the tools required on the job. There's no need to hold a manual, paddle or mobile device. Seamless transition across devices: Integrated BILT content on visionOS allows you to transfer conceptual information to practical applications on-site. Whether using Apple Vision Pro in the field or accessing guidance on an iPhone or iPad, BILT supports technical training from the classroom to field operations. Immersive learning: With the freedom to move around and through 3D models, you are more focused and engaged. This increases understanding and muscle memory, reducing ramp time. You can train without the physical product on site, saving costs. FaceTime-enabled support : You can collaborate quickly, which shortens support calls and hold times. Apple Vision Pro facilitates remote problem-solving by sharing the perspective of the tech on the job. MORE: APPLE VISION PRO SKI GOOGLE-LOOKING HEADSET GETS A BLACK EYE FROM YOUTUBE, NETFLIX AND SPOTIFY First, you need to download the BILT app from the App Store for visionOS. Make sure you get the new BILT app that is optimized for spatial computing, not the old BILT app that was ported over from iOS. You can tell the difference by the shape of the app icons: the new BILT app has a round icon, while the old BILT app has a square icon. The new BILT app is the one you want because it will let you pull the 3D models out of the window view and into your physical space. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS Once you have the new BILT app, you can launch it on your Apple Vision Pro headset and browse through the library of products. You can search by brand, category or product name, or you can scan the QR code on the product box or manual. When you find the product you want, you can select it and start the 3D immersive instructions. MORE: CREEPY EMBODIED AI AVATAR GIVES FACE, VOICE TO CHATGPT INTERACTION The 3D immersive instructions will show you a realistic and detailed 3D model of your product and guide you through the assembly, installation or repair process. You can move the 3D model around, zoom in and out, rotate it and see it from different angles. You can also see the parts list, the tools required, the estimated time and the difficulty level. You can follow the instructions at your own pace, pause and resume as you wish and skip or repeat any step. You can also ask questions, get tips and rate your experience.The best part is that you can see the 3D model of your product next to the real one and compare them as you go along. This will help you avoid mistakes, confusion and frustration, and it will ensure that you get the job done right. You will also have fun and learn new skills along the way.BILT is a game-changer for anyone who loves DIY projects but doesn't love the frustration that often comes with them. It combines the power of spatial computing with the convenience of interactive guidance. Don't take my word for it. Try it for yourself. Download the new BILT app for Apple Vision Pro and discover the power of 3D immersive instructions. You'll never look at instructions the same way again.How do you think spatial computing technology like BILT could revolutionize the way we approach DIY projects and product assembly in the future? Let us know by writing us at Cyberguy.com/Contact .For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover .Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Lizard-like robot could help Navy 'prevent catastrophes'

IN TODAY'S NEWSLETTER:- How a lizard-like robot could help the Navy 'prevent catastrophes
- Israeli deepfake detection start-up fighting disinformation during Gaza war
- Speaker Johnson launches new artificial intelligence task force in House MILITARY GAME-CHANGER: A lizard-like robot and other devices relying on artificial intelligence could soon be major military game changers, according to a defense expert investing in the tech.  DEEPFAKE BATTLE': An Israeli AI cybersecurity start-up, Clarity, has developed software to detect and protect against deepfakes and recently raised its first $16 million in seed money. AI TASK FORCE: House Speaker Mike Johnson is putting together a formal task force to explore how the U.S. can stay competitive in the artificial intelligence (AI) sphere while also managing the rapidly evolving technology's risks. A-EYELASHES': Artificial intelligence is making its way into esthetics with a new application in eyelash extensions . CHALLENGE OR OPPORTUNITY?: Today, people don't know what to think about artificial intelligence or what the next few years will look like. The consensus from popular opinion is that the future is bleak. TECH SAVVY: Amazon Web Services (AWS) recently launched a new program aimed at helping small- and medium-sized businesses build competencies in areas like artificial intelligence (AI), the cloud and other skillsets to be more competitive. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Stealthy backdoor Mac malware that can wipe out your files

MacOS is generally perceived to be more effective at keeping malware out compared to PCs and other operating systems. However, that's not the reality; MacOS is just as vulnerable to malware threats as any other operating system, and this misconception can lead you to not be as vigilant regarding malware threats.As evidence, there's a new one you need to be aware of called SpectralBlur, which is a sophisticated backdoor malware threat targeting Macs that's capable of wiping out your files without you even knowing how and when it got there in the first place. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER SpectralBlur is a backdoor malware that was created by Lazarus, a hacking group from North Korea. Lazarus has been behind several hacks, including KandyKorn, which targeted blockchain engineers in cryptocurrency.For quite some time, SpectralBlur went undetected because antivirus software on Mac wasn't able to pick up on it. It wasn't until August 2023 that it was uploaded to VirusTotal - a virus detection software - published this new malware threat, and it gathered attention in the cybersecurity community. It's even being called "The First Malware of 2024" and was dissected originally by Greg Lesnewich. MORE: HOW TO PROTECT YOUR MAC FROM THE NEW METASTEALER MALWARE Because SpectralBlur is a backdoor malware , it means that instead of having to go through normal authentication procedures - where most malware would get detected - the malware gets into your system in several ways. It could be vulnerabilities in your system, a phishing attack , malicious links/downloads or other tactics.Objective-See's security researcher Patrick Wardle also analyzed SpectralBlur and came to similar conclusions as Lesnewich. Once it's installed, the hacker can grant themselves remote access to your macOS. This gives the hacker the ability to access files and databases on your server. With this access, they can remotely tell it to do whatever they want, for however long they go unnoticed.From uploading files from your computer into their server, downloading files from the hacker's server to yours, or deleting files on your computer, they can steal your sensitive information, documents, images, etc., and use them for all sorts of purposes. They can also deploy additional malware (again, without you necessarily realizing it). MORE: BEWARE OF THIS MAC MALWARE MASQUERADING AS AN OFFICE PRODUCTIVITY APP Once SpectralBlur gets initial access, it uses a pseudo-terminal to execute shell commands, which essentially means it can run any command on the macOS system as if the attacker were physically using the computer. It does this via a remote command-and-control (C&C) server, using RC4-encrypted socket communication.Because this communication is encrypted, it makes it difficult for security systems to detect and analyze the malware's network activity. This encryption helps it stay hidden by masking the data being sent and received as harmless to your system. Of course, that's not the case; it's potentially wreaking havoc without you knowing.Good question. This isn't something we'll cover in depth here, but essentially the idea is because North Korea has so many sanctions on it, hackers are motivated to execute their hacks by money and information. When they can steal funds in cryptocurrency, they can use that money to fund the regime. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS There are a few ways that SpectralBlur goes undetected, especially once it's gotten access to your system:To start, it utilizes Mac's sleep and hibernate commands, which allow it to lay dormant within a system. This capability not only helps it avoid suspicions but also makes it difficult for users and antivirus programs to recognize it's there. It's also able to avoid detection by wiping your files and overwriting them with zeros. This method ensures that once it has accessed or created files, they can be completely erased without a trace. So, not only is it deleting your files, it's getting away with it.Last but not least, SpectralBlur can update its configuration as it goes. In layman's terms, it's quite agile and quick on its feet. By being able to adjust its tactics on the fly, SpectralBlur can stay hidden. GET MORE OF MY SECURITY ALERTS, QUICK TIPS & EASY VIDEO TUTORIALS WITH THE FREE CYBERGUY NEWSLETTER - CLICK HERE Because SpectralBlur is so sneaky and smart, you might be wondering how Mac users recognize that SpectralBlur is on their system. After all, it evaded virus detectors and cybersecurity experts for quite some time, so the average person shouldn't be expected to figure it out.Ultimately, there are a few ways to know if SpectralBlur - or other backdoor malware - may be on your computer: Unusual system behavior: If you notice your system is acting slower than usual, apps crashing frequently, your system's settings have changed without you doing it yourself, or just the feeling that something isn't right, there could be malware on your computer. Increased CPU or network usage: An unexplained increase in CPU or network usage can also be a red flag. SpectralBlur might be using resources for malicious activities, which means more work on your system than usual. Suspicious files or applications: Those of you who regularly check your system might find unfamiliar files or applications. While SpectralBlur tries to clean up after itself, certain actions or additional malware installations might leave some traces (albeit not on purpose). Identity theft : Unfortunately, some users might only realize they've been a victim of SpectralBlur or a similar malware attack when their data has been breached . Hopefully, though, it won't get to this point.SpectralBlur is an advanced piece of malware, but there are ways you can protect yourself.1) To begin with, be sure to update your operating system regularly . Check to see whether or not you're running the latest version of macOS. If you aren't, do an update.2) Install a reliable antivirus software for an additional layer of protection. The absolute best way to protect yourself from having your data breached is to have antivirus protection installed on all your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices .3) Always be cautious when opening email attachments or downloading files , especially from untrusted sources.4) Use identity theft protection. Identity Theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Read more of my review of the best identity theft protection services here .5) Although having malware in your system is a cause for concern for bigger things like identity theft, one of the most upsetting results of a SpectralBlur infection for most users is the fact it can delete files on your macOS. No one wants to wake up one morning to find out that their docs, photos, notes, videos and whatever else you have saved to your computer are gone.Despite the fact you can't prevent this 100%, you can make sure to hold on to your files. Do this by initiating regular backups of important data. In the event of a malware infection, having up-to-date backups can save all of your important data.The whole reason that backdoor malware like SpectralBlur is so damaging is that it can exist on your system for a long time without getting noticed, deleting all your files and data in the process. Unfortunately, by the time it is detected, it may be too late. So, please do yourself a favor and protect your Mac as best as possible using the security tips we mention, like installing antivirus protection and backing up your information.Have you - or has anyone you know - detected SpectralBlur or other backdoor malware on their macOS? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How this ex-Apple guy's AI glasses invention works

Imagine being able to see the world through the eyes of an AI. You would be able to instantly recognize any object, person or place, translate any language, get nutritional facts, search the web and even generate images with just your voice. Sounds pretty cool, right?Well, now, thanks to a smart ex-Apple guy and his company called Brilliant Labs, you can now experience this amazing technology with their new product: Frame glasses. Frame glasses are the world's first glasses with an integrated multimodal AI assistant. They are more than just stylish. They are designed to give you AI superpowers. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Frame glasses are a pair of smart glasses that look like regular glasses, but have a powerful neural engine CPU that can run multiple generative AI models at the same time. They also have a color micro OLED display that projects information directly on the lens, a camera, a microphone and a battery.Frame glasses are compatible with Brilliant Labs' app, called Noa. Noa is an AI assistant that uses OpenAI for visual analysis, Whisper for translation and Perplexity for web search. Noa learns and adapts to both the user and the tasks it receives. MORE: ZUCKERBERG'S META AI RAY-BAN GLASSES EVOLVE INTO CREEPY LIVE-STREAM CAM Frame glasses can do a lot of things that will make your life easier and more fun. Here are some examples. Visual recognition: You can ask Frame glasses to identify any object, person or place that you see. For example, you can say, "What is this?" and Frame glasses will tell you what it is, how it works or where it comes from. You can also say, "Where is this?" and Frame glasses will tell you the location, history or culture of the place you are seeing. Translation: You can ask Frame glasses to translate any language that you hear or read. For example, you can say, "Translate this," and Frame glasses will translate the speech or text that you are listening to or looking at. Nutrition: You can ask Frame glasses to give you nutritional facts about any food that you eat. For example, you can say, "What is this?" and Frame glasses will tell you the calories, ingredients or health benefits of the food you are eating. GET MORE OF MY SECURITY ALERTS, QUICK TIPS & EASY VIDEO TUTORIALS WITH THE FREE CYBERGUY NEWSLETTER - CLICK HERE Web search: You can ask Frame glasses to search the web for any information that you need. For example, you can say, "Search this," and Frame glasses will search the web for the topic, keyword or question that you are interested in. You can also say, "Show me this," and Frame glasses will show you the results, images or videos that match your query. Image generation: You can ask Frame glasses to generate images for you based on your description, request or imagination. You can also say, "Create this," and Frame glasses will create the scene, story or artwork that you request. MORE: THESE HIGH-TECH GLASSES WILL SUBTITLE REAL-LIFE CONVERSATIONS Frame glasses feature a 640x400-pixel color micro OLED that projects light through a prism in front of users' eyes. It offers a roughly 20-degree diagonal field of view. Frame glasses also come with a 1280x720 camera, microphone and a 222mAh battery. They run a Lua-based custom operating system that is fully open source with very few dependencies and is powered by an nRF52840 Cortex-M4F CPU. MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS Frame glasses are available for preorder for $349. You can choose from three colors to suit your personality: black, gray or clear. If you need prescription lenses, don't worry, Frame has partnered with Adoptics to handle that part. Frame glasses start shipping on April 15.However, if you want to enjoy the full potential of Frame glasses, you will need to pay for a subscription to the Noa app. Although you can use Noa for free, it is subject to a daily cap. The startup is planning to offer a paid tier through Noa, but there is still no information on how much it might cost. You won't have to pay to use the hardware by itself, though, as Brilliant Labs notes that there is no paywall or subscription and that you can freely use the eyewear with other apps.Frame glasses are absolutely a new way to experience the world differently with AI glasses. They are a way to sort of unleash your AI superpowers. Whether you want to learn, explore, create or have fun, Frame glasses can definitely help you do that. I wonder what the feedback will be once people start testing them out. Should be interesting.How do you think Frame glasses will change the way you interact with the world? Which of the features of Frame glasses are you most excited about and why? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to tame the barrage of stealthy social media notifications and regain control

If the number of emails, text messages and spam calls isn't enough to deal with, suddenly you are inundated with an overwhelming number of notifications from your social media apps. At first, it seems exciting to be notified that people are showing interest in your profile or posts, but later, you realize that it was just a way to get you to open the app and engage with others.While these notifications initially look personal or important, you may realize after clicking on a few of these alerts that they aren't what they seem. Often they are simply notifying you of activity that other people in your social media "circle" may be up to on the platform and not necessarily about you or your actual post. Many social media companies are "pushing" these pseudo-relevant notifications in an attempt to get more engagement from their users. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER If you're tired of opening these notifications only to be distracted or disappointed, below are some ways to manage these potentially annoying notifications and put the power back in your hands.If you want to adjust how often and what kind of notifications you receive from your social media apps, you can find the options in the app's settings. Here are some examples of how to change notifications within the apps. MORE: DON'T FALL FOR THIS SNEAKY NOTIFICATION THAT'S FOOLING PEOPLE ON FACEBOOK AND INSTAGRAM MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS These social media companies are finding new, creative ways to get you to open their app and interact with its content. If going app to app and different types of notifications are overwhelming, you can also choose to control notifications from your device. On the iPhone: You can either manage notifications or set boundaries on your phone using the "Focus" feature. To manage notifications or specific app notifications: GET MORE OF MY SECURITY ALERTS, QUICK TIPS & EASY VIDEO TUTORIALS WITH THE FREE CYBERGUY NEWSLETTER - CLICK HERE How to use the "Focus" feature to customize your notifications and contacts on iPhone and Android. iPhone: On an Android: S ettings may vary depending on your Android phone's manufacturer. You can't control how social media apps will try to lure your attention away from your work and life and redirect it to their app. What you can control is whether they get your attention in the first place by controlling how and when you get notifications.Are you willing to go app by app to adjust notification settings to your liking? Or will you control notifications directly from your device? Do you get a ton of notifications that you can't even comb through? Let us know by writing us at   Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to  Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover .Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Distributed by aarss.com.