Technology News Articles on Fox News

Get a handle on your time: Google Calendar tips and tricks

Before we get into it, I'll acknowledge what you may be thinking: Using Calendar means handing over even more info to Google. Win an iPhone 15 worth $799! I'm giving it to one person who tries my free daily tech newsletter.  Sign up here while you're thinking about it. SEE WHAT THE HOME YOU GREW UP IN LOOKS LIKE NOW AND OTHER MAPS TRICKS Sure, but here's my take: For the sake of convenience, most of us choose a Big Tech company or two that we're OK sharing a lot with. If you use Gmail and Google Maps, adding Calendar to the mix won't make much difference in terms of privacy. Here are some ideas to get the most out of it Spoiler: A lot more than just meetings and dentist appointments. And yes, you can definitely use you preferred calendar app for all these things too, if Google isn't your thing . Let's get to the tricks FIX AUTOCORRECT IF IT'S DRIVING YOU DUCKING CRAZY A little know-how goes a long way in getting more out of your everyday software. Know when people are free:  I use this daily at work. Put your cursor in the box labeled Search for people under the Meet with  heading. Everybody in your organization should be searchable here, so no more setting meetings no one can attend. You can also create a new meeting, add guests and click Find a time under the date to see the attendees' availability side by side! WATCH OUT FOR THE NEW 'GHOST HACKERS' Automatically share meeting minutes:  In your meeting details, click Create meeting notes under the event description to generate a Google Doc that automatically gets shared with attendees. It includes a built-in outline with the meeting date, attendees, notes and action items. Pro tip: Attach additional notes, docs, slides or whatever else to the meeting so no one's looking around for them later! Never miss a beat:  When setting an appointment, simply click Add Notification . Choose how long before the event you'd like to be reminded. Boom! Whether it's 10 minutes or a day in advance, Google Calendar's got your back. No more oops moments. You know I have more amazing tips up my sleeve.  Get more Google Cal secrets. Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

How to remove Facebook access to your photos

Raise your hand if you've ever skimmed through the user agreements and legal jargon that appear when signing up for new software or services. (If you aren't raising your hand right now, you probably should be.) No one enjoys sifting through this dense information.Unfortunately, by not reading service agreements thoroughly, you might inadvertently grant services access to things you'd prefer they didn't have. For instance, you may have unknowingly allowed the Facebook app to access the photos stored on your phone or tablet during the download process.If you'd rather not give Facebook this level of access to your stored photos, you can modify the permissions even after installing the app. We'll guide you through the steps to protect your privacy concerning your photographs. Note that some images, like your profile picture and cover photo, are always visible to Facebook. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER You can prevent Facebook from gaining access to your photos on your iPhone or iPad through the following steps.You can then exit all of the menus and continue using Facebook, knowing that your photos are safe. MORE: IS FACEBOOK LISTENING TO YOU? You can deny Facebook access to your photos on your Android tablet or smartphone. Here's how. Settings may vary depending on your Android phone's manufacturer. MORE: 5 WAYS TO MAKE YOUR FACEBOOK ACCOUNT BULLETPROOF After disabling photo access for Facebook, you may encounter frequent popup messages requesting you to restore access. Allowing access can simplify the process of uploading and sharing photos directly from your device to your Facebook page.However, Facebook will not automatically post your personal photos without your permission; you decide which photos to upload. You might opt to restrict access to maintain privacy, ensuring that only selected photos are shared and preventing accidental posts of personal or sensitive images. MORE: HOW TO ESCAPE FACEBOOK'S CREEPY AD TRACKING You can enjoy social media without sacrificing your privacy by taking a few moments to adjust your settings. Remember, it's your data, and you have the power to control who sees what. Stay informed, stay secure and keep your personal moments personal.How do you decide which photos or personal information to share on platforms like Facebook? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to turn your iPhone into instant foreign language translator

In today's interconnected world, the ability to communicate across language barriers is more important than ever. Apple has recognized this need and, in a recent iOS update, introduced a nifty feature that allows you to translate languages instantly without even opening the Translate app.This feature utilizes the "Dynamic Island," a pill-shaped area at the top of the iPhone screen that can change size and shape to accommodate various types of alerts, notifications and interactions, turning it into a kind of front-and-center information hub. The Dynamic Island feature is available on the iPhone 15 models, which includes the iPhone 15, iPhone 15 Plus, iPhone 15 Pro and iPhone 15 Pro Max. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER MORE: TOP AFFORDABLE CELLPHONE PLANS Getting started is simple. Here's how you can set up the Translate option using the Action Button on your iPhone: MORE: HOW TO UPDATE YOUR PASSCODE ON YOUR IPHONE Once you've set it up, using it is just as easy:Make sure to release the Action Button after the Dynamic Island shows "English, Listening" to ensure the feature works correctly. MORE: HOW TO CREATE OR LEAVE GROUP TEXT ON YOUR IPHONE While you can't change the Translate settings directly from the Action Button, you can still customize your experience within the Translate app itself: MORE: 8 WAYS TO LOCK UP YOUR PRIVATE STUFF ON YOUR IPHONE Apple's latest update is more than just a technical enhancement. It's a step toward a world where language differences are no longer a barrier to communication. Whether you're traveling abroad, learning a new language or connecting with friends and family across the globe, the ability to translate on the fly is a game-changer. It's a testament to how technology can bring us closer together, making the vast world just a little bit smaller.Have you ever found yourself in a situation where instant translation would have made a significant difference? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Tidy up your tech: Spring-cleaning tips for safeguarding your data

It happens without warning. Suddenly, access to your personal data gets interrupted by a simple hardware failure, nasty virus, cyberattack, software glitch, accidental deletion or human mistake. It's clearer than ever that our personal data is vulnerable.As an advocate for privacy and security, and the editor behind the popular CyberGuy Report, which you can subscribe to for free at CyberGuy.com/newsletter , I have always emphasized the importance of personal responsibility when it comes to data security. My top recommendation for protecting your precious memories, critical documents and the mountains of personal data we accumulate is straightforward: utilize a personal drive for backups. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Spring is traditionally a time for cleaning, and this should extend to digital hygiene as well. Each year, I undertake a thorough cleaning of my personal data, making sure to back up documents, family photos and other irreplaceable items. There's nothing quite like the peace of mind that comes from having a physical backup, which places control firmly in your hands, irrespective of whether you use a Mac, PC or even a Chromebook. MORE: BEST LAPTOPS FOR 2024 One of my favorite tools for this task is the WD Portable Drive , which offers 2 terabytes of storage. It easily connects to your device via SuperSpeed USB 3.0, ensuring quick and efficient data transfer and is fully compatible with Chromebook. A reliable drive like this is a must-have; I use another similar WD model for my MacBook and PC. MORE: BEST DESKTOP COMPUTERS FOR 2024 In addition to regular ongoing backups either on the cloud or another drive, I use this WD drive that plugs into your Mac, PC or Chromebook as an extra copy of my important data that can be disconnected and kept in a safe place away from hackers and other threats. MORE: 10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE When deciding what to back up from your computer, it's crucial to prioritize documents, files and memories that are important and irreplaceable. Here's a comprehensive list to consider. 1) Personal documents : Include items like birth certificates, passports, social security cards, marriage certificates, wills and other legal documents that could be difficult or time-consuming to replace. 2) Financial records : This category should cover bank statements, tax returns, investment records and other financial documents that are essential for personal record-keeping and legal compliance. 3) Photos and videos : Family photos, vacation videos, special events like weddings or graduations and other personal memories that cannot be recreated. 4) Work and educational documents : If you use your computer for work or school, ensure you back up important projects, research papers, presentations and related correspondence. 5) Emails : Some emails might contain important information, agreements or attachments that you may need to refer back to. Consider backing up important emails or archiving them. 6) Contacts : A backup of your digital address book can save you a lot of trouble in case you lose access to your devices. 7) Music and media collections: For those who collect music, movies and books digitally, backing up these files ensures you don't lose your collection. 8) Software and app data : Back up settings and data for apps that you use frequently, especially if they help manage your schedule, finances or health. 9) Website bookmarks : If you rely on bookmarks to navigate the internet efficiently, backing them up can save time if you need to restore or switch to a new device. 10) Game saves and profiles : If you're a gamer, backing up your game saves and profiles can prevent loss of progress in case of system failure. 11) Creative works : Include writings, artwork, design files, coding projects or any other personal or professional creative work.The reality of digital threats, whether from ransomware attacks, viruses or even technical glitches in the cloud, is not a matter of "if" but "when." By maintaining a physical backup of your most crucial data, you ensure that in the event of a digital catastrophe, what matters most remains safe in your hands.Remember, safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. This spring, take the time to protect yourself from potential future data disasters. Unplug your backup drive and store it in a safe place. It's a simple step that could save you a lot of heartaches.What's your "data disaster" story and what lessons did you learn about digital backups from it? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

The troubling truth about our country's recycling programs

Imagine diligently separating your recyclables, placing them into the green bin as instructed, and then discovering it's all for naught. That's the frustrating reality a Redditor faced, sparking a conversation on r/Apartmentliving about the disheartening state of recycling in their complex. The green dumpster was just a facade, and the company didn't even offer residential recycling. It begs the question: Is anyone else's complex out there lying about something so obvious? CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER This isn't an isolated incident. Across the nation, renters find themselves handcuffed by landlords who block eco-friendly practices like gardening or air-drying laundry. Yet, there's hope. In the U.S., 74 million people live under homeowners associations where there's room to navigate or even alter the rules for the betterment of the community.The discourse on Reddit resonates with many who share similar struggles. One user lamented their building's failed recycling attempt due to contamination, and another mentioned the absence of recycling services altogether, leaving the responsibility on individuals to transport recyclables to centers. MORE: IS THIS TECHNOLOGY THE ANSWER TO CLEANING UP OUR OCEAN'S PLASTIC PROBLEM? In Washington, D.C., a report by The Recycling Partnership sheds light on the dire state of U.S. residential recycling. A mere 21% of recyclables actually get recycled. The report, "State of Recycling: Present and Future of Residential Recycling in the U.S.," reveals the gap between current practices and the five pillars of an efficient recycling system. It's a call to action for policymakers, companies and communities to bridge these gaps. MORE: HOW A FORMULA E RACE CAR WAS BUILT ENTIRELY FROM RECYCLED ELECTRONIC WASTE Under-recycled materials: A staggering 76% of recyclables end up in the trash at home. Only 73% of households have recycling access, with a significant disparity between single-family (85%) and multifamily homes (37%). Participation is low, with only 43% of households recycling, and even then not to full potential. State-by-state disparities: Some states like Alabama and Mississippi recycle less than 10%, while others like California and New York exceed 30%. The report suggests that extended producer responsibility (EPR) policies could elevate recycling rates significantly. The million-ton loss: Eleven states, including some with high recycling rates, lose over a million tons of recyclables each year. Local investment solutions are crucial for revamping the recycling infrastructure. MORE: THIS AI ROBOT GARBAGE PICKER CAN SORT OVER 500 TYPES OF TRASH IN SECONDS The Recycling Partnership's Chief System Optimization Officer, Cody Marshall, emphasizes the need for comprehensive action. Investing in access to recycling services and improving communication can lead to substantial progress. The report urges: Policymakers: Adopt EPR to fund recycling improvements. Companies: Design recyclable packaging and invest in closing the system's gaps. Community leaders: Use the report's data to enhance recycling efforts through education and engagement.The report is an urgent call for action. Systemic change is a slow process, but the road map is clear. It's time for concerted efforts to ensure recycling fulfills its role in waste reduction and resource conservation.The stories shared by individuals on platforms like Reddit aren't just tales of frustration; they're a rallying cry for change. From the deceptive green dumpsters to the stark disparities in recycling access, the issues are as real as they are widespread. But there's a silver lining - the collective voice of communities and the actionable insights from reports like The Recycling Partnership's are powerful catalysts for change. It's a reminder that every effort counts, and together, we can turn the tide on the recycling conundrum we find ourselves in.What changes do you think are necessary to make a real impact as far as recycling in this country? Let us know by writing us at Cyberguy.com/Contact .For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover .Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

5 great tips for planning your next travel getaway

Are you gearing up for your next big adventure but dreading the daunting task of planning? Worry not. We've got the ultimate travel toolkit to make organizing your journey a total breeze.From finding the best flight deals with Kayak to snagging that perfect window seat via ExpertFlyer, we're diving into the top travel resources that savvy globetrotters swear by. So buckle up, and let's explore how these five great tech tools can turn your travel woes into wows. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER If flying either domestically or internationally, Kayak is an excellent site to search for the cheapest flight deals. With the exception of airlines such as Southwest, Kayak searches tons of airlines for the cheapest flight based on specific or flexible dates. This is especially helpful if you want to compare costs and amenities across multiple airlines, hotels and rental car companies. GET FOX BUSINESS ON THE GO BY CLICKING HERE Additionally, they offer "hacker fares," which help you combine flights from different airlines to create your ideal journey. The only hitch is that you won't make the final booking on its website. Kayak will guide you to a third-party website, such as Expedia or the airline itself, to book the flight, car or hotel room. MORE: THE BEST TRAVEL GEAR FOR 2024 Flying? Any seasoned traveler knows that the seat you pick for your flight can determine how your vacation begins and ends. It can either be the most relaxing flight or a complete nightmare. If you want to beat other travelers on your flight for the best seat on the plane, check out ExpertFlyer .  Whether you've booked online, offline with a travel agent or directly through the airline, the free account lets you set an alert for a specific seat option (window seat, anyone?). Once you receive the alert, you can change your seat assignment to your preferred seat. MORE: HOW TO MAKE USE OF GOOGLE FLIGHTS' NEWEST FEATURE If you're more interested in taking your vacation via car, motorcycle, or RV, Roadtrippers can help you can help you create the journey by populating fun stops between your departure and destination location. Compatible and accessible across multiple devices, you can plan your trip on your desktop and take it on the road with you on your phone or tablet.For RV drivers, the Roadtrippers Premium account can give you RV-specific GPS navigation, which includes turn-by-turn directions appropriate for your RV. You get 3 stops for free or 150 stops with the Roadtrippers Premium. The app is available on iOS and Android . MORE: DISCOVER THE FUTURE OF RVING WITH THE ELECTRIC TRANSFORMER HOUSE  Most travelers tend to book their accommodations as soon as their flights or train tickets are booked. However, even the best-laid plans go haywire in some situations, and you are left looking for a hotel room at the last minute.Whether you're dealing with an overbooked hotel or a misleading accommodation listing, HotelTonight can help you find discounted rooms the same day at 1,000 properties worldwide. The app is available on iOS and Android. MORE: FILTERING FLIGHTS BY AIRCRAFT TYPE UP 15X FOLLOWING 737 MAX 9 INCIDENT While used frequently by many people daily to navigate cross-city traffic, Google Maps boasts new updates that make travel planning and sharing easier. It is available on iOS and Android . Discoverable lists: Now, you can aggregate lists from top travel and city sites such as Lonely Planet, Open Table and The New York Times. Starting with select cities in the U.S. and Canada, you can search for a curated list of recommendations from others who know the city well. There are also lists based on places other users are interested in or love on Maps. You can search for top, trending and gem restaurant lists. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? List customization: Go ahead and compile your recommendations from a variety of different sources, such as social media, so those you share your list with know why you picked a specific place. You can also choose how the list is ordered so you can arrange it by chronology or preference. Understand better with AI: Ever wish you could get more details while browsing specific restaurant reviews or photos? Now you can with artificial intelligence, which can do things like help you identify the name of a dish or price - making for a more immersive experience. MORE: UNEXPECTED HERO APP TURNS AROUND TERRIFYING TRAVEL TROUBLE    With so many options and so little time, summer vacation planning can feel like a full-time job. New tech, however, can truly take the guesswork out of the planning. In fact, it can be downright fun. Whether you are traveling by plane or car, summer vacation planning might be as fun as the trip itself.What type of traveler are you? Do you like to plan months in advance or the week of the trip? How do you take the stress out of travel planning?  Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

The secret meaning of your iPhone clock's 4 different colors

While casually scrolling on your iPhone , you may have noticed different colors behind the clock in the top left corner. These colors are not random, and you should know what they mean. You might see a blue, green, red or purple color as a bubble behind your clock at the top left corner status bar if you own an iPhone X or later, or across the entire status bar if you have an iPhone 8 or earlier. Knowing what these different colors mean can improve how you use your phone and enhance your privacy and security . Learn more about what these different colors behind the clock mean for iPhones (X or later) below. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER When a blue bubble appears in the top-left corner of your screen - right behind your time or clock - this means an app is actively using your iPhone's location or you are using Screen Mirroring . CHANGE THIS APPLE MUSIC SETTING ASAP TO PROTECT YOUR PRIVACY When a green bubble appears in the top-left corner of your screen - right behind your time or clock - this means you're on a call or your iPhone is being used as a personal hot spot. If you're not using it and you see the green bubble, another device may be connected to your hot spot and potentially using your data without your knowledge.To prevent unauthorized access to your personal hot spot, ensure you have a strong password set up.You can see how many devices are connected to your hot spot by opening the Control Center. For iPhones with Face ID, swipe down from the top-right corner; for iPhones with a home button, swipe up from the bottom. Press and hold the wireless section to see the number of connected devices.If you find an unknown device connected to your hot spot, you can disconnect it by changing the hot spot password or turning off the personal hot spot feature.Remember, monitoring your hot spot connections regularly is important to ensure no unauthorized usage, which can lead to data loss and potential security risks. MORE: AVOID PUBLIC WIFI BY USING YOUR IPHONE AS A HOT SPOT When a red bubble appears in the top-left corner of your screen - right behind your time or clock - this means your iPhone's recording sound or your screen . MORE: THE NEW IPHONE SECURITY THREAT THAT ALLOWS HACKERS TO SPY ON YOUR PHONE   When a purple bubble appears in the top-left corner of your screen - right behind your time or clock - this means your iPhone is using SharePlay , which can be used to share content such as games across iPhones.Now that you know what these different colors mean, you can be more aware if your iPhone is doing something you don't want it to do. Curious to see exactly what app or iPhone function is being used with these different color bubbles? If you tap on the clock when there is a color behind it, it will take you to the app or the control settings for the function that is being utilized.For example, if you tap the clock when the bubble is green, and you are on a call, it will return you to the main window where you can see who you are speaking with. If your iPhone is being used as a personal hot spot, tapping the green bubble will send you to the personal hot spot section of settings, where you can see who is using it and turn it off if you never intended it to be used as a hot spot in the first place.This is where knowing what these color bubbles are comes in handy. On one hand, you can use them to maneuver apps or settings on your iPhone easily. From the security and privacy perspective, you can now be alerted when any apps or other people are utilizing information or functions from your iPhone you don't want them to. GET FOX BUSINESS ON THE GO BY CLICKING HERE If you see that your iPhone's microphone and/or camera are in use even though you don't have an app opened, it likely means that an app has permission to use those features on your phone even when it isn't being used or your phone may have been hacked. In our article, "Is your device spying on you?" you will find step-by-step instructions to see which apps have permission to access your microphone or camera and how to turn those features off.If you've gone through your permission settings and your microphone and camera are being accessed without your consent, there is a chance that some malicious spyware may be using your device to spy.  If you're not sure your phone has been compromised, you can check for these additional signs outlined in our article, "How to tell if your phone has been hacked." To avoid this, consider adding good antivirus software to your phone to prevent malware. Also, the best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . MORE: 'IN CASE OF EMERGENCY' IPHONE SHORTCUT COULD SAVE YOUR LIFE The colorful indicators on your iPhone serve as a visual guide to what's happening behind the scenes. Whether it's the blue bubble alerting you to location services or screen mirroring, the green bubble indicating an active call or hot spot usage, the red bubble warning of recording in progress or the purple bubble signifying SharePlay activity, each color plays a crucial role in enhancing your awareness and control over your device's functions.By understanding what these colors represent, you can take proactive steps to protect your privacy, manage your connections and optimize your iPhone experience. This subtle yet powerful feature underscores the importance of being informed and vigilant about the digital footprints we leave. So, the next time you notice a colored bubble behind the clock, remember it's more than just a design choice - it's a gateway to understanding and managing your iPhone's diverse capabilities.How do you think Apple could further improve the color notification feature to assist iPhone users in managing their devices' functions? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Can AI help someone stage a fake kidnapping scam against you or your family?

You may feel confident in your ability to avoid becoming a victim of cyber scams . You know what to look for, and you won't let someone fool you.Then you receive a phone call from your son, which is unusual because he rarely calls. You hear a shout and sounds resembling a scuffle, making you take immediate notice. Suddenly, you hear a voice that you are absolutely certain is your son, screaming for help. When the alleged kidnappers come on the line and demand money to keep your son safe, you are sure that everything is real because you heard his voice.Unfortunately, scammers are using artificial intelligence (AI) to mimic the voices of people, potentially turning these fake voices into things like kidnapping scams. This particular scam seems to be rare, but it's happening.  CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Such fake emergency scams occur frequently enough that the Federal Trade Commission (FTC) provided warnings and examples for consumers. Hard numbers that indicate the frequency of these calls aren't readily available, though, especially for calls known to make use of AI.Such scams are certainly possible with current AI technology. Fake video and audio of politicians and other famous people are appearing with regularity. Aided by AI, these clips are frighteningly believable.You may recall the incident in late 2023 involving a fake dental plan advertisement that featured Tom Hanks. AI technology created the video. Hanks had to make a social media post calling out the fake advertisement. MORE: THE 'UNSUBSCRIBE' EMAIL SCAM IS TARGETING AMERICANS The AI technology creates a fake by analyzing a sampling of an audio clip of the person it wants to mimic. It uses its ability to interpret incredible amounts of data to take note of multiple characteristics of the person's voice, allowing it to make a highly realistic fake.Once the AI is able to create the fake audio, programmers then tell it what to say, creating a personalized message designed to sell dental plans or to convince you that your loved one is in trouble with kidnappers.Some AI programmers that use the fake audio for helpful purposes - such as for allowing people with medical problems like ALS to regain their "speech" - claim they can mimic a voice with as little as a few minutes of audio clips. However, the more audio that's available, the more realistic the mimicked voice should sound. Twenty minutes of audio is far better than three, for example.As AI's capabilities continue to expand at breakneck speed, you can expect the time requirements to shrink in future years. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? MORE: HOW TO GUARD AGAINST BRUSHING SCAMS Realistically, the vast majority of people don't have to worry about a fake kidnapping scheme that originates from AI-generated audio. If your loved one has a lot of video and audio on social media, though, the scammers may be able to find enough source audio to create a realistic fake.Even though AI makes this type of scam easier to perform, the setup process still remains too time-consuming for most scammers. After all, scammers in this type of scheme are relying on your rapidly expanding fear at receiving this type of call to cause you to miss obvious clues that would tell you it's a fake. The scammers may simply have a random child scream and sob uncontrollably, while allowing you to rapidly jump to the conclusion that it's your child. This is far easier than using AI to try to source and generate audio ... at least for now. MORE: HOW SCAMMERS USE AI TOOLS TO FILE PERFECT-LOOKING TAX RETURNS IN YOUR NAME Even though the scammers try to gain the upper hand with the suddenness of the fake kidnapping call and by catching you off guard, you have some steps you can take before and after you receive this type of call to prepare and protect yourself. 1. Ask your loved ones to keep you informed about trips: Fake kidnappers may try to convince you that the abduction is taking place outside your city. However, if you know that your loved one did not leave town, you can be confident that the call is probably a fake. 2. Set up a safe word or phrase: Set up a safe word that your loved ones should use if they ever are calling you because of a dangerous situation or because they are under duress. A scammer is not going to know this safe word. If you don't hear the safe word, you know it's probably a fake call. GET FOX BUSINESS ON THE GO BY CLICKING HERE 3. Use privacy settings on social media: Ask your family members to limit who can see their social media posts. This would make it harder for a scammer to obtain source audio that's usable in a fake kidnapping audio call. For more information on maintaining and protecting your online privacy, click here 4. Try to text your loved one: Either during or immediately after the call, send a text message to your loved one without telling the caller. Ask your loved one to text you back immediately, so you can converse without tipping off the scammers. If you receive a text back, you can be confident the call is a fake. Consider creating a code word that you can use with the entire family. When you send this code word in a text, everyone knows it's a serious situation that requires an immediate response. 5. Stay calm and think things through: Finally, although it is incredibly difficult to stay calm when you receive this kind of call, it's important to keep thinking clearly. Do not panic. Regardless of whether it's a real call or a scam call, panicking is never going to help. Listen for clues that make it obvious the call is a scam. Try to gather some information that can help you make a clear-headed judgment about the legitimacy of the call.As AI continues to become more readily available and gains sophistication, scammers will be ready to take advantage of it. Perhaps by then, AI will even the playing field by coming up with ways to help us protect ourselves. Until then, taking steps to protect your family, such as by setting up a safe word, can give you some peace of mind.Are you concerned about how scammers may take advantage of AI to create new scams?  Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Star singer fights AI

IN TODAY'S NEWSLETTER:- Meghan Trainor's will ensures her voice can't be used by 'spooky' technology after her death
- US Air Force confirms first successful AI dogfight
- Ever-evolving generative AI brings new, game-changing element to sports landscape 'THAT'S SPOOKY': Meghan Trainor is one of many stars wary of artificial intelligence . Earlier this month at the iHeartRadio Music Awards, Trainor shared her thoughts on the technology with Fox News Digital. AI DOGFIGHT: The U.S. Air Force on Wednesday publicly confirmed the first successful dogfight between a fighter jet piloted by artificial intelligence and a human-piloted aircraft. LOOKING AHEAD: Sports leagues and brands are constantly exploring advancements in technology and its potential impact on their respective end products. Many sports properties work within the content management and distribution space. WAR TECH: Some of Israel's most advanced military technology was on display over the weekend when its multi-level aerial defense array led the way in striking down an estimated 99% of the more than 350 drones, rockets and missiles that were fired by Iran in an unprecedented attack on the Jewish state. JUST SAY NO: The Department of Homeland Security and the Customs and Border Protection Agency can leverage the power of artificial intelligence to identify the trucks, boats and planes trying to sneak fentanyl into the country.   FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

How this new crazy invisibility tech can literally make you disappear

What would you think if I told you that there is technology available today that could make you vanish? It's true. Thanks to optical engineering, it's possible to become invisible to the naked eye. This isn't just a fantasy. It's a reality crafted by the U.K.'s Invisibility Shield Co. , which has introduced the impressive Invisibility Shield. This 6-foot-tall shield offers a new dimension to the concept of invisibility. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER At the heart of this technology lies a precision-engineered lens array. Picture this: You're standing behind the shield, and instead of being a conspicuous figure, the light reflecting off you is cleverly redirected.This array, composed of vertically oriented lenses, scatters the light horizontally, causing your image to dissolve into the backdrop. It's like a magic trick, where the magician vanishes not with a puff of smoke but with a whisper of light. MORE: BALANCING THE PROMISE OF NEW VR TECH'S X-RAY VISION WITH PRIVACY CONCERNS  Now, let's delve deeper into the science . The lenses are not just any lenses; they are elongated, convex lenses meticulously embossed onto a polymer sheet. These aren't your run-of-the-mill magnifying glasses; they are the result of rigorous testing and fine-tuning - shaped to perfection to manipulate light just right.But what about the backdrop? Ah, that's where the magic amplifies. The background light, brighter and broader, passes through the shield and gets refracted towards the observer. From their point of view, it's as if the background itself has stretched out, masking your presence. EARTH DAY WAS FOUNDED OVER 50 YEARS AGO, PUTTING A HEIGHTENED FOCUS ON THE ENVIRONMENT EVER SINCE MORE: THIS MIND-READING TECH USING AI CAN CONVERT BRAIN ACTIVITY INTO TEXT The versatility of the invisibility shield The shields aren't just a one-trick pony, though. They excel against a variety of backdrops - be it the lush green foliage, the rough texture of sand or even the smooth expanse of the sky. And for those who appreciate the finer details, the shields work wonders against horizontal lines, whether painted by nature's brush or the human hand. MORE: HOW STORES ARE SPYING ON YOU USING CREEPY FACIAL RECOGNITION TECHNOLOGY WITHOUT YOUR CONSENT But let's not forget, these shields are not armor. They won't protect you from harm, but will make you virtually invisible. And they're built to last, with materials that withstand the elements and the test of time.The company tells us that "generally, we find customers who have previously ordered a small version just like to play around with hiding items on their desks and experiment with the material."With respect to the large models, our shields have been used for all sorts of things: paintball, stalking wildlife, pranks, stage magic, making 'invisibility windows' and interior screening in apartments." GET FOX BUSINESS ON THE GO BY CLICKING HERE You will be able to pre-order a shield for $870 via a Kickstarter campaign . A less expensive, smaller version, measuring 7.9 inches in height, is available for $67. This will help fund the first large production run of the new shields. The company tells us the Kickstarter campaign exceeded the initial goal of around $12,600 by almost 10 times, which would be close to $125,000.The Invisibility Shield Co.'s creation takes us a step closer to the stuff of daydreams, allowing us to vanish on a whim. With the support of a thriving Kickstarter initiative, this piece of tech could one day reshape our interaction with the visible world. It's a leap into a future where being unseen is just a matter of choice, a shield's width away.How would you use this device to disappear? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Olympic organizers announce plans to use AI in sports ahead of Paris games

Olympic organizers unveiled their plans Friday to use artificial intelligence in sports, joining the global rush to capitalize on the rapidly advancing technology.The International Olympic Committee outlined its agenda for taking advantage of AI. Officials said it could be used to help identify promising athletes, personalize training methods and make the games fairer by improving judging."Today we are making another step to ensure the uniqueness of the Olympic Games and the relevance of sport. To do this, we have to be leaders of change," IOC President Thomas Bach said at a press event at the former London Olympic Park, which hosted the summer games in 2012. 'UNCONTROLLABLE' AI SYSTEMS COULD TURN ON HUMANS, REPORT WARNS "We are determined to exploit the vast potential of AI in a responsible way," Bach said.The IOC revealed its AI strategy as it gears up to hold the Paris Olympics, which are set to kick off in just under 100 days.The IOC's AI plans also include using the technology to protect athletes from online harassment and to help broadcasters improve the viewing experience for people watching from home. The IOC earns billions of dollars through the sale of broadcast rights for the games.The local organizers of the Paris games have already sparked controversy with their plans to use artificial intelligence for security, with a video surveillance system that includes AI-powered cameras to flag potential security risks such as abandoned packages or crowd surges.

How to zoom in and out on PC

Have you ever found yourself squinting at your computer screen to decipher tiny text or make out the details of an image? Well, you're not alone. Fortunately, there's a nifty trick that can save your eyes: zooming in . It's a simple yet effective way to enhance your browsing experience, whether you're working, shopping or just surfing the web.If you want to zoom in and out on browser text on a Mac, we've got those step-by-step instructions here . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Let's start with the basics. If you need a quick zoom in or out on your browser window on your PC, here's how to do it. 10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE MORE: FIRST THINGS TO DO IF YOU GOT A NEW PC Prefer using your mouse to zoom in and out? No problem. MORE: 10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE Sometimes, you need to see more than just the browser text on your PC. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: HOW TO TIDY UP YOUR DESKTOP ON A PC OR MAC Zooming in on your computer screen is more than just a trick; it's a way to adapt technology to your needs. Whether it's for accessibility or comfort, the ability to zoom in and out with ease ensures that everything you need to see is within view. So the next time you're struggling to read that small print or want a closer look at a web page, remember these simple shortcuts. See my Best Laptops for 2024 here . How important is it for you to have control over visual elements like size, contrast and layout when using various devices, and how does this affect your choice of technology? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Over half a million Roku accounts compromised in second cybersecurity breach

Recently, Roku has faced significant security challenges, with two separate cyberattacks occurring within a short span. The streaming giant confirmed that over half million Roku user accounts were compromised through credential-stuffing attacks in a second incident.The first of these incidents was detected earlier this year when Roku's security systems noticed unusual activity in about 15,000 user accounts. Investigations revealed that these breaches were due to credential stuffing, where attackers used login information stolen from other services to access Roku accounts. Fortunately, Roku confirmed that there was no compromise of their systems and the credentials used were obtained from external sources. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The situation escalated with a second, larger-scale incident involving approximately 576,000 accounts. In fewer than 400 of these cases, malicious actors logged in and unauthorized purchases of streaming service subscriptions and Roku hardware products were made. However, sensitive user information, including full credit card numbers or other full payment information, remained secure. Roku has over 80 million active accounts , and the affected accounts represent a small fraction of their user base. The company posted a statement on its website, saying, "We sincerely regret that these incidents occurred and any disruption they may have caused. Your account security is a top priority, and we are committed to protecting your Roku account." MORE: HOW TO FIND OUT WHO'S SPYING ON YOU In response to these security breaches, Roku has taken four proactive steps.1. Password Resets: All affected accounts have had their passwords reset.2. Direct Notifications: Roku has been notifying affected customers directly.3. Refunds and Reversals: Charges made during the breach are being refunded or reversed.4. Two-Factor Authentication: Roku has rolled out two-factor authentication (2FA) for all accounts to provide an additional layer of security. NATIONWIDE ALERT: SMS PHISHING ATTACKS TARGET TOLL ROAD CUSTOMERS MORE: HOW TO PROTECT YOURSELF FROM STREAMING HACKS Roku emphasizes the importance of user participation in securing accounts. Here are a few recommendations:If it has already happened, and you've been hacked, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow.If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn't' recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely. Enable two-factor authentication: Two-factor authentication prevents credential-stuffing attacks by adding an additional layer of security to your Roku account. It works by prompting you to enter a time-sensitive code along with your username and password. This prevents hackers from breaking into your account with just a stolen password. GET FOX BUSINESS ON THE GO BY CLICKING HERE You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or authorities immediately. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.Identity Theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using an identity theft protection company is that it could include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft . If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.  MORE: HACKERS USE PIRATED SOFTWARE TO HIJACK MAC, ANDROID AND WINDOWS DEVICES Roku's recent experiences highlight digital service providers' ongoing challenges in securing user data against increasingly sophisticated cyberthreats. By implementing stronger security measures and fostering user awareness, Roku aims to safeguard against future incidents. The adoption of two-factor authentication is a significant step forward, ensuring that the security of user accounts is not solely dependent on passwords.How has the recent surge in cyberattacks affected your trust in digital platforms, and what actions should companies take to regain your confidence? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

This crazy 2-in-1 electric vehicle comes equipped with 2-seat aircraft hidden inside

Have you ever noticed how science fiction has this uncanny ability to make us dream about the future? Sometimes, it's hard to tell where fantasy ends and reality begins. But Chinese company XPENG AeroHT is shaking things up with something straight out of a sci-fi novel - a vehicle that's set to turn our whole idea of travel on its head. With 2025 just around the corner, we're getting a sneak peek into what might just be the next big thing in adventure travel . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Dubbed the Land Aircraft Carrier (LAC), this vehicle combines the rugged allure of an electric six-wheel off-roader with the capabilities of a two-seat eVTOL (electric Vertical Take-Off and Landing) aircraft.At its core, the LAC is a van-like six-wheeler capable of traveling on the most challenging terrain. Its extended-range electric 6WD system, enhanced by six driven wheels and rear-wheel steering, provides exceptional maneuverability. It is equipped with an intelligent cockpit featuring four to five seats. SCI-FI SOLAR EV NEVER NEEDS TO PLUG IN FOR A RECHARGE Concealed within this terrestrial titan lies the human-piloted X3-F air module that is ready to take its occupants from the rugged trails to the skies . It features electric vertical take-off and landing. Its distributed electric propulsion can meet single-point failure safety requirements. It has manual/autonomous dual driving modes and a 270-degree panoramic two-seat cockpit.  GET FOX BUSINESS ON THE GO BY CLICKING HERE The X3-F isn't just any aircraft; it's an all-electric, panoramic cockpit-equipped eVTOL designed for both leisure and utility. From search-and-rescue missions to breathtaking aerial tours, its capabilities are as diverse as they are revolutionary. With AeroHT at the helm, already demonstrating prototypes and securing crucial certifications, this vision inches closer to reality. MORE: BEST CAR ACCESSORIES 2024 XPENG AeroHT's journey from concept art to concrete action is a testament to innovation and ambition. Despite the daunting dual certification processes for automotive and aeronautical components, the company is making significant strides. The acceptance of the Type Certificate application by the Civil Aviation Administration of Central and Southern China marks a pivotal step towards bringing the LAC to the market. MORE: A CAR-BOAT COMBO THAT CAN HIT ROAD OR WATER WITH SAME VEHICLE The LAC's dual-mode design offers not just a new way to travel, but a new way to explore. Its ground module serves as a robust, all-terrain "mother ship," while the air module offers a unique vantage point to experience the world. Whether it's navigating the wilderness or soaring above it, the possibilities are as boundless as the skies. MORE: GET READY FOR A FOLDABLE ELECTRIC CAR THAT MAKES PARKING A BREEZE As we stand on the cusp of witnessing the LAC's debut, it's clear that we're not just looking at a new vehicle, but a new chapter in human mobility. XPENG AeroHT's vision challenges us to reimagine the boundaries of exploration and adventure. Whether it will transform our world or remain an ambitious dream is a story yet to unfold. But one thing is certain: the Land Aircraft Carrier is a bold stride into the future, promising an adventure on an entirely new level.What are some applications you foresee for the LAC in various fields such as travel, emergency response or scientific exploration? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

European Union has requested details surrounding TikTok's newest app that has quietly been released in the EU

European Union regulators said Wednesday they're seeking details from TikTok on a new app from the video sharing platform that pays users to watch videos.The European Commission said it sent TikTok a "request for information" on the TikTok Lite app that has been quietly released in France and Spain.The commission wants to know about the risk assessment that TikTok should have carried out before deploying the app in the European Union. EXPERT WARNS OF 'CHILLING REALITY' TIKTOK THREAT POSES: 'CHINA'S GREATEST ASYMMETRIC ADVANTAGE' "We have already been in direct contact with the Commission regarding this product and will respond to the request for information," TikTok said in a statement.Such evaluations are required under the bloc's Digital Services Act, a sweeping law that took effect last year with the aim of cleaning up social media platforms . The commission is the 27-nation bloc's executive arm and top enforcer of digital regulations.TikTok Lite lets users "earn great rewards," according to its app store listing. The app, which launched this month in France and Spain, is a slimmed-down version of the main TikTok app and doesn't come with ecommerce or livestreaming features.The commission said the app lets users earn points by doing things like watching videos, liking content and following content creators. The points can be exchanged for rewards including Amazon vouchers and gift cards on PayPal.TikTok said rewards are restricted to users 18 years and older, who have to verify their age. Users can watch up to one hour a day of videos to earn rewards, which are capped at the equivalent of one euro ($1.06) a day, it said.TikTok has 24 hours to turn over the risk assessment. The commission is interested in what it says about the app's potential impact on the protection of minors, "as well as on the mental health of users, in particular in relation to the potential stimulation of addictive behavior."It's also seeking other information on the measures TikTok has put in place to mitigate such "systemic risks," which the company has until April 26 to provide.

Fox News AI Newsletter: Doctor's groundbreaking surgery

IN TODAY'S NEWSLETTER:- First-ever augmented reality abdominal surgery performed in Chile: 'A revolution'
- High school students, parents warned about deepfake nude photo threat
- Adobe releases Acrobat AI assistant starting at $4.99 a month SURGICAL 'REVOLUTION': Surgeon and CEO Dr. Alberto Rodriguez conducted the first-ever augmented reality (AR) abdominal surgery March 11 in Santiago, Chile. That's according to Rodriguez's company, Levita Magnetics, a medical equipment manufacturer in Silicon Valley. 'SCARY' SCHOOL TREND: Multiple Los Angeles-area school districts have investigated instances of "inappropriate," artificial intelligence-generated images of students circulating online and in text messages in recent months. AI IN PDF: Adobe announced that its new Acrobat artificial intelligence assistant will be available to Acrobat and Reader users starting on Tuesday. POTHOLE HEALER: Tech firm Robotiz3d is developing three technologies as part of its Autonomous Road Repair System. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Nationwide alert: SMS phishing attacks target toll road customers

The FBI has issued a critical warning about a pervasive scam sweeping across the country.Americans are being targeted by a sophisticated series of SMS phishing - or "smishing" - attacks that bait them with fictitious unpaid road toll charges.The smishing scheme has been active since last month, duping thousands of people, as reported by victims to federal authorities. BI's Internet Crime Complaint Center has documented a significant influx of over 2,000 complaints detailing deceptive texts that impersonate road toll services from various states. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER MORE: IS THE FTC CALLING YOU? PROBABLY NOT. HERE'S HOW TO AVOID A NEW PHONE SCAM TARGETING YOU Investigations reveal that these messages are uniform in their deception , falsely asserting that the recipient is delinquent on road toll payments. These communications aim to manipulate individuals into clicking on links that are ingeniously designed to mimic legitimate state toll service websites, complete with fluctuating phone numbers to elude detection. HIGH SCHOOL STUDENTS, PARENTS WARNED ABOUT DEEPFAKE NUDE PHOTO THREAT MORE: THE DARK WORLD OF FACEBOOK ADS WHERE SCAMMERS ARE TRYING TO STEAL YOUR MONEY The Pennsylvania Turnpike has been at the forefront of the afflicted services, proactively advising its customers to avoid interacting with these fraudulent messages. Similarly, the Pennsylvania State Police have expressed their concern, highlighting that the scam texts redirect to counterfeit websites designed to steal personal data.Regional services are not the only ones affected. Residents across various parts of the U.S. have been under threat since the onset of these attacks, which seem to target residents using toll services. While this detail is not directly mentioned in the FBI's public service announcement, secondary sources tracking the issue have confirmed it.  MORE: 'UNSUBSCRIBE' EMAIL SCAM IS TARGETING AMERICANS BI has recommended several preventive measures in light of the ongoing phishing attacks. 1. Report the phishing attempt at ic3.gov with the scammer's contact details and the website URL from the message. 2. Verify your toll account through the official service website. 3. Reach out to the official customer service for the toll service. 4. Erase the fraudulent text message from your device. 5. Use good antivirus protection on all devices to reduce risks. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . GET FOX BUSINESS ON THE GO BY CLICKING HERE For individuals who have engaged in these phishing attempts, it is crucial to take immediate action to secure personal and financial information. The FBI stresses the importance of monitoring for unfamiliar charges and disputing them promptly to mitigate any potential financial harm.As the threat landscape evolves, staying informed about these scams is paramount. By following the FBI's advisories and maintaining a high level of skepticism toward unsolicited texts claiming to be from toll services, you can safeguard against these invasive phishing tactics. It's really important that we all work together to spot and call out scams. By doing this, we're joining forces to protect people from cybercriminals who try to trick them.What role should mobile carriers and tech companies play in combating smishing scams, and how can they improve their current measures? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Change this Apple Music setting ASAP to protect your privacy


In the age of oversharing, there's something to be said for keeping a slice of your digital life to yourself, especially when it comes to your music . Whether you're headbanging to heavy metal or crooning to country , your Apple Music experience is yours alone.So, let's talk about a little-known setting that might be overexposing your musical escapades: "Discoverable by Nearby Contacts." It's tucked away in your Apple Music settings , and it could be letting your contacts know what you're listening to via SharePlay - whether you're in the mood for sharing or not. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Ready to reclaim your audio anonymity? We'll show you how to switch off this feature and keep your playlists private. Because sometimes, the best soundtrack is the one only you know is playing. MORE: HERE'S HOW TO FIND ANYTHING ON YOUR APPLE DEVICE GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: GET YOUR KARAOKE ON WITH THIS NEW APPLE MUSIC SING FEATURE MORE: IOS 17.4 INTRODUCES REVEALING APPLE PODCAST TRANSCRIPTION FEATURE Your music, your rules. Whether it's a guilty pleasure track or a new indie discovery, what you listen to should be your choice to share or not. So, take control of your Apple Music settings and keep your beats to yourself.How important is it for you to keep your music listening activity private from friends, family or colleagues? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Watch out for the new 'ghost hackers'

Imagine if this happened to you. Your spouse passed away and a few weeks after the funeral, you get a message from them that says, "Hi, hope you're having a great day." Other friends report they're getting similar messages from your spouse. Some messages offer big returns in crypto investments. Join over 500,000 people who get tech smart with my free newsletter. It's easy to sign up and one click to cancel if you don't like it. "Ghost hackers" have taken over your spouse's account. It's a sick new scam . With account owners dead and families focused on grief, the hacking is more likely to go unnoticed. It's awful, and I want to make sure this doesn't happen to you or someone you love. SEE WHAT THE HOME YOU GREW UP IN LOOKS LIKE NOW AND OTHER MAPS TRICKS It's not just trolling and 'investments'
Ghost hackers monitor obituaries and death notices for potential targets. Then, they use their arsenal (hacking weak passwords, guessing security questions and accessing previously leaked credentials) to break in. Often, hackers leapfrog into banking and retirement accounts, making it easy to steal directly from the person who passed.  The best offense is a good defense I know firsthand there are a ton of administrative tasks to take care of when a close family member dies - everything from canceling cellphone plans to executing the will. This list now also needs to include memorializing or deleting their social media accounts . Luckily, social networks have processes in place for this. For Facebook , ask  Facebook to memorialize the account . You'll need a link to an obituary. You can also request the  profile be removed . Instagram has  similar steps to Facebook, and the  same goes for X . Now, take time to protect yourself On Facebook, you can designate a legacy contact to manage your account if you die. They won't be able to log in, read your messages or delete friends. CAN YOU SPOT ELECTION DEEPFAKES? HERE'S HOW NOT TO BE DUPED Apple's Legacy Contact is a safe, secure way to give someone access to data stored in your Apple account after you die. You can add more than one Legacy Contact, and all of them can access the account to make decisions. The person must be 13 or older.Here's how to set it up on your iPhone:Finally, adjust your Google account . You probably have a few things you'd prefer to keep private in your search, watch and location history. By default, Google auto-deletes account records after 18 months. If you want to shorten that window, you can do so in a few steps. Really, you need a digital estate plan It's not a legal document but rather a rundown of all your accounts, passwords and online assets with instructions on how to find them. My Mom made one before she passed, and I can't tell you how much time and stress it saved me during an incredibly emotional time. TOP LAWMAKER SHARES 'BIGGEST FEAR' ABOUT HER KIDS' DATA ONLINE AS CONGRESS EYES FEDERAL PRIVACY RULES Your list can be as formal or informal as you like. It could be an Excel spreadsheet or Word doc that includes websites, login details and anything else you want to leave behind. If you go this route, password-protect the file and leave the password in your will.If you're comfortable with it, I highly recommend you do this in a password manager. Most have the option to set up a contact who can access your logins when you pass. Use a  password notebook if you're more comfortable with pen and paper.Here's a checklist to get you started:I know it's not fun to think about, but you'll be helping your loved ones immensely if you do. Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Cellphone nightmare leads to ported numbers, identity theft and fight for recovery

Imagine this scenario: You're going about your day, and suddenly you can't make calls or send texts. Little did you know, but you've become the latest victim of a ported phone number scam, a devious tactic in which hackers hijack your phone number to take over your identity. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER A CyberGuy Report subscriber contacted us to share that they've been a victim of a ported phone number scam. Also known as a SIM swapping or port-out scam, this is when a hacker steals a victim's phone number to gain control over it. Once they have control, they use that number to commit identity theft by gaining access to their other accounts. MORE: TV HOST ANDY COHEN SWINDLED IN COSTLY BANK SCAM: HOW TO AVOID BECOMING A VICTIM YOURSELF Though there are several ways they may go about porting a victim's phone number, one of the most common ways is to use your stolen personal information in order to call your mobile provider, pass their security checks, and once they are through, they request that the number be ported to a new carrier or transferred to a new SIM card that they have sent to them.Once the scammer successfully ports the phone number, they receive all the calls and messages intended for the victim. This access allows them to bypass security measures like two-factor authentication (2FA) that sends a code via text message to the phone number associated with an account.With this power, the scammer can use this method to reset passwords and gain unauthorized access to your personal accounts, whether it be a social media account, online bank account or another account. Once they continue to gain access to your other various accounts, there's no telling what else they can do. MORE: WHAT TO DO WHEN YOUR OWN NUMBER APPEARS TO RING YOUR HOME PHONE If you manage to pull yourself out of identity theft once, chances are you'll do whatever it takes to ensure you don't end up in that position again. All this being said, it's important not to blame yourself. Scammers are very sophisticated, and they are always looking for ways to stay one step ahead of their victims. So, do what you can to stay one step ahead of them: 1) Secure your phone number: If you can take any extra measures to keep your phone number safe, don't think twice. For instance, add a secondary security code or PIN on your Android or iPhone. 2) Enable two-factor authentication (2FA) : This adds an extra layer of security to all of your accounts. 3) Secure your email account: Just as you would for your phone, add extra verification methods when possible and notifications if someone logs into your account from another device. 4) Secure your other accounts: Take the same measures for your other accounts, like your bank or social media accounts . For instance, ask to receive notifications every time there is activity on the account, so you can monitor it and quickly determine if that activity was made by you or someone else. 5) Limit who you give your number to: Be cautious about who you share your phone number with. 6) Consider using a secondary or burner number for online use: This can help protect your primary phone number. 7) Change your password: Use a strong password that's more than 12 characters (if applicable) and a mix of numbers and upper and lowercase letters. Consider using a password manager to generate and store complex passwords. 8) Be cautious with emails: Don't open attachments or click links in emails unless you are positive that they are safe. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices .You might become aware of a ported phone number scam when your mobile service is unexpectedly interrupted because your number has been ported to a different carrier's SIM card. Such incidents could escalate into full-blown identity theft.A scammer might exploit one-time passwords (OTPs) - unique codes sent to your phone for security verification - to unlawfully access all the data on your device, including credit card details. This breach could result in you being barred from your own accounts.When a scammer successfully ports your phone number to a different carrier's SIM card, they can receive these OTPs intended for you. This allows them to bypass security measures and gain unauthorized access to your accounts, such as email, banking and social media, potentially leading to identity theft.Regaining control of your phone number and securing any accounts that were compromised is often a difficult and lengthy process. This underscores the need for you to be proactive, protect your personal information and stay alert for any unusual activities on your accounts. MORE: WHY YOU NEED AN IDENTITY PROTECTION PIN THIS TAX SEASON If you discover that your identity has been stolen - whether through this phone port scam or another type of identity theft - there are a few steps you should take. Report the theft to your local police department: Some businesses may require a police report to remove fraudulent debts from your account. Visit IdentityTheft.gov : This website helps you recover from identity theft. You can answer questions about what happened to you, get your Identity Theft Report and create a recovery plan just for you. Contact your credit card companies: Inform them about the situation and follow their procedures for securing your accounts. You may need to close your current accounts and open new ones. Check your credit reports: Look for any accounts or charges you did not make and report them. Place a fraud alert on your credit reports: This makes it hard for someone else to open new accounts in your name. Use an identity theft protection service: Identity Theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses . See my tips and best picks on how to protect yourself from identity theft . MORE: HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMERS Unfortunately, once a scammer steals your identity, it can be very arduous to get it back. That being said, there are steps you can take to reclaim your identity while ensuring that your number doesn't get ported again in the future.What measures do you think mobile carriers should implement to prevent ported phone number scams? Let us know by writing us at Cyberguy.com/Contact. For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Is this technology the answer to cleaning up our ocean's plastic problem?

In the vast, swirling expanse of the North Pacific Ocean lies a phenomenon as intriguing as it is troubling - the Great Pacific Garbage Patch (GPGP). This colossal debris vortex stretching from California to Japan has become the poster child for the planet's plastic pollution crisis.Yet, amid this dire scenario, a project called The Ocean Cleanup has emerged as a beacon of hope and a subject of debate. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The GPGP is no ordinary island. It's an immense floating trash vortex spanning approximately 617,763.454 square miles, with Hawaii nestled in its midst.The majority of this debris is plastic, ranging in size from large discarded fishing nets to microplastics that pose a more insidious threat.While only 8% of the GPGP's total mass, these tiny plastic fragments represent 94% of the estimated 1.8 trillion pieces of plastic floating in this marine desert. The presence of microplastics highlights the immense challenge of addressing oceanic plastic pollution, as these particles continue to break down but never fully disappear, threatening marine life in profound ways. MORE: THIS AI ROBOT GARBAGE PICKER CAN SORT OVER 500 TYPES OF TRASH IN SECONDS Enter The Ocean Cleanup , a nonprofit that uses technology to combat oceanic and riverine trash. Central to their mission is System 002, affectionately dubbed "Jenny." This innovative U-shaped catchment system, towed by two fuel-powered ships, trawls the ocean surface, collecting debris in its path. Once Jenny is full, the garbage is transferred to a larger vessel and taken ashore for processing.As The Ocean Cleanup evolves, so do its methods. The upcoming System 03, or "Josh," promises even greater cleanups, boasting enhancements like the "MASH" - a marine animal safety hatch designed to safeguard sea life during the collection process.System 03 features an expansive floating barrier spanning roughly 1.4 miles, strategically positioned between a pair of vessels towing it at a reduced speed. Attached to this barrier is a downward-reaching screen that plunges 13 feet beneath the water's surface, targeting the zone where the majority of floating plastic debris is typically found. MORE: AI ROBOT CAN TRIM, EDGE, AND BLOW YOUR LAWN FOR YOU A crucial question looms: What happens to the trash once it's hauled ashore? The Ocean Cleanup asserts that a significant portion of the plastic is recycled and transformed into "durable and valuable" products. The remnants, deemed unrecyclable, are incinerated to generate electricity - a process known as thermal recycling.However, this approach is not without its critics. Concerns have been raised about the optimistic view of plastic recycling and the potential environmental impact of thermal recycling, including the release of toxins. MORE: DIVE INTO THE SEA WITH THIS STATE-OF-THE-ART UNDERWATER DRONE The Ocean Cleanup's efforts are not unchallenged. Critics argue that while removing trash from the oceans is beneficial, the ultimate solution lies in preventing plastic from entering the waters in the first place.Ocean scientists and environmental advocates emphasize the need to reduce our reliance on plastic and to intercept it before it reaches the ocean, citing projects like river interceptors and initiatives like Baltimore's Mr. Trash Wheel.The Great Pacific Garbage Patch and The Ocean Cleanup's efforts to address it present a microcosm of the broader challenges and debates surrounding oceanic plastic pollution. While the organization's innovative approaches offer hope, they also spark important conversations about the most effective strategies for preserving our oceans. As we navigate these turbulent waters, the tale of the GPGP serves as a poignant reminder of human activity's impact on the natural world and the urgent need for collective action to safeguard our planet's future.Do you believe technological interventions like 'The Ocean Cleanup' are sustainable long-term solutions, or should we focus more on preventive measures? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Fix autocorrect if it's driving you ducking crazy

Frustrated with how often autocorrect is auto- wrong ? Even with new AI features included in many platforms' latest updates, autocorrect remains annoying. Let's fix that for iOS and Android. Join over 500,000 people who get tech smart with my free newsletter. It's easy to sign up and one click to cancel if you don't like it. If this saves you a little frustration, share this tip with a friend! SEE WHAT THE HOME YOU GREW UP IN LOOKS LIKE NOW AND OTHER MAPS TRICKS Go cold turkey Yes, you can just turn it off - no more bad guesses or awkward corrections. Just type what you mean letter by letter, like in the early days.Note: Depending on your Android make, model and OS, steps may differ. There are just too many variations to cover all of them.Start here on your iPhone Bonus tip: In iOS, misspellings are underlined. To turn that off, head to Settings > General > Keyboard again and turn off Check Spelling . CAN YOU SPOT ELECTION DEEPFAKES? HERE'S HOW NOT TO BE DUPED Using an Android? Bonus tip:  Under your keyboard settings , flip the switches next to "Predictive Text" and "Show Predictions Inline." Add your own slang If you're feeling ambitious, program your phone to replace a phrase with your shorthand. Think turning "brt" into "be right there" or "1234" into "Four Score and Seven Years Ago." Pretty slick! Pro tip : In iOS and Android , if you leave the Shortcut  field blank, autocorrect will stop bugging you with alternate spellings. SOCIAL PSYCHOLOGIST URGES PARENTS TO KEEP SMARTPHONES AWAY FROM KIDS TO 'PROTECT' THEIR MENTAL HEALTH Why is autocorrect capitalizing random words? You may notice that autocorrect capitalizes random words in a sentence. If you are typing something like, "I need to call Mom and ask when She needs to go to the Store," you'll have to go back and make a change to all the words that shouldn't be capitalized.If you don't know why autocorrect keeps capitalizing Mom and Store, take a peek at your contact list and see how you're typing names. If you save certain words in your contact list a certain way, autocorrect assumes this is the way you always want it written.Another simple fix for this issue is to turn off the auto-capitalization setting in your keyboard tab. Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

6 things to do right now to boost your security, privacy before it's too late

There are so many things you can do to protect yourself and your loved ones by stepping up your privacy and security. All the things you can do, however, can be overwhelming. Below are six simple steps you can take right now that will help make your life safer and more secure immediately. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER While it seems like a basic step, "Find My" is not on by default on your iPhone. If you own an Apple device or are fully immersed in the Apple ecosystem, it is worth it to make sure to turn on Find My.If you lose or have your Apple device stolen, and it is linked to Find My and turned on, you can use the app or sign into your iCloud account to track your device. For the Find My app to be effective, the device that is lost or stolen needs to be powered on and usually connected to the internet or data network. Apple offers another feature known as Find My Network. This allows for tracking Apple devices even when they are not connected to the internet. However, it's important to note that for this feature to be effective, Find My must be enabled on the device before it is lost or stolen.Now, let's discuss the steps to follow for Android. Install the Find My Device app to be prepared to use one Android phone or tablet to find another. Click here to learn how to find, lock or erase your Android device. MORE: 8 WAYS TO LOCK UP YOUR IPHONE'S PRIVATE STUFF iPhones are not only expensive, but they usually contain important personal and professional information. This makes having your iPhone stolen a complete nightmare. Turning on this "Stolen Device Protection" feature on your iPhone can give you an extra layer of protection. This feature gives you an additional layer of protection when your iPhone leaves a familiar location, such as work or home. If you have this feature on, and your device is away from your familiar locations, it will require Face ID or Touch ID for biometric authentication to access certain features of your iPhone, such as accessing passwords or credit card information. Additionally, a security delay is activated, so outside your familiar locations, there is an hour delay to take security actions such as changing your Apple ID password and then a Face ID or Touch ID authentication.While it can be easy to dismiss social media accounts as a nonessential aspect of your digital security or privacy, it can be the gateway for danger if you aren't proactive. Once your social media accounts are hacked, not only can hackers and scammers target your information to wreak havoc in other aspects of your life, but they can use it to target your social or professional networks.If inappropriate materials are posted on your social media accounts, it can damage not only your social reputation but also your professional one. To avoid this, take several steps right away, including changing your passwords or turning on two-factor authentication . Also, consider using a password manager to generate and store complex passwords. In addition, here's how to change your privacy settings on Facebook , Instagram and X . MORE: HOW IMPOSTERS ARE TRYING TO EXPLOIT YOUR GRIEF AND WALLET IN A NEW FUNERAL SCAM   Sometimes it isn't your devices that can put you at risk from scammers and criminals. It might be as simple as what you carry in your wallet. Because you're usually carrying your wallet when you're operating in the world, it has the potential to leave you more vulnerable than certain devices, such as your desktop. Carrying items such as all your credit and debit cards in your wallet puts all your accounts at risk as opposed to only carrying the cards you most commonly use. If your wallet gets stolen, you still have alternative cards to use while you freeze or replace your cards. For other items to remove from your wallet immediately, read "Why you should never carry these things in your wallet." Because hackers have become more sophisticated and resilient, it has caused consumers to return equal force with more sophisticated efforts to maintain their security and privacy. An old-school step, however, that gets lost in the shuffle of this effort is backing up your devices. Data, whether it be photos or contacts, is sometimes irreplaceable. Though devices can be expensive to replace, data, if lost, can be incredibly hard to recover. Regularly backing up your devices can give you an advantage over any breaches in security. If you have the option to remotely delete information on your device if it gets stolen, you can do so with definitive ease. If your device crashes or breaks, you don't have to spend costly amounts of money to try to recover data. MORE: WINDOWS DEFENDER VS ANTIVIRUS SOFTWARE: FREE PROTECTION FALLS SHORT Viruses or malware can not only make your device a nightmare to use, they can also make it your worst enemy by being a wealth of personal and professional information that can be used against you. If the problem is bad enough, you may be required to reset your device to its factory setting , which means you can lose all your data.The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. By simply installing and turning on an antivirus service, you can catch viruses and malware before they completely infect and infiltrate your device. See expert reviews of the best antivirus protection for your Windows, Mac, Android and iOS devices .In a more complicated world with a variety of devices that can leave you more vulnerable to criminals, it may seem easier to bury your head in the sand. If you take or have taken any of the simple steps above, you have already made your life safer.Have you ever lost or had your device stolen? Have you ever lost your wallet and experienced identity theft or fraud as a result? What behavioral or physical changes have you had to make to adjust to the changing landscape of modern life? Let us know by writing us at Cyberguy.com/Contact .For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to hide apps on your iPhone to keep them secret

As you know by reading our articles, we emphasize privacy a lot. We believe it is very important, so sometimes, that means keeping certain apps away from curious eyes. Hiding apps on your iPhone is straightforward, whether you're aiming to declutter your iPhone's home screen or ensure your privacy. Let's walk through the steps together. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER First, let us address how to make a single app vanish from your home screen:The app is now hidden from your home screen but remains accessible through the search function and in your App Library. To access the App Library on your iPhone: MORE: BEST ACCESSORIES FOR YOUR PHONE If you're looking to hide an entire page of apps, here's how:Your selected page of apps is now out of sight, creating a cleaner and more organized home screen. Hiding an app on your iPhone prevents it from showing up on the home screen, but it will still be discoverable through search. If you want to avoid that, you can also hide an app from search on your iPhone: MORE: HOW TO UPDATE YOUR PASSCODE ON YOUR IPHONE Change your mind? No problem. Here's how to bring back your hidden apps: MORE: 8 WAYS TO LOCK UP YOUR IPHONE'S PRIVATE STUFF Customizing your iPhone's app visibility is about privacy and personalizing your user experience. Whether you're hiding a single app or an entire page, the process is reversible, giving you the flexibility to change things up as needed. Remember, your apps are just out of sight, ready to be summoned back whenever you choose.In what situations do you find it most necessary to conceal apps or pages on your iPhone? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Is your smartphone spying on you without you even knowing it?

Researchers at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) recently revealed a startling new privacy threat.Our smartphones' ambient light sensors might be turned into makeshift cameras.Ambient light sensors are commonplace in smartphones, primarily used to adjust screen brightness according to environmental lighting. However, CSAIL researchers have demonstrated that these sensors could potentially be repurposed to capture images of a user's surroundings.By employing a computational imaging algorithm, they managed to recover environmental images from the perspective of the phone's screen, utilizing only the light intensity data from these sensors. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The implications of this discovery are far-reaching. " Ambient light sensors are tiny devices deployed in almost all portable devices and screens that surround us in our daily lives," notes Princeton University professor Felix Heide. The study underscores a privacy threat that spans a broad spectrum of devices, previously underestimated in its potential impact. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Beyond static images, the study suggests that ambient light sensors could intercept user gestures, like swiping and sliding, capturing interactions with phones during activities such as video watching. This capability challenges the belief that ambient light sensors are harmless in terms of private data exposure. MORE: BEST WAY TO PROTECT YOUR DEVICES FROM GETTING HACKED Yang Liu, a Ph.D. candidate at MIT EECS and CSAIL, warns that ambient light sensors, in conjunction with display screens, can capture our actions without consent, posing significant privacy risks. The researchers urge operating system developers to tighten permissions for these sensors, reducing their precision and sampling rate.To mitigate these security concerns, the study proposes granting users control over ambient light sensor permissions akin to camera permissions. Additionally, future device designs might include ambient light sensors positioned away from the user, such as on the side of the device, to prevent unauthorized visual data capture.While the study's findings prompt a reevaluation of sensor permissions and design, it's equally important to recognize the broader context of smartphone security vulnerabilities. Let's delve into the realm of spyware, another pressing concern where even the most vigilant users can find themselves compromised.You might not realize it, but your phone could be more exposed to spyware than you think. Just a small slip-up while you're browsing the web, and you could accidentally invite a cyber-spy into your life. If you're an Android user, be extra cautious. Your phone is usually more at risk than iPhones.But here's the kicker. Even if you're super careful, you're not totally out of the woods. If you don't update your phone's software regularly or if you've jailbroken it, you're playing with fire. Here are some telltale signs of spyware on your phone. MORE: SNEAKY SPYWARE IS AFTER YOUR MOST SENSITIVE DATA  Is your phone acting strange ? Here are the telltale signs of spyware on your device. Unusual noises: Beeping, faint voices or static during calls might not just be network issues. They could signal an eavesdropping attempt. Performance lags: If your phone suddenly slows down or the battery drains rapidly, spyware might be hogging your resources. Sensors activate unexpectedly: Modern smartphones signal when cameras and mics are in use. If this happens sans your input, investigate promptly. Mysterious apps and files: New, unrecognizable apps or files might indicate that your phone's security has been breached. Excessive pop-ups and spam: An uptick in ads, error messages or scam texts may be adware, a common companion to spyware. Overheating issues : Like performance lags, overheating can suggest that spyware is overworking your phone's internals. MORE: MALICIOUS ANDROID SPYWARE DETECTED IN OVER 100 POPULAR APPS  1. Have good antivirus software: Yes, antivirus protection can help detect and disable spyware on your smartphone. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . 2. Remove unfamiliar apps and files: If you suspect your phone has been hacked, promptly remove any unfamiliar apps . 3. Restart your device: Rebooting your phone can sometimes stop spyware from running. 4. Update to the latest software: As mentioned before, updates can patch vulnerabilities. 5. Be cautious when browsing: Avoid clicking on suspicious links or downloading files from untrusted sources. 6. Update your phone regularly: Updates often include security patches that can help protect your device from spyware and other vulnerabilities. 7. Don't jailbreak your phone: Jailbreaking removes security restrictions that can make your phone more susceptible to spyware. 8. Look for unusual activity: This includes unusual noises during calls, performance lags, unexpected sensor activation, mysterious apps or files, excessive pop-ups and overheating. 9. Delete unwanted or unused apps: Some apps use your device's camera and microphone and collect your data even while it is not in use. Getting rid of unused apps frees up storage space on your phone and declutters your lock screen. It can also eliminate one more potential app that might be collecting information from you unknowingly. On an iPhone: 
On an Android: Android settings may vary based on the manufacturer's settings.  GET FOX BUSINESS ON THE GO BY CLICKING HERE While it may seem like an extra effort to review and change your apps' permission settings, it'll give you more peace of mind knowing which apps have access to specific device functions and data. Most devices now have a dedicated part of their settings to view which apps are using the different functions of your phone and what data it has access to. 10. Changing camera settings: It may seem simple to just give access to your camera to certain apps. This way, you can easily use the camera function whenever you pull up the app to use. There are, however, apps that do not need access to your camera to function. Does your navigation app need access to your camera even when it is not in use? Take back control of your camera by using the steps below to find out which apps have access to your camera and turn it on or off. On an iPhone: On an Android: Android settings may vary based on the manufacturer's settings.  11. Restrict camera and microphone permissions: Restricting camera and microphone permissions can make it more difficult for spyware to access these features. On an iPhone: On an Android: Android settings may vary based on the manufacturer's settings.  MORE: NEWLY IPHONE SPYWARE TOOL SOLD TO GOVERNMENTS FOR TARGETED SURVEILLANCE In a world where our smartphones are virtual extensions of ourselves, the discoveries at MIT's CSAIL cast a new light on what we often take for granted. As we navigate the delicate balance between convenience and privacy, it's clear that the devices we depend on daily harbor capabilities far beyond their intended use, prompting a necessary conversation on security, awareness and the evolving landscape of digital privacy.With the revelation that devices we use daily, like smartphones, can be exploited in ways that compromise our privacy - such as converting ambient light sensors into makeshift cameras - what steps do you believe technology companies and governments should take to protect personal privacy? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Distributed by aarss.com.