Technology News Articles on Fox News

How scammers have sunk to a new low with an AI obituary scam targeting the grieving

As if scammers couldn't sink any lower, there's a new online scam taking advantage of grieving people. It's a strange pirate scam that uses artificial intelligence to scrape data to build fake obituary websites, exploiting the information of somebody who is deceased in an attempt to scam vulnerable victims.We can only hope that this unfortunate situation doesn't affect you or anyone you care about. If, unfortunately, you have died , there's little you can do to prevent someone from exploiting your obituary for their own gain. However, these scammers specifically target kind-hearted individuals who are still alive and willing to assist grieving families. It's essential to remain vigilant and protect yourself and your loved ones from such deceptive practices. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER MORE: HOW IMPOSTERS ARE TRYING TO EXPLOIT YOUR GRIEF AND WALLET IN A NEW FUNERAL SCAM  Have you ever been on your social media account and seen someone post an obituary page of someone they have lost? Perhaps you've clicked on the links to learn about the person, their impact, how they've passed or to read the information regarding the funeral.Maybe you're even looking to send flowers to the family or a donation in the person's name. Of course, when someone dies, the last thing you're probably thinking about is whether it could be a scam. But there's been a rise in bereavement scams by heartless scammers.Scammers do this by first monitoring Google search trends to determine when people are searching for obituaries after a death. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Then, once the scammers find out who has died, they create bogus obituaries with the help of AI that are hosted on legitimate funeral/memorial websites.Next, the scammers optimize these pages using SEO tactics so that the scammer's page ranks first when someone searches for a specific person's obituary page.Then, when the prospective victim goes to click on it, they'll be redirected to an e-dating or adult entertainment site, or they'll be given a CAPTCHA prompt that, unbeknownst to them, will install web push notifications or pop-up ads when clicked.These may give fake virus warnings but link to legitimate landing pages for subscription-based antivirus software programs. Worrying that you might accidentally download a virus, innocent victims instead walk right into a scam.After this, two things can happen:So, while they may not explicitly target you in the same fashion as other scams, they're still quite creative. Although Secureworks Counter Threat Unit emphasizes that this scam is not currently infecting devices with malware, it is possible that this scam could evolve in that direction in the near future. MORE: HOW TO ENSURE YOUR PASSWORDS DON'T DIE WITH YOU To protect yourself from one of these scams, there are a few questions to ask yourself if you see an obituary page: Do you have a connection to the person who has passed away? If you're not connected in any way to the person you see the obituary page for, don't click on it. And, if you do know the person, make sure you click on the original link that was shared on social media from the contact you know well; don't search it in Google, as the first option that comes up could be a fake one. Know the fake websites. Some fake obituary websites include Nextdoorfuneralhomes.com, Memorialinfoblog.com, Obituaryway.com and Funeralinfotime.com. But keep in mind that some scammers are using common sites, too. Check if the person has actually passed away. This may seem obvious, but some of these scammers are writing obituaries for people who have not actually passed away! Look out for suspicious pages. Key signs of a fake obituary include overly descriptive language and an impersonal tone. Many scammers rely on AI to write these obituaries as quickly as they can and don't usually take the time to review them to make them sound more human. After all, they are in a rush to snag you shortly after the person has died. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: SCAMMERS ARE USING FAKE NEWS AND MALICIOUS LINKS TO TARGET YOU IN AN EMOTIONAL FACEBOOK PHISHING TRAP Many scammers prey on emotionally vulnerable people to get their way. Though this obituary scam is next-level, it's not much different than someone taking advantage of someone during a phone scam, where the victim is rushed to send over money or provide information. So, always keep your wits about you if you're ever not sure. Before clicking on a link, opening a file or answering that phone call, take a minute.What ethical responsibilities do online platforms and social media networks have in safeguarding you from exploitative scams? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Dennis Quaid on what AI can't replace

IN TODAY'S NEWSLETTER:- Dennis Quaid says AI can't replace human emotion: 'That's what actors bring'
- African drone company uses AI to give vital help to US farmers
- Amazon CEO Andy Jassy touts AI push in shareholder letter 'WHAT ACTORS BRING': Dennis Quaid sees artificial intelligence as a "great tool," but doesn't think humans will lose out at the end of the day. SAVING THE FARM: - South Africa's Aerobotics is utilizing artificial intelligence (AI) in helping fruit and nut farmers improve crop yields . AI PUSH: Amazon CEO Andy Jassy outlined the e-commerce giant's approach to artificial intelligence (AI) development in his annual letter to shareholders released Thursday. ENHANCING THE MASTERS: Thanks to Watsonx - IBM's AI and data platform - and the Masters Tournament, the experience for golf fans around the world will have their own analytics they can use to further their understanding of the tournament in real time.h AI RACE HEATS UP: Google unveiled its latest custom-designed artificial intelligence semiconductor on Tuesday, introducing the new Google Axiom Processors designed to operate data centers.  FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Apollo the robot joins Mercedes-Benz assembly line production

You just knew this was coming. No doubt, you've heard about the staffing shortages in factories . And guess what? The solution seems to be robots.At Mercedes-Benz Manufacturing in Hungary, they've swapped out some of their human workers for humanoid robots right there on the factory floor. These futuristic robots are produced by Apptronik, a Texas-based company.Mercedes-Benz and Apptronik have teamed up to explore how these robots can lend a helping hand to their human counterparts. The goal? To tackle staffing challenges during the manufacturing process. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The humanoid robots are called Apollo . Standing at a height of 5 feet 8 inches and weighing in at 160 pounds, Apollo mirrors the proportions of a human worker. Its mission? To collaborate seamlessly with its human counterparts while tackling physically demanding tasks. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? MORE: AI ROBOT THAT CAN TRIM, EDGE AND BLOW YOUR LAWN FOR YOU  Apollo's powerful arms can lift up to 55 pounds at a time, making it a valuable asset in an assembly line environment. Its swappable battery ensures a runtime of approximately four hours per pack, enough to keep it going through a productive shift. MORE: THIS ROBOT INVENTION CAN DO BACKFLIPS BETTER THAN A GYMNAST Apollo's unique force control architecture allows it to operate safely alongside humans. Think of it as a collaborative robot, not an industrial behemoth. No need to barricade off sections of the factory; Apollo integrates seamlessly into existing spaces. MORE: THIS HUMANOID ROBOT IS NOW CAPABLE OF FULL CONVERSATIONS Apollo's first task? Logistics. It shuttles parts to the production line, ensuring workers have what they need to assemble vehicles. So, for example, Apollo delivers assembly kits while simultaneously inspecting components. Later in the process, Apollo takes on another critical role: delivering totes of kitted parts. These neatly organized containers contain everything necessary for specific assembly steps.Mercedes-Benz faces a common challenge: finding reliable workers for physically demanding, repetitive, dull tasks. That's where Apollo comes in and bridges the gap. The company says these robots allow them to automate tasks and free up skilled employees to focus on higher-value work. They say it's a win-win for productivity and job satisfaction. However, it's unclear how many robots will be used at their factories. GET FOX BUSINESS ON THE GO BY CLICKING HERE But Mercedes-Benz isn't the only player in this game. Earlier this year, BMW made waves by partnering with California-based Figure to put its robots to the test. The star of the show? Figure's 01 robot, currently hard at work in BMW's U.S. factories located in Spartanburg, South Carolina.Both Mercedes-Benz and BMW are still fine-tuning their approach, figuring out how best to leverage these robots. The goal? To automate those tricky, unsafe or downright tedious tasks that have traditionally fallen on human shoulders. From delivering and inspecting parts to working alongside skilled workers, these robots are poised to revolutionize the assembly line.Is this a step in the right direction, or is this just another way to replace human jobs with automation, potentially leading to job displacement? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions:Copyright 2024 CyberGuy.com. All rights reserved.

Your kids may be treating video games like banks and playing with real money. The government has questions

A federal agency announced it's monitoring video games that include in-app purchases, digital currencies and external marketplaces often used by children.Games that include these features can effectively operate as banks of sorts but aren't subject to the same types of regulations or protections, according to a Consumer Financial Protection Bureau report released last week. The agency also questioned whether children or parents were aware of the vast amount of data gaming companies collect."For several years, the most popular video games have included immersive virtual worlds that offer the storage and exchange of valuable assets," CFPB wrote. "Gaming companies have created digital marketplaces that facilitate the buying, selling, and trading of these assets with limited consumer protections, which has led to potentially harmful practices for players including financial losses due to theft and scams."For years, video games like the mega-hit "Fortnite" have allowed users to make microtransactions - small, optional fees players can pay to obtain items or other features. In many cases, users must purchase in-game currencies bought with real dollars - similar to tokens purchased at brick-and-mortar spots like Dave & Buster's or Chuck E. Cheese. GOATS, GOOGLE AND GAMES: THE FUTURE IMPACT OF A TECH GIANT'S PUSH TO TRAIN AI TO PLAY VIDEO GAMES CFPB warned that digital currencies, purchased items and other assets can amount to a "considerable value" in terms of real money. But those closed markets aren't subject to regulations meant to protect asset holders. "Banking and payment services that facilitate the storage and exchange of valuable assets generally provide consumer protections, including recourse after unauthorized transactions," CFPB wrote in its report. "Yet operators of gaming and virtual worlds typically emphasize a 'buyer beware' approach."The agency was particularly worried about children , who may be using these markets without their parents knowing."For many young people today, gaming may be their introduction to financial activity," CFPB wrote. "For example, gaming provides young people the opportunity to learn about earning currency, managing assets, and making purchases." NOW THAT ARTIFICIAL INTELLIGENCE CAN CLONE VOICES, VIDEO GAME ACTORS MUST WEIGH THEIR OPTIONS "Gaming companies may view young players as an opportunity to create lifelong consumers early," the report continued.Because players can accumulate assets in these video games worth considerable sums of real money, gamers could face a significant financial loss if their accounts are hacked or if they fall prey to scammers.Those risks have increased as the value of gaming assets has risen, according to CFPB. But players might have limited recourse since traditional banking and payment system protections don't apply."In complaints to the [Federal Trade Commission] and CFPB, several players reported hacking attempts, account theft, scams, unauthorized transactions, and losing access to game currencies and virtual items, but they received limited recourse from gaming companies," the bureau wrote. Gaming companies often put "the burden on individual players to avoid these scams and phishing attempts." CLICK HERE TO GET THE FOX NEWS APP Meanwhile, publishers can also collect significant information about their users, including location data, social media data and behavioral interactions, "such as how a player responds to personalized incentives," according to the CFPB report."There is risk that gamers may be harmed when their data is sold, bought, and traded between companies, including for purposes outside of game play," the report continued. "Additionally, the vast accumulation of data collected from consumers by gaming companies raises questions as to whether privacy rules are being adhered to and whether consumers, especially young ones and their parents, are fully aware of how their data is being collected and used across the industry."Ultimately, CFPB didn't indicate it was taking action against the video game industry , instead noting that it's "monitoring" the situation.

Stairs are no obstacle for this robot vacuum and mop cleaner

The Ascender robot vacuum and mop cleaner tackles stairs, edges and corners for marathon cleaning sessions. Are you tired of lugging heavy vacuums up and down the stairs? Do you wish a robot could help you clean every corner of your home, including those pesky stairs? Well, now there is.  Meet Migo Robotics' Ascender , the world's first robot vacuum and mop cleaner with stair-climbing capability. You heard right - stairs. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER rget=_new href="https://pre-launch.migorobotics.com/?_gl=1*1yi3r61*_gcl_aw*R0NMLjE3MTExMjUxNzcuQ2owS0NRancyUFN2QmhEakFSSXNBS2MyY2dOU01hcE44ekc3U255MTNuRGJqeEVxMzVPNV92cnNhNWloVEJVbDJaUGRxd1ZfQk9pa0J5a2FBcHBPRUFMd193Y0I.*_gcl_au*MTkzNDQ1MTcyMC4xNzA2NjI0Nzgy*_ga*MTY2NDM4NTU5MC4xNTg5MjA0OTQ3*_ga_4DXBGJ1ZPW*MTcxMTEyODc3Ny40LjEuMTcxMTEyODc3OS41OC4wLjEzMTkwMDg0NzE." target="_blank" rel="nofollow noopener"> Ascender isn't just another robot vacuum ; it's a game-changer. With the ability to climb stairs of different heights up to 8.7 inches, Ascender navigates over stairs, obstacles and floor levels to clean your entire house hands-free. Plus, it can clean various types of stairs, ensuring no nook or cranny is left untouched. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? rget=_new href="https://cyberguy.com/news/game-changing-electric-h1-robot-flips-what-we-thought-possible/" target="_blank" rel="nofollow noopener"> MORE: THIS ROBOT INVENTION CAN DO BACKFLIPS BETTER THAN A GYMNAST Ascender's square-shaped body with motorized omnidirectional wheels ensures optimal cleaning of every edge and corner. Equipped with ultra-strong suction power and versatile brushes, Ascender deeply cleans various surfaces, from floors to carpets, picking up even the tiniest particles. MORE: AI ROBOT THAT CAN TRIM, EDGE, BLOW YOUR LAWN FOR YOU Forget about manual mopping. Ascender will have you saying goodbye to your handheld mop. With 17N downward pressure and high-speed scrubbing, it surpasses handheld floor scrubbers. It automatically detects the ground material and adjusts the mop accordingly, ensuring a thorough cleaning every time. MORE: THIS HUMANOID ROBOT IS NOW CAPABLE OF FULL CONVERSATIONS Featuring a 12000mAh battery, Ascender can sweep, mop and climb a grade slope of up to 5,380 square feet on a single charge. Say goodbye to interrupted cleaning sessions and hello to true hands-free cleaning.At the core of Ascender lies advanced hardware and software, including an HD camera, LiDAR and ToF sensors, which ensure navigational accuracy. With its powerful Al algorithms seamlessly integrated, Ascender avoids obstacles and plans efficient cleaning routes. GET FOX BUSINESS ON THE GO BY CLICKING HERE rget=_new href="https://cyberguy.com/news/forget-hands-toyotas-hug-ready-robot-picks-up-with-its-entire-body/" target="_blank" rel="nofollow noopener"> MORE: FORGET HANDS. TOYOTA'S HUG-READY ROBOT PICKS UP WITH ITS ENTIRE BODY With the Ascender app, you can control your robot vacuum from anywhere, set cleaning schedules and even designate no-go zones. Ascender seamlessly integrates into smart home systems, offering convenience and flexibility.Experience truly hands-free cleaning with Ascender's all-in-one dock. No more manual emptying or cleaning of the robot - Ascender takes care of everything.Currently, the Ascender is a Kickstarter project. The company tells us that it will start mass production very soon and aims to start shipping in June or July. You can choose from Ethereal White, Moon Grey or Titanium Black. At the time of publishing, the price per robot was $849.00. According to the Ascender's Kickstarter site, this project will only be funded if it reaches its goal by Tuesday, April 30, 2024.Say goodbye to the hassle of multi-floor cleaning with the Ascender. With its revolutionary features, including stair-climbing capability, smart navigation and cleaning performance, Ascender is more than just a cleaner - it's a lifestyle upgrade for your home. Say hello to effortless, hands-free cleaning and reclaim your time for the things that matter most.Would you consider having one of these robots in your home? Are we becoming a lazy society where we let technology do everything for us? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions Copyright 2024 CyberGuy.com. All rights reserved.

The taxing truth: A state-by-state analysis of tax-time trickery

We are less than a week away from the tax deadline , and McAfee is out with new data on tax season that can help ensure you stay safe this tax season. With tax return scams on the rise, rushing to get your taxes done before the deadline can be one of the ways you are more vulnerable to becoming a victim of one of these scams.So, how can you strike the balance of utilizing tax filing software to support you in getting those taxes on time while ensuring you're protecting yourself from the various tax scams that are out there?Steve Grobman, senior vice president and chief technology officer at McAfee, a cybersecurity company, advises that filing your taxes on time is a key step in avoiding tax scams. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Tax scams have become more sophisticated over the last few years, but they are in no way new. However, with AI becoming more commonplace, scammers can utilize this technology to expedite their malicious scams. These scams can come in many different forms, but some of the most common ones are: Phone scams: Scammers impersonate IRS officials to solicit back payments or personal information over the phone, using threats of arrest or fines to pressure immediate compliance. They may use fake badge numbers, caller IDs or robocalls enhanced with AI voice-overs. Phishing email scams: Scammers commit fraud by sending emails or messages pretending to be from tax authorities or reputable tax software companies. They entice recipients to click on links that lead to fake websites designed to steal personal and financial information or directly request sensitive data under the guise of tax filing or refunds. Tax-related identity theft: This occurs when identity thieves use stolen personal information to file fraudulent tax returns. Signs of such theft include receiving a letter from the IRS about a tax return already filed in your name, an electronic filing rejection because a return has already been filed using your Social Security Number, or a notification about the creation of a new online IRS account you did not initiate. MORE: DON'T FALL FOR THESE SNEAKY TAX SCAMS THAT ARE OUT TO STEAL YOUR IDENTITY AND MONEY Today's tax landscape is dominated by online engagement, with nearly nine out of 10 (89%) individuals turning to online platforms for at least one part of the tax filing process. More than half of consumers (54%) struggle to differentiate between scams and legitimate messages. In February alone, cybersecurity firm McAfee blocked more than one million attempts to engage with malicious, tax-related URLS.Steve says, "With less than a week left until Tax Day, early filers are awaiting refunds and tax procrastinators are likely feeling the pressure and stress of the deadline. Scammers exploit these heightened emotions by offering easy filing, faster refunds or urgent information requests , so it's not surprising that Americans report an average of $8,199 per person lost to tax-related email and text message scams." "We encourage people to maintain healthy skepticism, pause before sharing sensitive information online, and to use the right tools to protect their privacy, identity and personal information during tax season and beyond." According to Steve, "Our recent tax scam survey uncovered notable disparities in scam susceptibility. Residents of some states - particularly Texas, New York, California, Alaska and Arkansas - have a much higher rate of receiving fraudulent tax refund messages than others." "These messages often contain malicious links or malware, increasing vulnerability to scams, so we encourage people to be extra alert and use AI-powered online identity and information protection measures to safeguard themselves against potential scams." Here's some more information by state: Texas : Despite being highly confident in spotting tax-related scams, Texas has a significant percentage (66%) of people who have lost money to online tax scams, indicating a gap between confidence and reality. New York : While New Yorkers are confident in identifying tax-related scams, 70% have received messages purporting to be from tax authorities, and 80% have received requests for personal information, suggesting a significant issue with scam attempts. MUST-KNOW TAX SEASON TIPS FOR FAMILIES WITH COLLEGE STUDENTS West Virginia : Although West Virginia has a high confidence level in spotting fake tax preparation services, 88% of its residents are likely to click on links from supposed tax software companies, indicating vulnerability to scams. Kansas : Despite being less likely to click on links from purported tax preparation software companies, Kansas has a relatively high percentage ( 88% ) of people who wouldn't recognize a scam message from the IRS or state tax authority, suggesting a need for awareness and education on tax scams. Tennessee : 100% of Tennessean respondents who clicked on links from supposed tax software companies lost money, and all respondents who received messages about tax refunds clicked on those links, highlighting a vulnerability to scam messages in the state. MORE: HOW SCAMMERS ARE USING AI TOOLS TO FILE PERFECT-LOOKING TAX RETURNS IN YOUR NAME There are several ways you can protect yourself from tax-related identity theft: Smart Selection: Utilize tax software to get your taxes done faster and on time, but be sure to research and check the reviews. IRS Impersonation Alert: The IRS will NEVER call you and ask you to make any sort of payment over the phone. Secure Your Identity: Request an Identity Protection PIN from the IRS. This will help to ensure your account is protected going forward and make it less likely that someone can file a fake tax return in your name. Early Bird Advantage: In the future, try to file your taxes as early as you can. By doing this, you're essentially beating the scammer to it. Once you file the return, they will be unable to commit fraud by filing a return in your name. Beware of Phishing: Don't click on suspicious links, even if you recognize the name of the tax software company. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices .Steve adds, "The rise of AI-generated tax scams has made it incredibly challenging for Americans to tell the difference between real and fake communications. Cybercrooks can now easily create malicious robocalls that sound like they could come from a neighbor and send error-free text and email messages." " With 1 in 4 Americans losing money to online tax scams, it's crucial for consumers to stay informed about the latest scams, exercise skepticism when something seems too good to be true, and utilize AI-powered tools to protect their privacy, identity and personal information." MORE: TOP WAYS TO SAFEGUARD YOUR SOCIAL SECURITY NUMBER The hope is that by being aware of the different tax scams that are out there - especially when the deadline for filing your taxes is right around the corner - you'll be less likely to become a victim of one. That being said, we know that these scammers are pretty clever. So, if you do find that you've been a victim of a scam, follow these steps: 1. Complete IRS Form 14039, the Identity Theft Affidavit. This is the form that all victims of fraud must fill out for the IRS. It will let them know that the person claiming to be you is a fraud. You can find the form on the IRS website . 2. Request a copy of the fraudulent tax return from the IRS: You can do this by going to this page on the IRS website on dealing with fraudulent returns and following the instructions to order a copy. 3. Alert national credit bureaus: Let the national bureaus, such as Experian, Equifax and TransUnion, know that there has been fraud and freeze your account so that the scammers cannot access it. 4. Report the crime to the Federal Trade Commission: The FTC is there to help track down scammers, and your report can also help them record how many scams are happening in a single year to improve better how to warn others. You should also report the crime to identitytheft.gov/ . 5. Check your online bank accounts: Make sure there aren't any suspicious transactions on any of your accounts. 6. Use an identity theft protection service: As tax season approaches, the risk of tax fraud significantly increases. It's crucial to be vigilant and proactive in protecting your personal information. One effective measure is to enlist the help of an identity theft protection service.  GET FOX BUSINESS ON THE GO BY CLICKING HERE Identity theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using an identity theft protection service is that it might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses . See my tips and best picks on how to protect yourself from identity theft . MORE: DON'T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX Taxes are a necessary evil that we have to do every year. Because it can be complicated, many people resort to software to help get the job done. Whatever route you take, be on the lookout for suspicious links from these software companies and any strange messages or phone calls claiming to be from the IRS - and claim your IRS Identity Protection PIN ASAP.Considering the advancements in cybersecurity, what steps should companies take to protect their customers' sensitive financial data? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Could this robot unicorn be your next smart family member?

In an era when technology is advancing at breakneck speed, smart robots are becoming a part of our daily lives. And let me tell you about one of the coolest ones out there: the XPENG Robotics Smart Robot Unicorn.This isn't just any regular toy; it's way more than that. Imagine having a super smart companion who understands the world around you. That's what the XPENG Robot Unicorn is all about.It's got this amazing ability to sense its environment so accurately that it can dodge obstacles while playing or effortlessly find its way around your living room. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Inspired by the mythical unicorn, Robot Unicorn features an innovative body and joint design . Its knee joints and elbow joints allow for a natural and elegant gait, something that sets it apart from clunky robots of the past. As it moves gracefully, you'll find yourself forgetting that it's not a living creature. MORE: THIS ROBOT INVENTION CAN DO BACKFLIPS BETTER THAN A GYMNAST   The robot's tail has been redesigned for the Gen 2 unicorn model. The previous tail had little use, but now it has been designed as a robotic arm. This innovation catapults the unicorn's practicality to new heights. Imagine a tail that can grasp, lift and carry objects weighing up to approximately 6.61 pounds.Picture this scenario: You're wedged under a car, tinkering with its inner workings. Instead of struggling to reach for tools, you turn to your unicorn companion and say, "Can you pass me the 5/8 open ender, please?" And there it is - the robotic tail extends, placing the tool in your hands.As the software continues to evolve, its fetch-and-carry capabilities become even more practical. Soon, this robotic companion will prove genuinely useful - like simply lending an extra hand (or tail) around the house. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? MORE: THIS HUMAN ROBOT IS NOW CAPABLE OF FULL CONVERSATIONS The XPENG Robot Unicorn isn't just silent company but a conversationalist. With its talking and listening capabilities, it engages in banter. But that's not all: this unicorn recognizes you through face or voiceprint, responds to touch and even expresses emotions through its expressive face screen. MORE: A ROBOT THAT CAN TRIM, EDGE, BLOW YOUR LAWN FOR YOU Imagine your child's excitement as they hop onto their very own smart vehicle - the XPENG Robot Unicorn. Its unique riding and driving system ensures a safe experience, and custom safety gear protects your little one, whether they're exploring the backyard or racing down the hallway.Need to carry groceries? Picking up packages? The robot unicorn has you covered there as well. Its specially designed loading gear allows it to transport items effortlessly. It's like having a helpful little assistant by your side, ready to lend a hoof (or four).The XPENG Robot Unicorn's navigation system rivals that of a smart car. Cameras, LiDAR and other sensors work in harmony to map its environment, plan paths, follow targets and avoid obstacles. GET FOX BUSINESS ON THE GO BY CLICKING HERE Eighteen months ago, the idea of a quadruped companion for children seemed whimsical. But today, the XPENG Robot Unicorn is here, bridging the gap between fantasy and practicality. It's not just a booty-shaking companion; it's a testament to how far artificial intelligence has come. Once a concept, the Unicorn now stands as an intelligent, articulate companion. Whether it's assisting with chores, fetching tools or sparking conversations, this unicorn has the framework to be your or your child's versatile companion.If you had your own Robot Unicorn, how would you utilize its robotic tail? What tasks or scenarios would you envision where this tail could come in handy? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: AI to fly F-16 with Air Force secretary on board

IN TODAY'S NEWSLETTER:- Air Force secretary plans to ride in AI-operated F-16 fighter aircraft this spring
- Artificial beauty: Warning of threats to girls' self-esteem, Dove recommits to never using AI in ads
- OPINION: China's schools use AI. Why don't ours? FLIGHT RISKS: Air Force Secretary Frank Kendall told members of the U.S. Senate on Tuesday that he plans to ride in the cockpit of an aircraft operated by artificial intelligence to experience the technology of the military branch's future fleet. 'KEEPING BEAUTY REAL': As experts predict that 90% of online content could be generated by artificial intelligence by the year 2025, a major beauty brand is taking a stand against the use of AI in advertising. OPINION: The United States has a long and proud history of fostering innovation on the global stage. America cannot afford to fall behind in the AI revolution as global competitors like China are already significantly ahead in integrating these tools into their education systems, NetChoice's Carl Szabo writes. 'TRANSFORMATIONAL': JPMorgan Chase CEO Jamie Dimon published his annual letter to shareholders on Monday in which he discussed the implications of artificial intelligence on the operations of the largest lender in the U.S. and the economy at large. SPLIT THE DECISION: Zola, a wedding planning company that helps engaged couples plan details of their nuptials, announced the launch of a new tool to help couples struggling with making a myriad of decisions for the celebratory day.  NEW INDUSTRIAL REVOLUTION: The U.S. labor market continues to hum along after remaining historically tight for the past year, but recent comments by famed economist Larry Summers suggest the robust job numbers could eventually become a thing of the past due to artificial intelligence . FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Is the FTC calling you? Probably not. Here's how to avoid a phone scam targeting you

Just when you thought phone scams couldn't get any trickier, there's another one out there that you must watch out for. And this one is even more sophisticated because the government agency you're meant to report these types of scams to - the FTC - is being impersonated.One reason this impersonation has been on the rise is the progression of artificial intelligence. AI voice-over tools and deep-fake technology make it even easier for impersonators to commit crimes. But you can protect yourself. Here's what you need to know. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Like a phishing scam , the FTC impersonation scam involves scammers pretending to be Federal Trade Commission employees calling your number and trying to convince you to wire money to them. These scammers have become very clever in how they target their victims. First, they may spoof an FTC phone number so that when your phone rings, and you see your caller ID, it says FTC and/or a title related to a government agency. Next, the scammer may impersonate an actual FTC employee. So, when you ask for their name to check whether or not it's a scam (which you should always do!), your quick internet search will reveal an actual FTC employee. While checking whether or not this is an actual scam, some victims might not think twice after checking this. Finally, they'll tell you that you owe money to them. While it's not clear exactly what they are saying - perhaps they are telling you that you owe an invoice, debt or a fine - some scammers even tell you to send money in other peculiar ways, such as going to Bitcoin ATMs or withdrawing cash to pay them in person.These scams have been successful, and this year, the median loss per call has risen to $7,000. SCAMMERS ARE USING FAKE NEWS, MALICIOUS LINKS TO TARGET YOU IN AN EMOTIONAL FACEBOOK PHISHING TRAP MORE: HOW SCAMMERS USE AI TOOLS TO FILE PERFECT-LOOKING TAX RETURNS IN YOUR NAME Now, the FTC is catching onto these scams, warning and educating the public, and cracking down on perpetrators.To start, the FTC said in a press release that it "will never send consumers to a Bitcoin ATM, tell them to go buy gold bars, or demand they withdraw cash and take it to someone in person." The agency added that it will "never contact consumers to demand money, threaten to arrest or deport them, or promise a prize."Secondly, due to public outcry against AI and the increase in the number of complaints to the FBI, the FTC is working with the government to utilize tools to "detect, deter, and to catch these impersonators" while proposing strict legislation that would ban government and impersonation fraud, thereby "enabling the FTC to directly file federal court cases aimed at forcing scammers to return the money they made from government or business impersonation scams."1. Stay updated: The first step in protecting yourself from government impersonation fraud is simply being educated about it. Keep yourself updated about these scams and other scams by reading the news and subscribing to sites like Cyberguy. Again, the FTC reports that it will never call you and ask you to wire money in any way, shape or form, so if you get a call from them or another government agency asking for this, it's a scam.But due to the 22% increase in reported losses to online crime compared to 2022 based on the FBI's 2023 Internet Crime Report , they're proposing other strategies to keep yourself safe from scams by following the tips we list below:2. Stay calm: If you think a scammer is calling you, it's important to stay calm and not let yourself get emotional. It's very easy to get worked up when you're in the middle of this situation. If it happens, you can always say you will get back to them and hang up the phone. If they become aggressive and try to exploit you, tell them you will report them and hang up. GET FOX BUSINESS ON THE GO BY CLICKING HERE 3. Cautionary note: Do not contact unknown telephone numbers provided in pop-ups, texts or emails.4. Safety reminder: Do not download software at the request of unknown individuals who contact you.5. Security precaution: Do not allow unknown individuals access to your computer.6. Don't click that link: Do not click on unsolicited pop-ups on your computer, links sent via text messages or email links and attachments.7. Have good antivirus software: As scammers weaponize AI and deep-fake technologies , robust antivirus software becomes your first line of defense. The best way to protect yourself from clicking malicious links that install malware that may access your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . MORE: HOW A FLAW IN IPHONE'S SECURITY COULD LEAVE YOU LOCKED OUT Scammers will continue finding new ways to prey on their victims, and AI has made it easier for them to do so. One of the major concerns about AI is that it will progress faster than agencies like the FTC and FBI can keep up with. Therefore, it is important to take measures to protect yourself and avoid falling victim.Have you ever received a suspicious call or encountered an impersonation attempt? How did you handle it? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Restaurant combines an amusement ride with unforgettable fine dining

Ready for an amazing restaurant experience that'll take your taste buds on a wild ride as you move from one incredible room to the next? Sounds like an amusement park experience, right?If you thought that, you wouldn't be too far off.  This unique restaurant is called Eatrenalin, and it's built around some pretty cool Floating Chair innovation. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER The Eatrenalin restaurant is located next to the four-star superior hotel Krønasår in Rust, Germany. Spanning approximately 17,222 square feet, this innovative dining establishment offers a sensory experience like no other. MORE: THIS ROBOT CAN COOK BURGERS IN LESS THAN 60 SECONDS Pioneered by MACK Rides, the superstars of amusement park tech , the Floating Chair is Eatrenalin's secret sauce. Each chair consists of approximately 2,100 components and weighs about 705 pounds.This engineering masterpiece whisks you away on an over two-hour adventure for your senses, gently gliding you between themed rooms without you ever needing to budge from your comfy seat. ADVICE FROM FRAUD SPECIALIST WHO FILES DEBIT CARD SWINDLING CLAIMS ALL DAY MORE: THE BEST TRAVEL GEAR FOR 2024 But the Floating Chair is cooler than just a fancy way to get around. It's designed to work seamlessly with the whole multimedia show. As the chair glides you through each incredible experience, from the refreshing depths of the Ocean room to the mind-blowing vastness of the Universe room, the sights and sounds perfectly match the movement, creating an experience that totally immerses you. MORE: THAT'S NOT A HUMAN TALKING TO YOU IN THE FAST-FOOD DRIVE-THRU Adding to the awesome experience is a culinary masterpiece. Led by a dream team of world-class chefs, Eatrenalin offers an eight-course tasting menu that perfectly complements each themed environment.Whether you choose the "Red Dimensions" menu with its international flavors or the plant-powered "Green Dimensions" option, the flavors will blow your mind while the Floating Chair ensures a comfy and unforgettable journey. GET FOX BUSINESS ON THE GO BY CLICKING HERE While the patented Floating Chair from Mack Rides glides guests through these immersive spaces, the multimedia content curated by MACK Animation and MACK Solutions ensures that the visual worlds are truly mesmerizing.Thomas Mack, a driving force behind this innovation, emphasizes the seamless fusion of new LED screens and projections, creating an interplay of media technology and film.If you're wondering what's next for Eatrenalin, the owners say they are already eyeing locations in Southern California or Las Vegas, aiming to bring this blend of taste, technology and storytelling close to you here in the States.Eatrenalin proves that cutting-edge tech and fantastic food are a great match. The Floating Chair technology, coupled with the incredible settings and world-class cuisine, creates a one-of-a-kind dining experience that is sure to leave you wanting more.If you could design your own themed room within Eatrenalin, what concept or environment would you choose? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Air Force secretary plans to ride in AI-operated F-16 fighter aircraft this spring

Air Force Secretary Frank Kendall told members of the U.S. Senate on Tuesday that he plans to ride in the cockpit of an aircraft operated by artificial intelligence to experience the technology of the military branch's future fleet.Kendall spoke before the U.S. Senate Appropriations Committee's defense panel on Tuesday, where he spoke about the future of air warfare being dependent on autonomously operated drones.In fact, the Air Force secretary is pushing to get over 1,000 of the AI-operated drones and plans to let one of them take him into the air later this spring.The aircraft he plans to board will be an F-16 which was converted for drone flight. PENTAGON SEEKS LOW-COST AI DRONES TO BOLSTER AIR FORCE: HERE ARE THE COMPANIES COMPETING FOR THE OPPORTUNITY "There will be a pilot with me who will just be watching, as I will be, as the autonomous technology works," Kendall said. "Hopefully neither he nor I will be needed to fly the airplane."Last month, the Pentagon said it was looking to develop new artificial intelligence-guided planes , offering two contracts for several private companies to compete against each other to obtain.The Collaborative Combat Aircraft (CCA) project is part of a $6 billion program that will add at least 1,000 new drones to the Air Force. The drones will be designed to deploy alongside human-piloted jets and provide cover for them, acting as escorts with full weapons capabilities. The drones could also act as scouts or communications hubs, according to a report from The Wall Street Journal. EUROPE SEEKS TO BECOME 'GLOBAL REFERENCE POINT' WITH AI OFFICE The companies bidding for the contract include Boeing, Lockheed Martin, Northrop Grumman, General Atomics and Anduril Industries.Cost-cutting is one of the elements of AI that appeals to the Pentagon for pursuing the project.In August 2023, Deputy Secretary of Defense Kathleen Hicks said deployed AI-enabled autonomous vehicles would provide "small, smart, cheap and many" expendable units to the U.S. military, helping overhaul the "too-slow shift of U.S. military innovation." WHAT IS ARTIFICIAL INTELLIGENCE (AI)? rget=_new href="https://www.foxnews.com/category/us/military" target="_blank" rel="noopener"> Military officials have been mum on what the drones will actually look like in terms of size - full-sized planes or smaller.But the idea is to not fall too far behind China, which has modernized its air defense systems, which are much more sophisticated and put manned planes at risk when they get too close.Drones have the potential of interrupting such defense systems and could be used to jam them or provide surveillance for crews."The initial role for the aircraft was going to be counter-air, but it will have the potential to do other things," Kendall said during the hearing. CLICK HERE TO GET THE FOX NEWS APP He also said the new drone fleet will likely be cheaper than having new manned jets created. The goal is to have the drones cost about a third or less than the $20 million it costs to build an F-35 fighter. Peter Aitken of Fox News Digital contributed to this report.

Advice from fraud specialist who files debit card swindling claims all day

While different types of fraud can bring their own elements of frustrations and consequences, debit card fraud can leave your bank account empty almost immediately and be hard to recover from.That's why we are so grateful for the email we received from a debit card fraud specialist who shared their incredible knowledge and insight to protect you from debit card fraud. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER As someone who processes debit fraud claims daily, and luckily has never experienced it herself, below are the top do's and don'ts of debit card use.1) Safest way to use your debit card: Use your debit card to withdraw money from your own financial institution's ATM or teller. Preferably transfer larger amounts of money out of a checking account into high-yield savings accounts so that your money isn't readily available in large sums in a checking account.2) Why credit cards are generally better for purchases: Don't use your debit card to make regular or frequent purchases. It is better to use a regular credit card for those transactions. It leaves you less exposed to potential debit card fraud. If a scammer gets a hold of your credit card, it is easier to freeze that card, cancel it or get a new one issued. If your debit card or debit card number gets compromised, you could lose all your cash in your checking account. MORE: WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED 3) Consider using mobile wallets for convenience and security: If you must use your debit card to make regular purchases, add it to your smartphone wallet (like Apple Pay or Google Pay) and use it that way instead of swiping your debit card. Not being swiped likely prevents your card from being skimmed . 4) Protecting your PIN is crucial: Do not write your PIN down on your card or a piece of paper in your wallet.5) Recurring payments aren't affected by locking your card: Even if you have recurring payments for bills such as utilities, they usually can still be made if your debit card is locked. When a debit card is locked, single transactions aren't allowed.6) Don't share your debit card: Your debit card is a legal agreement between you and your financial institution. Letting anyone else use your card, even family, may jeopardize your ability to be compensated for fraudulent transactions. Your child accidentally purchasing something with your debit card saved on your mobile app is not considered fraud.7) Financial reimbursement might not be immediate: While some financial institutions will reimburse fraudulent transactions, they may not be fast enough to cover checks, e-checks or recurring financial transactions. You'd likely be at risk of incurring overdraft fees, non-sufficient funds or late charges from your financial institutions, creditors or merchants - all of which would be costly.8) Enable alerts to catch fraudulent activity quickly: Most financial institutions offer financial alerts or restrictions for all transactions on checking accounts and cards. Use them so you can be notified of any fraudulent transactions immediately. The faster you can report these charges to your financial institution, the more likely you are to stop scammers in their tracks. MORE: HOW CROOKS ARE USING SKIMMERS, SHIMMERS TO STEAL YOUR MONEY AT YOUR ATM Here are additional steps you can take to help you prevent crooks from gaining access to your debit card: Keep your card safe physically: Store your debit card in a secure place when not in use. Don't write down your PIN or keep it with your card. Be cautious when using your debit card in public places and shield your PIN when entering it. Use strong PINs: Choose a unique and strong PIN that isn't easily guessable. Avoid using numbers like your birth date, address or easily recognizable sequences. Don't share your PIN with anyone. Create strong, unique passwords: for your accounts and devices. Avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Use biometric authentication: Consider using biometric authentication (fingerprint, facial recognition) if your device supports it. This can provide an extra layer of security and convenience for you. Regularly review your transactions: Frequently monitor your bank statements and transaction history for any authorized or suspicious transactions. Set up account alerts for large transactions or any activity that falls outside your normal spending patterns. Use secure networks: Avoid using public Wi-Fi networks for sensitive transactions. Public Wi-Fi networks are often unencrypted and vulnerable to hackers who can intercept your data or infect your device with malware. Use a Virtual Private Network (VPN): When accessing your financial accounts over public networks, you should use a VPN. We recommend using a VPN to protect against hackers snooping on your device as well. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices . Beware of phishing scams: Be cautious of unsolicited emails, texts or calls asking for your debit card information or login credentials. It could be a phishing scam . Never click on suspicious links or images or download attachments from unknown sources. Have good antivirus software on all your devices: Keeping hackers out of your devices can often be prevented when you have good antivirus protection installed on all your devices. Having antivirus software on your devices will help make sure you are stopped from clicking on any known malicious links, attachments or images that may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here . Regularly update your software: Keep your computer, smartphone and other devices updated with the latest security patches and updates. Use two-factor authentication (2FA): If your bank offers two-factor authentication , enable it. This adds an extra layer of security by requiring a second form of verification in addition to your password. Use secure ATMs:  Whenever possible, use ATMs that are located in well-lit and secure areas. Avoid ATMs that appear tampered with or have suspicious devices attached to them or point-of-sale terminals. MORE: WHY YOU SHOULD NEVER CARRY THESE THINGS IN YOUR WALLET Regularly monitor your credit reports: Check your credit reports for any unusual activity that might indicate fraud or identity theft. If you find any errors or discrepancies on your credit reports, contact the credit bureaus and the creditors involved as soon as possible to dispute them. Consider debit card controls and mobile apps: Some banks offer apps that allow you to turn your card on or off instantly, set spending limits and receive notifications for transactions. Make purchases from trusted sites: Only use reputable and secure websites for online shopping and payments. Look for a padlock symbol in the address bar before entering your card details.Report the fraudulent transactions and request to freeze or cancel your debit card. Your bank will investigate the fraud and may issue you a new card and a refund. Depending on your bank's policy, you may have to file a written claim or a police report to support your case.Check for any other unauthorized charges or suspicious activity on your accounts. You can also get a free copy of your credit report from each of the three major credit bureaus once a year at AnnualCreditReport.com. If you find any errors or signs of identity theft, dispute them with the credit bureau and the creditor.Identity theft protection companies can monitor personal information, like your home title, Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.The great part of some identity theft companies is that they often include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks for best identity theft protection . Though many people use debit cards as they would use their credit cards, there is a whole world of problems that can occur with your debit card if it falls in the wrong hands. Having your debit card information stolen or compromised doesn't just jeopardize your credit line, it may mean all the money in your account can disappear. If you treat your debit card like a signed, blank check, you'd likely leave it somewhere safe at home.Considering the potential downsides of debit cards, do you see a future where they become less common due to security concerns? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to update your PIN or password on your Android

The security of our personal devices is more important than ever. Donna, a resident of Oklahoma City, Oklahoma, reached out with a distressing situation that many of us might find all too relatable. Her story is a stark reminder of how quickly technology can turn from a tool into a tormentor when in the wrong hands - even if those hands belong to someone we trust. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Donna watched in disbelief as her son, armed with a computer science degree and a disregard for boundaries, hacked into her Android. A simple, innocuous-looking message popped up, a common enough occurrence in our daily digital lives, which led to a series of unfortunate events. This message asked her to re-sign into some apps, a gateway her son exploited to wreak havoc.As Donna describes it, her ability to use her Android dwindled rapidly. Text messaging became an ordeal, her phone's battery life plummeted, and her pleas for him to stop fell on deaf ears. The situation highlights a grim reality: the people with the capacity to harm us the most might not always be strangers from the digital void but those within our own homes. And while the "how" of her son's actions became painfully clear, the "why" remained a mystery, leaving Donna grappling with questions that had no easy answers. MORE: 5 BEST PORTABLE PHONE CHARGERS Feeling violated and helpless, Donna sought our help, desperate for a solution. Our advice is straightforward yet powerful: change the device's password. This simple act is often the first defense against unauthorized access, yet many overlook its significance.For those in Donna's shoes, particularly Android users, changing your password or screen lock method is a breeze. Here's how to do it. S ettings may vary depending on your Android phone's manufacturer.  As far as password security is concerned, consider using a password manager to store and generate complex passwords securely. It will help you create unique, difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills in passwords for you when you're logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts. MORE: BEST ACCESSORIES FOR YOUR ANDROID What if the breach goes beyond a simple lock screen compromise? Donna's story sheds light on the potential for deeper issues, such as phishing attempts and malware . Here are additional steps to consider: Review your apps: Uninstall any apps that don't look familiar or that you don't remember installing. Update your phone: Always keep your software up to date to benefit from the latest security patches. Run a security scan: Use reputable antivirus software to check for malware. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . Consider a factory reset: If all else fails, backing up your data and restoring your phone to its factory settings can be a clean slate.If these steps don't resolve the issue, you may want to contact your Android device manufacturer's customer support for further assistance. MORE: 5 TIPS YOU DIDN'T KNOW YOU CAN DO ON AN ANDROID Securing our devices is as much about protecting ourselves from external threats as it is about drawing boundaries that those close to us should respect. Technology is a powerful tool but can become a weapon in the wrong hands.Have you ever experienced a breach of trust or privacy involving personal technology within your own home? If so, what happened? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

See what the home you grew up in looks like now and other Maps tricks

I grew up in New Jersey , right next to a state park. I still remember riding my bike all day like it was yesterday. Oh, and the time I threw a snowball at a police car and hit the cop inside. That was bad. Get smart, actionable tech news and tips like this daily in your inbox. Join 500K folks and get the Current. It's free! I hadn't looked at the house in years, so  seeing it on a map took me back. While you're at it, take yourself on a walk down memory lane, too. CAN YOU SPOT ELECTION DEEPFAKES? HERE'S HOW NOT TO BE DUPED Blast from the past There's something special about seeing what the house you spent your childhood in looks like now - or you can flash back for as long as Google has been collecting pictures in that area.💡 I have an idea. While you're looking at your old house, write down three memories in the Notes app on your phone . Next time you're with the kids, show them the house and tell them a few stories. So fun! WHY SOME PEOPLE STILL OPT FOR GLOBES IN AN ERA OF DIGITAL MAPPING Plan ahead and save on gas The longer you spend in traffic, the more gas you'll burn. Google Maps helps you plan a future trip , taking in predicted traffic, routes, and road conditions along the way. Here's how to set a planned time and date for a trip: Step inside buildings US AIRPORTS ADAPT TO TRAVEL SURGE BY EXPANDING USE OF TECHNOLOGY TO PROCESS PASSENGERS With Google Maps, you can virtually visit the inside of places such as stores, airports, or hotels. It's fun to check out photos of places uploaded by other people, too.You might see a Directory option showing floor plans and restaurant and store lists. The numbers at the bottom of the screen allow you to move from floor to floor. The blue dot icon shows you where you are located in the building. Bonus: Ahoy, matey Let's go from close to home to far away. Google Earth has captured images of thousands of shipwrecks over the decades. To snoop around, open  Google Earth and search for the specific coordinates below:50°23'42.35″N 125°57'25.64″W64°10'34.46″N 51°43'20.85″W40°33'24.59″N 74°13'6.22″WSome people find this so fascinating, they've created giant interactive maps. Check out  one of the largest here . Super cool, right? Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Protect your Android from the Vultur banking Trojan's remote attacks

One of the most advanced Trojans targeting banking apps has gotten an upgrade. Vultur has been wreaking havoc on Androids since security firm ThreatFabric discovered it in 2021. According to researchers with NCC Group, the malware has reemerged and is even stealthier than before.You might remember Vultur for the notoriety it gained for its ability to screen record on devices remotely. It hid in apps, some of which were on the Google Play Store, and infected your device.But now Vultur has new ways to take over Androids and new methods to trick you into downloading malware. Hackers now utilize everything from text messages to phone calls to dupe their victims. Once they get into your device, they can take total control. Hackers can remotely access and use your phone - all in an effort to take your hard-earned money. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER According to NCC Group , this new attack focuses on contacting victims. It begins with a text message urging the victim to call if they didn't authorize a transaction on their bank account. However, the transaction isn't real; it's simply a ruse.If the victim calls, they will receive instructions to download a McAfee Security app containing the banking Trojan and a text message with the link.The security app looks normal but actually contains the Brunhilda dropper, a deceptive component hidden within seemingly legitimate apps. In this case, the dropper contains the Vultur Trojan. It then releases and executes the Trojan in three batches. When the third batch is dropped, hackers can gain total control of your Android device. MORE: HACKERS USE PIRATED SOFTWARE TO HIJACK MAC, ANDROID, WINDOWS DEVICES Vultur was already a very serious threat to Android users. But now, that threat has been significantly upgraded thanks to the level of control hackers can gain. Once Vultur has infected your device, hackers can install, delete, upload and download files. It can even stop apps from running in the first place. If that wasn't enough, Vultur can bypass Android's Keylock feature, bypassing your lock screen.Even more frightening is Vultur's remote control capabilities. The malware has been able to remotely access devices since it was first discovered in 2021. But now, hackers can instruct the malware to swipe, click, scroll, mute and unmute audio, and more, giving them more control.Hackers don't need to worry about staying connected to the device, either. They have leveraged Google's Firebase Cloud Messaging system to be able to send instructions to infected devices.One of the biggest ways to stay away from Vultur is not to call after a hacker texts you about approving a large bank transaction. You can always call your financial intuition yourself to check. But never call an unknown phone number that's sent to you by an unknown person. Here are some other tips as well:Try not to sideload apps. That's when you install apps outside of a legitimate source. Shortened URLs can mislead users into downloading malware.Exercise caution when granting app permissions. Consider whether an app truly needs access to certain device functions or data.Sometimes, having a lot of apps on your phone can make it easy to be exposed to malware. These apps can let in malicious code over time, and the more apps you have to keep track of and update, the more likely your Android will be vulnerable. Here's how to delete unnecessary apps from your Android . MORE: WHAT YOU NEED TO KNOW ABOUT VAJRASPY RAT, THE CYBERESPIONAGE TOOL THAT INFILTRATED GOOGLE PLAY Additionally, when you download apps, make sure they are from reliable and legitimate developers. Check reviews and do some research before just hitting "install."Your phone has a way of keeping itself safe with software and security updates . Don't forget to install them.Installing antivirus protection on all your devices is the best way to protect yourself from malware. Antivirus software will prevent you from clicking on potentially malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . If malware has already invaded your device, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow:Vultur can give hackers access to everything on your device, including your online accounts and your personal or financial information. To prevent this, you should change your passwords for all your important accounts as soon as possible. However, you should not do this on your infected device because the hacker might see your new passwords. Instead, you should use ANOTHER DEVICE , such as your laptop or desktop, to change your passwords. Make sure you use strong and unique passwords that are difficult to guess or break. You can also use a password manager to generate and store your passwords securely.You should regularly check your online accounts and transactions for suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or authorities immediately. You should also review your credit reports and scores to see signs of identity theft or fraud.Hackers can access everything on your Android device, including your personal and financial information. They can use this information to create fake accounts in your name, access your existing accounts and pretend to be you online. This can cause serious damage to your identity and credit score.To avoid this, you should use identity theft protection services. These services can track your personal information, such as your home title, Social Security Number, phone number and email address, and notify you if they detect any suspicious activity. They can also help you freeze your bank and credit card accounts to stop hackers from using them. Read more of my review of the best identity theft protection services here .If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.If you want to ensure that your device is free of malware or spyware, you can restore it to factory settings . This will erase all your data and settings and reinstall the original Android version. Before doing this, you should back up your important data and only restore it from a trusted source.Vultur is an incredibly sophisticated banking Trojan with some terrifying features. The fact that hackers can gain full control of your Android is scary, making it all the more important that you protect yourself.These attacks begin with a simple text message. It's up to you to make the effort to separately call your financial institution and see if anything's amiss. Just taking an extra 10 minutes can save you from having your entire device compromised and your personal information exposed.How worried are you about Vultur attacks? How do you protect yourself from attacks targeting your finances? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to print your Reminders app lists on your iPhone to take wherever you go

While you can do pretty much everything on your iPhone, it is nice to be able to translate some of the functionality offline. If you want to have a good old-fashioned list instead of squinting at your phone screen, the good news is that you can print out your lists from your Reminders app. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER If you prefer a physical list to carry to the store and check off as you go, or if you want to place the list at home on the refrigerator or on a desk, or even if you want to share your reminders with others, follow the steps below to learn how to print out your lists from the Reminders app on your iPhone. MORE: TOP PRINTERS OF 2024 MORE: THE CHEAPEST PRINTER INK AND HOW TO MAKE CARTRIDGES LAST LONGER MORE: 4 WAYS TO PRINT OUT, SAVE, SEND YOUR IPHONE'S TEXT MESSAGES Printing your Reminders app lists from your iPhone offers several practical advantages. Whether you prefer the tactile experience of a physical list while shopping, want to keep reminders visible at home (perhaps on the refrigerator or a desk) or need to share your lists with others, the process is straightforward.By following the steps outlined above, you can easily print out your reminders and enjoy the convenience of having them in hand. So, go ahead, put that printer to good use and keep your tasks organized.While it is great to have all your reminder lists saved in one place, it is equally great to have the ability to print individual lists when you need to make additional notes, physically take them with you or share them with others.Do you find the tactile experience of a physical list more effective than a digital one? Why or why not? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Two new stealthy malware threats are targeting those of you who use Macs

If you use a Mac , it could be at risk of two new threats. While Apple has a reputation for having ironclad security, these two pieces of malware are designed to trick you and steal your data.Jamf Threat Labs, an organization that focuses on the safety of Apple products, says the malware threats are part of a year-long attack on Mac systems.  The group says hackers are using them to harvest data.  Attacks like these are constantly happening, according to the lab. That makes it all the more important for those who use a Mac to ensure your data is locked down.It's important to note that, according to the lab, these hackers largely target the crypto industry, putting those individuals, particularly, at risk. That said, all Mac users should still exercise caution. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER rget=_new href="https://irtable.com/appWxqdv6xgWRUQsD/shrc8HkP0UvPkE0u1" target="_blank" rel="noopener"> Before we get into the malware , let's talk about Arc Browser. For those unfamiliar with it, Arc Browser is a Mac web browser that looks to give users a unique experience. First and foremost, the main focus is on the webpage. Any buttons you might find in a traditional browser are relegated to a sidebar. It uses a bookmark system that gives you multiple workspaces. It also has automated tab management.In other words, many Mac users would consider Arc Browser an upgrade over the already-included Safari. And its ever-growing popularity makes it a huge target for hackers. MORE: HOW CRYPTO IMPOSTERS ARE USING CALENDY TO INFECT MACS WITH MALWARE In this attack, hackers are hiding malware in advertisements posing as ads for Arc Browser, as seen below.Instead of taking you to the legitimate download page for the Arc web browser, the ad takes you to a lookalike malicious site, aricl[.]net , that imitates the legitimate arc.net and hosts malware.Once you download malware posing as Arc Browser, the malware unleashes an Atomic stealer. It's a fake prompt that looks like a normal System Preferences prompt asking you for your password. Once the hackers get access to your system password, they can steal other data.Even worse, these so-called "ads" can appear as sponsored advertisements in a Google search. Jamf Threat Labs says these links can only be accessed through a generated sponsored link and not accessed directly. Attempts to access the malicious website directly returned an error message. This is presumably done to evade detection.The researchers at Jamf Threat Labs have also discovered a fake website that offers malware hidden as free group meeting scheduling software. Meethub[.]gg appears to be legitimate. The company posts articles on Medium and has more than 8,000 followers on X, at the time of publishing. It, however, hosts malware that's related to Realst, another piece of malware designed to drain crypto wallets.Some of the attacks involving Meethub use social engineering. A hacker might approach their victim looking to interview them for a job or a podcast. In order to meet, they ask the victim to download Meethub's software. According to Jamf, these attacks can sometimes lead to big paydays for hackers. 1. Don't download bootleg software: It's not worth the risk to download bootleg software. It exposes your device to potential security threats like viruses and spyware.  If someone emails you a link for a download, make sure it's from a reputable source and scan it. 2. Don't click on suspicious links or files: If you encounter a link that looks suspicious, misspelled or unfamiliar, avoid clicking on it. Instead, consider going directly to the company's website by manually typing in the web address or searching for it in a trusted search engine. Most often, the first or second result that comes up is legitimate . If you see the word "Sponsored "above the search result, take a beat before clicking it and consider clicking on the result below it. 3. Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Mac, Windows, Android & iOS devices . MORE: STEALTHY BACKDOOR MAC MALWARE THAT CAN WIPE OUT YOUR FILES  If it has already happened, and you've been hacked, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow:If hackers have recorded your passwords, they could access your online accounts and steal your data or money. On another device (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn't recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.You'll want to activate two-factor authentication for an extra layer of security. GET FOX BUSINESS ON THE GO BY CLICKING HERE You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or authorities immediately. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.Identity theft protection companies can monitor personal information like your home title, Social Security number, phone number and email address and alert you if it is being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft. If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges, and issue new cards for you.If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual. MORE: HOW A FLEW IN iPHONE'S SECURITY COULD LEAVE YOU LOCKED OUT While Macs are generally secure devices, that hasn't stopped hackers from stealing data. In fact, these two new attacks show how creative they can be while trying to break into your device. That's why it's so important to have good antivirus software and safety practices.Good safety practices are even more essential for people who trade and use cryptocurrencies in these particular situations. As mentioned before, these attacks focus largely on draining crypto wallets. And while anyone can be hacked, crypto users have a higher risk. So take the time to assess a link before clicking on it. Don't just download software because someone tells you to. Do your research. At the end of the day, it will help keep your data and your wallet safe.Are you worried about hackers finding more creative ways to break into your computer? If you use crypto, how are you keeping your crypto wallet safe? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

How 1X's humanoid robot is putting a stop to you having to fold laundry

Imagine never having to fold laundry again. No more Sunday afternoons spent meticulously tackling this tedious task. Sounds pretty sweet, doesn't it? Well, let me introduce you to Eve, the cool new humanoid robot from 1X, developed in collaboration with the folks at OpenAI. Eve isn't just another gadget; it's like a sneak peek into a future where household chores are a thing of the past. CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Just a month ago, Eve was impressing us with its ability to pick up items, self-charge and perform simple tasks around the house. Now, Eve is tackling one of the most universally dreaded chores - laundry folding. Despite lacking human-like hands and instead using claw grippers, Eve manages this delicate task with surprising precision and care. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? MORE: FIRST HUMANOID ROBOT FACTORY IN THE U.S. CAN CRANK OUT 10,000 ROBOTS A YEAR   Eve's rapid learning curve is a testament to the incredible potential of artificial intelligence -powered robotics. Within weeks, Eve has moved from performing simple tasks to handling complex, multi-step processes such as sorting items, using tools and, most impressively, folding shirts autonomously. This rapid progression is not just about doing chores; it's about redefining what robots are capable of achieving. MORE: AI ROBOT THAT CAN TRIM, EDGE AND BLOW YOUR LAWN FOR YOU   The development of Eve and robots like it represents a significant leap forward in the field of humanoid robotics. These robots are not being programmed for specific tasks; they are learning, adapting and evolving with minimal human intervention.This approach to AI and robotics is paving the way for a future where robots could become an integral part of our daily lives, assisting with a wide range of tasks. MORE: FORGET HANDS, TOYOTA'S HUG-READY ROBOT PICKS UP WITH ITS ENTIRE BODY  Eve's abilities highlight the broader advancements in the field of AI-driven humanoid robotics. From Agility Robotic's Digit working with Spanx to Apptronik's Apollo at Mercedes-Benz, humanoid robots are beginning to make their mark across various industries.Eve's success in autonomously folding laundry might seem like a small step, but it's part of a much larger journey toward creating robots that can perform a wide range of tasks.While Eve's ability to take over household chores sounds like a dream, it's also stirring a lot of conversations. Understandably, some folks are worried about the broader implications, particularly when it comes to job security. How do we balance the convenience offered by robots like Eve with the concern that they could take over jobs, even beyond household tasks? GET FOX BUSINESS ON THE GO BY CLICKING HERE You see, as Eve and its counterparts grow more skilled, the question isn't just about who's folding laundry. It's about what roles humans will play in a future filled with such capable robots. Critics argue that as robots become more integrated into various sectors, we might see a significant shift in employment patterns. On the flip side, proponents suggest that this technological leap could free us from mundane tasks, allowing humans to focus on more creative and fulfilling work.It's a complex issue, and there's no easy answer. What's clear, though, is that Eve's development isn't just a technical milestone; it's a prompt for serious discussions about the future of work, the ethics of AI and how we navigate the inevitable changes technology is bringing to our lives.As we witness the rapid evolution of robots like Eve, it's clear that we are on the cusp of a new era in robotics and artificial intelligence. These developments promise not just convenience but a fundamental shift in how we approach tasks and work. With robots capable of learning and adapting at an unprecedented rate, the possibilities are endless. Eve's journey from performing basic tasks to folding laundry is just the beginning. The future of humanoid robotics is here, and it's about to change the way we think about technology and its role in our lives.Do you have any concerns or fears about a future where robots seamlessly integrate into our daily lives, potentially taking over tasks currently done by humans? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter   Ask Kurt a question or let us know what stories you'd like us to cover Answers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

What to do when your own number appears to ring your home phone

If you are like me and refuse to give up your home landline, you're probably no stranger to... well, strange calls. Landlines are more prone to spam calls than cellphones, which offer better call-blocking options . If you're used to getting the occasional spam call on your landline, you likely already have a system in place to handle it. Perhaps you just hang up the call as soon as you see a number you don't recognize (or, maybe you recognize it at this point because they call so much!). Or, maybe you even pick up the line and give them a piece of your mind. However, is this the right thing to do?And what happens when your landline rings and the caller ID lists your number? Strange, right? This is what happened to one of our CyberGuy Report subscribers, who reached out to ask us about it. Crazy as it sounds, this person said the scammer got a hold of their home phone number and used it to call the same number they were spoofing. This is obviously a bit more of a cause for concern than ordinary scammers.Now, if the scammer you're seeing on your caller ID seems like they are calling from your own landline phone number, you'll want to do the steps above in addition to the three steps below: 1) Alert your phone provider: ur number has been spoofed, you should inform your phone company as soon as possible. Depending on the situation, they may be able to guide you on the best way to proceed. 2) Get your personal information offline: There are several ways that phone spoofers can hijack your phone number, but it's most likely because they can easily find personal information online. There are several tools you can use to find where your personal information is lurking online and get it offline, away from scammers who want to steal your information and exploit that information, whether to commit identity theft or something else.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 3) Change your number: If all else fails and your phone company is not really able to help, a good idea is to change your home phone number altogether. While you may not want to do this, it may be the only solution, especially if the scammer continues to call you on your same number and if friends and family are getting those calls as well. HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMERS Now, let's shift our focus to why it's best not to engage with scammers who call you, regardless of whether they're using your own phone number or another one. Here are a few reasons why:  1) Safety : Engaging with unknown callers can potentially expose you to scams or other forms of fraud. 2) Privacy : Even if you're giving them a hard time, they might still be gathering information about you in the meantime. And, now, with AI voice scams, these scammers can clone your voice to use for other types of scams. 3) Encouragement : Responding to these calls, even negatively, can signal to the caller that your number is active, which might lead to more calls. END OF ANNOYING ROBOCALLS? FTC CRACKS DOWN ON DECEPTIVE PRACTICES Of course, nobody wants to continue to get scam calls. So, there are a few recommended steps you can take instead: 1) Let the answering machine answer or go to voicemail. This allows you to screen calls without directly engaging with potential scammers. You can avoid direct interaction with them and listen to the message at your convenience to determine if it's legitimate. 2) Block the numbers : If you notice certain numbers repeatedly calling, you can block them. Take a look at our best landing call-blocking devices. These are especially helpful in blocking robocalls but can also help block individual scammers. 3) Report the calls : If you're in the U.S., you can report unwanted calls to the Federal Trade Commission . 4) Add yourself to the no-call list: Consider adding your phone number to the National Do Not Call Registry , which can help stop some of the scam and telemarketing calls you're getting.Remember, while these methods can significantly reduce unwanted calls, it may not be possible to block all spam calls completely. Always exercise caution and avoid sharing personal information over the phone with unknown callers. My rule of thumb involves asking yourself one simple question: "Did I ask for this call?" If the answer is no, then hang up. HOW TO AVOID BEING DUPED BY ROBOCALLS NOW AND FOREVER Getting spam calls on your landline is no fun, and even more so when those calls are coming from your own number. Remember, it's important to protect your personal information and privacy and always to be cautious when dealing with unknown callers. Using the techniques above can help ensure you're not only using best practices when dealing with scammers but also protecting yourself in the long run from future ones.How do you think phone companies should address scam calls and caller ID spoofing? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

10 tips to speed up your PC's performance

Have you been having issues with your PC moving at a snail's pace lately? Don't panic; it happens to everyone. Before you decide to invest in a new PC or take your computer into a repair shop, there are a few things that you can do first to help your computer get back up to speed.Here are 10 tips to help you get that slow-moving PC moving quickly again. If you have a Mac, you'll want to check out our 8 tips to speed up your Mac's performance .Before doing anything, give your PC a quick restart. When you restart your PC, Windows will close all your applications, which may resolve some slow-down issues.Make sure you are keeping your Windows OS up to date. Microsoft continuously rolls out improvements for bugs that may slow your PC down. Here's what you need to do:Check which programs open automatically at start-up. FIRST 10 THINGS TO DO IF YOU GOT A NEW PC Cleaning your disk with the Windows "Disk Cleanup" tool is an easy way to delete old temporary files and old system data stored on your hard drive, which can slow down your PC's performance. HOW TO SMARTLY ORGANIZE YOUR PHOTOS ON A PC  If none of the above steps helped speed up your PC, you may need to follow these slightly more advanced steps.Depending on which PC you bought, there's a good chance you have a few pre-installed programs on it that you don't use. Reviewing your applications list and deleting programs you no longer use or were pre-installed on your system is a good idea.To do this:Using the Windows Command Center, you can find applications running in the background and close them. This will free up processing power and memory and help speed up your PC. To do this: BEST LAPTOPS FOR 2024 You can turn off visual effects to free up additional memory and processing power.To do this:If everything else has failed to speed up your PC's performance, you can try these next steps. These steps will require a bit of technical know-how, such as how to open and replace components within your PC, so you may have to seek professional help.One of the most common issues that causes PCs to slow down is insufficient RAM for all your applications. While 8GB of RAM should be OK for most users, if you notice your PC is slow with 8GB of RAM, it's worth upgrading to 16GB. Most computer stores can help you with this for a fee. Solid State Drives (SSDs) can greatly enhance your PC's speed. They offer faster data transfer rates, improved boot and load times, and higher bandwidth compared to traditional Hard Disk Drives. By installing an SSD and moving your operating system and crucial applications to it, you can achieve faster boot, loading and read/write times. You have two options when it comes to installing an SSD: doing it yourself or consulting with a professional. If you're tech-savvy and comfortable with handling computer hardware, you can install the SSD yourself. This involves replacing or supplementing the existing HDD with the SSD and transferring your operating system and files. However, most people will want to consult with a professional. They can handle the installation and data transfer for you. Regardless of the method you choose, it's crucial to back up your data beforehand and ensure your computer is compatible with the SSD you've chosen.This should only be attempted by people who are comfortable installing and re-installing operating systems. Otherwise, we recommend getting your PC into a repair shop. If you want to perform a clean install of Windows 11 or 10, simply head to Microsoft's website and head over to the "Reinstall Windows" page.It's never fun when your computer is running slow, and we hope these 10 tips can help you bring your PC back up to speed. The first four steps will be enough for most users, but if you are comfortable and have a good deal of technical experience, you can attempt steps four through 10 or seek professional help to complete them.Have you encountered any unique challenges while trying to improve your computer's performance? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most-asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Tech's 'craziest talent war'

IN TODAY'S NEWSLETTER:- Elon Musk boosting pay of AI engineers to prevent poaching from OpenAI
- AI sports betting platforms' breaches likely impacting March Madness wagers
- Billionaire investor and New York Mets owner says AI could yield four-day work week for most workers 'CRAZIEST TALENT WAR': Tesla CEO Elon Musk said the electric vehicle giant is giving its artificial intelligence engineers a raise as the automaker tries to fend off poaching efforts by ChatGPT creator OpenAI. COSTLY GAME: More and more sports bettors appear to be turning to artificial intelligence to help counter the notoriously unpredictable tournament, which is often referred to as March Madness. LEISURE TIME: Billionaire investor and New York Mets owner Steve Cohen said in a Wednesday appearance on CNBC's "Squawk Box," that he believes that the majority of workers will eventually have a four-day work week and three-day weekend, which will expand opportunities for individuals to engage in leisurely pursuits . FIGHT AGAINST AI: Comedian George Carlin's estate has agreed to a settlement with the media company it sued earlier this year over the use of artificial intelligence . TAKING ON CANCER: After losing his wife to colon cancer, a New York man has dedicated his life to fighting the disease and trying to protect other families from the same tragedy, in part by using machine learning to analyze the outside of the cancer cells. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

US avoids 'digital security crisis' after developer uncovers sabotage in software

German software developer Andres Freund was running some detailed performance tests last month when he noticed odd behavior in a little known program. What he found when he investigated has sent shudders across the software world and drawn attention from tech executives and government officials.Freund, who works for Microsoft out of San Francisco, discovered that the latest version of the open source software program XZ Utils had been deliberately sabotaged by one of its developers, a move that could have carved out a secret door to millions of servers across the internet.Security experts say it's only because Freund spotted the change before the latest version of XZ had been widely deployed that the world was spared a digital security crisis . CHINESE HACKERS HAD ACCESS TO US INFRASTRUCTURE FOR 'AT LEAST 5 YEARS' BEFORE DISCOVERY "We really dodged a bullet," said Satnam Narang, a security researcher with Tenable who has been tracking the fallout from the find. "It is one of those moments where we have to wipe our brow and say, 'We were really lucky with this one.'"The near-miss has refocused attention on the safety of open source software - free, often volunteer-maintained programs whose transparency and flexibility mean they serve as the foundation for the internet economy.Many such projects depend on a tiny circle of unpaid volunteers fighting to get out from under a pile of demands for fixes and upgrades.XZ, a suite of file compression tools packaged into distributions of the Linux operating system, was long maintained by a single author, Lasse Collin. CHINESE CYBER ATTACKS ARE INTENDED TO 'INDUCE SOCIETAL PANIC' ACROSS AMERICA, SECURITY DIRECTORS TELL CONGRESS In recent years, he appeared to be under strain.In a message posted to a public mailing list in June 2022, Collin said he was dealing with "longterm mental health issues" and hinted that he working privately with a new developer named Jia Tan and that "perhaps he will have a bigger role in the future."Update logs available through the open source software site Github show that Tan's role quickly expanded. By 2023 the logs show Tan was merging his code into XZ, a sign that he had won a trusted role in the project.But cybersecurity experts who've scoured the logs say that Tan was masquerading as a helpful volunteer. Over the next few months, they say, Tan introduced a nearly invisible backdoor into XZ.Collin didn't return messages seeking comment and said on his website that he would not respond to reporters until he understood the situation well enough to do so.Tan did not return messages sent to his Gmail account. Reuters has been unable to ascertain who Tan is, where he is, or who he was working for, but many of those who've examined his updates believe Tan is a pseudonym for an expert hacker or group of hackers -- likely one working on behalf of a powerful intelligence service."This is not kindergarten stuff," said Omkhar Arasaratnam, the general manager of the Open Source Security Foundation, which works to defend projects like XZ. "This is incredibly sophisticated."Tan could easily have gotten away with it had it not been for Freund, the Microsoft developer , whose curiosity was piqued when he noticed the latest version of XZ intermittently using an unexpected amount of processing power on the system he was testing.Microsoft declined to make Freund available for an interview, but in publicly-available emails and posts to social media, Freund said a series of easy-to-miss clues prompted him to discover the backdoor.The find "really required a lot of coincidences," Freund said on the social network Mastodon.Microsoft CEO Satya Nadella congratulated Freund over the weekend, saying in a post to the social network X that he loved seeing how the developer, "with his curiosity and craftsmanship, was able to help us all."In the open source community, the discovery has been sobering. The volunteers who maintain the software that underpins the internet aren't strangers to the idea of little pay or recognition, but the realization that they were now being hunted by well-resourced spies pretending to be Good Samaritans was "incredibly intimidating," said Arasaratnam, of the Open Source Security Foundation.Government officials are also weighing the implications of the near-miss, which has underlined concerns about how to protect open source software. Assistant National Cyber Director Anajana Rajan told Politico that "there's a lot of conversations that we need to have about what we do next" to protect open source code."The Cybersecurity and Infrastructure Security Agency (CISA) says it has been leaning on U.S. companies that use open source software to plow resources back into the communities that build and maintain it. CISA adviser Jack Cable told Reuters the burden was on tech companies not just to vet open software but to "contribute back and help build the sustainable open source ecosystem that we get so much value from."It's not clear that software companies are properly incentivized to do so. Online open source mailing lists are teeming with complaints about tech giants demanding that volunteers troubleshoot issues with open source software those companies use to make billions of dollars.Whatever the solution, almost everyone agrees the XZ episode shows something has to change."We got unreasonably lucky here," said Freund in another Mastodon post. "We can't just bank on that going forward."

How to create custom Gmail signature

Are your emails lacking that professional touch? If the answer is yes, we're here to help. By adding a Gmail signature , you can elevate your email game and make a lasting impression. Whether you're a business professional, freelancer or just want to spruce up your personal emails, follow these simple steps to create a polished Gmail signature.If you have an iPhone, we have steps to add a custom signature to your emails. Just click here . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER GMAIL REVOLUTIONIZED EMAIL 20 YEARS AGO - AFTER BEING INITIALLY MISTAKEN AS GOOGLE'S APRIL FOOLS' DAY JOKE Here's how to create multiple signatures: MORE: HOW TO USE SMART COMPOSE TO WRITE EMAILS FASTER ON GMAIL Your signature only shows up in messages you send from the Gmail app. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: TURN THIS GMAIL SECURITY FEATURE ON ASAP Your signature only shows up in messages you send from the Gmail app. MORE: HOW TO STOP SPAM EMAIL IN GMAIL Now you know how to set up your Gmail signature on your desktop and your phone. From now on, all your outgoing emails will have that professional touch. Remember to keep it concise, relevant and aligned with your personal or business brand.What's your biggest email pet peeve? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Ultimate guide to viewing solar eclipse on April 8

Depending on where you live in the United States, this month will be your last chance to witness a total or partial solar eclipse until 2044. On April 8, our moon will pass between Earth and the sun , temporarily blocking light from the sun.The total eclipse will occur for those living throughout the Midwest, eastern Mexico and a small part of eastern Canada.Here are some quick tips on avoiding eye injuries from staring at the sun during an eclipse . CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER Eclipse glasses are significantly darker than normal sunglasses and are designed specifically for viewing solar events. To avoid buying a pair of fake eclipse glasses, ensure that any pair you buy features the ISO 12312-2 filter. You run the risk of serious eye injury and even blindness, so make sure your eclipse glasses are up to par and have the ISO 12312-2 filter. NEW YORK INMATES SUE CORRECTIONS DEPARTMENT TO WATCH SOLAR ECLIPSE AMID PLANNED PRISON LOCKDOWNS MORE: HOW THE DREAM CHASER SPACEPLANE PLANS TO SHAKE UP SPACE TRAVEL IN THE FUTURE NASA itself doesn't approve of any single brand of eclipse glasses. However, they do point towards the American Astronomical Society's list of safe options . NASA also recommends avoiding online marketplaces to buy your eclipse glasses. Due to the popularity of the upcoming solar event, third-party vendors have flooded online marketplaces such as Amazon with knockoff eclipse glasses.If you still have eclipse glasses after enjoying the 2017 solar eclipse, reusing them is a good idea. The actual ISO 12312-2 filter and lens are good forever if the lens is free of cracks or punctures. However, buying a new pair is a good idea if you are uncertain about it. MORE: ARE YOU READY TO TAKE CRAZY RIDE TO OUTER SPACE IN 8-PASSENGER LUXURY BALLOON? The only time you can safely remove your eclipse glasses is during the solar eclipse's totality. This period lasts around three minutes, and you'll know it's happening because you won't be able to see the sun through your eclipse glasses anymore . The totality is when the moon entirely obscures the sun during its passing.When you are wearing your eclipse glasses and look up at the sun, you'll see the glow of the sun. When there is absolutely no glow left, feel free to take a few seconds and then take your eclipse glasses off. GET FOX BUSINESS ON THE GO BY CLICKING HERE MORE: ELON MUSK WANTS TO SELL YOU INTERNET ACCESS FROM SPACE If you cannot purchase proper eclipse glasses, you can still enjoy the eclipse with a homemade pinhole projector. Making one is easy; here's how to do it: To use your projector, follow these steps: MORE: HOW TO PROTECT YOURSELF FROM THE SUN This is your last chance to see a total or partial eclipse until 2044, so make sure you follow these steps to find proper eclipse glasses or build your pinhole projector. You can also use a colander as a makeshift projector or make a sturdier projector with a cereal box. The path of totality for the eclipse will center on the East Coast and Midwestern region of the United States, but if you live elsewhere, you'll still be able to see a partial eclipse. A word of advice to any photographers out there: you will need to get a camera with a lens with an ISO 12312-2 filter applied, as looking at the sun directly through a camera's viewfinder will still cause damage to your eye.The path of totality for this eclipse cuts across several regions. If you could be anywhere in the world to witness this event, where would you choose and why? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Solar eclipse 2024: Tips to capture the perfect shot of the rare cosmic event

Monday's total solar eclipse might become one of the most filmed and photographed events of the year.As the moon passes in front of the sun, plunging a swath of North America into a few minutes of darkness, throngs will take pictures or videos of the moment. But powerful solar rays and drastic changes in lighting pose unique challenges in catching that perfect image. SOLAR ECLIPSE 2024: WHERE AND HOW TO VIEW THE RARE ORBIT HITTING THE US Here are some pointers on how to get the best shot.First, get in the right position. You'll want to be as close as possible to the path of totality, which passes over Mexico's Pacific coast and ends in eastern Canada. Fifteen U.S. states get to see the full eclipse.There are online maps to check if you'll be anywhere near the path. NASA's map shows how many minutes of totality there will be if you're inside the path depending on location, and how much of a partial eclipse you'll see if you're outside of it.For spectators in Mexico and Canada, eclipse expert Xavier Jubier's website overlays the eclipse's path on Google Maps, which allows zooming into street level detail.With so many factors in play including cloud cover and the sun's position in the sky, planning is key to getting the best image.There are a host of smartphone apps for eclipse chasers. The American Astronomical Society has compiled a list of useful ones for both iOS and Android devices, including its own Totality app that shows your location on a map of the totality path.The Solar Eclipse Timer uses your phone's GPS to play an audio countdown to the moment of totality and highlights key moments. The app's maker advises using a separate phone for taking photos.Eclipse Calculator 2 for Android devices uses the phone's camera to depict how the event will look in the sky from your position, using lines overlaid on top of the camera image. For iPhone users, apps like Sky Guide and SkySafari have eclipse simulators. There are other iOS apps that use augmented reality to simulate the eclipse, but they're pricier and not yet on the society's list.Digital SLR cameras will produce the best photos. Their manual exposure controls and ability to add zoom lenses and accessories like remote shutter buttons will let you make great pictures.Associated Press chief photographer Julio Cortez advises using a smaller aperture - f11 or f17 - to keep the focus "a little bit sharper." When he shot the 2017 total solar eclipse, he used an ISO setting of 1250 and 1/500 shutter speed.The rest of us have our smartphones.NASA published detailed guidelines for smartphone eclipse photography in 2017 with the caveat that "smartphones were never designed to do sun and moon photography." That's because the wide-angle lenses on most devices won't let you capture close-up detail. But new phones released since then come with sophisticated sensors, multiple lenses and image stabilization software that give a better chance.Some experts suggest HDR, or High Dynamic Range, mode, which takes a series of pictures at different light levels and then blends them into a single shot - ideal for combining an eclipse's very dark and very bright areas.But don't use flash. You can spoil the moment by ruining the vision of those around you whose eyes have adapted to darkness.The American Astronomical Society advises using a solar filter to protect cameras against intense sunlight and heat.You can buy a filter that screws onto DSLR lenses, but it will take time to remove when totality happens. Cortez made his own with cardboard, tinted film and fasteners that he can quickly rip off.For smartphones, you can use a spare pair of eclipse glasses and hold it over the lens, or buy a smartphone filter. There's no international standard, but the society's website has a list of models it considers safe. Make sure macro mode is not on.If you plan to shoot for an extended time, use a tripod. To line up his camera after mounting it on a tripod, Cortez uses a solar finder, which helps locate the sun without damaging your eyes or equipment.Cortez also advises bringing a white towel to cover up your gear after setting up to keep it from overheating as you wait for the big moment.It's very tempting to make a TikTok or Instagram-friendly eclipse video. Perhaps you want to selfie video, narrating into the camera while the cosmic ballet between sun and moon plays out over your shoulder.Be careful: While you might think your vision isn't at risk because you're not looking at the sun, your phone's screen could reflect harmful ultraviolet light, eye experts have warned.And if you're using a solar filter on the selfie camera, it will turn the picture dark and you won't show up.

Distributed by aarss.com.