Figure data breach exposes nearly 1M accounts
If you have applied for a loan online, you probably shared more than you realized. Your name. Your email. Your date of birth. Maybe even your home address and phone number. Now imagine all of that sitting on a
dark web forum
.That is the reality for nearly 1 million people after
hackers breached Figure Technology Solutions
, a blockchain-focused fintech lender.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Figure Technology Solutions, founded in 2018, uses the
Provenance blockchain
for lending, borrowing and securities trading. The company says it has unlocked more than $22 billion in home equity through partnerships with banks, credit unions, fintechs and home improvement companies. However, behind the scenes, attackers were working on a very different angle.
GOOGLE DROPPED DARK WEB MONITORING: SHOULD YOU CARE?
According to breach notification data shared by Have I Been Pwned, information from 967,200 accounts was exposed. The leaked data included more than 900,000 unique email addresses along with names, phone numbers, physical addresses and dates of birth. That is a gold mine for identity thieves. Figure says the incident stemmed from a social engineering attack. What that means in simple terms is that someone inside the company was tricked into handing over access."We recently identified that an employee was socially engineered, and that allowed an actor to download a limited number of files through their account," a Figure Technology Solutions spokesperson told CyberGuy in a statement. "We acted quickly to block the activity and retained a forensic firm to investigate what files were affected. We understand the importance of these matters and are communicating with partners and those impacted as appropriate. We are also implementing additional safeguards and training to further strengthen our defenses. We are offering complimentary credit monitoring to all individuals who receive a notice. We continuously monitor accounts and have strong safeguards in place to protect customers' funds and accounts."When people hear the word blockchain, they think secure and untouchable. But attackers did not break cryptography. They targeted a human being. Groups like ShinyHunters specialize in this playbook. They reportedly claimed responsibility for the breach and, according to BleepingComputer, posted 2.5GB of data allegedly tied to thousands of loan applicants.In recent weeks, the same group has claimed breaches involving companies like Canada Goose,
Panera Bread
and
SoundCloud
. Not every case is connected. Still, security researchers have observed a troubling pattern. Attackers impersonate IT support. They call employees. They create urgency. Then they direct victims to fake login portals that look nearly identical to real ones.Once employees enter credentials and even multi-factor authentication codes, attackers gain access to single sign-on systems tied to major platforms like Microsoft and Google. From there, one compromised account can unlock a web of connected tools and internal systems.
PANERA BREAD DATA BREACH EXPOSES 5.1M CUSTOMERS
Why this matters to you
If your information was part of the Figure data breach, criminals now have enough detail to craft convincing phishing emails or phone scams. They can reference your real name. They can cite your address. They can pretend to be a lender or bank calling about your application.Even if you never applied for a loan with Figure, this incident highlights something bigger. No platform is immune to human error. And social engineering works because it targets trust, not technology.Figure markets itself as blockchain native. Blockchain can provide transparency and strong cryptographic security. However, none of that protects against a well-crafted phone call.Security failures often happen at the human layer. That is where attackers focus their energy. As more financial services move online, the attack surface grows. Loan applications,
identity verification tools
and cloud-based systems create convenience. They also create new targets.
How to protect yourself after the Figure data breach
You cannot control how companies secure their systems. You can control how you respond. Start by checking whether your email address appears in the exposed dataset, then take the steps below to lock down your accounts.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
To see if your email address was affected, visit
https://haveibeenpwned.com/. Enter your email address to find out whether your information appears in the leak. When finished, return here and begin Step 1 below.Also, be cautious of unexpected calls about your accounts. If someone pressures you to act immediately, hang up and call the company directly using a number from its official website.The Figure data breach is a reminder that technology alone cannot protect sensitive information. A single employee tricked into revealing credentials can expose hundreds of thousands of people. That is not a blockchain failure. It is a trust failure. If your data was involved, take action now. Even if it was not, treat this as a wake-up call. Your personal information has value. Criminals know it. Companies should know it too.If one phone call can unlock nearly a million records, are companies investing enough in training people, or are they still betting everything on technology alone? Let us know by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
China's compact humanoid robot shows off balance and flips
Humanoid robotics
companies have already shown their machines can run at 22 mph, land backflips and even pull off front flips. So the new proving ground is not raw speed or acrobatics. It is control when something unexpected happens. That is where the
EngineAI PM01 humanoid robot
comes in.In newly released footage, the compact humanoid keeps dancing after being deliberately pushed off balance. It performs a controlled forward slip, absorbs the disruption and smoothly regains rhythm within seconds. The motion looks fluid and surprisingly natural.Then it lands another front flip, this time as part of a broader demonstration of balance and recovery.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
HUMANOID ROBOT MAKES ARCHITECTURAL HISTORY BY DESIGNING A BUILDING
rget=_new href="https://www.foxnews.com/tech/worlds-fastest-humanoid-robot-runs-22-mph">
Speed gets attention.
Recovery earns trust. When someone shoves the PM01, it does not freeze. It recalculates its center of mass, adjusts joint torque and corrects posture in real time. That level of control depends on tight coordination between sensors, actuators and AI algorithms. The front flip adds another challenge.Front flips are typically harder than backflips. Rotating forward shifts the body weight ahead of the support base. That makes landings less forgiving. The EngineAI PM01 humanoid robot executes the move with coordinated arm swing, core stabilization and accurate landing mechanics. This is not about flashy tricks. It is about controlled dynamic motion under stress.The PM01 stands just under 4 feet tall. That smaller build works to its advantage. A lower center of mass reduces tipping risk and requires less rotational force during flips. Its lighter structure also helps distribute impact forces more efficiently when it lands.By comparison, EngineAI's larger SE01 stands about 4 feet, 6 inches tall and weighs 88 pounds. The PM01 is roughly 10.5 inches shorter and about 17.6 pounds lighter. That size difference makes it more agile in research and development settings.Full-sized humanoids face greater mechanical stress during high-impact maneuvers. They need stronger actuators, reinforced joints and heavier structural support to stay stable.
Compact robots
like the EngineAI PM01 can achieve advanced movement with less overall strain.
CHINA'S ROBOTICS GIANT PUTS 200 ROBOTS TO THE TEST
Under the hood, the EngineAI PM01 humanoid robot combines advanced perception with serious computing power. It uses an Intel RealSense depth camera for visual awareness and spatial mapping. A dual-chip setup integrates Nvidia Jetson Orin with an Intel N97 processor. That architecture supports
real-time AI workloads
and rapid balance correction when the robot is pushed or slips.The robot features 24 degrees of freedom, including 12 joint motors. This design allows smooth coordinated movement across its limbs and torso. In the small humanoid segment, PM01 competes with models like the
Unitree G1
and the Booster T1. It walks at up to about 4.5 miles per hour, faster than the T1, though still below some larger high-speed humanoid platforms built for sprint performance.EngineAI appears less focused on headline-grabbing speed and more focused on refined stability and controlled motion.As humanoid videos go viral, skepticism follows. EngineAI recently addressed CGI accusations by releasing footage of its T800 humanoid physically interacting with its CEO. The company clearly wants to demonstrate that its robots operate in the real world.That credibility push matters. In a crowded robotics market, bold claims are common. Physical demonstrations help separate engineering progress from digital effects.
WARM-SKINNED AI ROBOT WITH CAMERA EYES IS SERIOUSLY CREEPY
Right now, this looks like a polished demo. However, balance and recovery are critical for
real-world use
. If humanoid robots are going to work in warehouses, hospitals or our homes, they must handle bumps, slips and unexpected contact without causing damage. A machine that can brace itself, fall safely and stand back up is far more practical than one that performs a single choreographed stunt. As humanoids move closer to everyday environments, resilience becomes just as important as athletic performance. The more stable they are, the more comfortable people will feel sharing space with them.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
Humanoid robots can already run fast, flip and move with serious athletic ability. What companies are racing to perfect now is something more practical: balance when things go wrong. The EngineAI PM01 humanoid robot shows how compact design and real-time correction can help a machine stay upright, recover quickly and keep moving without chaos. That kind of control matters far more in a crowded warehouse, hospital hallway or public space than a perfectly staged stunt. We are starting to see the shift from viral demo moments to robots built for everyday reliability. The real breakthrough is not the flip. It is what happens after the push.When humanoid robots can absorb a shove, land a flip and get back to work without missing a beat, how close are we to seeing them in your neighborhood? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Why the Microsoft 365 Copilot bug matters for data security
You trust your email security settings for a reason. So when an AI assistant quietly reads and summarizes messages marked confidential, that trust takes a hit.Microsoft says a bug in
Microsoft 365 Copilot
allowed its AI chat feature to process sensitive emails since late January.The issue bypassed Data Loss Prevention policies that organizations rely on to protect private information. Put simply, emails that were supposed to stay locked down were being summarized anyway.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
Microsoft says a coding error impacted Microsoft 365 Copilot Chat, specifically the "work tab" feature. The AI assistant helps business users summarize content, draft responses and analyze information across Word, Excel, PowerPoint, Outlook and OneNote.Beginning Jan. 21, an internal bug labeled CW1226324 caused Copilot to read and summarize emails stored in Sent Items and Drafts folders.The real concern runs deeper. Several of those messages carried confidentiality or sensitivity labels.Companies apply those labels along with DLP policies to block automated systems from accessing restricted content. Despite those safeguards, Copilot still generated summaries. We reached out to Microsoft, and a spokesperson provided CyberGuy with the following statement:"We identified and addressed an issue where Microsoft 365 Copilot Chat could return content from emails labeled confidential authored by a user and stored within their Draft and Sent Items in Outlook desktop. This did not provide anyone access to information they weren't already authorized to see. While our access controls and data protection policies remained intact, this behavior did not meet our intended Copilot experience, which is designed to exclude protected content from Copilot access. A configuration update has been deployed worldwide for enterprise customers." AI tools feel helpful. They save time and reduce busy work. But they also rely on deep access to your data. When
safeguards fail
, even temporarily, sensitive content can move in ways you did not expect.
YOUR PHONE SHARES DATA AT NIGHT: HERE'S HOW TO STOP IT
For businesses, that could mean:Legal discussions summarized outside intended controlsFinancial projections processed despite restrictionsHR communications are exposed to automated analysisEven if no data leaves the organization, the bypass itself raises concerns about how AI integrates with
enterprise security systems
.Microsoft says it began rolling out a fix in early February. The company continues to monitor deployment and is contacting some affected users to verify the fix works.However, Microsoft has not provided a final timeline for full remediation. It has also not disclosed how many organizations were affected.The issue is tagged as an advisory, which usually signals limited scope or impact. Still, many security professionals will want deeper clarity before feeling comfortable.This incident highlights something many companies are wrestling with right now. AI assistants sit inside productivity platforms. They need access to email, documents and collaboration tools to work well.
TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY
At the same time, those platforms contain your most sensitive information. When AI features expand quickly, security policies must evolve just as fast. Otherwise, even a small code mistake can create unexpected exposure.If your organization uses Microsoft 365 Copilot, here are practical steps to reduce risk:Work with your IT team to confirm which folders and data sources Copilot can access.Test sensitivity labels and DLP (Data Loss Prevention) rules to ensure they block AI processing as intended.Stay current on Microsoft service alerts and verify that the fix is fully deployed in your tenant.If you have concerns, consider temporarily restricting Copilot features until verification is complete.Remind staff that AI assistants can process drafts and send messages. Encourage careful handling of sensitive content.Review audit logs to see whether Copilot accessed or summarized labeled emails. This helps determine actual exposure rather than assumed risk.Confirm that confidential labels are configured to block AI processing where required. Misconfigured labels can create gaps even after a bug is fixed.Because the issue involved Sent Items and Drafts, evaluate whether sensitive drafts should be stored long-term or deleted after sending.Instead of enabling Copilot organization-wide, consider a phased deployment to departments with lower sensitivity exposure.Use this moment to reassess how AI tools integrate with compliance controls. Treat it as a learning opportunity rather than a one-time glitch.
Pro Tip:
This Copilot bug centers on enterprise controls. Even so, AI tools operate on your devices and accounts, so keeping software up to date and using strong antivirus software adds an important layer of defense. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at
Cyberguy.com
Enterprise AI bugs raise a bigger question: how much access should email platforms have to your data in the first place? If you want an added layer of privacy beyond mainstream providers, privacy-focused email services are worth exploring.Some offer end-to-end encryption, support for PGP encryption and a strict no-ads business model that avoids scanning messages for marketing purposes.
AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN
Many also allow you to create disposable email aliases, which can reduce spam and limit exposure if one address is compromised.While no provider is immune to software bugs, choosing an email service built around privacy rather than data monetization can limit how much of your information is accessible to automated systems in the first place.For individuals, journalists and small businesses especially, that added control can make a meaningful difference.For recommendations on private and secure email providers that offer alias addresses, visit
Cyberguy.com
AI assistants are becoming part of daily work life. They promise speed, efficiency and smarter workflows. But convenience should never outrun security.This Copilot bug may have a limited impact. Still, it serves as a reminder that AI tools are only as strong as the guardrails behind them.When those guardrails slip, even briefly, sensitive information can move in unexpected ways. As AI becomes more embedded in business software, trust will depend on transparency, fast fixes and clear communication.Here is the real question: If your AI assistant can see everything you write, are you fully confident it respects every boundary you set? Let us know by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Copyright 2026
CyberGuy.com
. All rights reserved. |
China's ultrasound brain tech race heats up
When you hear "
brain-computer interface
," you probably picture surgery, wires and a chip in your head. Now picture something quieter. No implant. No incision. Just sound waves directed at the brain.That is the approach behind a new wave of
ultrasound brain-computer interface
companies in China. One of the newest is Gestala, founded in Chengdu with offices in Shanghai and Hong Kong. The company says it is developing technology that can stimulate and eventually study brain activity using focused ultrasound.Yes, the same basic technology is used in medical imaging. But this time, it targets neural circuits.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
NEW YORK HALTS ROBOTAXI EXPANSION PLAN
Most
brain-computer interface systems
rely on electrodes that detect electrical signals from neurons.
Neuralink
is the most visible example. It places tiny threads inside the brain to record activity. Ultrasound works differently.Instead of measuring electrical signals directly, it uses high-frequency sound waves. Depending on intensity and focus, those waves can:Focused ultrasound treatments are already approved for Parkinson's disease, uterine fibroids and certain tumors. That clinical history gives companies like Gestala a foundation to build on. However, studying or interpreting brain signals with ultrasound is far more complex than delivering targeted stimulation.
WHAT TRUMP'S 'RATEPAYER PROTECTION PLEDGE' MEANS FOR YOU
Gestala's first product is focused on chronic pain. The company plans to target the anterior cingulate cortex, a brain region linked to the emotional experience of pain. Early pilot studies suggest that stimulating this area can reduce pain intensity for up to a week in some patients. The first-generation device will be a stationary system used in clinics. Patients would visit a hospital for treatment sessions. Later, the company plans to develop a wearable helmet designed for supervised use at home. Over time, Gestala says it wants to expand into depression, other mental health conditions, stroke rehabilitation, Alzheimer's disease and sleep disorders. That is an ambitious roadmap. Each condition involves different brain networks and clinical hurdles.Like other brain tech startups, Gestala is also exploring whether ultrasound could help interpret brain activity. The long-term concept is straightforward in theory. A device could detect patterns linked to chronic pain or depression, then deliver stimulation to specific regions in response.Unlike traditional brain implants, which capture electrical signals from limited areas, an ultrasound-based system may have the potential to access broader regions of the brain. That possibility is one reason researchers are paying attention. Still, translating that concept into reliable data is a major engineering challenge.China is not alone in exploring ultrasound brain-computer interface systems. Earlier this month,
OpenAI announced
a significant investment in Merge Labs, a startup cofounded by Sam Altman along with researchers linked to Forest Neurotech.Public materials from Merge Labs mention restoring lost abilities, supporting healthier brain states and deepening human connection with advanced AI. That language signals long-term ambitions. Yet experts caution that real-world applications are still years away.
GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
Ultrasound faces technical limits. First, the skull weakens and distorts sound waves. That makes it harder to obtain precise signals. In research settings, detailed readouts of neural activity have required special implants that allow ultrasound to pass more clearly than bone.Second, ultrasound measures changes in blood flow. Blood flow shifts more slowly than electrical firing in neurons. That delay may limit applications that require fast, detailed signal decoding, such as real-time speech translation. In short, stimulation is one challenge. Accurate readout is another level entirely.Right now, this technology is experimental. You are not about to buy a brain helmet at your local electronics store. Still, the direction matters. If noninvasive ultrasound devices can reduce chronic pain or support mental health treatment, more patients may consider therapy without facing brain surgery.At the same time, devices that analyze brain states introduce new
privacy questions
. Brain-related data is deeply personal. Regulators, hospitals and companies will need clear rules about how that data is stored, shared and protected. Finally, the link between AI companies and brain interface startups shows how closely digital intelligence and neuroscience are becoming intertwined. That connection could reshape medicine, wellness, and even how we interact with technology.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
Brain-computer interfaces used to feel far off and experimental. Now they are a serious focus of global research and investment. China's push to develop an ultrasound-based brain-computer interface adds momentum to a field already shaped by companies like Neuralink and new ventures backed by OpenAI. Progress is steady but measured. The potential is significant. The technical hurdles are real. What happens next will depend on whether researchers can turn promising lab results into safe, reliable treatments people can actually use.If sound waves could one day interpret your mental state, who should decide how that information is used? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Iran networks suffer losses amid airstrikes, showing digital evolution of conflicts
When missiles fly, we expect explosions. We expect smoke, sirens and satellite images. What we do not expect is silence. On February 28, 2026, as fighter jets and cruise missiles struck Iranian Revolutionary Guard command centers during
Operation Roar of the Lion
, a parallel assault reportedly unfolded in cyberspace. Official news sites and key media platforms went offline, government digital services and local apps failed across major cities, and security communications systems reportedly stopped functioning, plunging Iran into a near-total digital blackout.According to NetBlocks, a global internet monitoring organization that tracks connectivity disruptions, nationwide internet traffic
in Iran
plunged to just 4 percent of normal levels.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
That level of collapse suggests either a deliberate state-ordered shutdown or a large-scale cyberattack designed to paralyze critical infrastructure. Western intelligence sources later indicated the digital offensive aimed to disrupt IRGC command and control systems and limit coordination of counterattacks. For the United States and its allies, the episode offers a stark reminder that
modern conflict
now blends airstrikes with digital warfare in ways that can ripple far beyond the battlefield.In a matter of hours, modern conflict looked less like tanks and more like a blinking cursor.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Reports described widespread outages across Iran. Official news sites stopped functioning. IRNA, Iran's state-run news agency, went offline. Tasnim, a semi-official news outlet closely aligned with the Islamic Revolutionary Guard Corps, reportedly displayed subversive messages targeting Supreme Leader
Ali Khamenei
.
THINK YOUR NEW YEAR'S PRIVACY RESET WORKED? THINK AGAIN
The IRGC, Iran's powerful military and intelligence force, plays a central role in national security and regional operations. At the same time, local apps and government digital services failed in cities like Tehran, Isfahan and Shiraz.This was not one website defaced for headlines. It appeared systemic. Electronic warfare reportedly disrupted navigation and communications systems. Distributed denial of service attacks, often called DDoS attacks, flooded networks with traffic to overwhelm and disable them. Deep intrusions targeted energy and aviation systems. Even Iran's isolated national internet struggled under pressure.
CHINA VS SPACEX IN RACE FOR SPACE AI DATA CENTERS
For a regime that tightly controls information, losing digital command creates both operational and political risk.Cyber operations offer something missiles cannot. They disrupt without always killing. They send a signal without immediately triggering full-scale war. That matters in a region where escalation can spiral fast. History shows Iran understands this logic. Between 2012 and 2014, Iranian actors targeted U.S. financial institutions in Operation Ababil. Saudi Aramco also suffered a major cyberattack.
ARTIFICIAL INTELLIGENCE HELPS FUEL NEW ENERGY SOURCES
After Israeli strikes in 2025, cyberattacks targeting Israel surged dramatically within days.
Cyber retaliation
lets leaders respond while limiting direct military confrontation. It buys leverage in negotiations. It creates pressure without necessarily crossing a red line.But there is a catch. Every cyber strike risks miscalculation. And digital damage can spill into the real world fast if critical infrastructure is hit.If the blackout and strikes mark a turning point, Tehran has options. None are simple.Cyber retaliation remains one of Iran's most flexible tools. It can range from disruptive attacks and influence campaigns to more targeted intrusions that pressure critical services. Recent expert commentary warns that U.S. cyber defenses and the private sector could face sustained testing.Iran has used drones and electronic interference as signals before. Analysts continue to flag jamming, spoofing and harassment of unmanned systems as a way to raise costs without immediately striking large numbers of personnel.This risk is rising fast. An EU naval mission official reportedly said IRGC radio transmissions warned ships that passage through Hormuz was "not allowed". Greece has also urged ships to avoid high-risk routes and warned about electronic interference that can disrupt navigation. Insurers are already repricing the danger, with reports of war-risk policies being canceled or sharply increased.Iran has long worked with allied forces and militias in the region, and some of those groups could step up attacks on U.S. interests or allied partners in retaliation, widening the clash without direct state-to-state engagement.
Missile strikes remain a
high-impact option, but they raise the odds of rapid escalation. Recent expert analysis continues to frame them as a tool Iran may use for signaling, especially if leadership feels cornered.Here is the uncomfortable truth. Neither Washington nor Tehran likely wants a full-scale regional war. In moments like this, military strikes rarely stand alone. They often move alongside diplomacy. Leaders send signals. They apply pressure. At the same time, they try to leave room for talks.But escalation has momentum. Each missile changes the equation. Each casualty raises the stakes. The more damage done, the harder it becomes to step back.
5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY
Fear plays a role. So does pride. Domestic audiences demand strength. Leaders feel pressure to respond in kind. That is how limited strikes can spiral into something much larger.This episode highlights something bigger than regional tension. Nation-states now pair kinetic strikes with digital offensives. Cyberattacks can blind communications, freeze infrastructure and disrupt financial systems before the world even processes the first explosion.
TRUMP TELLS IRANIANS THE 'HOUR OF YOUR FREEDOM IS AT HAND' AS US-ISRAEL LAUNCH STRIKES AGAINST IRAN
For businesses and individuals, that reality matters. Modern conflict no longer stays confined to battlefields. Supply chains, energy grids and online platforms can feel the ripple effects. The blackout in Iran serves as a reminder that digital resilience is now a national security issue. When a country's internet can plunge to just 4 percent of normal traffic in hours, it is a reminder that cyber conflict can escalate quickly. Even if the disruption happens overseas, global networks are interconnected. Financial systems, supply chains and online platforms can feel the ripple effects.You cannot control geopolitics. You can control your digital hygiene. Here are practical steps to reduce your personal risk during periods of heightened cyber activity:Install strong antivirus software to guard against state-linked phishing and malware campaigns that often spike during geopolitical conflicts. Nation-state actors frequently exploit breaking news and global instability to spread malicious links and ransomware. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at
Cyberguy.com
Keep devices updated so security patches close vulnerabilities that attackers often exploit during global cyber spikes.
WORLD LEADERS SPLIT OVER MILITARY ACTION AS US-ISRAEL STRIKE IRAN IN COORDINATED OPERATION
Use strong, unique passwords stored in a reputable password manager to protect your accounts if cyber retaliation campaigns expand beyond government targets. Check out the best expert-reviewed password managers of 2026 at
Cyberguy.com
Enable two-factor authentication (
2FA
) on financial, email and social accounts to safeguard access in case stolen credentials circulate during heightened cyber conflict.Be cautious with urgent headlines or alerts about international conflict, since attackers frequently mimic breaking news.Monitor financial accounts for unusual activity in case broader disruptions spill into banking systems.When tensions rise,
phishing campaigns
often rise with them. Threat actors exploit fear and confusion. Staying disciplined with basic security habits makes you a harder target if malicious traffic increases.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com
The reported cyber blackout inside Iran may signal a new chapter in modern conflict. Jets and missiles still matter. But so do servers, satellites and code. Leaders may try to contain the damage while showing strength. Still, history shows how quickly careful plans can unravel once pressure builds. War today runs on electricity and bandwidth as much as fuel and ammunition. When networks go dark, the impact does not stay on a battlefield. It spills into banking systems, airports, hospitals and the phones in our pockets. That is what makes this moment different.If an entire nation's digital systems can be disrupted in hours, how prepared is your community if something similar ever hits closer to home? Let us know by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Copyright 2026
CyberGuy.com
. All rights reserved. |
Tired of websites blocking your VPN? A dedicated IP fixes that
If you have ever turned on your VPN and suddenly could not log in to your bank, email, streaming service or work portal, you are not imagining things. In fact, this is one of the most common frustrations VPN users face today.However, the issue is not that VPNs stopped working. Instead, websites have become far more aggressive about
blocking traffic that looks suspicious
.As a result, the way your VPN is built now matters just as much as whether you use one at all.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter
WHAT TRUMP'S 'RATEPAYER PROTECTION PLEDGE' MEANS FOR YOU
Most VPNs give you a shared IP address. As a result, hundreds or even thousands of people can appear online from the same address at the same time. From a website's perspective, that traffic pattern raises red flags. When platforms detect too many logins, rapid location changes or unusual activity tied to one IP, they step in quickly. In many cases, they respond by:Meanwhile, you did nothing wrong. Instead, you end up dealing with restrictions caused by other users sharing that same IP address.With a dedicated IP, you get an address that belongs only to you. Unlike shared VPN connections, no one else uses it.Each time you connect, you use the same IP address. As a result, you avoid sharing traffic, rotating locations or competing with random users whose activity could trigger blocks.Because of that consistency, your connection looks much more like a typical home or office internet setup. And that simple difference can dramatically reduce website suspicion and login headaches.
NEW YORK HALTS ROBOTAXI EXPANSION PLAN
That consistency does more than reduce suspicion; it improves how smoothly you
access the sites and services
you use every day.Banks, government portals, healthcare sites, and streaming services are far less likely to block a dedicated IP because it does not show heavy or erratic traffic patterns.Those endless "prove you're human" messages are usually triggered by shared IP abuse. A dedicated IP dramatically reduces them.Financial institutions and
email providers
often flag constantly changing IP addresses as suspicious. A dedicated IP stays consistent, so login alerts and lockouts happen far less often.Some employers only allow access from approved IP addresses. Shared VPN IPs cannot be approved. Dedicated IPs can.Shared VPN IPs are often the first to get blocked when streaming services crack down. Dedicated IPs are less likely to be flagged because traffic looks normal and predictable.A dedicated IP:Your traffic remains encrypted, and your real location stays hidden. You simply get a connection that websites trust more.A dedicated IP is especially helpful if you:
GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
u want these benefits, look for a VPN provider that offers a dedicated IP option built directly into its service. Some providers include it in premium plans, while others offer it as an add-on. Either way, the process should be simple. You should be able to select your dedicated IP inside the app without advanced setup or manual configuration. Before signing up, check that the provider also offers strong speeds, reliable uptime and clear privacy policies. A dedicated IP improves access, but overall performance still matters.A dedicated IP reduces blocks. However, a quality VPN should also deliver strong security and smooth performance.
Fast, stable connections:
Speed matters for streaming, video calls and everyday browsing. Look for providers known for consistent performance.
Wide server coverage:
More server locations give you flexibility when traveling and help reduce location errors.
Clear privacy practices:
Choose a VPN with a strict no-logs policy and independent audits when possible.
Secure server technology:
Modern VPNs often use RAM-based servers that automatically wipe data on reboot.
Easy-to-use apps:
Protection should feel simple, not technical. Clean apps across major devices make daily use effortless.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your
Windows, Mac, Android & iOS devices
at
Cyberguy.com
ur VPN keeps getting blocked, the problem may not be the VPN itself. It may be the shared IP address behind it. Websites are increasingly aggressive about suspicious traffic. When hundreds of users share the same IP, banks, email providers and streaming platforms take notice. That is when the captchas, verification codes and account lockouts start. A dedicated IP changes that experience. You still get encryption. You still protect your real location. But your connection looks stable and predictable, which helps you avoid constant interruptions.Should protecting your privacy really mean fighting with your bank, email, and streaming apps? Let us know by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Copyright 2026 CyberGuy.com. All rights reserved. |
Google dropped dark web monitoring: Should you care?
Google has officially discontinued
its Dark Web Report feature, a free tool that once scanned known dark web breach dumps for personal information tied to a user's Google account. The service delivered notifications when email addresses and other identifiers appeared in leaked datasets.According to Google's support page, the system ceased scanning for new dark web data Jan. 15, 2026, and the reporting function was removed entirely on Feb. 16, 2026, meaning users can no longer access the feature.The company said the decision reflects a shift toward
security tools
it believes provide clearer guidance
after
exposure, rather than standalone scan alerts.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
If you previously relied on the free dark web scan as an early warning signal for leaked data, this change removes one of your sources.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Google's Dark Web Report acted as a basic exposure scanner. It checked whether personal information linked to a Google account had surfaced in known breach collections circulating on the dark web.When a match is found, users receive a notification identifying which type of data appeared in a leak. Depending on the
data breach
, that could include an email address, phone number, date of birth or other identifying details commonly harvested during large-scale hacks.The report did not display stolen credentials or provide access to the leaked database itself. It also did not trace the origin of the compromise beyond referencing the breached service when available.After an alert was issued, the next steps were left to the user. Google recommended actions such as changing passwords, enabling stronger authentication methods and reviewing account security settings. With the tool now removed, that automated breach check tied directly to a Google account is no longer available.Google directs users to its Security Checkup, a dashboard that scans your account for weak settings and unusual sign-in activity.Its built-in Password Manager includes Password Checkup, which scans saved credentials against known breach databases and prompts you to change exposed passwords. Google also supports passkeys and
two-factor verification
to lock down account access.The Results About You tool lets users search for personal information in Google Search and submit removal requests for certain publicly indexed details.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
Once personal information is compromised, it often ends up far beyond the breach itself. Stolen credentials and identity data are regularly trafficked on underground platforms where buyers can search for information tied to real people.The BidenCash dark web marketplace was taken down by U.S. authorities in June 2025, and the Justice Department confirmed that the platform peddled
stolen personal information
and credit card data.These illicit markets operate with a level of organization not unlike legitimate online stores. Search tools and bulk data sets are up for grabs and can be used to target any online account. This makes credential stuffing easier, where attackers test leaked passwords across multiple services in hopes of barreling into your account.A breach alert tied to a dark web scan points to a leak at one moment in time; it does not follow whether that information has been sold to third parties or used in subsequent fraud attempts. For everyday users, this means that just knowing your data
appeared
in a leak doesn't help much.
THINK YOUR NEW YEAR'S PRIVACY RESET WORKED? THINK AGAIN
With Google's scan gone, some people may consider dedicated
identity protection services
instead. Many of these services offer continuous monitoring of your personally identifiable information and send alerts about changes to your credit reports from all three major U.S. credit bureaus. That can include notifications about new inquiries, newly opened accounts and monthly credit score updates. Some plans also monitor a broader range of personal identifiers, such as driver's license numbers, passport numbers and email addresses.Beyond credit monitoring, certain services track linked bank, credit card and investment accounts for unusual activity. They may also monitor public records for changes to addresses or property titles and alert you if your information appears in those filings.Many providers include identity theft insurance to help cover eligible out-of-pocket recovery costs. Coverage limits vary by plan and provider. Additional features often include spam call and message protection, a password manager, a virtual private network (VPN) and antivirus software.No service can prevent every form of identity theft. However, ongoing monitoring and recovery support can make it easier to respond quickly if your information is misused.See my tips and best picks on Best Identity Theft Protection at
Cyberguy.com.
Google's decision to drop its Dark Web Report may seem small. But it removes a tool many users relied on. For some, those alerts were the first warning that their data appeared in a breach. That automatic scan is now gone. Google still offers Security Checkup, Password Checkup, passkeys and two-step verification. However, none of them actively scan dark web breach dumps for you. Stolen data does not disappear. Criminals copy, sell and reuse it. One alert shows a single moment. Ongoing identity theft monitoring helps you stay aware over time.Now that Google has dropped its dark web monitoring feature, will you actively check your data exposure or assume someone else is watching it for you? Let us know your thoughts by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
New York halts robotaxi expansion plan
New York just hit pause on expanding robotaxis beyond New York City.
Gov. Kathy Hochul
has withdrawn her proposal that would have allowed commercial robotaxi services in smaller cities across the state. That means places outside New York City will not see driverless ride services anytime soon.If you live in Buffalo, Rochester or Albany, that future just got pushed further down the road. Meanwhile, one major player still plans to move forward inside the city.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
CONGRESS MOVES TO SET NATIONAL RULES FOR SELF-DRIVING CARS, OVERRIDING STATES
Waymo
, the self-driving arm of Alphabet,
received its first permit last year to test autonomous vehicles in New York City. However, the permit requires a trained specialist behind the wheel. That testing permit remains in place. So, while statewide expansion is off the table for now, Waymo's New York City testing program continues. The company already offers paid driverless rides in parts of:According to company data and
state regulators
in Arizona and California, Waymo has logged millions of fully autonomous miles. Arizona transportation officials have reported lower crash rates per mile compared with human drivers in certain operational zones. California's DMV and Public Utilities Commission continue to monitor safety performance and incident reporting.The company says it hears from thousands of New Yorkers who have ridden in Waymo vehicles elsewhere and want the service at home. Still, expanding beyond the city now faces a political roadblock.
UBER UNVEILS A NEW ROBOTAXI WITH NO DRIVER BEHIND THE WHEEL
The governor's office said support was not there in the state Legislature after conversations with stakeholders. That language matters. Self-driving vehicle rules involve state lawmakers, labor groups, local officials, safety advocates and insurance regulators. Expanding robotaxi services into smaller cities likely raised concerns about:Autonomous vehicle deployment remains under intense scrutiny nationwide. After a high-profile incident involving Cruise in San Francisco in 2023, regulators tightened oversight. Cruise later suspended operations, and
General Motors
scaled back its robotaxi ambitions. Waymo has not recorded a similar major injury event in public reporting. That distinction has helped it expand in states like Arizona and Texas. Even so, public trust remains fragile.You might be thinking, "I do not live in New York. Why should I care?" Because state decisions like this often ripple outward. If New York, one of the largest transportation markets in the country, slows expansion outside its biggest city, other states may take note. Lawmakers across the country watch how New York handles new technology.Here is what this pause signals:Some cities will embrace them quickly. Others will wait for more data and clearer rules.Even if autonomous vehicles prove safer per mile in controlled settings, public policy decides where they operate.As companies push for expansion in major metros, debates over safety, job liability and infrastructure will follow. If you rely on ride-hailing services, autonomous vehicles could eventually lower costs and increase availability. On the other hand, local drivers and labor groups may push back hard. This tension will play out city by city.
ATLANTA TESTS DRIVERLESS POD TRANSIT LOOP
Federal agencies like the National Highway Traffic Safety Administration continue to collect crash data and investigate autonomous vehicle performance. However, states control many of the rules governing commercial operations. That means America may not get one unified robotaxi system. Instead, it may look like a patchwork. Phoenix might move fast. Austin might expand aggressively. Buffalo might wait.In the meantime, companies like Waymo continue refining software using real-world miles and sensor data. The more data they collect, the stronger their safety case becomes. Yet public perception often hinges on a single viral incident. Technology evolves quickly. Regulation moves more slowly.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
ork's decision is not a death blow to robotaxis. It is a reminder that innovation must pass a political test. Waymo still plans to move forward in New York City. Smaller cities across the state will wait. Other states will watch. The question is no longer whether autonomous vehicles will expand. It is how fast and where.If driverless cars reduce crashes and improve pedestrian safety, should lawmakers speed up approval? Or should they move cautiously and protect existing systems until every risk is understood? What would you want your city to do? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
What Trump's 'ratepayer protection pledge' means for you
When you open a chatbot, stream a show or back up photos to the cloud, you are tapping into a vast network of data centers. These facilities power
artificial intelligence
, search engines and online services we use every day. Now there is a growing debate over who should pay for the electricity those data centers consume.During President Trump's State of the Union address this week, he introduced a new initiative called the "ratepayer protection pledge" to shift
AI-driven electricity costs
away from consumers. The core idea is simple. Tech companies that run energy-intensive AI data centers should cover the cost of the extra electricity they require rather than passing those costs on to everyday customers through higher utility rates.It sounds simple. The hard part is what happens next.
SCOOP: TRUMP BRINGS BIG TECH TO WHITE HOUSE TO CURB POWER COSTS AMID AI BOOM
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.AI systems require
enormous computing power
. That computing power requires enormous electricity. Today's data centers can consume as much power as a small city. As AI tools expand across business, healthcare, finance and consumer apps, energy demand has risen sharply in certain regions.Utilities have warned that the current grid in many parts of the country was not built for this level of concentrated demand. Upgrading substations, transmission lines and generation capacity costs money. Traditionally, those costs can influence rates paid by homes and small businesses. That is where the pledge comes in.Under the ratepayer protection pledge, large technology companies would:Supporters say this approach separates residential energy costs from large-scale AI expansion. In other words, your household bill should not rise simply because a new AI data center opens nearby. So far,
Anthropic is the clearest public backer
. CyberGuy reached out to Anthropic for a comment on its role in the pledge. A company spokesperson referred us to a tweet from Anthropic Head of External Affairs Sarah Heck."American families shouldn't pick up the tab for AI," Heck wrote in a post on X. "In support of the White House ratepayer protection pledge, Anthropic has committed to covering 100% of electricity price increases that consumers face from our data centers."That makes Anthropic one of the first major AI companies to publicly state it will absorb consumer electricity price increases tied to its data center operations. Other major firms may be close behind. The White House reportedly plans to host Microsoft, Meta and Anthropic in early March to discuss formalizing a broader deal, though attendance and final terms have not been confirmed publicly.Microsoft also expressed support for the initiative. "The ratepayer protection pledge is an important step," Brad Smith, Microsoft vice chair and president, said in a statement to CyberGuy. "We appreciate the administration's work to ensure that data centers don't contribute to higher electricity prices for consumers." Industry groups also point to companies such as Google and utilities including Duke Energy and Georgia Power as making consumer-focused commitments tied to data center growth. However, enforcement mechanisms and long-term regulatory details remain unclear.
CHINA VS SPACEX IN RACE FOR SPACE AI DATA CENTERS
AI infrastructure is already one of the most expensive technology buildouts in history. Companies are investing billions in chips, servers and real estate. If firms must also finance dedicated power plants or pay premium rates for grid upgrades, the cost of running AI systems increases further. That could lead to:
Energy strategy
may become just as important as computing strategy. For consumers, this shift signals that electricity is now a central part of the AI conversation. AI is no longer only about software. It is also about infrastructure.AI is becoming embedded in smartphones, search engines, office software and home devices. As adoption grows, so does the hidden infrastructure supporting it. Energy is now part of the conversation around everyday technology. Every AI-generated image, voice command or cloud backup depends on a power-hungry network of servers.By asking companies to account more directly for their electricity use, policymakers are acknowledging a new reality. The digital world runs on very physical resources. For you, that shift could mean more transparency. It also raises new questions about sustainability, local impact and long-term costs.
ARTIFICIAL INTELLIGENCE HELPS FUEL NEW ENERGY SOURCES
If you are a homeowner or renter, the practical question is simple. Will this protect my electric bill? In theory, separating data center energy costs from residential rates could reduce the risk of price spikes tied to AI growth. If companies fund their own generation or grid upgrades, utilities may have less reason to spread those costs among all customers.That said, utility pricing is complex. It depends on state regulators, long-term planning and local energy markets.Here is what you can watch for in your area:Even if you rarely use AI tools, your community could feel the effects of a nearby data center. The pledge is intended to keep those large-scale power demands from showing up in your monthly bill.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
The ratepayer protection pledge highlights an important turning point. AI is no longer only about innovation and speed. It is also about energy and accountability. If tech companies truly absorb the cost of their expanding power needs, households may avoid some of the financial strain tied to rapid AI growth. If not, utility bills could become an unexpected front line in the AI era.As AI tools become part of daily life, how much extra power are you willing to support to keep them running? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Google dismantles 9M-device Android hijack network
Free apps are supposed to cost you nothing but storage space. But in this case, they may have cost millions of people control over their own internet connections.Google says it has disrupted what it believes was the world's largest residential proxy network, one that secretly hijacked around 9 million Android devices, along with computers and smart home gadgets. Most people had no idea their devices were being used since the apps worked normally, and nothing looked broken.But behind the scenes, those devices were quietly routing traffic for strangers,
including cybercriminals
.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE
According to
Google's Threat Intelligence Group
, the network was tied to a company known as IPIDEA. Instead of spreading through obvious malware, it relied on hidden software development kits, or SDKs, that were embedded inside more than 600 apps. These apps ranged from simple utilities to VPN tools and other free downloads. When you installed one, the app performed its advertised function. But it also enrolled your device into a residential proxy network.That means your phone, computer or smart device could be used as a relay point for someone else's internet traffic. That traffic might include scraping websites, launching automated login attempts or masking the identity of someone conducting shady online activity. From the outside, it looked like that activity came from your home IP address. You wouldn't see it happening, and in many cases, you wouldn't notice any major performance issues.Google says in a single seven-day period earlier this year, more than 550 separate threat groups were observed using IP addresses linked to this infrastructure. That includes cybercrime operations and state-linked actors. Residential proxy networks are attractive because they make malicious traffic look like normal consumer activity. Instead of coming from a suspicious data center, it appears to come from someone's living room.Google says it took legal action in a U.S. federal court to seize domains used to control the infected devices and route proxy traffic. It also worked with companies like Cloudflare and other security firms to disrupt the network's command-and-control systems. Google claims it also updated Play Protect, the built-in
Android security system
, so that certified devices would automatically detect and remove apps known to include the malicious SDKs.However, Google also warned that many of these apps were distributed outside the official Play Store. That matters because Play Protect can only scan and block threats tied to apps installed through Google Play. Third-party app stores, unofficial downloads and uncertified Android devices carry far greater risk.IPIDEA has claimed its service was meant for legitimate business use, such as web research and data collection. But Google's research suggests the network was heavily abused by criminals. Even if some users knowingly installed bandwidth-sharing apps in exchange for rewards, many did not receive clear disclosure about how their devices were being used.Google's investigation also found significant overlap between different proxy brands and SDK names. What looked like separate services were often tied to the same infrastructure. That makes it harder for consumers to know which apps are safe and which are quietly monetizing their connection.
300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
If millions of devices can be quietly turned into internet relay points, the big question is, how do you make sure yours isn't one of them? These steps reduce the risk that your phone, TV box or smart device gets pulled into a proxy network without you realizing it.Only download apps from the Google Play Store or other trusted app marketplaces. Some apps hide small pieces of code that can secretly use your internet connection. These are often spread through third-party app stores or direct app files called "APKs," which are Android app files installed manually instead of through the Play Store. When you sideload apps this way, you bypass Google's built-in security checks. Sticking to official stores helps keep those hidden threats off your device.If an app promises rewards for sharing your unused internet bandwidth, that's a major red flag. In many cases, that is exactly how residential proxy networks recruit devices. Even if it sounds legitimate, you are effectively renting out your IP address. That can expose you to abuse, blacklisting or deeper network vulnerabilities.Before installing any app, check what permissions it requests. A simple wallpaper app should not need full network control or background execution privileges. After installation, go into your phone's settings and audit which apps have constant internet access, background activity rights or special device permissions.Today's
mobile security tools
can detect suspicious app behavior, unusual internet activity and hidden background services. Strong antivirus software adds an extra layer of protection beyond what's built into your device, especially if you've installed apps in the past that you're unsure about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at
Cyberguy.com.
Android security updates patch vulnerabilities that proxy operators may exploit. If you're using an older phone, tablet or Android TV box that no longer receives updates, it may be time to upgrade. Unpatched devices are easier targets for hidden SDK abuse and botnet enrollment.If your device ever becomes part of a proxy network or is otherwise compromised, attackers often try to pivot into your accounts next. That's why you should never reuse passwords. A password manager generates long, unique passwords for every account and stores them securely, so one breach does not unlock your email, banking or social media. Many password managers also include breach monitoring tools that alert you if your credentials appear in leaked databases, giving you a chance to act before real damage is done. Check out the best expert-reviewed password managers of 2026 at
Cyberguy.com.
Go through your installed apps and
delete or uninstall anything
you don't recognize or haven't used in months. The fewer apps running on your device, the fewer opportunities there are for hidden SDKs to operate. If you suspect your device has been compromised, consider a full reset and reinstall only essential apps from trusted sources.
ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
Residential proxy networks operate in a gray area that sounds harmless on paper but can quickly become a shield for cybercrime. In this case, millions of everyday devices were quietly enrolled into a system that attackers used to hide their tracks. Google's takedown is a major move, but the broader market for residential proxies is still growing. That means you need to be cautious about what you install and what permissions you grant. Free apps are rarely truly free. Sometimes, the product being sold is you and your internet connection.Have you ever installed an app that promised rewards for sharing bandwidth, or used a free VPN without thinking twice about it? Let us know your thoughts by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Copyright 2026 CyberGuy.com. All rights reserved. |
Fox News AI Newsletter: Trump forces Big Tech to pay for AI power
IN TODAY'S NEWSLETTER:-
Trump brings Big Tech to White House to curb power costs amid AI boom
-
Melania Trump's young State of the Union guest pushes AI to revolutionize American classrooms
-
China vs. SpaceX in race for space AI data centers
PAY UP: Trump brings Big Tech to White House to curb power costs amid AI boom
-
EXCLUSIVE - President Trump is bringing major
Big Tech leaders to the White House
for a high-stakes summit aimed at curbing the skyrocketing power costs and infrastructure demands associated with the ongoing artificial intelligence boom.
ESPIONAGE BATTLE: Top AI firm alleges Chinese labs used 24K fake accounts to siphon US tech
-
A prominent artificial intelligence firm has
leveled serious allegations
against Chinese research laboratories, claiming that state-linked operatives utilized 24,000 fake accounts to unlawfully siphon critical U.S. technology and intellectual property.
THE PLAN: Trump's science, tech man lays out White House's global AI strategy
-
President Trump's top science and technology advisor has officially laid out the
White House's comprehensive global strategy
for artificial intelligence, detailing the administration's plan to maintain American dominance in the rapidly evolving sector.
FUTURE IS HERE: Melania Trump's young State of the Union guest pushes AI to revolutionize American classrooms
-
A young student invited by first lady Melania Trump to attend the State of the Union address is
making headlines
for passionately advocating the use of artificial intelligence to revolutionize and modernize the American education system.
DIGITAL DECEPTION: 300,000 Chrome users hit by fake AI extensions
-
Cybersecurity experts are
issuing urgent warnings
after discovering that approximately 300,000 Google Chrome users have been targeted and compromised by malicious browser extensions carefully disguised as popular artificial intelligence tools.
COSMIC COMPETITION: China vs. SpaceX in race for space AI data centers
-
The global space race is
taking a new technological turn
as China and Elon Musk's SpaceX directly compete to establish the first advanced artificial intelligence data centers in Earth's orbit.
OPINION: White-collar office ecosystem being rewritten by AI, here's how we win
-
In this opinion piece,
entrepreneur and investor Bion Bartning explores how the traditional white-collar office ecosystem is being fundamentally rewritten by artificial intelligence, offering strategic insights on how American workers and businesses can adapt and emerge victorious.
'DECADE OF BUILDOUT': Nvidia CEO says AI boom just getting started, AI going everywhere
-
Nvidia's chief executive officer
is doubling down on the future of his industry, telling investors that the massive artificial intelligence boom is only just getting started and predicting that AI capabilities will soon be integrated everywhere.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
X
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
Amazon shelves Blue Jay warehouse robot
Amazon made a lot of noise in October when it unveiled Blue Jay, a
multi-armed warehouse robot
built to speed up same-day deliveries. Just months later, the company quietly ended the program.The robot's core technology will live on in other projects. Still, Blue Jay itself is done.That sudden shift raises an important question. If one of the world's most advanced logistics companies cannot make a high-profile robot work at scale, what does that say about the future of artificial intelligence (AI) in the real world?
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO
Blue Jay was not a simple conveyor belt upgrade. It was a ceiling-mounted system designed to recognize and sort multiple packages at once. Using AI-powered perception models, the robot could:Amazon said it developed the system in under a year. That pace alone was impressive. The goal was clear: move more packages faster while reducing strain on workers in same-day fulfillment centers. On paper, that sounds like a win for everyone.Despite the hype, Blue Jay faced steep engineering and cost challenges. First, the robot was mounted to the ceiling. That design required complex installation and tight integration into Amazon's Local Vending Machine warehouses. Those facilities operate as massive, single structures with automation baked into the building itself.There was little room to reconfigure hardware once installed. That rigidity likely became a liability. In software, AI can pivot overnight with a code update. In the physical world, changing course means retooling steel beams, motors and entire layouts. That takes time and serious money. Several employees who worked on Blue Jay have already moved to other robotics projects.The company reportedly continues to experiment and improve its warehouse systems. The technology behind Blue Jay will, in fact, inform future designs. In other words, the robot failed. The ideas did not.
WAYMO'S CHEAPER ROBOTAXI TECH COULD HELP EXPAND RIDES FAST
n's next move
centers on a new warehouse architecture called Orbital. Unlike the older Local Vending Machine model, Orbital is modular. It can be built from smaller units and deployed faster in different layouts.That flexibility matters. Retail is fragmenting. Customers expect same-day delivery from urban hubs, local stores and even grocery locations. Orbital could allow Amazon to place micro-fulfillment centers behind retail stores, including Whole Foods locations. That would help it compete more directly with Walmart, which already has a strong grocery footprint.Alongside Orbital, Amazon is developing a new robotics system called Flex Cell. Unlike Blue Jay's ceiling mount, Flex Cell is expected to sit on the floor.That small design change signals something bigger. Amazon appears to be moving from massive centralized automation to smaller, adaptable systems built for the unpredictable realities of local retail.If you order from Amazon regularly, you might wonder whether this affects you. In the short term, probably not. Your packages will still show up. Same-day and next-day delivery remain core priorities. However, the long-term story is more interesting. Amazon's robotics strategy shapes how fast your order arrives, how much you pay and how local warehouses operate in your community.If Orbital works, you could see:If it struggles, same-day expansion could slow or become more expensive. That tension reflects a broader truth about AI. Writing code is one thing. Teaching a robot to lift boxes in a real warehouse without breaking down is another.
AI TRUCK SYSTEM MATCHES TOP HUMAN DRIVERS IN MASSIVE SAFETY SHOWDOWN WITH PERFECT SCORES
Blue Jay highlights a growing divide in the tech world.
AI in software
is moving at lightning speed. Chatbots, image tools and predictive systems evolve weekly.Hardware is different. Robots must deal with gravity, friction, heat and unpredictable human environments. Every mistake has a physical cost.Amazon's course correction shows that even tech giants hit limits when translating AI breakthroughs into moving metal. That does not mean automation is slowing down. It means the path is bumpier than the headlines suggest.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
n shelving Blue Jay is not a retreat from robotics. It is a recalibration. The company is betting that modular, flexible systems will win over massive, tightly integrated machines. That shift could define the next era of e-commerce logistics. For you, the promise remains the same: faster delivery, better availability and more local convenience. But behind that promise is a complicated dance between AI ambition and real-world constraints.If even Amazon struggles to make advanced robots work at scale, how much of the AI revolution is still more vision than reality? Let us know by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
300,000 Chrome users hit by fake AI extensions
Your web browser may feel like a safe place, especially when you install helpful tools that promise to make your life easier. But security researchers have uncovered a dangerous campaign in which more than 300,000 people installed Chrome extensions pretending to be
artificial intelligence
(AI) assistants. Instead of helping, these fake tools secretly collect sensitive information like your emails, passwords and browsing activity.They used
familiar names like ChatGPT,
Gemini and AI Assistant. If you use Chrome and have installed any AI-related extension, your personal information may already be exposed. Even worse, some of these malicious extensions are still available today, putting more people at risk without their knowing.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
MALICIOUS BROWSER EXTENSIONS HIT 4.3M USERS
Security researchers at browser security company LayerX discovered a large campaign involving 30
malicious Chrome extensions
disguised as AI-powered assistants (via BleepingComputer). Together, these extensions were installed more than 300,000 times by unsuspecting users.Some of the most popular extensions included names like AI Sidebar with 70,000 users, AI Assistant with 60,000 users, ChatGPT Translate with 30,000 users, and Google Gemini with 10,000 users. Another extension called Gemini AI Sidebar had 80,000 users before it was removed.These extensions were distributed through the official Chrome Web Store, which made them appear legitimate and trustworthy. Even more concerning, researchers found that many of these extensions were connected to the same malicious server, showing they were part of a coordinated effort.While some extensions have since been removed, others remain available. This means new users could still unknowingly install them and expose their personal data. Here's the list of the affected extensions:
FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE
These fake extensions pretend to offer helpful AI features, such as translating text, summarizing emails, or acting as an AI assistant. But behind the scenes, they quietly monitor what you are doing online.Once installed, the extension gains permission to view and interact with the websites you visit. This allows it to read the contents of web pages, including login screens where you enter your username and password.In some cases, the extensions specifically targeted Gmail. They could read your email messages directly from your browser, including emails you received and even drafts you were still writing. This means attackers could access private conversations, financial information and sensitive personal details.The extensions then sent this information to servers controlled by the attackers. Because they loaded content remotely, the attackers could change their behavior at any time without needing to update the extension.Some versions could also activate voice features through your browser. This could potentially capture spoken conversations near your device and send transcripts back to the attackers.If you installed one of these extensions, attackers may already have access to extremely sensitive information. This includes your email content, login credentials, browsing habits and possibly even voice recordings.We reached out to Google for comment, and a spokesperson told CyberGuy that the company "can confirm that the extensions from this report have all been removed from the
Google Web Store
."
BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK
If you have ever installed an AI-related Chrome extension, taking a few simple precautions now can help protect your accounts and prevent further damage.On a Windows PC or Mac, open Chrome and type chrome://extensions into the address bar. Review every extension listed. If you see anything unfamiliar, especially AI assistants you don't remember installing, click "
Remove"
immediately. Malicious extensions depend on going unnoticed. Removing them stops further data collection and cuts off the attacker's access to your information.If you installed any suspicious extension, assume your passwords may be compromised. Start by changing your email password first, since email controls access to most other accounts. Then update passwords for banking, shopping and social media accounts. This prevents attackers from using stolen credentials to break into your accounts.A password manager generates unique, complex passwords for each account and stores them securely. This prevents attackers from accessing multiple accounts if one password is stolen. Password managers also alert you if your login credentials appear in known data breaches, helping you respond quickly and protect your identity. Check out the best expert-reviewed password managers of 2026 at
Cyberguy.com.
Good antivirus software can detect malicious browser extensions, spyware, and other hidden threats. It scans your system for suspicious activity and blocks harmful programs before they can steal your information. This adds an important layer of protection that works continuously in the background to keep your device safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at
Cyberguy.com.
Identity theft protection services monitor your personal data, including email addresses, financial accounts, and Social Security numbers, for signs of misuse. If criminals try to open accounts or commit fraud using your information, you receive alerts quickly. Early detection allows you to act fast and limit financial and personal damage. See my tips and best picks on how to protect yourself from identity theft at
Cyberguy.com.
Software updates fix
security vulnerabilities
that attackers exploit. Enable automatic updates for Chrome and your operating system so you always have the latest protections. These updates strengthen your defenses against malicious extensions and prevent attackers from taking advantage of known weaknesses.Personal data removal services scan data broker websites that collect and sell your personal information. They help remove your data from these sites, reducing what attackers can find and use against you. Less exposed information means fewer opportunities for criminals to target you with scams, identity theft or phishing attacks.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting
Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web:
Cyberguy.com.
Even tools designed to make your life easier can become tools for cybercriminals. Malicious extensions often hide behind trusted names and convincing features, making them difficult to spot. You can significantly reduce your risk by
reviewing your browser extensions
regularly, removing anything suspicious and using protective tools like password managers and strong antivirus software.Have you checked your browser extensions recently? Let us know your thoughts by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Think your New Year's privacy reset worked? Think again
At the
start of the year
, you did everything right. You searched your name, opted out of several data broker sites and deleted listings that exposed your address, phone number and relatives.At first, it felt like a clean slate. However, here's the uncomfortable truth:
your data rarely stays gone
. In many cases, February is when it quietly returns.Privacy does not work as a one-time cleanup. Instead, it requires ongoing maintenance, because data brokers design their systems to outlast your best intentions.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE
Most people assume that once they remove their profile from a data broker site, it's gone for good.That's not how the system works. Data brokers don't "store" your information the way a normal website does. They rebuild it constantly using
automated data feeds
from:Every few weeks, their systems can re-ingest new records and match them to your identity. That means:Even if you removed your profile in January, the next data refresh can quietly re-create it in February under a slightly different variation of your name. This is why people often say: "I removed my data... and then found it again a month later." It wasn't a mistake. It's how the business model works.Manual opt-outs feel empowering at first. However, they rarely last. The real issue is scale: hundreds of data brokers collect, trade and republish personal information, and many
share data with one another
. As a result, removing your profile from one site does not stop the spread. Instead:You're not fighting one website. You're fighting a self-healing network of databases that rebuild your profile every few weeks. That's why January cleanups don't protect you throughout the year. Scammers know this. They don't just scrape old databases; they wait for newly refreshed lists that contain your:By February and March, those lists are already circulating again.
10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE
When your data comes back, it doesn't just sit on a website. It becomes fuel for:That's why scams feel personal now. Criminals often have access to:Rather than guessing, scammers search your profile and build their pitch around real details. That precision is what makes today's fraud attempts so convincing.This is where most people misunderstand privacy tools. The real threat isn't the old profile you deleted. It's the next version that gets created.Ongoing removal means:Instead of playing whack-a-mole once a year, you block the rebuild cycle itself. This is the only way to stay ahead of systems designed to outlast you.
SPYWARE CAN HIJACK YOUR PHONE IN SECONDS
If you truly want to stay off data broker sites, you need a system that:That's what a
data removal service
was built for. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting
Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web:
Cyberguy.com.
In January, people clean up their digital footprint. By contrast, February is when many data brokers refresh their databases and scammers begin working from newly updated lists. Instead of sending alerts, brokers quietly republish your details. You receive no warning when your profile reappears, and no notification when someone resells your information. As a result, most people only realize what happened after a scam email hits their inbox or a suspicious call lights up their phone. For that reason, February becomes the moment of confusion. That is when readers often say, "I thought I already handled this."At the start of the year, you did what most people avoid. You searched your name, opted out of broker sites and took control of your information. However, privacy does not work like a one-time spring cleaning. Instead, it works more like lawn care. The moment you stop maintaining it, the growth returns. Data brokers constantly refresh and rebuild profiles. They pull from public records, commercial feeds and shared databases. As a result, when your profile reappears, scammers do not treat it like old data. They treat it like fresh intelligence. That is exactly why February matters. While January feels proactive, February is when many databases quietly update and republish information. So if you want lasting control, you need consistent monitoring and ongoing removal, not a single annual cleanup. The real objective is not simply deleting an old profile. Rather, it is stopping the next version from spreading in the first place. Ultimately, privacy is not about what you remove. It is about what never comes back.Have you ever removed your personal information from a data broker site, only to find it listed again weeks later? Let us know your thoughts by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter. Copyright 2026 CyberGuy.com. All rights reserved. |
Your phone is now a crime scene in your pocket
Take a second and look at your phone.
It knows where you slept
last night. Who you texted. What you searched. Where you drove.For investigators, that information can turn into evidence fast. In fact, a major new survey found smartphones now show up in almost every
criminal investigation
.In other words, your phone can become the primary crime scene. And that should get your attention.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT'S NOT
Your phone is always with you. It logs:According to the 2026 Industry Trends Report from Cellebrite, a digital forensics company that provides tools to law enforcement and investigators, smartphones are now the most cited source of digital evidence in criminal cases at 97%. The report shows that mobile data can reveal where a person has been, who they communicate with and patterns of daily life.For that reason, many in law enforcement now describe the smartphone as "a crime scene in your pocket" to illustrate how deeply these devices factor into investigations. That phrase may sound dramatic. It is not. It reflects how investigations now unfold in the U.S. and around the world. In many criminal cases, phone data regularly helps:Police agencies have testified in court that smartphone extractions help establish sequences of events faster than traditional methods. Modern policing no longer relies only on fingerprints and surveillance footage. It often begins with digital footprints.This is happening in courtrooms right now. Case in point, in the prosecutions tied to the
Gilgo Beach serial killings
in New York, investigators leaned heavily on burner phone data, cell site records and digital communications to link the suspect to victims. Mobile records helped narrow movements, connect devices and support key search warrants.In the ongoing University of Idaho murder case, prosecutors have relied on smartphone location data, digital mapping history and phone activity logs to build a timeline. Location records helped place the suspect's phone near the crime scene during critical time windows.Fraud investigations across the U.S. tell a similar story. In large-scale romance scams and crypto investment schemes, law enforcement now uses smartphone chat logs, transaction screenshots and crypto wallet trails to follow the money. Cryptocurrency evidence appears in a growing share of cases as online scams surge.The pattern is clear. Phone data can protect the innocent by confirming where someone was. It can also reveal intent through messages, searches and digital payments.Here is what matters most for everyday Americans. Even if you are not committing a crime, your phone creates a detailed and often lasting record of your life. And in today's justice system, that record carries real weight.
BRYAN KOHBERGER'S PHONE RECORDS REVEAL PANICKED SEARCHES AFTER POLICE UNCOVERED KEY DETAIL
The report revealed another important trend. Cryptocurrency is now the fastest-growing source of evidence. Investigators cited crypto data in 22% of cases, largely due to the explosion of online scams and fraud. If you have followed ransomware attacks or crypto investment scams, this makes sense. Payments leave blockchain trails. Law enforcement increasingly follows the money.Meanwhile, 65% of detectives believe
AI tools
can speed up investigations. A typical case can require up to 35 hours of digital review. About 60% of that time goes to sorting and evaluating data. That creates pressure. And pressure can lead to mistakes.Experts warn that generative AI can deliver convincing but inaccurate results if no one double-checks them.The report also highlights challenges investigators face behind the scenes. More than half of devices arrive locked. Many investigators report difficulty accessing iOS and Android phones due to constant software updates and encryption. Most teams still review evidence manually. Only a small share of users use advanced analytical tools to connect data across devices and cases. On top of that, agency leaders say training gaps and rising data volume are slowing investigations and stretching resources. As digital evidence grows, so do the pressure points inside the system.Here is the part most people miss. Even if you never plan to break the law, your phone can:Sometimes that helps you. It can prove an alibi. It can clear your name. Other times, it raises serious privacy questions. Who has access to your data? How long is it stored? How securely is it handled?In most criminal investigations,
law enforcement
must obtain a warrant or other court-approved legal process to access the contents of your phone. But the sheer volume of data these devices hold has exploded. And that changes the stakes.We live in an era where digital evidence is the backbone of modern justice. That helps solve crimes. It protects victims. It speeds up investigations. But it also means the device in your pocket contains a map of your life.As smartphone digital evidence becomes central to 97% of cases, we need to ask hard questions about privacy, oversight and AI accuracy. Because once data exists, it can be used.
5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY
You cannot eliminate your digital trail. But you can reduce unnecessary exposure.Turn off constant
location access
for apps that do not need it. On iPhone and Android, set most apps to "While Using" instead of "Always."Apps like Signal and WhatsApp use end-to-end encryption, which means messages are scrambled so only you and the recipient can read them. Apple's iMessage also uses end-to-end encryption for conversations between Apple devices. Strong encryption protects your messages from hackers and data breaches. It is also why law enforcement often cannot read message content without access to the physical device. Keep in mind that encryption protects message content, not everything around it. Metadata such as who you contacted and when may still exist.Check whether your messages and photos back up to the cloud. Cloud data can become part of investigations.Use a long passcode, not a simple four-digit PIN. Turn on biometric security and two-factor authentication (
2FA
).Search history, voice assistant queries and in-app messages often live longer than you expect.Security updates patch vulnerabilities that criminals exploit. They also protect your data from being stolen in breaches.my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com
.Your phone is no longer just a communication tool. It is a timeline, a diary and a witness. For law enforcement, that is powerful. For you, it is a reminder that convenience comes with consequences. The next time you tap "Allow" on a permissions request, remember this. You are not just installing an app. You are adding another entry to your digital twin.If your phone tells the story of your life, who should control that story when it matters most? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter. Copyright 2026 CyberGuy.com. All rights reserved. |
Apple app password scam email warning
You open
your inbox
and see a subject line from Apple. It says an app-specific password was generated for your account. Then your stomach drops.The email claims you authorized a $2,990.02 PayPal payment. It even includes a confirmation number. It urges you to call a support number right away. There is just one problem. You never did any of this.If that sounds familiar, you are likely looking at a classic
Apple impersonation scam
.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
DON'T IGNORE APPLE'S URGENT SECURITY UPDATE
The message claims:At first glance, it looks polished. It uses Apple branding. It mentions Apple Support. It includes a confirmation code. However, once you slow down and read it carefully, the red flags jump out.
Red flags in the Apple app-specific password scam email
Before you panic or pick up the phone, take a closer look at these warning signs that expose this Apple app-specific password scam email.The "To" field shows an email address that is not the recipient's actual address. That is a huge warning sign.
Legitimate Apple security emails
are sent directly to the Apple ID email on file. If the visible recipient address is different from yours, the message was likely mass-mailed or spoofed. Scammers blast these emails to thousands of addresses at once. They do not customize the recipient line properly. That mismatch alone is enough to treat the message as fraudulent.Scammers love big numbers. A charge close to $3,000 is designed to trigger panic. When people feel fear, they act fast. That is exactly what the criminals want.The email pushes you to call a specific phone number. That number does not belong to Apple. Real Apple security emails tell you to visit your account directly. They do not pressure you to call a random support line.If you call, the scammer may:That is how the real damage begins.The email includes bold links such as
Apple Account
and
Apple Support
. They are designed to look official and trustworthy. However, scammers often hide malicious URLs behind legitimate-looking text. When you hover over the link, the actual destination may be a completely different website. That is why you should never click links inside a suspicious email. Instead, open a new browser window and type the official website address yourself.The subject mentions an app-specific password. The body suddenly talks about a PayPal transaction. That mismatch is a major warning sign. Scammers often combine multiple fears into one message to increase urgency.The email opens with "Dear Customer." Apple typically addresses you by your name. Generic greetings are common in bulk
phishing emails.
SPYWARE CAN HIGHJACK YOUR PHONE IN SECONDS
There are several additional details that help confirm this is not real.In this case, the Reply-To field shows
appleid-usen@email.apple.com
, which appears to be an official Apple domain. However, a familiar-looking domain does not automatically prove an email is legitimate. Scammers can spoof visible sender information. They can manipulate display names and certain header fields so a message appears to come from a trusted company. Most people never see the deeper technical authentication details, such as SPF, DKIM or DMARC validation. That means a legitimate-looking sender address can still appear in a fraudulent message. When evaluating a suspicious Apple app-specific password email, weigh all the red flags together, not just the reply-to address.If the email also includes:Those warning signs matter far more than a familiar-looking domain.The email says: "You authorized a USD 2,990.02 payment to apple.com using PayPal." That wording feels stiff and unnatural. Apple receipts usually reference specific products, subscriptions or invoice details. They do not vaguely reference a large PayPal payment tied to a password notification. The mismatch between a password alert and a major payment should raise suspicion immediately.The message shows a masked address with dots and an unusual domain, such as relay.quickinvoicesus.com. That is not standard Apple formatting. Apple typically references your Apple ID directly, not an unrelated invoice-style domain. That strange domain inclusion is another strong indicator that this email is fraudulent.The message urges you to call immediately to report an unauthorized transaction. High urgency is a hallmark of phishing. Legitimate companies encourage you to log in securely to your account. They do not rush you into calling a third-party phone number. When you feel rushed, pause.
Scammers rely on speed
and emotion.This is a refund scam disguised as a security alert.The goal is simple. Get you to call the fake support number. Once you are on the phone, the scammer may:In many cases, victims lose far more than the fake $2,990 charge mentioned in the email.If you receive this type of message, pause. Then take control. Instead of clicking links in the email:If you did not generate an app-specific password and you see no suspicious charges, you are safe. You can also check your PayPal account directly by typing paypal.com into your browser. Never rely on links or phone numbers inside a suspicious email.Use this simple checklist the next time you get a scary email:If several of these appear together, you are almost certainly dealing with a scam.Apple has billions of users. PayPal has hundreds of millions more. Both brands are trusted, widely used and connected to
sensitive financial information
. When criminals attach Apple's name to a message, people pay attention. When they add PayPal and a large dollar amount, the fear intensifies. That combination is powerful. It blends account security concerns with financial panic. Many people react before they pause to verify the details. That split second of fear is exactly where scammers make their money."PayPal does not tolerate fraudulent activity, and we work hard to protect our customers from evolving phishing scams," a PayPal spokesperson told CyberGuy. "We always encourage consumers to practice vigilance online and to learn how to spot the warning signs of common fraud. We recommend reviewing our best practice tips for avoiding phishing schemes on the PayPal Newsroom, and contacting Customer Support directly through the PayPal app or our Contact page for assistance if you believe you have been targeted by a scam."CyberGuy also reached out to Apple for comment.
TAX SEASON SCAMS 2026: FAKE IRS MESSAGES STEALING IDENTITIES
You can reduce your risk from an Apple app-specific password scam email with a few smart habits. These steps protect more than just your Apple account. They protect your entire digital life.Enable
two-factor authentication (2FA)
on your Apple ID, PayPal and email accounts. Even if someone guesses your password, they still cannot log in without the second verification step. That extra layer blocks most account takeover attempts.If an email tells you to call support or click a link, stop. Instead, open a new browser window and type the official website address yourself. Go directly to appleid.apple.com or paypal.com. Also, make sure you have strong antivirus software installed on your devices. Strong antivirus tools can detect malicious links, block phishing sites and warn you before you land on a fake login page. That protection matters because one click on the wrong link can expose login credentials or install hidden malware. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at
Cyberguy.com
Scammers push urgency. They use large dollar amounts and phrases like unauthorized transaction to rush you. Pause when you feel panic. Review the details carefully. Legitimate companies do not pressure you into instant action.Install software updates on your phone and computer as soon as they become available. Security patches fix vulnerabilities that attackers exploit. Outdated software makes phishing and malware attacks easier to pull off.Do not reuse passwords
across accounts
. If one site gets breached, reused passwords put everything else at risk. A password manager generates long, complex passwords and stores them securely. That way, even if scammers trick you into entering one password somewhere, it will not unlock your other accounts. Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2026 at
Cyberguy.com.
6) Reduce your exposed personal information
Scammers often find your email address and personal details through data broker sites. Using a reputable data removal service can reduce how much of your personal information is publicly available online. When less of your data floats around the internet, criminals have fewer tools to target you with convincing phishing emails. Less exposure means fewer personalized scams landing in your inbox. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting
Cyberguy.com
.Forward suspicious Apple impersonation emails to
reportphishing@apple.com
. You can also mark the message as phishing in your email provider. Reporting scams helps improve filters and protect other people from falling victim.Even if you did not click anything or call the number, review your bank, PayPal and Apple accounts for unusual activity over the next few days. Early detection limits damage. The faster you spot fraud, the easier it is to reverse.If you entered personal information or downloaded anything suspicious, consider placing a free credit freeze with Equifax, Experian and TransUnion. A credit freeze prevents criminals from opening new accounts in your name. To learn more about how to do this, go to
Cyberguy.com
and search "How to freeze your credit." If you received an Apple app-specific password email with a $2,990 charge you did not authorize, trust your instincts. It is almost certainly a scam. Do not call the number. Do not click the links. Go directly to your official account pages and check for yourself. A few calm minutes can save you thousands of dollars and hours of stress.When phishing scams use trusted brands like Apple so easily, is the tech industry truly staying ahead of cybercriminals? Let us know your thoughts by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
China vs SpaceX in race for space AI data centers
If
your phone
heats up while running AI, imagine what happens inside a massive data center. Now imagine moving that data center into orbit.That is exactly what China and
Elon Musk
are planning. It is a serious race to build space-based AI data centers powered by sunlight in space.At stake? The future of artificial intelligence, energy dominance and who controls the next layer of digital infrastructure.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
CHAD WOLF: SPACE ISN'T JUST THE FINAL FRONTIER, IT'S THE 'ULTIMATE HIGH GROUND'
China's main space contractor, China
Aerospace Science and Technology
Corporation, outlined a five-year plan to build what it calls "gigawatt-class space digital-intelligence infrastructure," according to reporting cited by CCTV. While that phrase may sound bureaucratic. It is not.Gigawatt-class means massive energy output. Think industrial scale. These proposed orbital hubs would integrate cloud, edge and device-level computing. In simple terms, data collected on Earth could be processed in space instead of inside giant warehouses in Arizona or Inner Mongolia.The vision goes even further. A December policy document describes an industrial-scale "Space Cloud" by 2030. The goal is deep integration of computing power, storage and transmission bandwidth, all powered by solar energy in orbit. China also signaled that space-based solar power tied to AI computing will be a core pillar of its upcoming 15th Five-Year Plan. It's all part of its national strategy.Meanwhile, Elon Musk is making a similar bet. At the World Economic Forum in Davos, Musk said SpaceX plans to launch solar-powered AI data center satellites within two to three years. He argued that space is the "lowest-cost place to put AI" and predicted that it will be true within a few years. Why? Solar power in orbit can generate far more energy than panels on the ground. Musk said orbital solar generation can produce roughly five times more power because there are no clouds and no night cycles in the same way as on Earth. SpaceX reportedly expects to use funds from a planned $25 billion IPO to help develop these orbital AI systems.This makes sense when you consider that AI is devouring electricity. Training and running large models requires enormous computing clusters. Power grids are straining in places like Texas and Northern Virginia. So the thinking is simple. If Earth runs short on clean energy for AI, move the servers closer to the sun.There is only one problem. Getting hardware into space is expensive. SpaceX solved part of that with its Falcon 9 reusable rocket. Reusability dramatically lowers launch costs. It also enabled SpaceX's Starlink satellite network to dominate low Earth orbit.China, on the other hand, has not yet completed a fully successful reusable rocket program capable of repeated, reliable flights. That is a major bottleneck. Without reusability, the cost of launching and maintaining space-based AI infrastructure remains high.Still,
China achieved
a record 93 space launches last year, according to official announcements. Its commercial space startups are maturing quickly. And Beijing has made it clear it wants to become a "world-leading space power" by 2045. In other words, this is a long game.
ARTIFICIAL INTELLIGENCE HELPS FUEL NEW ENERGY SOURCES
China's five-year plan also includes suborbital space tourism and the gradual development of orbital tourism. That signals a broader push to commercialize space in a way similar to civil aviation.At the same time, both the U.S. and China see strategic and
military advantages
in dominating orbit. China recently inaugurated its first School of Interstellar Navigation within the Chinese Academy of Sciences. The goal is to move from near-Earth orbit to deep space exploration. State media described the next 10 to 20 years as a window for leapfrog development in interstellar navigation.Meanwhile, the U.S. is racing to return astronauts to the moon for the first time since the Apollo era. The competition is heating up on multiple fronts. AI infrastructure in space is just one piece of a much larger chessboard.You might be thinking, "Great. Billionaires and governments are fighting over satellites. Why should I care?" Here is why. AI is becoming embedded in everything. Search results. Customer service. Medical imaging. Financial systems. Smart homes. All of that runs on computing power. And that computing power runs on energy. If the cheapest and most abundant
energy for AI
ends up being in orbit, the balance of tech power could shift dramatically. Countries that control space-based AI infrastructure could gain economic leverage, military advantages and technological dominance. This is the next layer of the cloud. Not in a warehouse. Not in a desert. But circling above your head.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
CHINA QUIETLY BUILDS WORLDWIDE SPACE NETWORK, ALARMING US OVER FUTURE MILITARY POWER
For decades, space was about flags and footprints. Today, the focus is shifting toward servers and solar arrays as governments and private companies rethink where the world's most
powerful computers
should operate. China is pursuing a "Space Cloud," while Elon Musk argues that AI belongs in orbit. Both are racing toward a future where advanced computing systems are powered by uninterrupted sunlight above Earth. That shift sounds bold and carries real risk. However, if AI continues to accelerate and energy demand keeps climbing, moving computing infrastructure into space may start to look less radical and more inevitable.If the infrastructure powering AI moves into orbit, who should control it? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Spyware can hijack your phone in seconds
You already know malware is out there. You hear about phishing emails,
fake apps
and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on
both iPhone
and Android devices.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
Many
types of malware
focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.Here is where things get even more disturbing.ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker's wallet.Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.There is a reason
Apple strongly discourages
installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings.
On Android,
review installed apps and device administrator permissions.If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (
2FA
) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Check out the best expert-reviewed password managers of 2026 at
Cyberguy.com
Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at
Cyberguy.com.
On iPhone, check
Settings
>
General
>
VPN & Device Management
for unknown configuration profiles. Delete anything you do not recognize. On Android, review
installed apps
and remove anything unfamiliar. Also, check
device administrator settings
and revoke access from unknown apps.If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.A full factory reset on your
iPhone
or
Android
is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at
Cyberguy.com.
Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.Check which
apps have access to your camera, microphone and location
. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.Turn on two-factor authentication (
2FA
) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting
Cyberguy.com
. Get a free scan to find out if your personal information is already out on the web:
Cyberguy.com
.
Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.
YOUR PHONE SHARES DATA AT NIGHT: HERE'S HOW TO STOP IT
ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day.
Your phone
holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Trump's science and tech man lays out White House's global AI strategy
U.S. policy is often reported through announcements, personalities and regulatory skirmishes. Far less attention is paid to the economic mechanisms that actually move structures and determine outcomes.To understand how the White House is organizing a multipronged strategy for AI adoption and export, and how its pieces are meant to work together in practice, I had an exclusive sit down with Michael Kratsios, assistant to the president and director of the White House Office of Science and Technology Policy.
Tanvi Ratna:
The fundamental issue you speak about at the summit is the widening AI adoption gap between the developed and developing world. What makes that a concern for the White House right now?
Michael Kratsios:
The divergence in AI adoption between developed and
developing countries
is growing every day. We see the world in two broad categories, and different tools are needed for each.
WHAT REPLACED USAID? INSIDE THE TRUMP ADMINISTRATION'S GLOBAL HEALTH OVERHAUL
Developing countries are at risk of falling behind at a fundamental inflection point. That is why we urge them to prioritize AI adoption in sectors that deliver concrete benefits: healthcare, education, energy infrastructure, agriculture, and citizen-facing government services.For too long, countries seeking development support faced a false choice. We believe the
American AI Exports Program
offers a different path: trusted best-in-class technology, financing to overcome adoption barriers, and deployment support, so governments can learn how and where to use these tools.America remains the undisputed leader in AI, from GPUs to data centers to frontier models and applications. That leadership brings with it a responsibility to share the foundations of a new era of innovation. We stand ready to work with partners around the world so creativity, freedom and prosperity shape today's technological revolution.
STATE-LEVEL AI RULES SURVIVE - FOR NOW - AS SENATE SINKS MORATORIUM DESPITE WHITE HOUSE PRESSURE
Tanvi Ratna:
A lot of governments say they want AI leadership. Your delegation came in talking about real AI sovereignty, rejecting global governance, and launching an export program with multiple prongs. What is fundamentally different about this approach, and how should countries understand the system you're building?
Michael Kratsios:
The hope of the United States is that the pursuit of real AI sovereignty, the adoption and deployment of sovereign infrastructure, sovereign data, sovereign models and sovereign policies within national borders and under national control, will become an occasion for bilateral diplomacy, international development, and global economic dynamism. The American AI Exports Program exists to make that happen.Real AI sovereignty means owning and using best-in-class technology for the benefit of your people, and charting your national destiny in the midst of global transformations. We urge nations to focus on strategic autonomy alongside rapid AI adoption rather than aiming for full self-sufficiency. AI adoption cannot lead to a brighter future if it is subject to bureaucracies and centralized control.
PALANTIR'S SHYAM SANKAR: US MUST USE AI AS 'SLINGSHOT' AGAINST CHINA OR FACE ECONOMIC DEFEAT
We deeply believe that the best pathway for the developing world to fully realize the untold benefits of AI is through the adoption of the American AI stack. The American AI stack has the best chips, the best models and the best applications in the world, and that is what countries ultimately need to deploy AI effectively.
Tanvi Ratna:
When you say the American AI stack, are you talking about selling products, or shaping the foundation on which countries build while keeping sensitive data under national control?
Michael Kratsios:
Working with the American AI stack allows nations to build on the best technologies in the world while keeping sensitive data within their borders. Independent partners are critical to unlocking the prosperity AI adoption can deliver. That is why the
president launched the American AI Exports
Program.
TRUMP ADMINISTRATION'S TOP 'SCIENTIFIC PRIORITY IS AI,' ENERGY SECRETARY SAYS
American companies can build large, independent AI infrastructure with secure and robust supply chains that minimize backdoor risk. They build it, and it belongs to the country deploying it.
Tanvi Ratna:
If this is an adoption strategy, then cost and complexity become the bottlenecks. Your public remarks emphasize financing and deployment sophistication as the two biggest hurdles for developing countries. How are you actually removing those barriers?
Michael Kratsios:
Developing countries face two major obstacles to AI adoption. One is financing. The AI stack is expensive. Through the energy and material demands of its infrastructure, it brings the digital transformation of our world back into physical reality. Data centers, semiconductors, power production all require real labor and real resources.
CHINA RACES AHEAD ON AI -TRUMP WARNS AMERICA CAN'T REGULATE ITSELF INTO DEFEAT
The second barrier is a deficit in the technical sophistication needed to deploy AI tools effectively. To address this, we announced a U.S. government-wide suite of support initiatives to facilitate global adoption of trusted AI systems, create a competitive and interoperable AI ecosystem, and advance the American AI Exports Program in both developed and developing partner nations.
Tanvi Ratna:
Spell out that suite. What are the prongs, capital, integration, standards, execution, and which agencies are being activated?
Michael Kratsios:
We unveiled a new set of initiatives across the federal government supporting the American AI Exports Program, which was
launched by executive order
last July.
TRUMP CALLS FOR FEDERAL AI STANDARDS, END TO STATE 'PATCHWORK' REGULATIONS 'THREATENING' ECONOMIC GROWTH
The first new initiative within it is the National Champions Initiative. It is designed to include the leading technology companies of partner countries directly into the American AI stack. We want the best technologies from all our partners and allies to be part of that ecosystem wherever the American AI stack goes.The second is a full suite of
financing and funding opportunities
. We are mobilizing support through the U.S. International Development Finance Corporation, the Export Import Bank, the Millennium Challenge Corporation, the U.S. Trade and Development Agency, and a new World Bank fund, with additional programs launched by Treasury and other parts of the U.S. government. The message is simple: this is serious. Every possible financing avenue is being brought to bear.The third is the creation of the U.S. Tech Corps. It is a reimagining of how the Peace Corps can make an impact in the modern era. We are seeking Americans with technical backgrounds who can help deploy American technology abroad, because there is no better tool to drive economic development, health improvements, and quality of life gains than AI.
WAR DEPARTMENT REFOCUSES ON AI, HYPERSONICS AND DIRECTED ENERGY IN MAJOR STRATEGY OVERHAUL
And finally, we believe one of the fastest ways to drive global adoption is through standards, particularly as the next wave of innovation centers on AI agents. How those agents communicate and coordinate their actions will benefit from unified standards, which is why NIST has launched a dedicated initiative.
Tanvi Ratna:
The National Champions Initiative is easy to misunderstand. Critics hear American stack and assume dependency. Your framing suggests the opposite, integrating partner champions so countries do not have to choose between importing the stack and building domestic capability. Is that the point?
Michael Kratsios:
Exactly. To integrate partner nation companies with the American AI stack and ensure that no country has to choose between completing the stack and developing domestic AI, we established the National Champions Initiative. Partners need the opportunity to build native technology industries, and facilitating that is a core part of the exports program.
TRUMP ADMIN WILL RECRUIT 1,000 TECHNOLOGISTS FOR ELITE 'TECH FORCE' TO MODERNIZE GOVERNMENT
Tanvi Ratna:
You have also criticized previous U.S. approaches to AI diffusion for restricting partners. What did that get wrong strategically?
Michael Kratsios:
The previous approach treated partners as second-tier actors with significant restrictions on access to advanced technology. That was a lose-lose AI diplomacy strategy. It cut off partners from the best technology and limited American companies from competing globally.Under President Trump, the United States is rethinking how it advances international development and how technology can deliver lasting impact. We believe both developed and developing countries can build sovereign AI capability if given the chance.
FOX NEWS AI NEWSLETTER: TRUMP ACTIVATES 'TECH FORCE'
Tanvi Ratna:
Let's talk about the Tech Corps, because it would be easy to dismiss it as a feel-good addition. In your model, it sounds like an execution layer. What would these teams actually do on the ground?
Michael Kratsios:
These will be like Peace Corps volunteers, except the focus is on technology. We are looking for people with technical backgrounds who want to
help implement AI solutions
.If a country wants to improve agriculture through precision farming, apply AI to healthcare systems to improve hospital efficiency, or modernize digital public services, American technologists through the Tech Corps and the Peace Corps will be able to support those efforts.
WE'RE ON OPPOSITE SIDES OF THE AISLE. BUT WE KNOW AMERICA MUST WIN THE AI RACE, OR ELSE
A lot of young people today care deeply about real-world impact. What is special about this moment is that the United States has incredible technology, the best chips, models, and applications, and we are being more deliberate about sharing it.
Tanvi Ratna:
You put unusual emphasis on AI agents and interoperability. Why does the White House see standards as a strategic lever now?
Michael Kratsios:
The next wave of AI innovation over the next year or two will center on agents. How those agents communicate and orchestrate their actions would benefit greatly from unified standards. NIST has launched an initiative to develop standards for agents, so these systems can interoperate securely and effectively.
IN 2026, ENERGY WAR'S NEW FRONT IS AI, AND US MUST WIN THAT BATTLE, API CHIEF SAYS
Tanvi Ratna:
You also linked this export architecture to supply chains, from chips to data centers to power and minerals. Where does Pax Silica fit? Is it the hard backbone complement to the adoption layer?
Michael Kratsios:
Pax Silica is a broader alliance focused on supply chain challenges that the United States and many partner nations have faced. It is a small, select group of countries working together to alleviate these challenges. India is a tremendous addition.AI adoption depends on secure physical inputs. The AI stack is tangible: data centers, semiconductors, power generation. Pax Silica helps address those vulnerabilities while the exports program accelerates adoption. They are complementary.
TRUMP NATIONAL SECURITY BLUEPRINT DECLARES 'ERA OF MASS MIGRATION IS OVER,' TARGETS CHINA'S RISE
Tanvi Ratna:
Since India hosted the summit and joined Pax Silica, what role do you see for
India within this strategy
?
Michael Kratsios:
India is a technology powerhouse. It graduates an incredible number of engineers, has deep domestic talent, and is building strong products and applications. We look forward to working with them.India has long been a strong partner in how the United States shares technology abroad. Our major hyperscalers have data centers and research operations here and employ large numbers of Indian engineers. We believe many Indian companies can ultimately become part of the American AI stack.
Tanvi Ratna:
When critics frame this as being about China, you resist that characterization. How does the administration view competition?
Michael Kratsios:
We do not see this as being about any one competitor. This is about the fact that the United States has the best AI technology in the world, and many countries want it in their ecosystems. We are excited to share it and build mutually beneficial partnerships globally. |
Atlanta tests driverless pod transit loop
If you have ever sat in traffic staring at brake lights and questioning your life choices, this story will hit home.
South Metro Atlanta
is becoming the first place in the world to publicly test Glydways' Automated Transit Network in live passenger service. The idea sounds simple. Put small electric vehicles on their own narrow guideways. Keep them out of mixed traffic. Use AI to coordinate everything. The promise? Rail level capacity at bus fare prices without decade-long construction headaches.That is a bold claim. So let's unpack it.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
WAYMO'S CHEAPER ROBOTAXI TECH COULD HELP EXPAND RIDES FAST
The pilot is a 0.5-mile dedicated guideway connecting the ATL SkyTrain at the Georgia International Convention Center to the Gateway Center Arena. It will launch as a free public test service in December 2026.Instead of buses weaving through traffic or trains stopping at every platform, Glydways operates small electric passenger pods on a private lane. Riders request a trip through
an app,
and within minutes, a pod arrives. From there, passengers travel directly from point A to point B with no intermediate stops. That means no fighting SUVs, no getting stuck behind a delivery truck and no red lights.Because the vehicles run on their own guideway, they maintain consistent speeds in tight formations. As a result, the company says the system can move up to 10,000 people per hour on a guideway just over six feet wide. If those numbers hold up in real-world testing, the system could carry as many people per hour as a light rail line.This location was not random. A 2019 feasibility study from the ATL Airport Community Improvement Districts identified the airport area as a 24-hour mobility district with serious first- and last-mile gaps. In plain terms, people can get close to where they need to go. They just cannot easily get that last leg of their trip. That affects workers, convention visitors and arena guests. It also affects underserved communities that struggle to connect to jobs and transit.So the pilot serves as a controlled environment. Demand is predictable. Distances are short. Plus, stakeholders such as MARTA, Fulton County and Clayton County are already involved and on board. If it works here, expansion could follow.You may be thinking, "We already have autonomous vehicles." True. Companies like
Waymo
run driverless cars on public roads. But Glydways argues that putting autonomous vehicles into existing traffic does not solve congestion. In some cases, it makes it worse. The key difference here is separation.These pods do not mix with regular traffic. They run on purpose-built guideways with controlled access. That allows tighter spacing, predictable speeds and lower maintenance. In other words, it is more like a lightweight rail system without the heavy rail infrastructure.Technology is not the hard part. Autonomous vehicles on dedicated lanes are fairly straightforward engineering. The real question is cost.Traditional rail projects can run into the hundreds of millions or even billions of dollars. They often take years to build. Glydways claims its infrastructure deploys faster and cheaper, though specific Atlanta construction costs have not been disclosed.Operational costs also stay lower because there are no drivers, vehicles are electric, and the guideway environment reduces wear and tear. The company says unsubsidized bus fare pricing is core to its model. While that sounds great on paper, the Atlanta pilot will show whether the math works in practice.
THE ROBOTAXI PRICE WAR HAS STARTED. HERE'S EVERYTHING YOU NEED TO KNOW
Construction began in early 2026. Guideway installation, vehicle testing and system commissioning are underway. Passenger service is scheduled for December 2026.By 2027, the goal is a fully operational South Metro pilot delivering real-world data and rider feedback. A feasibility study led by MARTA will then evaluate whether expansion across the broader Atlanta region makes sense.If successful, future routes could connect airports, suburban corridors and high-traffic districts where rail is too expensive.Traffic congestion is not just an Atlanta problem. It is a global one. Glydways has signed agreements in Dubai and Abu Dhabi and has held discussions
in Tokyo,
Florida, California and New York. South Metro Atlanta is the global proving ground.If this pilot demonstrates reliable performance, strong rider adoption and sustainable economics, other cities will take notice. If it fails, critics will point to it as another ambitious transit experiment that looked better in a PowerPoint deck than on the street.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com.
TRANSIT FUNDING HITS RECORD HIGHS AS RIDERSHIP LANGUISHES, NEW REPORT QUESTIONS RETURN ON BILLIONS
Atlanta drivers know congestion is not going away on its own. Adding lanes rarely solves the problem. Traditional rail is expensive and slow to deploy. So cities are searching for net new capacity. Something that expands mobility without competing with what already exists. This pilot represents a serious attempt to rethink public transit from the ground up. It blends private lanes, electric vehicles and
AI coordination
into something that sits between bus and rail. Now the spotlight is on South Metro Atlanta. Will this be the beginning of a scalable new transit model or another well-intentioned experiment that struggles once real-world economics kick in?If a driverless pod could pick you up on demand and bypass traffic entirely, would you trust it with your daily commute? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
Conduent data breach hits millions across multiple states
A ransomware attack on government technology giant Conduent is turning out to be far bigger than first reported. What initially sounded like a limited incident now appears to affect tens of millions of people across multiple states. In Texas alone, at least 15.4 million residents may have had their data exposed. Oregon has reported another 10.5 million affected individuals. And notifications have also gone out to hundreds of thousands of people in states like Delaware, Massachusetts and New Hampshire. If you rely on state healthcare programs or government services, your data could be part of this breach.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
The cyberattack happened in January 2025 and was later claimed by the Safeway ransomware gang, which says it stole more than 8 terabytes of data. Conduent first disclosed the incident publicly in April, months after hackers disrupted its systems and caused outages to government services across the country.The company initially said about 4 million people
in Texas
were affected. That number has since jumped to 15.4 million, nearly half the state's population. Oregon's attorney general reported another 10.5 million impacted residents. Combined with other states issuing notifications, the total could reach into the dozens of millions.The stolen data includes names, Social Security numbers,
medical information
, and health insurance details. That combination is particularly dangerous because it can be used for identity theft, medical fraud, and highly targeted scams.Conduent processes data for large corporations, state agencies, and government healthcare programs. The company says its systems support services for more than 100 million people nationwide. However, it has not confirmed whether the breach affects that many individuals.In a filing with the SEC, Conduent acknowledged that the stolen data included a "significant number" of individuals' personal information tied to its clients' end users, meaning people who rely on government agencies and corporate services powered by the company.
RANSOMWARE ATTACK EXPOSES SOCIAL SECURITY NUMBERS AT MAJOR GAS STATION CHAIN
Unlike a retail breach, where credit card data might be exposed, this incident involves deeply sensitive personal and medical information. Social Security numbers and health records are long-term identifiers. You cannot simply cancel or replace them like a debit card.Healthcare-related data is especially valuable on the black market because it can be used to file fraudulent insurance claims, obtain prescription drugs, or open financial accounts. And because Conduent works behind the scenes for state agencies, many people may not even realize their data was stored by the company in the first place.Conduent said it is still in the process of notifying affected individuals and expects to complete those notifications by early 2026. The company did not provide a clearer timeline or confirm how many total people will ultimately be alerted. Many people could be waiting months before knowing whether their information was compromised.We reached out to Conduent for comment, and a company spokesperson provided CyberGuy with the following statement:"As previously disclosed in its April 2025 Form 8-K filing with the SEC, in January 2025, Conduent discovered that it was the victim of a
cybersecurity incident
. With respect to that incident, Conduent has agreed to send notification letters, on behalf of its clients, to individuals whose personal information may have been affected by this incident. Working in conjunction with our clients, we expect to send out all of the consumer notifications by April 15. In addition, a dedicated call center has been set up to address consumer inquiries. At this time, Conduent has no evidence of any attempted or actual misuse of any information potentially affected by this incident."Upon discovery of the incident, Conduent acted quickly to secure its networks, restore its systems and operations, notify law enforcement, and conduct an investigation with the assistance of third-party forensics experts. In addition, given the nature and complexity of the data involved, Conduent worked diligently with a dedicated review team, including internal and external experts, and conducted a detailed analysis of the affected files to identify the personal information contained therein, which was a time-intensive process."Both Conduent and our third-party experts monitor the dark web regularly and have no evidence of any personal information being released on the dark web."Rest assured, we have followed all of the right protocols and have assured our clients that we have secured the necessary data. Conduent has been working with law enforcement and takes this matter seriously. We regret any inconvenience this incident may have caused."To check if your information was sold on the dark web, you can go to
haveibeenpwned.com
and enter your email address into the search bar. The website will search to see what data of yours is out there and display if there were data breaches associated with your email address on various sites.If you find your data is out on the web, remove it with a
data removal service
. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting
Cyberguy.com
When a breach involves Social Security numbers and medical data, you need to think long term. Here's what you should do.A credit freeze prevents lenders from opening new accounts in your name without your approval. It's free and can be placed with Equifax, Experian, and TransUnion. This is one of the strongest protections you can put in place after an SSN exposure. You can temporarily lift it if you need to apply for credit.You're entitled to free credit reports from all three major bureaus. Look for unfamiliar accounts, credit inquiries, or address changes. Early detection makes it much easier to shut down fraud before it snowballs.If attackers obtained personal details like your name and email, they may try credential-stuffing attacks against your other accounts. A password manager creates strong, unique passwords for every account, so one breach does not unlock everything else. Many password managers also include breach alerts if your credentials show up in known leaks.Also, see if your email has been exposed in past breaches. Our #1 password manager (see
Cyberguy.com
) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2026 at
Cyberguy.com
Your email account is the gateway to nearly everything. Protect it with a strong password and two-factor authentication. Review recovery settings and recent login activity to make sure nothing has been altered.Two-factor authentication (2FA) adds another barrier, even if someone has your password. Use an authenticator app rather than SMS whenever possible for stronger protection.Strong antivirus software can help block malicious links, phishing attempts, and ransomware. After a major breach, scammers often target victims with follow-up attacks pretending to offer help or compensation. Security software adds another layer of protection.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at
C
yberguy.com
Identity theft services monitor your Social Security number, financial accounts, and even dark web marketplaces. If your information is misused, they can alert you quickly and help you recover faster. When SSNs are exposed, ongoing monitoring becomes especially important.See my tips and best picks on how to protect yourself from identity theft at
Cyberguy.com
Scammers often combine breach data with personal details found on data broker sites. A data removal service works to remove your phone number, address, and other exposed information from hundreds of databases. While no service can erase everything, reducing what's publicly available makes targeted fraud much harder.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting
Cyberguy.com
Get a free scan to find out if your personal information is already out on the web:
Cyberguy.com
The Conduent breach highlights a growing risk that many people never see coming. When large government contractors are hit, millions can be affected at once. And because these companies operate behind the scenes, you may not even realize they hold your data. If your information was exposed, taking action now can prevent long-term damage. The sooner you lock things down, the harder it becomes for criminals to profit from your data.Do you think
companies that process government data
are doing enough to protect it? Let us know your thoughts by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Copyright 2026 CyberGuy.com. All rights reserved. |
Waymo's cheaper robotaxi tech could help expand rides fast
If you live in cities like San Francisco, Phoenix, Los Angeles, Austin or Atlanta, you may have already seen or even taken a ride in a driverless Waymo operating without a human behind the wheel. In
newer markets like Miami
, service is rolling out, while other cities, including Dallas, Houston, San Antonio and Orlando, are part of Waymo's expansion plans.For everyone else, not so much. At least not yet. For most of us, that still feels like something happening somewhere else, not something that pulls up when you request a ride.However, that could start to change very soon. Waymo just unveiled its sixth-generation Waymo Driver hardware, and the headline is simple: it costs less and fits into more vehicles. That combination could help driverless rides reach a lot more cities, faster than you and I might expect.
THE ROBOTAXI PRICE WAR HAS STARTED. HERE'S EVERYTHING YOU NEED TO KNOW.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Until recently, if you spotted a Waymo on the road, it was usually a Jaguar I-Pace. Nice car. Not exactly built for a massive robotaxi rollout. The sixth-generation system changes that. The first vehicle to carry the new hardware is the Zeekr-built
Ojai electric minivan
. Zeekr is owned by Geely. Waymo employees in Los Angeles and San Francisco will begin fully autonomous rides in it soon, with public access expected to follow. In these new deployments, Waymo says the vehicles will operate without safety drivers behind the wheel. After that, the hardware will also power versions of the Hyundai Ioniq 5.Here is where this really matters. When Waymo can install the same system across multiple vehicle types and produce it at a lower cost, expansion becomes much easier. The company says it plans to move into 20 additional cities this year and is ramping up its Metro Phoenix facility to build tens of thousands of Driver kits annually.Waymo says it has shifted more processing power into its own custom silicon chips, allowing it to use fewer cameras while improving performance and reducing overall system cost. More vehicles and lower costs mean one thing: a better chance that driverless rides show up in your city sooner rather than later.If you have never been in a robotaxi, this is the part you are probably wondering about. The sixth-generation Waymo Driver uses
16 high-resolution 17 megapixel cameras
, short-range lidar, radar and external audio receivers. Waymo says the updated cameras offer improved dynamic range compared to the previous 29-camera setup. That helps the vehicle perform better at night and in bright glare.Short-range lidar delivers centimeter-level accuracy to detect pedestrians, cyclists, and other road users. Radar adds another layer of awareness. Waymo says its upgraded imaging radar can track distance, speed and object size even in rain or snow, giving the system more time to react. External audio receivers can detect sirens or trains by sound.Unlike Tesla, which has emphasized camera-based systems, Waymo relies on
multiple overlapping technologies
. If one sensor struggles, another can support it. There is also a cleaning system for key sensors. Snow, dirt, or road spray should not easily block visibility.Waymo says this version is designed to operate in more extreme weather, including heavy winter conditions, which could open the door to colder U.S. cities that were previously harder to support.Right now, Waymo has about 1,500 vehicles on the road. That sounds like a lot until you compare it to the millions of cars in the U.S. The company wants to grow that number to around 3,500 this year and eventually into the tens of thousands. Still, service is limited to certain parts of certain cities. If you do not live in one of those areas, you are simply not going to see one.That is why this new hardware matters. When the system costs less and fits into more vehicles, Waymo can put more cars on the road in more places. This is not about adding flashy features or cool upgrades. It is about getting from a small footprint to something that feels normal in everyday life.Whenever driverless cars expand, safety questions come right with them. Waymo says its system is built with
multiple layers of redundancy
. The sixth-generation Driver combines cameras, lidar, radar and audio detection so the vehicle is not relying on a single sensor. That layered setup is designed to reduce risk if one system has trouble. The company says this latest system builds on nearly 200 million fully autonomous miles driven across more than 10 major cities, including dense urban cores and freeways.Even so, incidents have happened. Earlier this year, a Waymo vehicle was
involved in
an accident that injured a child
, which raised fresh concerns about how autonomous vehicles respond in complex real-world situations. Regulators continue to monitor autonomous vehicle performance closely, especially in states like California, where reporting requirements are strict.
WAYMO UNDER FEDERAL INVESTIGATION AFTER CHILD STRUCK
Waymo has also released data suggesting its vehicles experience fewer injury-causing crashes per mile compared to human drivers in similar areas. Supporters argue that reducing human error could improve road safety over time. Critics say expanding too quickly could introduce new risks.Both things can be true. The technology is advancing, but public trust will depend on transparency, accountability and long-term safety performance.If Waymo expands into your city, you may soon open a rideshare app and see a new option. No driver. No conversation. Just a vehicle that navigates using software and sensors.More vehicles could mean shorter wait times in busy areas. Increased competition may also affect pricing in the rideshare market. At the same time, comfort levels vary. Many riders may hesitate before stepping into a car with an empty front seat. This shift is about more than technology. It changes how people commute, travel and move around urban areas.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com
Waymo's sixth-generation Driver is really about one thing: getting more driverless cars on the road, in more cities, at a lower cost. When the hardware becomes cheaper and easier to install in different vehicles, expansion gets easier. That does not automatically mean everyone will be comfortable hopping in. For many people, sitting in a car with no driver might still feel a bit scary. The technology is moving forward whether we are ready or not. The bigger question is simple: will we feel confident enough to get in?If you had to choose today, would you book the driverless ride or wait for a human behind the wheel? Let us know by writing to us at
Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter Copyright 2026 CyberGuy.com. All rights reserved. |
Why a credit freeze isn't the end of identity theft
Most U.S. data breach disclosures explain what information was leaked and any protective steps available to consumers.At the federal level, the Federal Trade Commission advises that after a breach involving sensitive personal information, consumers may consider placing a
credit freeze
to help prevent new credit accounts from being opened in their name.Many people place that credit freeze and assume they're protected. But a credit freeze is not a comprehensive block against identity theft. It stops most new credit applications, but it doesn't prevent the misuse of your Social Security number or account takeovers.
7 SIMPLE WAYS TO PROTECT YOUR CREDIT CARDS WHILE TRAVELING
Sign up for my FREE CyberGuy Report:
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my
Ultimate Scam Survival Guide - free
when you join my
CYBERGUY.COM
newsletter.A credit freeze, also called a security freeze, limits access to your credit report at Equifax, Experian, and TransUnion. Under federal law, placing a freeze is free. When a freeze is in place, most lenders can't access your credit file to evaluate applications for new credit cards or lines of credit. If a creditor can't see your credit report, the application will usually be denied.You can manage your credit freeze with each bureau individually. With Experian, for example, you sign in to your free online account at Experian's credit freeze page and then place, lift, or schedule a thaw; you can also call Experian's toll-free number (888-397-3742). If you plan to apply for credit, you must lift the freeze beforehand.A credit freeze blocks most new accounts that require a credit check. It does not extend beyond your credit file.Some identity protection services offer a credit lock feature that allows you to restrict access to your credit file through a mobile app. Like a freeze, it can limit new credit checks. The main difference is convenience, as you can typically turn it on or off quickly without logging into a bureau's website or calling by phone.A credit freeze blocks new credit accounts, but it does not stop many common forms of identity theft that do not require a credit check.
HOW TO SAFELY VIEW YOUR BANK AND RETIREMENT ACCOUNTS ONLINE
When identity theft happens outside the credit approval process, there is no automatic reversal. Each category of fraud is handled by a different agency or company.There is no single agency coordinating these corrections. You're responsible for identifying the fraud, filing the appropriate reports, and tracking responses across agencies.A credit freeze addresses risks tied to new credit applications. Identity theft often goes beyond that. Comprehensive identity protection typically includes
credit monitoring
across all three major bureaus, alerts for new inquiries or accounts, and monitoring for exposed personal information such as Social Security numbers, driver's license numbers, passport details, email addresses, and passwords.Some services also monitor public records, address changes, identity verification activity, and even suspicious financial transactions when accounts are linked. Early alerts can help you spot fraud before it spreads.If identity theft does occur, recovery can be complicated. Some identity protection plans provide access to fraud resolution specialists who help contact creditors, place fraud alerts, dispute unauthorized accounts, and prepare required documentation. Many also include identity theft insurance to help cover eligible recovery expenses, such as lost wages or legal fees.No service can prevent every form of identity theft. But layered monitoring, fast alerts, and guided recovery support can make the damage easier to contain and resolve.See my tips and best picks on Best Identity Theft Protection at
Cyberguy.com.
A credit freeze is a smart move after a data breach, but it is only one layer of protection. Many forms of identity theft do not involve a credit check, which means they can happen quietly and take time to fix. Real protection comes from understanding the gaps, monitoring your accounts, and acting quickly if something looks wrong. The more proactive you are, the easier recovery becomes.Have you placed a credit freeze, and did you know it does not protect against every type of identity theft? Let us know your thoughts by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report:
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
AI dating cafes are now a real thing
Dating has changed a lot over the past decade. First, we moved from meeting people in person to swiping on apps. Now, some people are skipping human partners altogether and dating AI. That shift became very real at a recent pop-up event in Hell's Kitchen in New York, where EvaAI, an
AI companion app
, hosted what it called a dating cafe. Guests arrived solo and brought their virtual partners with them.Instead of someone sitting across the table, many had a phone or tablet propped up between the candles. They slipped on headphones, smiled at their screens and carried on full conversations with digital companions. It looked like a normal date night. It just happened to include artificial intelligence.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.
AI COMPANIONS ARE RESHAPING TEEN EMOTIONAL BONDS
EvaAI organized the event to give users a chance to take their AI companion out on a real date. The app allows people to create customizable AI partners for text and video chat. For one evening, those private conversations moved into a public setting. Guests set up their devices on stands and began chatting with their AI partners as drinks were poured and music played. Some described their companions as friends. Others framed the relationship as romantic, often involving roleplay or fantasy scenarios.Company representatives said the goal was to reduce stigma around AI companion relationships. They emphasized that the app is not designed to replace human partners. Instead, they position it as support for people who feel lonely or who want a low-pressure way to build confidence. Still, seeing rows of candlelit tables with screens instead of people makes the shift feel tangible.An AI companion relationship happens when someone forms an emotional or romantic bond with a chatbot designed to simulate personality and conversation.On platforms like EvaAI, users can:You control the interaction. You decide when it starts and when it ends. You shape the personality to fit what you want. For many people, that control feels safe. There is no fear of rejection. No pressure to impress. No awkward silence unless you want one. If you have ever felt burned out by dating apps, you can probably understand the appeal.Modern dating can feel exhausting. You swipe, match and message. Then conversations disappear. AI cuts out a lot of the drama. There is no ghosting. No mixed signals. No waiting hours to reply, so you do not seem too eager. Instead, you get immediate engagement. For people who
struggle with anxiety
or who do not have many daily interactions, that can feel comforting. Some users say AI helps them practice conversation before dating real people. Others say it fills a social gap during lonely periods.Younger generations are also growing up with AI integrated into daily life. Talking to a chatbot no longer feels unusual. Adding emotional connection may feel like the next step. Surveys show a noticeable percentage of adults have experimented with AI in a romantic or intimate way. Among teens, the numbers are even higher.AI companion relationships come with real upsides. For example, they can reduce loneliness and provide emotional reassurance. In many cases, they also help people rehearse difficult conversations before having them in real life. As a result, some users say they feel more confident and socially prepared.However, there are clear tradeoffs. Unlike AI, real relationships require compromise, unpredictability and emotional growth. While a digital partner adapts to your preferences, a human partner may challenge you in unexpected ways. In contrast, AI typically responds the way you prefer and rarely pushes back unless designed to do so.Over time, spending several hours a day in digital intimacy may shift expectations about real-world connections. At the
New York event
, some attendees admitted they feel more comfortable interacting with their AI companion at home rather than in crowded spaces. Because the app offers a high level of control, it can feel safer than face-to-face interaction. On one hand, that comfort can build confidence. On the other hand, it may reinforce isolation. Ultimately, the outcome depends on how intentionally the technology is used.
TEENS TURNING TO AI FOR LOVE AND COMFORT
It is easy to dismiss an AI dating cafe as a quirky tech stunt. Then again, meeting someone through a dating app once felt strange, too. Technology keeps advancing. Video syncing looks smoother. Voices sound more natural. Conversations feel more responsive.As AI becomes more lifelike, emotional attachment may deepen. EvaAI's leadership has made clear that they do not view the app as a substitute for human relationships. They describe it as support during periods without a partner or as practice for real-world dating. Whether users maintain that boundary over time remains an open question.Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you'll get a personalized breakdown of what you're doing right and what needs improvement. Take my Quiz here:
Cyberguy.com
If you had told someone ten years ago that people would bring a chatbot to a wine bar for date night, they probably would have laughed. Now it is happening, and not quietly. The AI dating cafe in New York highlighted something very human. People want connection. When dating feels exhausting, awkward or intimidating, they look for something that feels safer and easier to manage. For some, AI companion relationships may serve as practice. For others, they may become a primary source of emotional support. The technology will keep improving. The bigger question is how we choose to use it. We once debated whether meeting someone online counted as "real." AI may follow a similar path, or it may remain a niche comfort for a certain group of people.If an AI companion helps someone feel less lonely and more confident, does it really matter that the connection is digital, or is the lack of a human on the other side a line you would never cross? Let us know by writing to us at
Cyberguy.com.
Sign up for my FREE CyberGuy Report:
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide - free when you join my
CYBERGUY.COM
newsletter.Copyright 2026 CyberGuy.com. All rights reserved. |
The robotaxi price war has started. Here's everything you need to know.
Right now, in several American cities, you can open an app, and a car with no driver pulls up and takes you wherever you want to go. No small talk. No wrong turns. No tip. No perfume covering up the cigarette smells.A
driverless Waymo ride
in San Francisco averages $8.17. A human Uber in the same city? $17.25. The robotaxi price war is here.
CONGRESS MOVES TO SET NATIONAL RULES FOR SELF-DRIVING CARS, OVERRIDING STATES
I live in Phoenix most of the time, and I see
Waymos everywhere
. At the grocery store. On the freeway. Sitting at red lights with nobody behind the wheel, just vibing. I still haven't gotten in one. But I'm giving myself two weeks.If I survive, I'll share the ride. Mostly kidding.Waymo (owned by
Google's parent Alphabet
) is the clear leader. It gave 15 million driverless rides in 2025, and today, it's about 400,000 per week. Valued at $126 billion. Available in Phoenix, San Francisco Bay Area, Los Angeles, Austin, Atlanta and Miami. Coming in 2026: Dallas, Denver, DC,
London, Tokyo
and more.
WOULD YOU BUY THE WORLD'S FIRST PERSONAL ROBOCAR?
Tesla launched in Austin last June but is way behind. Roughly 31 cars. One tester took 42 trips, and every single one still had a safety monitor on board. So supervised.Zoox (
owned by Amazon
) is the wild card. Their pod has no steering wheel and drives in both directions. Rides are free in Vegas and San Francisco while they wait for approval to charge.Waymo uses cameras, lidar (laser radar that builds a 3D map around the car) and traditional radar. It works in total darkness and heavy rain. Tesla uses cameras only. Eight of them, no lidar. Cheaper, which is how it offers rides at $1.99 per kilometer. Now, are they safe?
WAYMO UNDER FEDERAL INVESTIGATION AFTER CHILD STRUCK
Tesla has reported
seven crash incidents
to regulators since launching. Waymo says it has 80% fewer injury crashes than human drivers. But NHTSA has logged 1,429 Waymo incidents since 2021, 117 injuries, two fatalities. Three software recalls, including one last December for passing stopped school buses. A friend of mine took a Waymo, and it dropped her off a full mile from where she was going. No way to change it. No human to flag down. Just a robot car that said, "You have arrived." She had not. So yeah. I'm curious. But I'm also cautious.When a robotaxi gets confused, a human in a remote center sees through the car's cameras and draws a path for it. At a Senate hearing on Wednesday, Feb. 4, Waymo admitted some of those helpers are in the Philippines. Senators were not amused. I wasn't either.Your car sits parked 95% of the time. Robotaxis run 15+ hours a day. When a driverless ride costs less than
gas and insurance,
owning a car feels like a gym membership you never use.The future of driving is nobody driving. Steering us in a whole new direction.Know someone who still thinks self-driving cars are science fiction? Forward this. They're in for a ride.
Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.
|
|