Struggling to hear TV dialogue? Try these simple fixes
Have you ever found yourself needing to constantly turn the volume up on
your TV
because it sounds like the actors onscreen are speaking in whispers, but then whenever action is onscreen, your TV feels deafening? It's not just you. This is one of the most common issues people have with their TV audio, but, fortunately, you can change a few settings on your TV to make the dialogue sound clearer. Read on for three easy fixes to help your TV audio sound better.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Most modern TVs feature preset audio settings that you can adjust on the fly to make things sound better, depending on whether you're gaming, watching a live concert or watching a slow-burn drama. Too much bass will often obscure spoken dialogue in
TV shows and movies
, and I suggest going through your TV's preset audio settings to see if you can make the audio clearer. Most TVs feature a movie, music and standard mode for TV audio. You can find your TV's audio presets by navigating to the settings from your remote and selecting "sound."Some TVs will also feature audio presets explicitly designed for dialogue. Check to see if you have a setting for "Dialogue," "News," "Speech" or even "Speech Boost" in your
TV audio settings
. Any three of these should help your TV dialogue come through more clearly. You might also want to consider disabling settings for surround sound or bass boost, as these can cover up the sound of dialogue by increasing the bass too much.Increasing the treble might be worth it if you have access to EQ settings on your TV and are struggling to hear TV dialogue. It's an easy fix that can improve audio quality without taking too much away from non-dialogue sound in a movie or TV show.
HOW TO EASILY CONNECT HEADPHONES TO YOUR TV FOR GREAT SOUND
Dynamic range compression, or "volume leveling," is useful for tailoring audio sound to personal needs. Volume leveling reduces the gulf between the loudest and quietest sounds onscreen, making it easier to hear and understand onscreen dialogue, especially in action movies, where the dialogue is often much quieter than the preceding action sequence. You'll find the settings for volume leveling or dynamic range compression in your TV audio settings, which, on most TVs, you can access directly from the remote.My TV features volume leveling, and I love to use it when I watch TV late at night at a low volume. It helps me to understand everything easily without having the speakers loud enough to wake anyone else up. It's also a great way to keep the audio level when commercials come on if you watch cable.
BEST WAYS TO STREAM ANY CONTENT FROM YOUR PHONE TO A TV
GET FOX BUSINESS ON THE GO BY CLICKING HERE
The default speakers built into TVs aren't the best. While a few high-level TVs come with a built-in soundbar, you'll still have the best experience with your own independent speakers or a soundbar. If you followed the two tips above but are still having trouble hearing movie or TV dialogue, it might be time to look into and invest in a set of speakers or, if you want a single unit,
a soundbar.
I prefer using a soundbar with a TV over speakers for a cleaner setup because they often come with built-in subwoofers that enhance the bass, making action scenes and music sound more immersive. Additionally, modern soundbars are sleek and can easily blend with your home decor. Many of them also support advanced audio technologies like Dolby Atmos, which provides a surround sound experience without the need for multiple speakers scattered around the room.
TOP 10 SOUNDBARS TO ENHANCE YOUR TV AUDIO EXPERIENCE
If you're having trouble hearing dialogue clearly while watching TV, connecting headphones can provide a private listening experience that enhances audio clarity. Here's how to easily connect both wired and wireless headphones to your TV:
Check for a 3.5mm jack:
Most TVs, especially older models, have a headphone jack located on the back or side panel. If your TV has this port, simply plug in your wired headphones for instant audio.
Using adapters:
If your TV lacks a headphone jack but has RCA outputs (the red and white ports), you can use an RCA-to-3.5mm adapter to connect your headphones.
Bluetooth connection:
Many modern TVs support Bluetooth. To connect:
Bluetooth transmitter:
If your TV doesn't have Bluetooth, consider using a Bluetooth transmitter. This device plugs into the TV's audio output (like the headphone jack or RCA ports) and sends audio wirelessly to your Bluetooth headphones.
Media streamers:
If you use devices like Roku or Apple TV, they often support Bluetooth connections for headphones, allowing you to listen privately through those devices instead.By connecting headphones, you can enjoy clearer dialogue without disturbing others, making it easier to follow along with your favorite shows and movies.
BEST NOISE-CANCELING HEADPHONES TO BOOST YOUR LISTENING
If you're consistently struggling to hear dialogue on your TV, it might be time to consider professional-grade hearing solutions. For those with mild to moderate hearing loss, products like the
AirPods Pro 2
can double as hearing aids with customizable sound settings designed to enhance speech clarity. These devices are particularly useful when paired with your TV's Bluetooth, allowing for a clear and immersive listening experience.For more severe hearing loss,
our top hearing aid pick
offers advanced technology tailored for the hearing-impaired. This device uses cutting-edge dual-processing to separate speech from background noise, delivering exceptional clarity. Designed for comfort and discretion, these nearly invisible hearing aids fit snugly behind or inside the ear, ensuring a seamless and natural listening experience.The best hearing aids today feature
Bluetooth accessibility
and user-friendly smartphone apps, allowing you to adjust settings, switch modes and even take calls directly through the device. Along with innovative technology, many options also come with access to expert support from licensed specialists, either in person or virtually, ensuring a personalized experience and ongoing assistance.Investing in a professional-grade hearing aid can significantly improve your ability to hear dialogue clearly, transforming your TV-watching experience into a more enjoyable and stress-free activity.If you find yourself straining to catch every word during your favorite shows, you're not alone. Many people struggle with audio clarity, but by implementing these simple fixes, you can significantly enhance your TV viewing experience. Whether it's adjusting your TV's audio settings, utilizing dynamic range compression, investing in better speakers or soundbars, or connecting headphones for a more personal listening experience, there are effective solutions at your fingertips.
CLICK HERE TO SIGN UP FOR THE ENTERTAINMENT NEWSLETTER
you ever invested in external audio equipment, such as soundbars or speakers? If so, how has that changed your viewing experience? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
Fox News AI Newsletter: 'Trump will be very good at' AI infrastructure
IN TODAY'S NEWSLETTER:- OpenAI CEO Sam Altman looking forward to working with Trump admin, says US must build best AI infrastructure
- Meta to build $10 billion AI data center in Louisiana as Elon Musk expands his Tennessee AI facility
- LA Times owner announces planned AI-powered 'bias meter' for stories, columns
READY AND WILLING:
Sam Altman, CEO of OpenAI, the creator of ChatGPT, on Sunday said he is looking forward to working with the incoming Trump administration, adding that he thinks President-elect Trump will succeed at helping to make America a world-leading force in
artificial intelligence (AI)
infrastructure.
'NEW CHAPTER':
Louisiana Gov. Jeff Landry praised Meta's plans to build a new
artificial intelligence
data center in the Pelican State, calling it the "largest private capital announcement."
PRESS FOR FAIRNESS:
LA Times owner Dr. Patrick Soon-Shiong announced the upcoming
AI feature
on Wednesday in an interview with conservative commentator and newly appointed Times editorial board member Scott Jennings on "The Mike Gallagher Show," which Jennings was guest-hosting.
'NOT THAT WORRIED':
Elon Musk's possible political influence under the incoming Trump administration is not a concern for
OpenAI CEO Sam Altman
, who dismissed claims that the X owner would use lawfare to stifle competition.
NO TENNIS PARTNER?:
Imagine having a personal tennis coach who never gets tired, always hits the perfect shot, adapts to your skill level and is available 24/7. Enter the PongBot, a groundbreaking
artificial intelligence-powered
tennis robot that's turning heads in the tennis world.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
The AI-powered grandma taking on scammers
Are you tired of scammers calling your phone, trying to trick you into giving away your hard-earned money? If so, you're not alone. Many people are fed up with the constant barrage of
fraudulent calls and messages
. But what if you could fight back in a fun and creative way? Enter the world of scambaiting, where people waste scammers' time and resources instead of falling for their tricks.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Scambaiting is when someone
interacts with a scammer
to waste their time and resources. Some of these online experiences are entertaining and even hilarious to watch. Instead of falling for their sneaky tricks, scambaiters play along, knowing it's a scam, and take on the role of a potential victim to keep the scammers busy. But get this - there's now some new technology to do the scambaiting for you.
TOP 10 ROBOCALL HOTSPOTS IN AMERICA
So, why should we care about scambaiting? This creative strategy offers several compelling benefits. First and foremost, it effectively wastes scammers' time. Every minute they spend on the phone with Daisy is a minute they can't use to target real victims. By keeping them occupied, we can potentially prevent them from scamming someone else.In addition to wasting time, scambaiting raises awareness about common scams. It serves as an educational tool, helping others recognize and avoid falling prey to similar tactics. The more people understand how these scams operate, the less likely they are to become victims. Moreover, watching scammers get flustered sheds light on the lengths these criminals will go to and highlights the importance of staying vigilant against their schemes.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES
"Hello there! I'm just trying to understand how this prize works. Can you explain it again? I'm not as tech-savvy as I used to be?"That's Daisy, an
artificial intelligence-powered
grandma developed by Virgin Media O2 to interact with scammers. When a scam call comes in, Daisy automatically answers and engages the caller in conversation, wasting their time. With her friendly personality and quick thinking, she keeps them on the line while gathering useful information about their tactics. Daisy combines various AI models that work together to listen and respond to fraudulent calls instantaneously. She's so lifelike that she has successfully kept numerous fraudsters on calls for 40 minutes at a time. By tricking the criminals into thinking they were defrauding a real person and playing on scammers' biases about older people, Daisy has prevented them from targeting real victims.Now, before you get too excited, Daisy is currently only available for customers of Virgin Media O2 in the U.K., but other companies in the U.S. are beginning to offer similar AI-driven solutions. For instance,
Apate.ai
has developed AI.Callee, which engages scammers in real-time conversations across various channels. Another U.S. company,
Scamnetic
, has launched an AI-based scam-detection solution that can be integrated into enterprise platforms to protect consumers from various types of scams.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
END OF ANNOYING ROBOCALLS? FTC CRACKS DOWN ON DECEPTIVE PRACTICES
While scambaiting can be a fun way to fight back against scams, the best defense is simply not picking up and answering scam calls in the first place. One effective strategy is to consider investing in personal data removal services that wipe your information from public databases on the internet. By reducing your digital footprint, you can make it more difficult for scammers to contact you in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
The introduction of AI-powered scambaiters like Daisy marks a new era in the fight against fraud. While it's entertaining to imagine scammers being outwitted by a chatty AI grandma, it's important to remember that the ultimate goal is to protect vulnerable individuals from falling victim to these schemes. As technology evolves, so do the tactics of scammers, making it crucial for everyone to stay informed and vigilant. Whether it's Daisy keeping scammers occupied or individuals taking steps to protect their personal information, every effort counts in the ongoing battle against fraud.Would you consider trying scambaiting or using AI technology to fight back against scammers, and what are your thoughts on these innovative approaches to protecting yourself from fraud? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
Don't scam yourself with the tricks hackers don't want me to share
You're pulling your hair out, trying to fix something on your computer. You
Google it
and find what looks like a helpful website or a tutorial with easy step-by-step instructions.Phew, you're finally solving your problem, but hold up! You've just walked into a
"scam-yourself" attack
. Cybercreeps use this clever strategy to trick you into compromising your tech so they don't have to do the dirty work.
BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?
I'm giving away a $500 Amazon gift card.
Enter here
, no purchase necessary!
How bad is it?
Bad.
Really
bad. "Scam-yourself" attacks shot up
614%
in the third quarter of this year alone. Lumma Stealer, the top data-stealing malware type that grabs banking info and browser extensions, spiked by
1,154%
.Why do these scams work so well? When something's broken, our instinct is to rush and fix it as quickly as possible. Now, add to this the fact you're going through the steps yourself so it feels like
you're
in control. That's exactly what makes these tricks so dangerous.Scammers are also shockingly good at mimicking trusted sources with
professional-looking websites
or tutorials, making it easy to believe you're on safe ground. Add frustration and impatience to the mix, and it's no wonder so many folks take the bait.
TALK TECHY TO ME: GET YOUR WORK DONE FASTER WITH THIS PRO TIP
RELATED:
How to spot a fake retail website before you buy
How they snag you
RELATED:
Another scammer is now rich
How to protect yourself
These scammers are savvy, but you can outsmart them.
Think twice before downloading:
If a tutorial tells you to turn off antivirus software or download a random link, bail. Rely on big names like Google,
Apple and
Microsoft that publish steps for help online ... or, you know, me!
Check URLs and sources:
Cybercriminals mimic
legitimate sites. Always double-check the web address, especially when you're looking at updates or troubleshooting guides. If the URL feels
off
, trust your gut and close it.
3 SECURITY AND DATA CHECKS YOU SHOULD DO ONCE A YEAR
Be careful what you copy and paste:
Never copy commands from unknown sources into your computer's terminal or command prompt. That's a classic malware delivery tactic.
Update the right way:
Don't click random pop-ups to update your software. Always go through your device settings or the
app store
.
RELATED: Hackers have a sneaky trick to get you to click their fake links -
See it in action
Let's say the worst happens.
Despite being careful, you fell for it. Don't panic, just act fast to limit the damage:
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Get ready to build your own Lego masterpieces with this new tech
Imagine being able to turn any object into a Lego masterpiece with just your phone.Sounds cool, right? Well, that's exactly what Brick My World offers.
This innovative app
is here to make custom Lego creation fun and accessible for everyone, whether you're a seasoned builder or just getting started. By using advanced
artificial intelligence
and mobile scanning technology, Brick My World opens up a world of creative possibilities.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
The process of creating Lego models with
Brick My World
is pretty simple. First, you snap a photo of any object using your Android or iPhone. Next, you will brick it, as they call it, with the app transforming the scan into a Lego model. Finally, you can build it by following the detailed instructions generated by the app, bringing your creation to life.Gone are the days when advanced 3D modeling skills were necessary or when building custom models required painstaking manual design. Brick My World makes custom Lego creation accessible to everyone, regardless of your
technical expertise
.
A WHOPPING 342,817 LEGO TECHNIC PIECES ARE USED TO BUILD A SPORTS CAR
Brick My World combines several cutting-edge technologies:
Mobile scanning:
Utilizes ARCore (Android) and ARKit (iOS) for precise object capture.
Photogrammetry:
Creates detailed 3D models from 2D scans.
Voxelization:
Converts 3D models into brick-compatible structures.
AI optimization:
Refines the model for accuracy and structural integrity.
KURT'S BEST NEW HOLIDAY DEALS
LEGO-LIKE CONSTRUCTION BLOCKS MADE FROM PLASTIC WASTE CAN STAND UP TO NATURE'S FURY
With
Brick My World
, your creativity knows no bounds. Create a scale model of your house, immortalize your pet in bricks or craft unique souvenirs from your travels. The app handles models of various sizes, from small objects using 500-1,000 bricks to larger creations requiring several thousand pieces.
WOULD YOU WANT TO CHAT WITH THIS CREEPY-LOOKING LEGO HEAD POWERED BY AI?
Worried about finding the right pieces? Brick My World has partnered with BrickOwl, an independent Lego marketplace. The app generates a detailed parts list, allowing you to easily source the bricks you need for your custom creation.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Brick My World is the brainchild
of a diverse team of Lego enthusiasts and tech innovators. Their combined expertise in software development, AI engineering and UX design has resulted in this revolutionary app.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
The team has ambitious plans for the future, including adding support for non-traditional bricks (plates, slopes, transparent pieces), incorporating wheels and other specialized elements, and expanding the app's capabilities based on user feedback and technological advancements.Throughout the
Kickstarter campaign
, supporters are being offered exclusive early-bird pricing for lifetime access to the premium version of the app, allowing them to be among the first to experience this groundbreaking tool. The funds raised will be instrumental in further developing the app's features and expanding its capabilities, including the addition of non-traditional bricks and enhanced design options.The overwhelming support from backers demonstrates a collective desire to make custom Lego creation accessible to all. As Brick My World moves forward, the team is committed to delivering on its promises and pushing the boundaries of what can be achieved in the world of Lego building. Stay tuned for updates on new features and enhancements as they continue to innovate and inspire creativity in builders everywhere.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
By making the design process accessible to everyone, Brick My World opens up new possibilities for creativity and expression through Lego. Whether you're a seasoned builder or new to the world of bricks, this app promises to bring your ideas to life in a way that's both fun and rewarding.What unique objects would you love to see transformed into Lego creations using the Brick My World app? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
8 phishing email scams to watch out for this holiday season
The holiday season is upon us, bringing joy and celebration. But it also comes with a surge in cybercrime. As we focus on shopping and connecting with loved ones, scammers are hard at work using
phishing emails
to trick us into revealing personal and financial information. These deceptive messages often look like they're from trusted sources such as banks or delivery services, making it easy to fall for their traps.Below are some phishing attempts that have ended up in CyberGuy's inboxes. By examining these examples of fake phishing emails, you'll be better equipped to spot the red flags and protect yourself from potential
scams this holiday season
.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
This phishing email claims to be from Apple and promises you a free iPhone 15 Pro. It says, "NO CATCH, NO COST, WIN IN MINUTES." It uses the official Apple logo and the word FREE in capital letters to catch your attention. It asks you to confirm your shipping address to receive your prize and says, "Just answer a few questions, WIN a iPhone 15 Pro. It is that simple!" It even shows you a picture of an iPhone 15 to
make it look authentic
. You'll notice it has two green buttons for you to click that say, "GET STARTED." This scammer tries to fool you by using the words "Temu Confirmation," which sounds like a legitimate email confirming that your package is on its way. They urge you to click on the link that says, "Please Confirm Receipt," implying that you need to do so to receive your package.They also add a deceptive message that says, "If you cannot see the images below, Click show images," highlighted in red. This is another way to trick you into clicking on the link.Moreover, they use a sneaky tactic of labeling the message as "This message is from a trusted sender" and highlighting it in green, as if to reassure you that it is safe and authentic.This email is a fake one that tries to imitate the Chinese shopping platform Temu. It uses the phrase "YOUR OPINION IS IMPORTANT!" in capital letters to get your attention. It then offers you a tempting reward: "a pallet of products from TEMU" with a picture to make it look real. It asks you to take a short survey to claim your reward by clicking on the big orange button that says "CLICK HERE" in capital letters. Don't do it!
BEWARE OF THIS LATEST PHISHING ATTACK DISGUISED AS AN OFFICIAL EMAIL SENT BY GOOGLE
The scam email pretending to be from Target wants you to believe that you are a lucky winner. It uses the words "GIVEAWAY ENTRY WINNER" in large and bold capital letters. It also puts "Final notice" in the subject header, giving you a sense of urgency. The email asks you to take a short survey about your Black Friday shopping experience to claim your prize and wants you to click on the GET STARTED button. Don't do it.
SCAMMERS EXPLOIT GRIEF WITH FAKE FUNERAL STREAMING ON FACEBOOK
As you'll see in the "Delivery" messages below, the scammers are getting clever by sending a
series
of emails to make you think that you have a real package on its way to you, and/or you keep missing the delivery of this package. The emails say things like "We tried delivering your package," "Uncompleted Dispatch," "Third attempt," "Delivery unsuccessful" and "Your order will be canceled in the next 24 hours."These emails are designed to create a sense of urgency and pressure you into clicking on the links that they provide. They want you to think that this company is really trying to reach you, so it must be real. But it's a scam! However, these links are not from legitimate delivery companies but from scammers who want to steal your information or infect your device. If you are expecting a package, check the tracking number and the sender's address carefully. Do not click on any links or attachments that you do not recognize.This email claims to be from UPS, but it is actually a scam. It uses the UPS logo and colors to look authentic and is designed to trick you into clicking on malicious links. It starts with the alarming phrase "Delivery Unsuccessful" and tells you that you have one package waiting for delivery.It then asks you to confirm your shipping details by clicking on either the "CONTINUE" or the "SCHEDULE YOUR DELIVERY" buttons, both in capital letters. Don't do it!
HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM
This is another email pretending to be from UPS. It uses the words "order pending" to catch your attention, and it shows a picture of a package to make you think you have a delivery.It then tells you that your parcel is stuck at a distribution center because you need to pay more postage. It asks you to go to a link to pay the fee. And it warns you that you have only 48 hours to do so, or else your package will be returned to the sender. It tries to create a sense of urgency by making you click on the yellow button that says "SCHEDULE FOR DELIVERY" in capital letters. Don't do it!One of the phishing scams we encountered recently is an email claiming that you've won a Rachel Ray Cucina Cookware Set. This email is particularly deceptive because it appears to come from a reputable retailer, Kohl's, but there are several red flags to watch out for. The email falsely claims to be from "Kohl's Department" instead of the official "Kohl's." This slight alteration is a common tactic used by scammers to trick recipients into believing the email is legitimate.The email's reply-to address is tech@student.lvusd.org, which is clearly unrelated to Kohl's. Official emails from Kohl's would not use a student email address. The message includes phrases like "You have won a Rachel Ray Cucina Cookware Set" to create a sense of urgency and excitement, prompting you to click on the provided link without proper verification.As you can see, phishing emails can be hard to distinguish from genuine ones, especially during the busy holiday season when you may receive many emails from various sources. However, there are some additional red flags beyond the ones we've already mentioned that can help you identify a fake email. Here are some of them:
Check the sender's address and domain name.
Fake emails often use spoofed or similar-looking addresses and domain names to deceive you. For example, an email from support@amaz0n.com or info@fedex.delivery.com is likely a phishing attempt. You'll notice in the Apple phishing email below the email address has just a bunch of letters and numbers. Always verify the sender's address and domain name before opening or responding to an email.
Check the spelling and grammar.
Phishing emails often contain spelling and grammar errors or use poor or unnatural language. For example, an email that says, "Dear Customer, Your order has been shipped. Please confirm your delivery address by clicking here." It is suspicious because it does not address you by name, uses a generic greeting and asks you to click on a link. Always read the email carefully and look for any mistakes or inconsistencies.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Check the links and attachments.
Fake emails often contain links and attachments that lead to malicious websites or download malware to your device. For example, an email that says, "You have won a $100 gift card from Walmart. Click here to claim your prize." It is likely a scam. On a laptop or desktop, always carefully hover your mouse over the links and check the URL before clicking on them, and never open or download any attachments from unknown or suspicious sources.
Use strong antivirus software:
The first and most crucial step to protect yourself from accidentally clicking on fake links in spam emails is to have strong antivirus software installed on your device. This software can detect and block malicious emails and links, providing an extra layer of security.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices
.
Do not open or reply to spam emails.
This can confirm your email address to the sender and encourage them to send you more spam. It can also expose you to malicious links or attachments that can harm your device or data.
Mark spam email as junk or spam.
Most email providers have a
feature
that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.
Do not share your email address publicly or with unknown sources.
This can reduce the chances of your email address being collected by spammers. You can also use a disposable or
email alias
for signing up for online services that you do not trust or need.
Use a personal data removal service:
Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM
If you realize that you have clicked on a link or opened an attachment from a fake email, don't panic. Here are some steps that you can take to minimize the damage and protect yourself:1.
Disconnect your device from the internet.
This will prevent any further communication or data transfer between your device and the malicious website or
malware.
You can do this by turning off your Wi-Fi or unplugging your ethernet cable.2.
Scan your device for malware.
Use a reputable
antivirus
software to scan your device and remove any potential threats. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices
.3.
Change your passwords.
If you have entered or provided any passwords or personal information on the malicious website, you should change them as soon as possible. Consider using a
password manager
to generate and store complex passwords.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
4. You should also
enable
two-factor authentication
for your online accounts, which adds an extra layer of security by requiring a code or a device confirmation in addition to your password.5.
Monitor your accounts and credit reports.
If you have entered or provided any financial information on the malicious website or link you clicked on, you should monitor your bank accounts, credit cards and credit reports for any suspicious or unauthorized activity.6. You should also
contact your bank or credit card company
and inform them of the incident. You may need to cancel or freeze your cards or accounts to prevent any further fraud.7.
Report the phishing email.
You should also report the phishing email to the sender's legitimate organization, such as your bank, retailer or delivery service, and to the authorities, such as the
Federal Trade Commission (FTC)
or the
Anti-Phishing Working Group (APWG)
. This will help them to take action and prevent others from falling for the same scam.8.
Use identity theft protection services
if you entered your personal information on any links you clicked on or websites that you were directed to. Identity theft protection companies can monitor your personal information (home title, Social Security number, phone number, email address) and alert you in the event they become breached. It can also alert you if any of these are being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft.
Unfortunately, as the holiday season unfolds, cybercriminals are also getting into the "holiday spirit" by increasing their efforts to exploit your trust and distractions. By staying alert and applying the tips we've discussed, you can enjoy the season without falling victim to their schemes. Remember, phishing emails are designed to play on your emotions - whether it's excitement, urgency or curiosity. Always take a moment to verify the authenticity of any message before clicking on links or sharing personal information. When in doubt, reach out directly to the company or service in question through its official website or app.Do you feel that companies are doing enough to protect consumers from phishing scams? Why or why not? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
How to bulk delete spam and old text messages on Android
If your
Android messaging app
is overflowing with old texts, you're not alone. Many people find their message inboxes cluttered with conversations that are no longer relevant. Luckily, there are some quick and easy steps you can take to clean things up and keep your messages organized. (iPhone users,
follow these tips
.)
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Follow these steps to easily bulk delete messages on your
Android device
:
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
S
ettings may vary depending on your Android phone's manufacturer.
BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024
To stop messages from piling up again in the
messages app
on your Android, perform these steps:S
ettings may vary depending on your Android phone's manufacturer.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
HOW TO CHANGE YOUR PRIVACY SETTINGS ON ANDROID
Important Note: Be cautious with this setting. It will permanently delete older messages once you reach 1,000 texts, 100 multimedia messages or 5,000 chats. If you often need to reference old messages, consider leaving this setting off to avoid losing important information.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Cleaning up your messages app can significantly enhance your messaging experience. By following these simple steps for bulk deleting and enabling automatic deletion, you can maintain an organized inbox without the hassle of manual cleanup every few weeks. Remember to regularly check your settings and adjust them based on your messaging habits.What's your biggest challenge with maintaining a clutter-free inbox? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
Fox News AI Newsletter: AI catches cancer that mammogram misses
IN TODAY'S NEWSLETTER:- AI detects woman's breast cancer after routine screening missed it: 'Deeply grateful'- OpenAI CEO Sam Altman looking forward to working with Trump admin, says US must build best AI infrastructure- Robots perform like human surgeons by just watching videos
MAMMO MISHAP:
A U.K. woman is thanking
artificial intelligence
for saving her life. The technology picked up cancer cells in the patient's screening that were undetectable by the human eye, according to SWNS.
READY AND WILLING:
Sam Altman, CEO of OpenAI, the creator of ChatGPT, on Sunday said he is looking forward to working with the incoming Trump administration, adding that he thinks President-elect Trump will succeed at helping to make America a world-leading force in
artificial intelligence
infrastructure.
SEEING IS REPEATING:
In a groundbreaking development,
researchers at Johns Hopkins University
and Stanford University have successfully trained a robotic surgical system to perform complex tasks with the skill of human doctors.
'TERRIFYING':
Katherine Waterston isn't a big fan of
artificial intelligence.
"Like all technology, there's the potential for incredible innovation and a real threat and obviously needs to be highly regulated," she told Fox News Digital.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
Malicious Play Store apps put 8 million Android users at risk
Malicious apps are pretty common, and it's easy to accidentally download them if you're not cautious. You'll often find these apps on third-party app stores, shady websites, or through suspicious emails and texts. What you wouldn't expect is to encounter them on the Google Play Store if you're an Android user or the App Store if you're
on iPhone
. While Apple does a great job of keeping its app marketplace safe, Google doesn't quite measure up.A new report has revealed that over a dozen malicious apps containing SpyLoan malware have been available on the Play Store. These apps have been downloaded by 8 million Android users, putting them at risk of
extortion, harassment and financial loss
. Below are images of four of the SpyLoan apps found on Google Play.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
SpyLoan is malware often hidden in apps that promise instant loans.
These apps
reel people in with offers of quick, hassle-free loans, boasting low rates and hardly any requirements. While they might look legit at first glance, their real goal is to gather as much personal info as they can. Once they have it, they use it to harass or pressure users into paying ridiculous interest rates. They also use shady tactics like countdown timers or "limited-time" offers to create a fake sense of urgency, pushing people to act fast without thinking it through. Instead of helping with finances, these apps trap users in a cycle of debt and invade their privacy.McAfee's mobile research team has
uncovered 15 apps
on the Google Play Store packed with SpyLoan malware. These apps use the same code and systems, targeting users worldwide to steal data and send it to command-and-control (C2) servers. Many of them hide behind fake names and logos that mimic legitimate financial institutions, making them look trustworthy at first glance. You can find the names of these apps in the screenshot added below.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
McAfee, an App Defense Alliance partner tasked with helping keep the Play Store safe, reported the apps to Google. Google took action, and the malicious versions of the apps are no longer available on Google Play. We reached out to Google, and a rep confirmed that Android users are automatically protected against known versions of this malware by Google Play Protect. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices.
ANDROID BANKING TROJAN EVOLVES TO EVADE DETECTION AND STRIKE GLOBALLY
The goal of these malicious apps is to gather as much data as possible from infected devices, which they then use to extort users. Victims are often coerced into repaying loans at sky-high interest rates, with some even being threatened for delays. In extreme cases, the app operators have harassed victims' families and sent death threats, using stolen personal photos as leverage.These apps request intrusive permissions, giving them access to system data, cameras, call logs, contacts, location, and SMS messages. They justify this data collection by claiming it's necessary for user verification and anti-fraud measures. Users signing up for these services are verified through a one-time password (OTP) to confirm their phone number is from the target region. They are also pressured to share additional details like ID documents, bank accounts, and employment information.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA
1. Have strong antivirus software:
Android has its own built-in malware protection called Play Protect, but the SpyLoan malware proves it's not enough. Historically, Play Protect hasn't been 100% foolproof at removing all known malware from Android phones. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any
phishing emails
or
ransomware scams.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
2. Download apps from reliable sources:
It's important to download apps only from trusted sources like the Google Play Store. You might say I am contradicting myself, but the Play Store is still safer than other options out there. They have strict checks to prevent malware and other harmful software. However, even with the security measures provided by Google Play, downloading apps from the store does not guarantee 100% protection against malware or harmful software. Avoid downloading apps from unknown websites or unofficial stores, as they can pose a higher risk to your personal data and device. Never trust download links that you get through SMS.
3. Be cautious with app permissions:
Always review the
permissions requested by apps
before installation. If an app requests access to features that seem unnecessary for its function, it could be a sign of malicious intent. Do not give any app Accessibility permissions unless you really need to. Avoid granting permissions that could compromise your personal data.
4. Take loans from legit institutions:
Always take loans from legitimate financial institutions like banks or well-known lenders. Avoid sketchy apps or services promising instant cash with minimal requirements. They're often too good to be true. Legit lenders are transparent about their terms, interest rates, and fees, and they won't demand access to your personal data or pressure you with scare tactics. If you're unsure about a lender, check reviews, verify their credentials, or consult a financial advisor before committing.
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
It can be tempting to use apps that promise instant loans, especially when you need the money. But they're often just trying to scam you and push you into a never-ending debt cycle. If you need a loan, go to a trusted bank or lender. Protecting yourself from malicious apps like those infected with SpyLoan malware starts with staying informed and cautious. Always scrutinize the apps you download, stick to trusted platforms, and think twice before sharing sensitive information.
Do you think Google does enough to protect users from malware on the Play Store? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
How to bulk delete spam and old text messages on iPhone
Are you tired of scrolling through endless spam and old text messages on
your iPhone
? You're not alone! Many of us struggle with cluttered inboxes filled with unwanted messages. Well, I've got some great news for you. I'm here to show you how to quickly clean up your iPhone's Messages app and keep those pesky spam texts at bay.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Let's start with bulk deleting those unwanted conversations:
OUTSMART SPAMMERS TO FINALLY END UNSOLICITED EMAILS
But what if you could keep your
Messages app
free of spam or unwanted messages? Here's a nifty trick:This feature automatically
sorts messages from people
who aren't in your contacts into a separate list, making it easier to manage potential spam or unwanted messages. In the Messages App, tap
Filters
in the upper right corner, and you will see
Unknown Senders
.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
HOW TO BLOCK A PHONE NUMBER OR TEXT ON YOUR SMARTPHONE
Now, for those who prefer to keep their message history down to a minimum, you can also set up automatic deletion of older messages. This feature is helpful if you're running low on device storage and sharing a lot of long videos, which can really fill up your storage fast. Plus, some of you might want to do this not just to save space but also to keep your conversations private.Here's how to set it up:
GET FOX BUSINESS ON THE GO BY CLICKING HERE
However, be cautious with this last option, as it will permanently delete older messages. If you often need to reference old messages, you may want to keep this setting on Forever to avoid losing important information.
FIND OUT WHY CELLPHONE COMPANIES NOW MUST BLOCK OBVIOUS SCAM TEXTS
Cleaning up your iPhone's Messages app doesn't have to be a chore. With these simple tips, you'll not only declutter your inbox but also enjoy a more organized messaging experience. So go ahead, give these methods a try and reclaim your space.Have you discovered any unique features or apps that help you keep your messaging organized? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Windows 7 in 2024: The hidden dangers of clinging to the past
Computers are a significant investment, especially for those on fixed incomes. Fortunately, with proper care and maintenance, older computers can remain secure and functional for years. Let's address a concern from Connie in Rochester, Minnesota, who wrote to us about her older computer's vulnerability to hackers:
"I'm still using Windows 7 on my 2013 computer. It says I have Security Essentials, but I saw somewhere that it ended in 2023? When I click on it, it says it's scanning, but am I protected or not? I pay yearly for MSN extra and use an iPhone 14. All the worrisome reports make a senior citizen a little nervous. What's your advice? A new computer? Will your virus protection be compatible with my old computer? I'm not keen on spending more on a new computer on a fixed budget."
This question is relevant to many users with older computers. Let's dive deeper into the situation and provide some comprehensive advice for Connie and others in similar situations.
I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS - Ends today at 3 pm ET
Enter by
signing up
for my free newsletter.
Using Windows 7 does pose significant security risks. Since Jan. 14, 2020, Microsoft has
stopped providing security updates and technical support
for Windows 7. This means that any new vulnerabilities discovered in the operating system will not be patched, leaving your computer exposed to potential attacks.Since the start of 2023, 47 vulnerabilities have been discovered in Windows 7. Cybercriminals actively target outdated operating systems because they're more likely to be unpatched and vulnerable. Without official support, Microsoft is no longer compelled to disclose formal vulnerabilities, making it harder for users to stay informed about potential security risks.Connie, you mentioned that you have Microsoft Security Essentials installed. Unfortunately, this software also stopped receiving updates on January 14, 2020. While it may still scan your computer, it's not providing up-to-date protection against new threats.
TOP WAYS TO OPTIMIZE YOUR PC AND MAC DEVICES
Given the security risks, it's advisable to take action. Here are some options to consider:
1) Upgrading your operating system or computer
: While it's possible to continue using Windows 7 with a third-party antivirus, it's generally recommended to upgrade to a newer operating system for the best security.
If your current computer meets the system requirements, you could consider upgrading to Windows 10 or even Windows 11
. However, if a new computer isn't in your budget right now, using a supported antivirus on your Windows 7 machine is a good step.
2) Install strong antivirus software:
If upgrading isn't possible immediately, install a strong, reputable, up-to-date antivirus software that's compatible with Windows 7. However, keep in mind that this is a temporary solution and doesn't address all the vulnerabilities in the operating system itself. There are several antivirus programs that continue to support Windows 7.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
3) Consider a new computer:
While it's understandable that you're on a fixed budget, investing in a new computer might be the most cost-effective solution in the long run. New computers come with the latest operating systems and security features, providing better protection against current threats. You can see our picks for a variety of
laptop
computers
and
desktop computers
(at a variety of price ranges). If you decide to upgrade and get a new computer, check out
how to securely get rid of your old PC or Mac
.
HOW TO SAFEGUARD YOUR OLDER PC
You might be wondering if it's really that dangerous if you're careful about what you download. The truth is, even if you're cautious, you're still at risk. Modern malware can be incredibly sophisticated. There's a type of threat called a "persistent threat" that can hide on your machine indefinitely, continuously monitoring your computer and stealing information without you even knowing it.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.Let's address two other points you made in your email to us. Your iPhone 14 is not affected by the Windows 7 issue. Apple regularly updates its iOS software, providing security patches for supported devices. So, make sure your iPhone's software is up to date to ensure you have the latest security features. Here's how:As for MSN Extra, while it may provide some additional features, it doesn't compensate for the lack of operating system security updates.
10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE
Look, Connie, I know all this tech stuff can be overwhelming, but here's the deal: While we can't make your computer 100% hacker-proof, these steps will definitely up your security game. Keep your eyes peeled when you're checking emails or downloading stuff, especially if it's from someone you don't know. Now, about getting a new computer. I get it, it's not cheap. But think about it this way: It's like insurance for your digital life. The headache and costs of dealing with a hacked computer? Trust me, that's way worse. In this day and age, when we're all connected 24/7, keeping your digital self safe is super important. So, if you can swing it, seriously think about upgrading your system or getting a new computer with all the latest security bells and whistles. Bottom line? Taking these steps isn't just about protection. It's about giving yourself peace of mind every time you hop online. And let's face it, that's pretty priceless.What are your biggest challenges when it comes to maintaining your devices and why? Share your tech hacks by writing to us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
Robotic shorts give your legs a boost to walk farther and tire less
Imagine slipping on a pair of shorts that could make walking feel like a breeze, almost as if you've instantly shed 20 pounds. Sounds too good to be true, right? Well, get ready to have your mind blown! Scientists at the Technical University of Munich have cooked up something that might just change the game for anyone who's ever wished walking was a little easier.They call it the WalkON system, a pair of high-tech shorts that's not your average gym wear. These bad boys can cut down the energy you need for a stroll or jog by up to 18%! Whether you're a spring chicken or in your golden years, these shorts could be a game-changer, especially if stairs have become your nemesis or long walks leave you winded.
I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS - Ends today at 3 pm ET
Enter by
signing up
for my free newsletter.
The WalkON system combines sensors, artificial tendons and smart motors to enhance your natural walking motion. It starts with advanced sensors embedded in the shorts that continuously monitor the stress on your tendons. These sensors are incredibly precise, picking up on subtle changes in your movement, including how fast you're walking and the angle of your hips.Connected to these sensors are two thin artificial tendons that extend from your thighs to a specially designed waist belt. These tendons play a crucial role in how the system assists you. When you start to walk, the shorts analyze your gait pattern and can even detect the moment you transition from standing to walking. As each leg enters the "swing phase," the system knows exactly when to kick in.At just the right moment, small but powerful motors activate and gently pull on the artificial tendons. This action helps lift your thigh, reducing the effort needed by your hip flexor muscles, making it feel much easier to move. What's really impressive is how adaptable WalkON is; whether you prefer a slow stroll or a brisk jog, the system adjusts its level of assistance based on your speed and leg weight. All of this happens seamlessly, so you experience a natural enhancement to your movement rather than feeling like you're being pushed or pulled by a machine.
KURT'S BEST HOLIDAY DEALS
Best gifts for
Men
|
Women
|
Kids
|
Teens
|
Pet
lovers
EXOSKELETON HELPS PARALYZED PEOPLE REGAIN INDEPENDENCE
The WalkON system significantly reduces energy expenditure by 18% for young people walking uphill. For older individuals walking on level ground, it decreases energy expenditure by 10%. This reduction in energy expenditure is equivalent to the feeling of instantly losing 22 pounds or 13 pounds, respectively. The system allows you to walk slowly or jog, providing versatility in movement. Participants in tests reported high satisfaction with the device, giving it a mean rating of 6 out of 7 for its ability to assist while maintaining a sense of control.
COULD THESE EXOSKELETON 'POWER PANTS' MAKE OUTDOOR ACTIVITIES EASIER IN THE FUTURE?
The WalkON system can benefit anyone seeking to increase their mobility; however, it shows particular promise for older adults who may experience declining physical capabilities. Additionally, individuals weakened by illness can find significant advantages in using WalkON to enhance their mobility and independence. Furthermore, the device is designed for those looking to maintain an active and healthy lifestyle, making it a versatile solution for a wide range of users.
WEARABLE EXOSKELETON CAN TURN YOU INTO A SUPERHUMAN ATHLETE
Unlike traditional rigid exoskeletons, WalkON's soft, flexible design offers several advantages over its more cumbersome counterparts. Conventional exoskeletons often feature rigid frames that can be difficult and time-consuming to put on, limiting their practicality for daily use.In contrast, WalkON's soft robotic shorts can be put on quickly and easily, similar to regular clothing, and are more than a mechanical device. Professor Lorenzia Masia, the lead researcher, aptly compares WalkON to an electric bike for walking. This analogy highlights the system's ability to enhance natural movement without overpowering it, making mobility more accessible and appealing to a wider range of users. The lightweight, tendon-driven design of WalkON allows for a more natural range of motion, adapting to the user's movements rather than constraining them.Furthermore, WalkON's compact and unobtrusive nature addresses a common concern with exoskeletons: social acceptance. Its design allows it to be worn discreetly under regular clothing, potentially increasing user comfort in social situations. This feature, combined with its efficiency in reducing metabolic cost, positions WalkON as a more practical solution for everyday use compared to bulkier exoskeleton systems.Given the current stage of development and testing, it's likely that WalkON could be available to you within the next three to five years, pending further research and regulatory approvals.While no exact price point is yet available, we can compare it to other assistive technologies. Current exoskeletons can cost anywhere from $40,000 to $100,000-plus. However, given WalkON's simpler design and intended widespread use, it's possible that it could be priced more affordably, perhaps in the range of $5,000 to $15,000 when it first hits the market. As with many technologies, the price could decrease over time as production scales up.The WalkON system's potential to enhance mobility for people of all ages, particularly older adults and those with health challenges, is immense. By making movement easier and more efficient, WalkON could encourage more active lifestyles, potentially improving overall health and quality of life for many individuals. While questions about availability and cost remain, the development of WalkON is a promising sign that we're moving towards more accessible and user-friendly mobility assistance solutions.If you could design your own mobility assistance device, what features or capabilities would you include and why? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
|
This crime shot up 400% - how to protect yourself
To keep you and your money safe, I make it a point to always let you know about spreading scams, from crypto catfishing to AI deepfakes. I bet you're going to be surprised by this news: The crime that shot up 400% last year is old-school check fraud.
We're giving away a $500 Amazon gift card.
Enter to win now.
No purchase necessary.
It's not high-tech, but it is highly effective. In 2023, check scammers stole
$26.2 billion
from Americans like you and me, right out of our mailboxes. You need to make sure you don't become a statistic.
HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA
Scammers coordinate in private groups on Telegram, Facebook or TikTok to share tips and sell tools that make it easy for scams to spread. One of their tricks? Buying universal keys that can open any USPS drop box or snapping up books of blank checks from the Dark Web.But plenty of crooks just swipe checks right from your mailbox. Then, they use simple household chemicals like acetone to dissolve the ink and write themselves (or their alias) some spending money.Fraudsters deposit their haul at an ATM or right from their couch through a banking app, then they withdraw the cash in chunks so it doesn't trigger alerts. Before you or your bank know it, they're on their way to the casino, buying designer goods or investing in real estate - you name it.
RELATED: 563,588 people start their day with
this free tech newsletter
.
Banks are cracking down on fraud with stricter deposit policies and extended hold times on deposits. So, if you've noticed your funds aren't clearing as fast as they used to, it's because banks are taking extra time to verify deposits for potential fraud.A recent viral TikTok glitch exploited J.P. Morgan's instant access feature for deposits from bad checks. Scammers flooded in, and many ended up being sued - proof crime doesn't pay.
SMARTPHONE TRICKS EVERY IPHONE AND ANDROID USER SHOULD KNOW
If any of your checks go missing or you suspect fraud, file a report immediately - not just with your bank, but also with USPS and your local police department. Be sure to ask for a case number so you can track the progress of your claim.The biggest checkwriters are baby boomers. They don't like change.
SHARING IS NOT ALWAYS CARING: 7 DANGEROUS THINGS TO POST ONLINE
Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Data broker blunder: More than 600,000 sensitive files exposed in data services leak
There are companies whose entire business model is built around collecting personal data, including criminal records, employment details, addresses and more. They use this data to offer background check services to other businesses and individuals. However, while they profit from this information, they often fail to adequately protect it. Earlier this year, the National Public Data made headlines for
failing to secure 2.7 billion records of people whose data it collected
. Now, on a smaller scale, another data aggregator has exposed the personal information of 600,000 Americans.
ENDS TOMORROW: I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by
signing up
for my free newsletter.
As reported by
Website Planet
, the exposed database contained 644,869 PDF files, totaling 713.1 GB of sensitive data. These documents mainly consisted of background checks but also included court records, vehicle ownership details such as license plates and VINs, and property ownership reports. The background checks alone revealed highly sensitive personal data, including full names, home addresses, phone numbers, email addresses, employment details, information about family members, social media accounts and criminal histories.The worst part is that the database was left publicly accessible without password protection or encryption, allowing anyone to grab it. Anyone with the link could view and download the files. Plus, the files were named in a way that exposed personal details, using formats like "First_Middle_Last_State.PDF." This made sensitive information visible even without opening the files.
HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS
The database that exposed over 600,000 records belongs to SL Data Services LLC, an information research provider that appears to prioritize convenience over basic data security. The company operates a sprawling network of around 16 websites, including Propertyrec, which advertises real estate ownership data and property records. However, SL Data Services' business goes far beyond property records, offering services like criminal background checks, DMV records and even birth and death records.While Propertyrec promotes its affordability, claiming users can search for documents for as little as $1, customer reviews paint a different picture. Many users report being unknowingly enrolled in subscription services, resulting in recurring charges instead of the promised one-time fees. This predatory business practice raises further questions about the company's ethics and transparency.
BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU
The exposure of sensitive personal info in this breach is a big deal for the people involved. The database has detailed data about them, and that's basically a jackpot for cybercriminals. This kind of leak can lead to various dangerous outcomes. For one, attackers could use this info to run phishing scams or social engineering tricks. If they know details like your job, family or even criminal history, they can send super convincing messages to trick you into sharing even more sensitive details, like your financial info. That's not all. Criminals could also use this leaked data to impersonate someone and apply for loans, credit cards or other services in their name.What really gets me, though, is that most people whose info got leaked probably won't even find out about it unless they're using a service to remove their data. A lot of them might not have even known they were being background-checked in the first place. For those with criminal records, this kind of leak could cause major reputational damage or lead to discrimination, even if the info is outdated or flat-out wrong.We reached out to SL Data Services/Propertyrec for a comment but did not hear back before our deadline.
1) Remove your personal information from the internet:
While no service can promise to completely erase your data from the internet, using a data removal service is one of the best steps you can take. They do the heavy lifting by actively scanning and removing your personal information from hundreds of websites. This helps protect you from scammers who may cross-reference data from breaches with other information they find on the dark web.
Check out my top picks for data removal services here
.
2) Be wary of mailbox communications:
With your address exposed, bad actors could try to scam you through physical mail. They may impersonate companies or people you trust and send fake urgent letters about things like missed deliveries, account suspensions or security alerts. Be skeptical of unexpected communications and verify any claims before taking action.
3) Be cautious of phishing attempts and use strong antivirus software:
The leaked data could lead to phishing attacks via email, phone calls or messages from unknown sources. Be on high alert for any requests for personal information, especially if they seem urgent or ask you to click on suspicious links. Always verify the legitimacy of any request before responding.To protect your devices from malicious links, make sure you have strong antivirus protection. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
4) Monitor your accounts:
Given the scope of this breach, it's crucial to start regularly reviewing your bank accounts, credit card statements and other financial accounts. Keep an eye out for any unauthorized transactions and report them immediately to your bank or credit card company to prevent further damage.
5) Use strong, unique passwords:
Create complex passwords for each of your online accounts and consider using a
password manager
to keep track of them securely.
6) Enable two-factor authentication (
2FA
):
Implement this extra layer of security on all accounts that offer it to prevent unauthorized access.
7) Regularly update your software:
Keep your operating system, apps and security tools
up to date
to protect against known vulnerabilities.
WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED
It's alarming how many companies profit from collecting personal data, yet fail to protect it adequately. Recent breaches, including one exposing the sensitive information of 600,000 Americans, highlight this negligence. With unprotected databases containing everything from criminal records to addresses, cybercriminals have a treasure trove of information to exploit. This situation underscores the urgent need for you to take proactive steps to safeguard your privacy and demand better security practices from these data aggregators.Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Try CyberGuy's new games (crosswords, word searches, trivia and more!)
Enter CyberGuy's $500 Holiday Gift Card Sweepstakes
Kurt's Best New Cyber Monday Deals
Copyright 2024 CyberGuy.com. All rights reserved.
|
Is your friend's phone number compromised? Here's what to look for
Phone hacking is a bigger deal than most of us realize, and it's something we all need to be aware of. Just the other day, Dennis sent an email sharing that he had a pretty unsettling experience with a suspicious text message that seemed to come from a friend's number. His story is a wake-up call for all of us to stay alert and informed. By understanding the signs of potential hacking, we can better protect ourselves and our loved ones from cyber threats.
ENDS TOMORROW: I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by
signing up
for my free newsletter.
Dennis received a text from a friend that was unusually brief and out of character, simply asking, "Would you like to chat?" This raised immediate concerns, especially since the number appeared to be his friend's but wasn't recognized by Messenger as being in his contact list. Such scenarios often suggest phone number
spoofing
or
hacking
, where cybercriminals disguise their identity by using someone else's number.
HOW TO STOP ANNOYING ROBOCALLS
Understanding the signs of a compromised phone number is crucial for protecting your personal information and that of your friends. Here are some indicators that your friend's number might be hacked:
Unusual messages:
If your friend starts sending texts that seem out of character - such as odd phrasing, unexpected links or requests for personal information - it could indicate their number has been hacked.
Unknown contacts:
If Messenger says the number is not in your contact list when it actually is, it might indicate a problem.
Unexpected phone behavior:
If your friend mentions their phone is acting strangely, they should look out for:
Unauthorized charges:
If your friend's phone bill shows unexpected charges, it can result from premium SMS services or calls made by malicious apps.
Spam sent from your friend's number:
If you or other contacts receive spam or suspicious messages from your friend's number, it's a strong sign that their phone might be compromised.
KURT'S BEST NEW CYBER MONDAY DEALS
WHY AM I GETTING SPAM FROM MY OWN EMAIL ADDRESS AND HOW TO STOP IT
If you suspect your friend's phone number has been hacked, consider these actions:
1) Verify with your friend:
Contact them through another method to confirm if they sent the message.
2) Check for malware using strong antivirus software:
Advise your friend to use strong antivirus software to scan for malicious apps or malware on the device. The best way for them to safeguard from malicious links that install malware, potentially accessing their private information, is to have antivirus software installed on all their devices. This protection can also alert them to phishing emails and ransomware scams, keeping their personal information and digital assets safe.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
3) Change passwords
: If your friend suspects their phone number has been hacked, they should change their passwords for all accounts linked to their phone number. They should consider using a
password manager
to generate and store complex passwords.
4) Contact service provider
: Your friend should contact their mobile service provider to report the issue. The provider can help secure their account and prevent further unauthorized access.
5) Enable two-factor authentication
: Encourage your friend to enable
two-factor
authentication
nn their accounts for added security.
6) Monitor accounts:
Advise your friend to regularly check their bank statements and credit reports for suspicious activity.Phone hacking is a bigger issue than most people realize, and Dennis's recent experience is a stark reminder of that. It's crucial for all of us to stay vigilant and informed about the signs of potential hacking. By recognizing these warning signs and taking proactive steps, we can better protect our personal information and our loved ones from cyber threats.Have you ever experienced a suspicious message or a potential hacking incident? Share your story with us and let us know how you handled it by writing to us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Try CyberGuy's new games (crosswords, word searches, trivia and more!)
Enter CyberGuy's $500 Holiday Gift Card Sweepstakes
Kurt's Best New Cyber Monday Deals
Copyright 2024 CyberGuy.com. All rights reserved.
|
9 ways scammers can use your phone number to try to trick you
Scammers have various methods
when it comes to getting their hands on your phone number. You might think, "Well, what's the big deal? Isn't it easy to find someone's number these days, no matter what?" Yes. And if you've already had your fair share of telemarketers call you, maybe you feel like you've got it under control.The problem is that scammers with the right knowledge and the wrong intentions can wreak havoc just by having your phone number in their possession. Once they do, they can use it to trick you in all sorts of ways. The good news is that by familiarizing yourself with their tactics, you can be one step closer to
preventing yourself from falling victim
to them. Here's what you need to know.
2 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)
In today's digital age, your phone number is more than just a way for friends and family to reach you. It can be a gateway for scammers to access your personal information and wreak havoc on your life. From
phishing attempts
to extortion, the risks are numerous and varied. Here are nine ways scammers can exploit your phone number if it falls into the wrong hands:Scammers can also use your phone number to launch rather easy
phishing attacks
. They might send text messages or make calls posing as your bank or a popular online service that you subscribe to. The goal is to call you and trick you into providing login credentials, credit card details or other personal information, which they can then use for fraudulent activities. And once they have all your other information, they can do a lot more damage just by having your phone number as that initial segue.In some cases, scammers use your phone number for extortion or blackmail. They may claim to have compromising information about you and demand payment to keep it private. By contacting you directly, they can apply continuous pressure, making their threats seem more real and immediate.One unique way they do this to target elderly people is by pretending to be your grandchild or another relative in distress. The scammer often claims that your grandchild is in an emergency situation - such as needing bail money or medical assistance - and urgently requests financial help. With
AI voice cloning technology,
they may even be able to use your grandchild's voice. This emotional manipulation usually gets the victim to pay up.This one may not be as dramatic, but your phone number can be sold to
robocall and spam
message services. These automated systems bombard you with unwanted calls and texts, often promoting scams or fraudulent products. While these may seem like minor annoyances, they can lead to bigger scams if you engage with the messages or follow their instructions. Hang up on them.
HOW TO STOP ANNOYING ROBOCALLS
rget=_new href="https://cyberguy.com/scams/how-to-stop-phone-number-spoofing-and-protect-yourself-from-scammers/" target="_blank" rel="nofollow noopener">
Phone number spoofing
is a common tactic where scammers disguise their caller ID to appear as a trusted contact by calling from what appears to be a familiar number as it may have the same area code where you live, an area code where your friends or family live or even the actual phone number of someone close which you can recognize.This makes it more likely that you'll answer the call, giving them the opportunity to deceive you into revealing personal information or transferring money. This is, of course, the case when phone spoofing is used against you. But in situations where they use YOUR phone number, they can be scamming those close to you without you even knowing!With these phone spoofing tactics, scammers can use your phone number to
impersonate government officials
, such as IRS agents or Social Security administrators. They may call you claiming there's an urgent issue, like unpaid taxes or suspicious activity involving your Social Security number. This ploy often involves threats of legal action or arrest to pressure you into providing sensitive information or making immediate payments.Instead of pretending to be from a government agency, another trick is for scammers to try their luck by posing as a representative from a utility company, like an electric or water company. Scammers will claim that you have an overdue invoice and threaten to cut off your service unless you pay immediately. Using your phone number, they can contact you repeatedly, making the scam seem more legitimate (and pressing).
SIM swapping
or a
port-out scam
is when scammers transfer your phone number to a new SIM card in their possession. By convincing your mobile carrier to reroute your number, they can receive all your calls and messages, including those containing two-factor authentication codes. This allows them to bypass security measures and take over your online accounts.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
With SIM swapping techniques/port-out, scammers can also use your phone number as a key to access sensitive data stored in your online accounts. By initiating password resets and intercepting verification codes sent via SMS, they can gain unauthorized access to your email, social media and banking accounts, leading to significant personal and financial damage.Finally, scammers can use all the tactics above to not only access the accounts you already have but also create fake online accounts in your name. These accounts can be used for a variety of
malicious purposes
, such as spreading malware, launching further scams or conducting identity theft. The presence of your phone number makes these accounts appear more legitimate, increasing the chances of deceiving others.
10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE'S SECURITY AND PRIVACY
To protect your phone number from falling into the hands of scammers, here's what you can do:
1. Be cautious about sharing your phone number publicly:
Avoid posting your phone number on public forums, websites or social media platforms where it can be easily accessed by scammers.
2. Limit exposure of your phone number on social media and other online platforms:
Use
privacy settings
to restrict who can see your contact information. Most social media platforms and online services offer privacy settings that allow you to control who can view your personal information. Make sure to review and adjust these settings regularly. Only share your phone number with trusted contacts.
3. Consider using a secondary number for online registrations and transactions:
Services like Google Voice can provide you with a secondary number that you can use for online activities, keeping your primary number private.
4. Monitor your accounts regularly for unusual activity:
Check your bank accounts, email and other online accounts for any signs of unauthorized access or suspicious activity.
5. Have strong antivirus software:
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
6. Use two-factor authentication apps instead of SMS-based verification where possible:rget=_new href="https://cyberguy.com/how-to/what-is-two-factor-authentication-and-why-should-i-enable-it/" target="_blank" rel="nofollow noopener">
Two-factor authentication
(2FA) provides an extra layer of security that is more difficult for scammers to bypass compared to SMS-based verification.
7. Use an identity theft protection service:
Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses.
See my tips and best picks on how to protect yourself from identity theft.
8. Remove your personal information from the internet:
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services here.
rget=_new href="https://www.foxbusiness.com/apps-products" target="_blank" rel="noopener">
GET FOX BUSINESS ON THE GO BY CLICKING HERE
If you suspect that scammers already have your phone number, take the following steps:
Contact your mobile carrier to alert them of the scam calls
, especially if they come from the same number. Your carrier may be able to block the number or provide additional security measures.
Consider changing your phone number if the issue persists:
If scam calls continue despite your efforts, changing your phone number may be the best solution.
Report any suspicious activity to the appropriate authorities:
Contact your local law enforcement or consumer protection agency to report scams and seek advice on further actions.
Consider placing fraud alerts on your accounts:
Fraud alerts can help protect your credit and financial accounts from unauthorized access.
Monitor your phone for unusual calls or messages:
Keep an eye out for any unexpected calls or messages, and do not respond to them.
Check your phone bill for unauthorized charges:
Regularly review your phone bill to ensure there are no unexpected charges, which could indicate that your number has been used fraudulently.By following these steps, you can significantly reduce the risk of falling victim to phone number scams and protect your personal information.
RECLAIM YOUR PRIVACY BY DISABLING YOUR CELL PHONE CARRIER'S DATA TRACKING
Scams have become much more sophisticated these days, especially with artificial intelligence, making it easier for scammers to target more people and get away with it. Always be wary of a scam. If you think something seems strange, it's probably best to go with your gut.Have you ever experienced a scam involving your phone number? If so, how did you handle it? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener">
Ask Kurt a question or let us know what stories you'd like us to cover
Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
No tennis partner? No worries with this AI robot
Imagine having a personal tennis coach who never gets tired, always hits the perfect shot, adapts to your skill level and is available 24/7. Enter the PongBot, a groundbreaking
artificial intelligence-powered
tennis robot that's turning heads in the tennis world. This isn't just another ball-serving machine; it's a smart training partner designed to elevate your tennis game.
2 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)
The PongBot comes with a clever clip-on sensor that tracks your position on the court. This sensor ensures that
the PongBot can deliver
shots tailored to your exact position, simulating the dynamic nature of a real tennis match. Additionally, this technology enables the AI match training feature to adjust ball speed and spin in real time, providing a highly immersive and challenging training experience.
DON'T HAVE ANYONE TO PLAY PING-PONG WITH? NO PROBLEM WITH THIS CREEPY COMPETITIVE ROBOT
Want a personalized training experience? The PongBot app lets you create custom drills down to the individual ball level. Imagine programming a sequence like a deep forehand return, followed by a short backhand, two volleys and an overhead shot - all saved and ready for your next practice session. The PongBot offers up to 300 preprogrammed drills with three difficulty levels. Whether you're a beginner or a seasoned player, there's a drill that'll challenge you just right.
KURT'S BEST NEW BLACK FRIDAY DEALS EXTENDED
ROBOT DOG IS MAKING WAVES WITH ITS UNDERWATER SKILLS
The real game-changer is the
AI match training feature
. The robot continuously reads your court position and analyzes your performance, adjusting ball speed and spin to simulate real match conditions. It's like having a smart opponent who knows exactly how to push your limits.
QUADRUPED ROBOT CLIMBS LADDERS, CREEPS US OUT
The PongBot isn't just smart, it's powerful. It can serve balls at up to 80 mph with various spin types (topspin, underspin or no spin), reaching up to 60 rotations per second. With a ball capacity of 150 and a battery life of eight hours, you'll have plenty of time for an intense training session.What truly sets the PongBot apart is its ability to integrate with the broader tennis technology ecosystem. It works seamlessly with smart devices like intelligent rackets and can sync performance data with the Apple Watch. The over-the-air updates promise continuous improvement, ensuring your training tool stays cutting-edge.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The PongBot's journey began
on Kickstarter
, where it far exceeded its initial goal of just $10,000. This overwhelming support showcases not only the demand for innovative training solutions but also confidence in the creators behind this project. Early backers still have the chance to snag some fantastic deals. You can get the Pace S for about $699 or the Pro model for $899.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Despite some caution often associated with crowdfunding platforms, potential backers can feel secure in their investment here; the team behind PongBot has solid backing from Qualcomm and experience in creating impressive robotics technology. If everything goes according to plan, backers can expect their machines to ship by December - just in time for some serious off-season training.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
By combining AI, smart sensors and adaptive training modes, PongBot offers tennis players an unprecedented opportunity to improve their game. Backed by Qualcomm and created by robotics experts who've already impressed the tech world with ping-pong robots, the PongBot isn't just another crowdfunding project. It's a serious training tool for players who are serious about improving their tennis game.Would you feel comfortable using a robotic training partner like the PongBot to enhance your tennis skills? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
Helpful Hack: Siri's new tricks, photo magic and writing help with iOS 18.1's new AI features
Ready to make
your iPhone
even smarter? With the latest iOS 18.1 update, Apple Intelligence brings many powerful new features to your fingertips. Before you dive into these exciting tools, let's get your device updated and set up. Don't worry - it's a quick and easy process. And once you're all set, you'll be amazed at how these features can transform your day-to-day interactions with your phone. Let's get started.
3 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24 12 pm PT)
First things first, you'll need to update your iPhone to
iOS 18.1 or later
. Here's how:Open the
Settings app.
Tap
General.
Select
Software Update.
If iOS 18.1 or later is available, tap
"Download and Install."
HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE
Once you're on iOS 18.1 or later, enabling
Apple Intelligence
is a breeze:Go to
Settings.
Tap
Apple Intelligence & Siri.
Toggle on
Apple Intelligence.
Your iPhone will then download the necessary AI models. You'll get a notification when it's ready to roll. Currently, Apple Intelligence is only available on iPhone 15 Pro, iPhone 15 Pro Max, and newer iPads and Macs with M1 chips or later.
WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH
Now for the fun part. Let's check out some of the coolest new features:You can use Apple Intelligence to summarize messages and mail and get the key details at a glance. Here's how it works:In your mail app, tap an
email message
or thread.Now, tap the
summarize button
in the top right corner.An
animation
appears as Apple Intelligence analyzes the text, and a
summary
will appear above the email.
I
S IT TIME FOR ME TO UPGRADE TO A NEW IPHONE?
Siri's gotten a major upgrade and is now supercharged by Apple Intelligence. When you talk to Siri, you'll notice an elegant glowing light around the edge of your screen that shows that Apple Intelligence is working for you.It now can handle those "umm" moments we all have. For example, try saying, "Hey Siri, set a 10-minute, no, 15-minute timer." Siri will understand and set the 15-minute timer.If you don't want to ask Siri out loud, you can now type to Siri. Just
double-tap
at the bottom of the screen, and you can quickly and quietly
type your Siri request.
Apple Intelligence has your back when it comes to writing. Here's how to use it:Select
any text
in an email or document by
double-tapping on the text
and dragging the cursor over the text you want help with.Then, the
selection handles
will appear. Tap the
Writing Tools
icon that appears above the selected text.Choose from options like
"Proofread," "Rewrite," "Friendly," "Professional," "Concise," "Summary," "Key Points," "List"
or
"Table."
Here's what each does specifically:
Proofread:
Checks for grammar and spelling errors.
Rewrite:
Offers alternative phrasing for the selected text.
Friendly:
Makes the text more casual and approachable.
Professional:
Adjusts the tone to be more formal and polished.
Concise:
Shortens the text to be more direct.
Summary:
Provides a brief overview of the selected text.
Key Points
: Highlights the main ideas.
List:
Converts the text into a list format.
Table:
Organizes the text into a table.Once you've made your selection, you can either tap
Done
or
Revert
to what you had.Your photo library just got a lot more searchable:Open the
Photos app.
Tap the
search icon
at the top of the screen.Try
natural language queries
like "dog sitting on the couch."Click Search, and you'll be amazed at how accurately it finds your photos.Tap
Done
Want to remove unwanted objects from your photos? Here's how:Open a photo in the
Photos app.
Tap the
Edit button
below the picture.Select the
Clean Up
tool in the bottom right of the screen.
Circle
or
tap
the object you want to remove.Apple Intelligence will
work its magic to erase it
seamlessly.Then, click either
done
or
cancel.
Create custom photo slideshows using natural language prompts. Here's how to use this feature:Open the
Photos app.
Scroll down to where it says
Memories.
Click where it says
Create
to Create a Memory Movie.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Enter a
text prompt
describing the theme or content you want and then tap the
up arrow.
Apple Intelligence will work its magic to
Create a Memory Movie
seamlessly.Tap the
three horizontal dots
at the top of the screen to
Edit Move Timeline,
or you can tap
Share Movie
to share it via Messages, Mail or Social Media.Tired of notification overload? Apple Intelligence now provides smart summaries for your emails and messages. Just swipe down from the top of your screen to see condensed versions of your notifications.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Remember, to access these features, you'll need a compatible device (iPhone 15 Pro, iPhone 16 series or newer iPads/Macs with M1 chips or later) running iOS 18.1 or later. You'll also need to enable Apple Intelligence in your device settings.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
While these features are exciting, Apple has even more in store. We're still waiting on some promised capabilities like emoji creation, image playground and ChatGPT integration. Apple hasn't given us a firm timeline, but stay tuned - the AI revolution on your iPhone is just getting started.What feature of Apple Intelligence are you most excited to try out on your device, and why? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:
New from Kurt:
Try CyberGuy's new games (crosswords, word searches, trivia and more!)
Enter Cyberguy's $500 Holiday Gift Card Sweepstakes
KURT'S HOLIDAY GIFT GUIDES
Deals:
Unbeatable Best Black Friday deals
|
Laptops
|
Desktops
|
Printers
Best gifts for:
Men
|
Women
|
Kids
|
Teens
|
Pet lovers
For those who love:
Cooking
|
Coffee
|
Tools
|
Travel
|
Wine
Devices:
Laptops
|
Desktops
|
Printers
|
Monitors
|
Earbuds
|
Headphones
|
Kindles
|
Soundbars
|
Vacuums
|
Surge strips and protectors
Accessories:
Car
|
Kitchen
|
Laptop
|
Keyboards
|
Phone
|
Travel
|
Keep It Cozy
Can't go wrong with these:
Gift Cards
|
Money-saving apps
|
Amazon Black Friday insider tips
Copyright 2024 CyberGuy.com. All rights reserved. |
Robots perform like human surgeons by just watching videos
In a groundbreaking development,
researchers at Johns Hopkins University
(JHU) and Stanford University have successfully trained a robotic surgical system to perform complex tasks with the skill of human doctors. This achievement marks a significant step toward autonomous
robotic surgery
, potentially transforming the future of medical procedures.The team utilized a da Vinci Surgical System, a
robotic platform typically controlled remotely by surgeons
. Using a machine learning technique called imitation learning, they trained the system to perform three critical surgical tasks: manipulating a needle, lifting body tissue and suturing.
3 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24 12 pm PT)
What sets this approach apart is the training method. Instead of painstakingly programming each movement, the robot learned by watching hundreds of videos recorded from wrist-mounted cameras on da Vinci robots during actual surgical procedures. This method allows the robot to learn from the collective experience of numerous skilled surgeons, potentially surpassing the capabilities of any single human operator.
KURT'S BEST NEW BLACK FRIDAY DEALS
COULD YOUR NEXT PHYSICAL EXAM BE PERFORMED BY A ROBOT FINGER?
The researchers developed an AI model that merges imitation learning with the machine learning architecture used in popular language models like ChatGPT. However, this model operates in the language of robotics - kinematics - translating visual input into precise robotic movements. This sophisticated approach allows the system to understand and replicate complex surgical maneuvers with remarkable accuracy.
THE CREEPY YET HELPFUL HUMANOID ROBOT READY TO MOVE INTO YOUR HOME
The surgical system not only executed tasks as proficiently as human surgeons but also demonstrated the ability to correct its own mistakes. As Axel Krieger, assistant professor at JHU, noted, "Like if it drops the needle, it will automatically pick it up and continue. This isn't something I taught it to do." This level of autonomy and adaptability is crucial in surgical settings where unexpected situations can arise. The robot's ability to problem-solve and adjust its actions in real time could potentially reduce complications and improve patient outcomes.
ROBOTS GET A FEEL FOR HUMAN TOUCH, NO ARTIFICIAL SKIN REQUIRED
This breakthrough could significantly speed up the development of autonomous surgical robots. Traditional methods of programming robots for surgery are time-consuming and limited in scope. With this new approach, Krieger explains, "We only have to collect imitation learning of different procedures, and we can train a robot to learn it in a couple days." This rapid learning capability opens up possibilities for quickly adapting surgical robots to new procedures or techniques, potentially revolutionizing the field of robotic surgery.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The JHU team is now working on expanding this technology to train robots to perform complete surgical procedures. While fully autonomous robotic surgery may still be years away, this innovation paves the way for safer and more accessible complex treatments worldwide. The ability to train robots on entire surgical procedures could lead to standardized, high-quality surgical care even in areas lacking specialized surgeons.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
By harnessing the power of AI and imitation learning, we're witnessing the birth of surgical robots that can learn and adapt much like human surgeons. As this technology continues to evolve, it holds the promise of reducing medical errors, increasing surgical precision, and potentially making advanced surgical procedures available to more patients globally. While there are still challenges to overcome, including ethical considerations and regulatory approvals, the future of AI-assisted and autonomous robotic surgery looks increasingly promising.Would you feel comfortable undergoing surgery performed by a robotic system trained using AI and imitation learning? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. |
Artificial intelligence changes across the US
An increasing number of companies are using
artificial intelligence
(AI) for everyday tasks. Much of the technology is helping with productivity and keeping the public safer. However, some industries are pushing back against certain aspects of AI. And some industry leaders are working to balance the good and the bad."We are looking at critical infrastructure owners and operators, businesses from water and health care and transportation and communication, some of which are starting to integrate some of these AI capabilities," said U.S. Cybersecurity and Infrastructure Security Agency Director Jen Easterly. "We want to make sure that they're integrating them in a way where they are not introducing a lot of new risk."
US AGRICULTURE INDUSTRY TESTS ARTIFICIAL INTELLIGENCE: 'A LOT OF POTENTIAL'
Consulting firm Deloitte recently surveyed leaders of business organizations from around the world. The findings showed uncertainty over government regulations was a bigger issue than actually implementing AI technology. When asked about the top barrier to deploying AI tools, 36% ranked regulatory compliance first, 30% said difficulty managing risks, and 29% said lack of a governance model.Easterly says despite some of the risks AI can pose, she said she is not surprised that the government has not taken more steps to
regulate the technology
."These are going to be the most powerful technologies of our century, probably more," Easterly said. "Most of these technologies are being built by private companies that are incentivized to provide returns for their shareholders. So we do need to ensure that government has a role in establishing safeguards to ensure that these technologies are being built in a way that prioritizes security. And that's where I think that Congress can have a role in ensuring that these technologies are as safe and secure to be used and implemented by the
American people
."Congress has considered overarching protections for AI, but it has mostly been state governments enacting the rules."There are certainly many things that are positive about what AI does. It also, when fallen into the hands of bad actors, it can destroy [the music] industry," said Gov. Bill Lee, R-Tenn., while signing state legislation in March to protect musicians from AI. The Ensuring Likeness Voice and Image Security Act, or ELVIS Act, classifies vocal likeness as a property right. Lee signed the legislation this year, making Tennessee the first state to enact protections for singers. Illinois and California have since passed similar laws. Other states, including Tennessee, have laws that determine names, photographs and likenesses are also considered a property right."Our voices and likenesses are indelible parts of us that have enabled us to showcase our talents and grow our audiences, not mere digital kibble for a machine to duplicate without consent," country recording artist Lainey Wilson said during a congressional hearing on AI and intellectual property.
AI HORROR FLICK STAR KATHERINE WATERSTON ADMITS NEW TECH IS 'TERRIFYING'
Wilson argued her image and likeness were used through AI to sell products that she had not previously endorsed."For decades, we have taken advantage of technology that, frankly, was not created to be secure. It was created for speed to market or cool features. And frankly, that's why we have cybersecurity," Easterly said.The Federal Trade Commission (FTC) has cracked down on some deceptive AI marketing techniques. It launched "Operation AI Comply" in September, which tackles unfair and deceptive business practices using AI, such as fake reviews written by chatbots."I am a technologist at heart, and I am an optimist at heart. And so I am incredibly excited about some of these capabilities. And I am not concerned about some of the Skynet things. I do want to make sure that this technology is designed and developed and tested and delivered in a way to ensure that security is prioritized," Easterly said.Chatbots have had some good reviews. Hawaii approved a law this year to invest more in research utilizing AI tools in the health care field. It comes as one study finds, OpenAI's chatbot outperformed doctors in diagnosing medical conditions. The experiment compared doctors using ChatGPT with those using conventional resources. Both groups scored around 75% accuracy, while the chatbot alone scored above 90%.AI isn't just being used for disease detection, it's also helping emergency crews detect catastrophic events. After deadly
wildfires devastated Maui
, Hawaii state lawmakers also allocated funds to the University of Hawaii to map statewide wildfire risks and improve forecasting technologies. It also includes $1 million for an AI-driven platform. Hawaiian Electric is also deploying high-resolution cameras across the state.
AI DETECTS WOMAN'S BREAST CANCER AFTER ROUTINE SCREENING MISSED IT: 'DEEPLY GRATEFUL'
"It will learn over months over years to be more sensitive to what is a fire and what is not," said Energy Department Under Secretary for AI and Technology Dimitri Kusnezov.
California and
Colorado have similar technology. Within minutes, the AI can detect when a fire begins and where it may spread.AI is also being used to keep students safe. Several school districts around the country now have firearm detection systems. One in Utah notifies officials within seconds of when a gun might be on campus."We want to create an inviting, educational environment that's secure. But we don't want the security to impact the education," said Park City, Utah, School District CEO Michael Tanner.Maryland and Massachusetts are also considering state funds to implement similar technology. Both states voted to establish commissions to study emerging firearm technologies. Maryland's commission will determine whether to use school construction funding to build the systems. Massachusetts members will look at risks associated with the new technology."We want to use these capabilities to ensure that we can better defend the critical infrastructure that Americans rely on every hour of every day," Easterly said.The European Union passed regulations for AI this year. It ranks risks from minimal, which have no regulations, to unacceptable, which are banned. Chatbots are classified as specific transparency and are required to inform users they are interacting with a machine. Software for critical infrastructure is considered high risk and must comply with strict requirements. Most technology that profiles individuals or uses public images to build-up databases is considered unacceptable.The U.S. has some guidelines for AI use and implementation, but experts say they believe it will not go as far as the EU classifying risks."We need to stay ahead in America to ensure that we win this race for artificial intelligence. And so it takes the investment, it takes the innovation," Easterly said. "We have to be an engine of innovation that makes America the greatest economy on the face of the earth." |
Siberia's 'Gateway to Hell' crater fuels new fears
In the remote reaches of Siberia, a colossal scar on the Earth's surface is expanding at a breathtaking pace, swallowing up the frozen landscape and potentially unleashing ancient threats. The Batagaika crater, aptly nicknamed the "Gateway to Hell," is not just a geological curiosity, it's a stark reminder of the rapid changes our planet is undergoing.
4 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24 3 pm ET)
Enter by
signing up
for my free newsletter.
Imagine a gash in the Earth so large you could fit several football stadiums inside it. That's the Batagaika crater for you. This massive thermokarst depression - a fancy term for a giant permafrost-thaw sinkhole - is growing at an astonishing rate of 35 million cubic feet each year. To put that into perspective, it's like carving out a small town's worth of earth annually. Currently stretching about 0.6 miles long and 0.5 miles wide at its widest point, this behemoth shows no signs of slowing down. In fact, it's speeding up, driven by a vicious cycle of warming temperatures and melting ice. This study was published in the
journal Geomorphology
.
IS THIS SPACE CAPSULE HOW WE WILL LIVE, WORK IN ORBIT IN FUTURE?
Despite its name, permafrost isn't actually permanent. It's ground that's remained at or below freezing for at least two years. When this frozen soil thaws, it can't support the weight above it, leading to collapse and the formation of these massive "slumps." The Batagaika crater is a prime example of this process in overdrive. As the permafrost melts, it exposes more soil to sunlight, which then melts more permafrost. It's a feedback loop that's difficult to break, especially in our warming world.
KURT'S BEST NEW BLACK FRIDAY DEALS
RACE TO FLOAT TOURISTS TO EDGE OF SPACE HEATING UP
While the sheer size of the Batagaika crater is impressive, what's truly mind-boggling is its depth, both physical and temporal. The steep walls of this mega-slump reveal permafrost layers estimated to be 650,000 years old. That's older than our species. But with ancient ice comes ancient dangers. Scientists have already revived a 48,500-year-old "zombie virus" from Arctic permafrost, and there's concern about what other long-dormant pathogens might be awakening. It's not just a plot from some sci-fi movie anymore. It's a real consideration for modern science and medicine.
CALIFORNIA'S FIRST ELECTRIC TRAIN COULD BE WHAT'S COMING TO YOUR CITY
The Batagaika crater isn't just releasing potential pathogens. It's also unleashing a significant amount of carbon into the atmosphere. According to recent studies, this single mega-slump is responsible for releasing 4,000 to 5,000 tons of organic carbon every year. That's equivalent to the annual emissions of about 1,000 cars. This release of carbon, previously locked away in the frozen ground, further contributes to global warming, potentially accelerating the very process that created the crater in the first place.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
The Batagaika crater, while extreme, is not unique. It represents a process happening across the Arctic and sub-Arctic regions. As our planet continues to warm, more of these massive permafrost thaw features are likely to appear. While some might see the crater as a tourist attraction - and indeed it has become one - it's crucial to recognize it as a warning sign. The "Gateway to Hell" is more than just a catchy nickname; it's a portal into a possible future where rapid environmental changes reshape our world in ways we're only beginning to understand. The question remains: Will we heed the warning signs and take action, or will we continue to watch as more gateways open across our warming world?What are your thoughts on the potential impacts of ancient pathogens being released from melting permafrost, and how do you think we should address the challenges posed by climate change? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:
New from Kurt:
Try CyberGuy's new games (crosswords, word searches, trivia and more!)
Enter CyberGuy's $500 Holiday Gift Card Sweepstakes
KURT'S HOLIDAY GIFT GUIDES
Deals:
Unbeatable Best Black Friday deals
|
Laptops
|
Desktops
|
Printers
Best gifts for:
Men
|
Women
|
Kids
|
Teens
|
Pet lovers
For those who love:
Cooking
|
Coffee
|
Tools
|
Travel
|
Wine
Devices:
Laptops
|
Desktops
|
Printers
|
Monitors
|
Earbuds
|
Headphones
|
Kindles
|
Soundbars
|
Vacuums
|
Surge strips and protectors
Accessories:
Car
|
Kitchen
|
Laptop
|
Keyboards
|
Phone
|
Travel
|
Keep it cozy
Can't go wrong with these:
Gift cards
|
Money-saving apps
|
Amazon Black Friday insider tips
Copyright 2024 CyberGuy.com. All rights reserved.
|
US agriculture industry tests artificial intelligence: 'A lot of potential'
In the 1930s, there were around 6.8 million farms
in the United States
. The size averaged at around 155 acres. Over the next several decades, the number of farms rapidly declined to around 1.9 million in 2023. Those farms grew larger, averaging around 464 acres.As farming has changed over time, experts believe
artificial intelligence
(AI) can help farmers and producers make food faster and more efficiently.
FARMERS 'BRUTALIZED' AS COSTS 'GO THROUGH THE ROOF' IN LAST DAYS OF BIDEN'S AMERICA
"I think there's a lot of potential for both increasing productivity on the crop side, but also for reducing the amount of resources that we use on the productivity side. There's the data that we can actually collect to increase yields and improve the nutritional quality. But then there's also the facilitate facilitating of reductions in labor availability," said Mason Earles, an assistant professor at UC Davis in the departments of Viticulture & Enology and Biological & Agricultural Engineering and researcher at the AI Institute for Next Generation Food Systems or AIFS.The most recent data shows 41% of farmers reported labor shortages in 2018. That's a 27% increase from those reporting shortages in 2014. The trend is expected to continue. The Bureau of Labor Statistics projects a 2% decline in workers through 2033 despite the number of job openings remaining the same."We do more with less. It's not that it has no set way and has totally changed the traditional work, it is empowering, and it is increasing the productivity of existing workers," said Ilias Tagkopoulos, a
computer science
professor at UC Davis and the director of AIFS.AIFS is funded through a grant from the USDA Institute of Food and Agriculture. It is part of USDA's effort to conduct more research on utilizing Artificial Intelligence in agriculture.
RURAL AMERICANS ARE MAD - AND THEY GAVE DEMOCRATS A RECKONING
"One of the big things that I specifically focus on, and we work at the Institute for Food Systems is trying to say, how can I make an impact in agriculture and food systems across the board? Whether that has to do with production of different types of vegetables, fruits, nuts, other types of meats or other
types of foods
," Earles said. "There's a lot of potential, we think, all the way from going from the research and lab side through startups, through corporate innovation. And we're here to kind of find a way to facilitate and integrate that along the way."A USDA study shows just 27% of farmers are using
emerging technologies
like Artificial Intelligence. Investment is expected to grow across the industry from more than $2 billion this year to more than $5 in 2028."What our vision is, is how can we have a healthier society and a more sustainable planet? Our mission is to leverage AI to build that, to help towards that goal," Tagkopoulos said. "AI is doing two things. One is making businesses more productive. And the second is to accelerate innovation. It accelerates innovation by actually focusing on what matters versus what's out there."Researchers are looking into how AI hardware like sensors or robotics can better gather data in the field."One of the powers of AI is that it can process a massive amount of data in a very short amount of time and achieve really high performance in pattern recognition," Earles said.The technology can help farmers decide where to apply fertilizer and when the best opportunities for harvest might be.
AI BEING USED TO RUN WORLD'S FIRST INDOOR VERTICAL BERRY FARM
"There's great examples out there of being able to process millions of images within the course of every hour to identify where there might be damage due to weeds, presence of weeds or disease or pest, and be able to use various types of either implements to precisely remove those weeds or pests so that the farmer see higher yields. And the consumer sees better fruit, veggies and other products that are coming out of those fields," Earles said.One USDA project at the University of Arkansas is looking at using virtual reality to process poultry. Researchers will study whether robots can be used in the field while workers control the devices virtually. While fewer workers are expected to be needed, the cost of the equipment is high."The question there is how can you make this technology even more cost-effective and the even more practical, which is always a challenge," Tagkopoulos said.Controlled environments or indoor farming also see high upfront costs. But some studies have shown that higher crop yields are possible because of fewer weather-related challenges and the ability to grow year-round."We see in the future more data being generated, more tools becoming available, easier, much less expensive in terms of AI tools to be able to give recommendations on when to irrigate, when to farm, where to sell. A lot of more collaboration among farmers because now they understand more that they need to share their data. And it's not about competition. It's about everybody winning out of it," Tagkopoulos said.Controlled environments have received a lot of funding in the past few years. The USDA recently broke ground on a project at Cornell University to research grapes. The National Grape Improvement Center will help scientists study climate adaptable grape varieties and management strategies for growers."The opportunity to grow fruits and veggies and other types of crops where they may not otherwise be able to grow has huge potential for delivering all sorts of foods, fresh foods and nutritious foods to urban and or other areas," Earles said. "AI has the real potential to help us understand how to regulate those types of indoor climates so that it can optimize the output." |
Spotify playlists are being hijacked to promote pirated software and scams
Many of us
use Spotify every day
, whether to listen to songs, podcasts or audiobooks. Some of us create playlists of our favorite songs, while others save playlists made by others. In case you didn't know, Spotify allows you to create public playlists that anyone can save and listen to. You'd think this is a harmless feature, but spammers have found a way to misuse it. They're using Spotify playlists and podcasts to push pirated software, game cheat codes,
spam links and malware sites
. I'll discuss the details of this emerging online scam and share tips on how to stay safe.
5 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (ends 12/2/24 12 pm PT)
As reported by
BleepingComputer
, this scam works by misusing Spotify's popularity and trustworthiness. Scammers exploit Spotify playlists by injecting targeted keywords, such as "free download," "crack" or "warez," into titles and descriptions. These keywords are designed to align with popular search terms. Since Spotify's web player pages are indexed by search engines like Google, these spammy results appear in user searches, driving traffic to their links. For example, a Spotify playlist titled "Sony Vegas Pro 13 Crack..." was found promoting "free" software sites in its title and description, directing users to questionable external links.The scam isn't limited to playlists. It extends to podcasts as well.
Scammers create podcasts
with multiple short episodes, typically under 20 seconds, using synthesized speech to direct listeners to click links in the description for free content. These podcasts often target users searching for pirated ebooks, audiobooks or game cheats. While the content may appear legitimate at first glance, clicking on the links often results in being redirected to unsafe pages that further exploit users.
4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH
The main goal of this scam is to use Spotify's trusted reputation and search engine visibility to get people to click on shady links and visit sketchy websites. Scammers make money through fake ad clicks, bogus surveys and affiliate links, while also spreading malware by tricking users into downloading harmful software or extensions. They also try to steal personal info through fake sign-up forms or phishing pages, which can lead to identity theft or be sold to others. By using Spotify's indexed pages, they boost the search rankings of their spam sites, reaching more people. Some of these sites even run extra scams like fake crypto giveaways or phishing attempts to grab even more money or data from unsuspecting users.
CLICK HERE TO SIGN UP FOR THE ENTERTAINMENT NEWSLETTER
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
1. Avoid clicking on suspicious links:
Be cautious when you come across playlists or podcasts with titles like "Sony Vegas Pro 13 Crack" or other promises of free software, audiobooks or game cheats. These often include links in the description that redirect to unsafe sites hosting malware, adware or phishing pages.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
2. Stick to official sources:
Always download software, eBooks or other digital content from trusted official websites or reputable platforms. If you see a Spotify playlist or podcast offering "free" versions of paid content, it's likely a scam. Cross-check the legitimacy of the content through known channels instead of relying on unverified links.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
3. Use strong, unique passwords:
Create complex and unique passwords for your Spotify account and avoid using personal information like birthdays or pet names. Consider using a
password manager
to generate and store complex passwords.
4. Be skeptical of synthesized speech and short episodes:
Many scam podcasts feature short episodes (10-20 seconds) with synthesized speech directing you to click on a link in the description. These are a common tactic used to trick users into visiting unsafe pages. If the content feels automated, vague or overly promotional, it's best to avoid it.
5. Verify curator credentials:
Check the credentials of playlist curators. Legitimate curators usually have a verifiable online presence. If you can't find any information about them, it's best to avoid engaging with them.
6. Recognize phishing attempts:
Be cautious of emails claiming to be from Spotify that ask you to confirm account details or click on suspicious links. These are often phishing attempts designed to steal your credentials.
7. Report and block suspicious content:
If you come across playlists or podcasts that seem fraudulent or inappropriate,
report them directly to Spotify
. Use Spotify's reporting tools to flag content that violates its platform rules. Blocking suspicious accounts or playlists also ensures you won't accidentally interact with them in the future, and reporting helps Spotify improve its filtering and moderation systems.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Scammers will use any means possible to trick you. In the past, we've seen bad actors weaponize
Google search results
with malicious websites that install malware when links are clicked on. There have also been plenty of
SEO scams
targeting users. Companies like Spotify need to implement measures to prevent their platforms from being misused by scammers. Google also has a responsibility to ensure the quality of its search results. Just because a webpage comes from a well-known organization doesn't mean it deserves to rank highly on the search results pages.Do you think platforms like Spotify and Google are doing enough to prevent scams, or could they improve? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:
New from Kurt:
Try CyberGuy's new games (crosswords, word searches, trivia and more!)
Enter CyberGuy's $500 Holiday Gift Card Sweepstakes
KURT'S HOLIDAY GIFT GUIDES
Deals:
Unbeatable Best Black Friday deals
|
Laptops
|
Desktops
|
Printers
Best gifts for
Men
|
Women
|
Kids
|
Teens
|
Pet lovers
Copyright 2024 CyberGuy.com. All rights reserved.
|
Amazon's VP explains how to protect yourself from holiday impersonation scams
Black Friday is around the corner, and by the time you finish your
Thanksgiving leftovers
, Christmas will already be knocking. That might be an exaggeration, but what's not is the rise in impersonation scams as the holiday season approaches. With shopping in full swing, Amazon becomes an especially big target. Expect to see bad actors pretending to be trusted contacts, trying to access sensitive information like Social Security numbers, bank details or Amazon account credentials.To help you enjoy a scam-free shopping experience this holiday season, we spoke with Scott Knapp, VP of Worldwide Buyer Risk Prevention
at Amazon
, to learn how scammers impersonate the platform, what Amazon is doing to fight holiday scams and how you can stay safe.
5 DAYS LEFT! I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS(ends 12/2/24 12 pm PT)
Amazon is the world's largest e-commerce platform, and it becomes even more relevant during the holiday season. With so many of us hunting for deals, scammers are well aware and ready to take advantage. They often use impersonation scams to trick shoppers into handing over card details or other sensitive information."During the 2023
holiday shopping season
(Black Friday through Christmas Day), the most commonly reported impersonation scam by Amazon customers involved fake order or shipping confirmations claiming that payment was required in the U.S. There was nearly a 1.5x increase in reports of this scam from three weeks prior," Knapp said. Another common impersonation scam around this time involves fake purchase alerts for popular tech products. Knapp said that Amazon saw about a 13x spike in customer reports compared to three weeks earlier.
HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS
It's clear that many scammers are trying to target Amazon customers, so I wanted to understand what the company is doing to keep them safe. I asked Knapp a bunch of questions about how the e-tail giant is staying ahead of the latest online holiday scams, and you can read his responses below.
How is Amazon working to take down phishing websites and phone numbers used in impersonation schemes?
"Our goal is to ensure that customers are protected when they shop on Amazon. That is why we are initiating the takedown of scammers with public-private partnerships to hold bad actors accountable. We have a team - including machine learning scientists and expert investigators - who protect our store and consumers from fraud and other forms of abuse."In 2023 alone, we initiated takedowns of more than 40,000 phishing websites and 10,000 phone numbers being used as part of impersonation schemes. We can take down reported scam phone numbers the same day and phishing websites in just a couple of hours. We also partner with law enforcement across the globe to ensure scammers are held accountable, including having referred hundreds of bad actors to authorities."
CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER
Can you explain how Amazon's email verification technology helps identify phishing attempts?
"We've made it harder for bad actors to impersonate Amazon communications through implementing industry-leading tools, including the adoption of a secure email capability to make it easier for customers to identify authentic emails from Amazon and avoid phishing attempts. Customers using Gmail, Yahoo, and other common email providers can be confident that when they receive an @amazon.com email with the smile logo in their inbox, that email is really from us."
Can you explain Amazon's A-to-z Guarantee and how it protects holiday shoppers?
"More than 60% of sales in Amazon's store are from independent sellers-most of which are small and medium-sized businesses-providing a vast selection of amazing products, competitive prices, and convenience for consumers. When customers shop in the Amazon store, they can do so with peace of mind knowing that we stand behind the products sold in our store with the
A-to-Z Guarantee
."When a claim is filed, Amazon combines our advanced fraud and abuse detection systems with external, independent insurance specialists to analyze filings, take on the investigative work for our selling partners, present valid claims, and deny unsubstantiated, frivolous, or abusive claims. By doing this work on behalf of sellers, we save them from having to investigate these claims on their own. Innovating this process enables customers to shop confidently, which in turn drives selling partner success."Amazon's protection applies to physical products purchased in our store worldwide, and in the unlikely event that customers experience issues with timely delivery or the condition of their purchase, whether purchased from Amazon or one of our approximately two million selling partners, Amazon will make it right by refunding or replacing it. Whether during the holiday shopping season, or anytime throughout the year, customers can confidently shop Amazon's vast selection of amazing products with the A-to-z Guarantee."
BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU
1. Watch out for red flags:
Some telltale signs of an impersonation scam include requests for account or payment information and creating a false sense of urgency. Amazon will never ask for your password, payment or bank transfer through phone, email or any external website. Scammers might reference a purchase (real or fake), a giveaway, a prize or claim that "your account is locked," urging you to click a link, make a payment or buy a gift card.
2. Verify the email:
For any questions related to an order, always check your order history on Amazon.com or via the "Amazon Shopping" app. Only legitimate purchases will appear in your order history. If you are ever unsure about the legitimacy of an email, go to Amazon's website or app to access the Message Center and review authentic communications.In addition, you should always check the sender's email address by hovering over the "From" name and verify it's a genuine Amazon email, which will come from "@amazon.com."
GET FOX BUSINESS ON THE GO BY CLICKING HERE
3. Beware of phishing links:
Avoid clicking on random links, especially in messages about shopping deals, order confirmations or account issues. Scammers often use fake links to mimic legitimate retailers and steal your information. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
4. Don't fall for "too good to be true" offers:
Scammers often lure victims with irresistible deals, such as huge discounts on popular products or "exclusive" offers. If an offer seems too good to be true, it probably is. These offers might be tied to fake websites or phishing attempts designed to steal your personal and financial details. Always double-check the legitimacy of any deal before making a purchase. If you're unsure, visit the official Amazon site or app to search for the product and compare prices.
5. Use a personal data removal service:
Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here
.
6. Report suspicious activity:
If you encounter an impersonation scam, your best course of action is to report it to Amazon. Knapp says, "The more consumers report scams to us, the better our tools get at identifying bad actors so that we can take action against them and protect consumers. If consumers suspect that they have encountered a scam, they can report suspicious communications to us at amazon.com/ReportAScam, so that we can protect their accounts and refer bad actors to law enforcement to help keep consumers safe."
WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED
Scammers will do their best to ruin your holiday season, but most of their tactics can be easily avoided with the right tools and a little common sense. Be cautious of unsolicited texts, emails or phone calls offering deals, discounts or asking for your personal information. If you're shopping on Amazon, track everything through the Amazon app and reach out to their customer support for any concerns or questions.What features or tools do you wish online retailers would implement to enhance customer security during peak shopping times? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:
New from Kurt:
Try CyberGuy's new games (crosswords, word searches, trivia and more!)
Enter CyberGuy's $500 Holiday Gift Card Sweepstakes
KURT'S HOLIDAY GIFT GUIDES
Deals:
Unbeatable Best Black Friday deals
|
Laptops
|
Desktops
|
Printers
Best gifts for
Men
|
Women
|
Kids
|
Teens
|
Pet lovers
Copyright 2024 CyberGuy.com. All rights reserved.
|
Sharing is not always caring: 7 dangerous things to post online
Too many people share just about everything online. That's a one-way ticket to Scamtown. Some info makes you an especially prime target. Keep these close to the vest.
I'm giving away an
iPhone 16 Pro with Apple Intelligence
. No purchase necessary; enter now!
1. Your relationship status
Widows and widowers are big targets. Crooks want to get their grimy hands on inheritance money. Take
Rosalie Douglass
, who tried her hand at online dating and listed "widow" as her relationship status. Two different scammers connected with Rosalie and swindled her out of a staggering $430,000.
HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA
Pro tip:
If you're a widow or widower, keep it off your dating and
social media apps
. You never know who's watching.
2. Your vacation plans
Tiffany posted about her family's upcoming Carnival cruise
on Facebook
by sharing shots of her tickets. She didn't think about the fact her booking reference number was included. The same day, a scammer created a new Carnival account using Tiffany's confirmation number. The scammer canceled her booking and ruined her $15,000 trip.
Pro tip:
Announcing your
vacation plans
before or during your trip screams "Rob me!" Take tons of pics on your vacation, but don't share them until you're home.
3. Videos of you talking
Artificial intelligence tools
make it cheap and easy for anyone to create a deepfake video. Recently, on TikTok, a woman named Sam said a shady brand stole her face and used it to promote a product. The brand did it all with a video from her social media account and some deepfake software.
BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?
Pro tip:
Limit the personal information you share online, especially high-quality photos and videos of you talking. For most folks, setting your social media accounts to "private" is the way to go.
4. Expensive electronics you're selling
A
South Carolina man
listed a limited-edition PlayStation on a Facebook buy-sell-trade group. The "buyer" he met up with pulled out a gun and made off with the PlayStation, plus the man's phone, wallet and watch. Scary.
Pro tip:
If you're selling anything pricey, meet in a public space during the day and bring a friend. Your
local police department's
parking lot should scare off anyone who intends to rob you.
5. Personal walking, hiking and biking routes
Fitness apps with
GPS track
way
more than workouts. I told you about the Secret Service agents who spilled the locations of President Biden and the first lady, President-elect Trump and his wife and Vice President Harris. In case you missed it, the agents used Strava to track their movement and apparently didn't realize anyone could see those routes.
HOSPITALS FACING UNPRECEDENTED THREATS; YOU MUST SECURE YOUR HEALTH RECORDS TODAY
Pro tip:
If you use a fitness app, change your settings to private. You can disable GPS altogether, but that shuts off the functionality you use the app for in the first place.
6. Your kids' school or activities
You're proud of your kiddos and want to share their milestones online. Sorry, but posting photos in front of your kid's school or sharing their weekly soccer schedule is not smart. You truly never know who is watching.
Pro tip:
Don't post specifics about your
kids' schools
, day care centers, sports teams or even the clubs they attend. When you do share, keep it vague and avoid anything identifiable in the background.
7. Your work details
The real danger here is setting yourself up for a scam. Spear-phishing scams target one person with highly personalized information. Mid- and high-level employees are big targets since they may have access to a company's finances.The more specific details you post, the more fuel you give a scammer. This includes where you work, your role, projects you're working on or really anything else.
Pro tip:
Limit the details you share about your job. Keep posts about career achievements vague or share only with friends and family.Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
|