Technology News Articles on Fox News

Exciting AI tools and games you can try for free

I'm not an artist. My brain just does not work that way. I tried to learn Photoshop but gave up. Now, I create fun images using AI. You need a vacation. We're giving away a $1,000 getaway gift card for your favorite airline.  Enter to win now! Some AI tech is kind of freaky (like this  brain-powered robot ), but many of the new AI tools out there are just plain fun. Let's jump into the wide world of freebies that will help you make something cool. 20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER Create custom music tracks Not everyone is musically inclined, but AI makes it pretty easy to pretend you are. At the very least, you can make a funny tune for a loved one who needs some cheering up. AI to try:  Udio Perfect for: Experimenting with song styles Starter prompt: "Heartbreak at the movie theater, '80s ballad"Just give Udio a topic for a song and a genre, and it'll do the rest. I asked it to write a yacht rock song about a guy who loves sunsets, and it came up with two one-minute clips that were surprisingly good. You can customize the lyrics, too. Produce quick video clips The built-in software on our phones does a decent job at editing down the videos we shoot (like you and the family at the beach), but have you ever wished you could make something a little snazzier? AI to try:  Invideo Perfect for: Quick content creation TIME-SAVING TRICKS USING YOUR KEYBOARD Starter prompt: "Cats on a train"Head to Invideo to produce your very own videos, no experience needed. Your text prompts can be simple, but you'll get better results if you include more detail.You can add an AI narration over the top (David Attenborough's AI voice is just too good). FYI, the free account puts a watermark on your videos, but if you're just doing it for fun, no biggie. Draft digital artwork You don't need to be an AI whiz skilled at a paid program like Midjourney to make digital art. Here's an option anyone can try. AI to try:  OpenArt Perfect for: Illustrations and animations Starter prompt: "A lush meadow with blue skies"OpenArt starts you off with a simple text prompt, but you can tweak it in all kinds of funky ways, from the image style to the output size. You can also upload images of your own for the AI to take its cues from and even include pictures of yourself (or friends and family) in the art. If you've caught the AI creative bug and want more of the same, try the OpenArt  Sketch to Image generator. It turns your original drawings into full pieces of digital art. YOUR BANK WANTS YOUR VOICE. JUST SAY NO. More free AI fun Maybe creating videos and works of art isn't your thing. There's still lots of fun to be had with AI. If you're not tech-ahead, you're tech-behind Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

This drone detection technology could have intercepted assassin's drone 2 hours before Trump shooting

The FBI has admitted the assassination attempt on former President Trump was aided by a drone . The shooter apparently used the drone to get footage of where Trump was speaking.This is a serious security lapse and something that could have been easily prevented if the security agencies had used drone detection technology at the location where the former president took the stage.The harrowing incident unfolded at a rally in Butler, Pennsylvania, on July 13. A gunman, identified as 20-year-old Thomas Matthew Crooks , opened fire from a rooftop, hitting Mr. Trump in the right ear, killing one attendee and leaving two others badly injured. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE FBI Director Christopher Wray provided new details on the drone that was recovered from the gunman. While speaking before the Republican-led House Judiciary Committee, Wray noted that the shooter flew a drone over the Butler fairgrounds about two hours before Trump spoke at the rally.Wray said Crooks flew the drone around the area, roughly 200 yards from the stage, from around 3:50 p.m. to 4 p.m. Trump took the stage around 6 p.m."We think - but we do not know, so again, this is one of these things that is qualified because of our ongoing review - that he was live-streaming, viewing the footage [for] about 11 minutes," he said. GET FOX BUSINESS ON THE GO BY CLICKING HERE According to the FBI head , investigators have successfully reverse-engineered the drone's flight path from the day of the rally. They believe the drone footage would have provided the shooter with a view of what was behind him, essentially acting like a rearview mirror for the scene.Wray's statement clearly indicates that the drone played an important role in informing the gunman of his surroundings and helping him plan the assassination attempt. At the time of the shooting, the drone was in Crooks' vehicle, he said, adding that the device is now "being exploited and analyzed by the FBI lab." THE US AIR FORCE'S XQ-67A DRONE THINKS, FLIES, ACTS ON ITS OWN A drone detection system could have easily alerted the Secret Service about an unidentified drone flying in the region. Such systems are already utilized by the Army and certain police departments. For example, defense company Dedrone's airspace security solution is currently used by the St. Petersburg Police Department in Florida and the South Carolina Law Enforcement Division.Dedrone's official website mentions that its drone detection system can not only detect the presence of a drone but also determine the drone and pilot's location.Drone detection systems also capture data such as the drone's manufacturer, model, time and length of activity, video verification and flight history (including flight path). This data could have been easily used to identify suspicious activity at the Pennsylvania rally and might have led to the arrest and prosecution of the gunman even before he attempted the assassination. CLICK HERE FOR MORE US NEWS HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET It's known that counter-drone technology is currently restricted in use. Regulations limit its deployment to specific DoD (Department of Defense) personnel during narrowly defined events. However, the rally should have qualified as the kind of National Security Event that the regulations were designed to address.If not drone detection tech, the Secret Service could have at least employed drones to capture aerial images of the site. Drones would have provided an unobstructed view of the building from which the shooter fired at Trump. Even if there were obstacles blocking a direct line of sight, drones equipped with thermal cameras could have scanned the building for potential threats. BEST HOME SECURITY SYSTEMS THE CRIME-FIGHTING DRONE THAT BEATS COPS TO THE SCENE The assassination attempt on former President Trump highlights the need for drone detection technology at high-profile events. Had such technology been in place, the Secret Service could have detected the unauthorized drone activity, potentially preventing the shooter from gathering crucial reconnaissance footage.How do you think advancements in drone technology will impact security protocols for future high-profile events? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

New prosthetics restore natural movement via nerve connection

In the world of prosthetics , a groundbreaking advancement is changing the game for individuals with lower-limb amputations. Researchers at MIT, in collaboration with Brigham and Women's Hospital, have developed a neuroprosthetic system that allows users to control their prosthetic legs using their own nervous systems. This innovative approach could bring us closer to a future of fully integrated, naturally controlled artificial limbs. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE At the heart of this breakthrough is a surgical procedure known as the agonist-antagonist myoneural interface, or AMI. Unlike traditional amputation methods, the AMI reconnects muscles in the residual limb, preserving the natural push-pull dynamics of muscle pairs. This seemingly simple change has profound implications for prosthetic control and function.Dr. Hugh Herr, a professor at MIT and senior author of the study , explained the significance: "This is the first prosthetic study in history that shows a leg prosthesis under full neural modulation, where a biomimetic gait emerges. No one has been able to show this level of brain control that produces a natural gait, where the human's nervous system is controlling the movement, not a robotic control algorithm." HOW TO STOP ANNOYING ROBOCALLS rget=_new href="https://cyberguy.com/health/ai-driven-exoskeleton-lightens-your-load-and-elevates-performance/" target="_blank" rel="nofollow noopener"> AI-DRIVEN EXOSKELETON LIGHTENS YOUR LOAD AND ELEVATES PERFORMANCES The key advantage of the AMI system is its ability to provide users with proprioceptive feedback, the sense of where their limb is in space. This sensory information, often taken for granted by those with intact limbs, is crucial for natural movement and control. With the AMI, patients regain a portion of this vital feedback, allowing them to walk more naturally and confidently.In the study, seven patients with AMI surgery were compared to seven with traditional amputations. The results were striking. AMI patients walked faster, navigated obstacles more easily and climbed stairs with greater agility. They also demonstrated more natural movements, such as pointing their toes upward when stepping over obstacles, a subtle but important aspect of a natural gait. CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE rget=_new href="https://www.foxnews.com/us" target="_blank" rel="noopener"> CLICK HERE FOR MORE US NEWS One of the most impressive aspects of the AMI system is its versatility. Patients were able to adapt their gait to various real-world conditions, including walking on slopes and navigating stairs. This adaptability is crucial for everyday life, where terrain and challenges can change rapidly.The system's responsiveness was put to the test in an obstacle-crossing trial. AMI patients were able to modify their gait to clear obstacles more effectively than those with traditional prosthetics. This ability to rapidly adjust to unexpected challenges is a hallmark of natural limb function and represents a significant leap forward in prosthetic technology. AI WEARABLE CONTRAPTION GIVES YOU SUPERHUMAN STRENGTH The success of the AMI system hinges on its ability to augment residual muscle afferents, which are the sensory signals sent from muscles to the nervous system. Remarkably, even a modest increase in these signals allows for significantly improved control and function. This finding highlights the incredible adaptability of the human nervous system and its ability to integrate and utilize even partial sensory information.Dr. Hyungeun Song, lead author of the study, notes: "One of the main findings here is that a small increase in neural feedback from your amputated limb can restore significant bionic neural controllability, to a point where you allow people to directly neurally control the speed of walking, adapt to different terrain and avoid obstacles." GET FOX BUSINESS ON THE GO BY CLICKING HERE While this research represents a significant step forward, it's just the beginning. The team at MIT is exploring ways to further enhance sensory feedback and improve the integration between the human nervous system and prosthetic devices. The AMI procedure has already been performed on about 60 patients worldwide, including those with arm amputations, suggesting broad applicability across different types of limb loss.As this technology continues to evolve, we may see even more natural and intuitive control of artificial limbs. The ultimate goal is to create prosthetics that feel and function like a natural part of the user's body, blurring the line between human and machine. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The development of prosthetic limbs controlled by the nervous system marks the beginning of a new era in bionics. It offers hope for improved mobility, independence and quality of life for millions of people living with limb loss. Moreover, it provides valuable insights into the plasticity of the human nervous system and our ability to integrate with advanced technology.As we continue to push the boundaries of what's possible in merging biology and technology, we open up new frontiers in human augmentation and rehabilitation. The implications extend far beyond prosthetics, potentially influencing fields such as neurology, robotics and even our understanding of human consciousness and embodiment.How comfortable would you be with technology that directly interfaces with your nervous system? Let us know by writing us at rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener"> Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener"> Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

AI concerns spur video game workers to go on strike starting Friday

Video game performers with SAG-AFTRA will strike beginning Friday as AI "loopholes" have caused concerns.

Beginning at 12:01 Friday morning, video game voice actors and motion capture performers under the Screen Actors Guild-American Federation of Television and Radio Artists will strike over artificial intelligence protections.

This is the second strike for SAG-AFTRA performers in video games. While the union has conceded that wages and job safety have made gains in video game contracts, AI in interactive media continues to be a source of insecurity.

rget=_new href="https://www.foxnews.com/video/6358872078112" target="_blank" rel="noopener"> TENS OF THOUSANDS OF GAMERS DESCEND ON LAS VEGAS FOR THE EVO TOURNAMENT

SAG-AFTRA Chief Contracts Officer Ray Rodriguez shared at the presser on Thursday that some performers' work may be treated as "data" under current AI guidance .

"We strike as a matter of last resort. We have given this process absolutely as much time as we responsibly can. We have exhausted the other possibilities, and that is why we're doing it now," said Rodriguez.Nearly two years of negotiations with gaming creators like Warner Brothers and the Walt Disney Company have led to the strike.

SAG-AFTRA's negotiating committee shared with the AP that the definition of "performer" may differ between the union and the gaming companies.

rget=_new href="https://www.foxnews.com/video/6358436919112" target="_blank" rel="noopener"> AMERICAN LEGION EMBRACES VIDEO GAMES Audrey Cooling, a spokesperson for the gaming companies involved,  with the AP that the companies' offer "extends meaningful AI protections."Cooling added, "We are disappointed the union has chosen to walk away when we are so close to a deal, and we remain prepared to resume negotiations."Andi Norris, an actor, said to the AP "the performers who bring their body of work to these games create a whole variety of characters, and all of that work must be covered. Their proposal would carve out anything that doesn't look and sound identical to me as I sit here, when, in truth, on any given week I am a zombie, I am a soldier, I am a zombie soldier."

"We cannot and will not accept that a stunt or movement performer giving a full performance on stage next to a voice actor isn't a performer," Norris argued.According to SAG-AFTRA, the video game agreement represents 2,500 "off-camera (voiceover) performers, on-camera (motion capture, stunt) performers, stunt coordinators, singers, dancers, puppeteers, and background performers."

rget=_new href="https://www.foxnews.com/download" target="_blank" rel="noopener"> CLICK HERE TO GET THE FOX NEWS APP

The Associated Press contributed to this report.

10 easy ways to help launch a successful online shop

If you ever wanted to launch an online shop, but you're not quite sure where to start, I get it. With all the website platforms that exist out there, it can feel rather daunting. But whether you're looking to start a side hustle or finally begin that passion project after retiring, I want you to understand how someone with no prior experience can easily create their own online presence. I'm here to help you launch a successful online site - like a shop, for example - one step at a time. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE There are many website builders available, like Squarespace, Shopify, WordPress and Wix, but only a few specialize in online selling. Among those, even fewer make it easy to design, publish, manage your shop and handle all the in-between tasks on one platform without needing to integrate other services. Here's how you can do it in this step-by-step guide.Your website design plays a crucial role in attracting and retaining customers . Although it's often said not to judge a book by its cover, many of us naturally do. Consider the intersection of form and function, how structure and design elements guide shoppers through their buying journey. If design isn't your strong suit, many website builders offer a variety of e-commerce templates to choose from. GET FOX BUSINESS ON THE GO BY CLICKING HERE Here are some tips:When it comes to colors, fonts and other design aspects, familiarize yourself with color marketing to determine what will work best for your brand and store. Ensure your logo and/or shop name is clearly placed on your storefront.Remember, strong product images and descriptions are essential. Use this opportunity to integrate customer support, cross-selling features and social proof to pave the path to purchase. Kurt's best website builders for building your online shop BEST DESKTOP COMPUTERS FOR 2024 Once your design is ready to go, start by adding your products to the store. Whether you're selling physical items or digital downloads , consider the following:Don't worry if you don't have all of this figured out yet or if you only have one product to sell right now. You'll need to start somewhere, and there's no time like the present. 3 WAYS TO MAKE THE MOST MONEY ONLINE SELLING YOUR THINGS u do have multiple products or plan to add them later, you'll want to group similar products into categories. This helps organize your catalog and allows customers to browse related items together, in addition to being able to easily search and filter through what they are looking for. In order to do this, follow these steps: BEST LAPTOPS FOR 2024 After deciding which products to sell and categorizing those products, you'll need to make it easy for your audience to find, read about and see what those products are. Without getting a good description and visual of what they'll be getting, they'll be less likely to order from you. So, here's what you'll need to optimize those product pages:Additionally, you'll want to add to your site: Kurt's best website builders for building your online shop HOW TO STOP ANNOYING ROBOCALLS It's important to enable site settings to ensure your site functions smoothly. You can do this by entering essential details such as: Kurt's best website builders for building your online shop Having a site to showcase your products is the first step, but you also need to have a way to get those products to your customers in a timely and cost-efficient manner. This is the part that can make or break your customer base, as you'll need to be able to create expectations for your users. CLICK HERE TO READ MORE ON FOX BUSINESS Now, decide how to get your products to customers: Kurt's best website builders for building your online shop Now, how will your customers pay for those products? Be sure to set up secure payment gateways so that customers can pay seamlessly and with multiple payment options. Many platforms support various payment methods, including credit cards, PayPal and more, and it's easy to accept those payments directly through your site. Kurt's best website builders for building your online shop In addition to making your product pages look snazzy, you'll also want to take the time to optimize those pages - and other pages on your online shop - for SEO. What this means is that when someone searches for a specific product or type of store on a search engine, your site/product pages will be the ones that come up. People accomplish this by finding relevant search keywords that people are searching for, like "handmade necklaces of fruits" or "organic soaps online ship to Atlanta."This may require you to pay for an SEO research tool or hire an SEO specialist to help boost your visibility, ensuring your people can find you. Some platforms have SEO tools that can help you ensure you're putting in all the keywords correctly, and you can also hire an SEO specialist directly through the site. Kurt's best website builders for building your online shop SEO is a way to organically lead customers to your store, but there are other ways to spread the word with outbound marketing. You may have to put a little extra effort into this, but it can help increase your sales and, at the very least, raise awareness about your shop, which people can share with their own networks, thus spreading the word. Try to have an idea of where your audience is, though, before putting all your resources into all of these methods. Sometimes just one is enough! Social media: Use social media platforms to share product updates, promotions and behind-the-scenes content. You can also insert social icons onto your site to help visitors share products with their network. Email marketing: Build a subscriber list and send targeted emails. Sometimes the best place to start is by contacting people that you already have in your network, as they may be thrilled at the idea of supporting your store! Email marketing automation, like sending an automated "thank you" email after someone purchases a product from your store, can also be very effective. Paid advertising: Consider Google Ads or social media ads to give your products and site an extra boost. Kurt's best website builders for building your online shop ONLINE MARKETPLACES AND SOCIAL MEDIA PLATFORMS UNDER FIRE BY CONGRESS OVER RECALLED PRODUCTS Last but not least, running an online shop isn't much different from running a brick-and-mortar store, especially when it comes to monitoring your store's performance and checking your inventory. There are many tools available to help you regularly check your store's performance:When launching a website, you have a variety of choices to suit your specific needs, whether you're seeking simplicity, customization or advanced features. Explore these top website builders to find the perfect fit for your online presence: Wix, Squarespace, Weebly, Shopify and WordPress. Learn more about these options by clicking here.It's important to have a comprehensive e-commerce solution that allows you to sell everywhere with ease: online, in person and across multiple channels. Look for features like POS systems, a branded mobile app, drop-shipping and more, so you can adapt and scale your business effortlessly.You want to gain complete control of your business by managing all your inventory, orders and sales from one centralized dashboard. You also want to optimize your site traffic with built-in SEO tools, marketing automations and ad campaigns. The ultimate goal is to ensure a seamless experience for your customers. Kurt's best website builders for building your online shop Launching an online shop might seem overwhelming at first, but with the right tools and guidance, it can be a smooth and rewarding process. A comprehensive platform that simplifies everything from design to payment processing can make it easier for you to focus on what you love: selling your products. Remember, every successful store starts with a single step, so don't hesitate to dive in and start building your dream shop today.Now that you've learned how to set up your online shop, we'd love to hear from you! What challenges or successes have you experienced in your journey to launch an online store? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

New technology makes it nearly impossible to kill house plants

Remember that " pandemic garden " you started in 2020 that didn't quite make it? Well, you're not alone in your plant care struggles. In fact, many people unintentionally send their houseplants to the great compost heap in the sky each year. But fear not. There's a new gadget out there that could change the way we care for our plants. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE SmartyPlants is a smart sensor designed specifically for houseplants. It takes the guesswork out of plant care. This clever little device monitors crucial factors such as light, humidity, temperature, soil moisture and nutrients and sends all that vital info straight to an app on your smartphone. HOW TO FIND ANY RECIPE WITH JUST A PHOTO ON IPHONE Gone are the days of wondering, "Does my ficus need water, or am I just being paranoid?" SmartyPlants provides real-time updates on your plant's needs. And here's a fun twist: You can name your plants in the app. So when "Dave needs a drink," you'll know exactly which of your green buddies is feeling parched. BEST HOME SECURITY SYSTEMS  The brains behind SmartyPlants know the struggle is real. In fact, the Founder and CEO Ben Beaver's partner was a self-proclaimed "serial plant killer" who had managed to keep only one hardy cactus alive for six years. Drawing on his background in biology and technology , the CEO realized there had to be a better way. After numerous prototypes and tests, SmartyPlants was born, giving even the most challenged plant parents a fighting chance at nurturing thriving indoor jungles. CLICK HERE FOR MORE US NEWS ARE THESE ROBOTS MAKING HUMANS OBSOLETE FOR HOME AND REPAIR TASKS SmartyPlants is packed with features that go well beyond simple watering reminders. It can assess your space and recommend plants that would thrive in that specific environment. You can set up automatic watering systems over Wi-Fi, perfect for worry-free vacations.The device uses AI image analysis to monitor your plant's progress over time and keeps tabs on past issues to prevent future problems. It doesn't just measure light intensity but looks at the full spectrum to maximize photosynthesis. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Launched on Kickstarter, SmartyPlants quickly became a sensation. Within just four days, the campaign had over 500 backers and raised more than 10 times its initial target. By the middle of the campaign, they had over 1,000 backers, putting them in the top 1% of all Kickstarter projects. They even snagged a coveted "Projects We Love" award from Kickstarter, given to only the top 10% of projects on the platform.You can get your hands on a SmartyPlants sensor by heading over to the SmartyPlants Kickstarter page . For a single sensor, you can grab an early bird discount of approximately $43, 15% off the regular price. If you're dreaming big, a monster pack of 20 sensors is available for about $605, a whopping 40% discount. Simply back the project and wait for updates on shipping and delivery. GET FOX BUSINESS ON THE GO BY CLICKING HERE ber, this is a Kickstarter campaign, so the usual crowdfunding caveats apply. But given the project's success and the team's dedication, it looks like a pretty safe bet for plant lovers.After reading this article about the SmartyPlants gadget, are you now considering a houseplant to add to your home or office? Well, you're in luck. After evaluating a wide selection of plants and suppliers, I highly recommend a plant subscription service . Services like these offer a variety of beautiful and easy-to-care-for plants delivered right to your door. It's a perfect way to start or expand your indoor garden, ensuring you always have fresh greenery to brighten your space. For more information and to get started, check out this link .Let's face it, constantly replacing dead plants can get expensive and disheartening. At around $43 for an early-bird Kickstarter deal, SmartyPlants seems like a solid investment if it can keep your green friends alive and thriving. While it can't protect your plants from curious pets (sorry, Fluffy) or magically turn you into a botanist overnight, SmartyPlants might be the tool you need to achieve that lush, Pinterest-worthy indoor garden you've finally been dreaming of.What's your most memorable experience with trying to keep plants alive, and how might a device like SmartyPlants have changed that outcome? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Waymo's robotaxi launches citywide in San Francisco

IN TODAY'S NEWSLETTER:- Robots take the wheel as San Francisco opens streets to driverless taxis- FTC probes AI-powered 'surveillance pricing' at Mastercard, JPMorgan Chase, McKinsey and others- US Air Force's XQ-67A drone thinks, flies, acts on its own DRIVERLESS TAXIS ARRIVE: The future of urban transportation is here, and it's taking the form of sleek, autonomous vehicles traveling through city streets. Across the United States, self-driving car companies are racing to revolutionize how we move, promising safer roads, reduced traffic and a new era of mobility. But it's in San Francisco that this future is suddenly now a reality for thousands. 'SHADOWY ECOSYSTEM': The Federal Trade Commission on Tuesday announced that it launched a probe of eight companies that offer "surveillance pricing" tools that use artificial intelligence and other technology to analyze consumer data to help set price targets for products and services. AI IN THE SKY: The U.S. Air Force has just unveiled a new aircraft that's turning heads and raising eyebrows across the globe. ACCIDENT AVOIDANCE: Developed by Maine-based entrepreneur Josh Fox, Survue is an innovative device that looks to address the limitations of existing bicycle radar systems. While conventional systems primarily focus on the speed of approaching vehicles, Survue takes a more holistic approach by considering multiple factors to assess potential risks. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

What exactly is a data breach and why should I care?

Data breaches have become common, and if you've actively used online services in the past year, you might have been affected by them. For example, the Advance Auto Parts breach exposed more than 2.3 million users' personal information, while a recent AT&T incident allowed hackers to access around six months of customer call and text interactions. But what do bad actors do with all this data?John from Jackson, Mississippi, asked a similar question that I want to highlight and address because it helps all of us: "What do you mean when you say a company has exposed 2.3 million or whatever in a data breach? This happens often, but there is never any follow-up. It's like throwing address labels in a trash can, and then they are carried to the landfill. So? What really happens with a data breach?" I get what you're saying, John. breaches make headlines, but you rarely hear about the fallout. It's tough to link a specific breach to a specific problem later on. Below is a detailed look at what a data breach actually means. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE A data breach occurs when an unauthorized person gains access to information that is meant to be confidential, private, protected or sensitive. Think of it this way: You have personal information that you trusted a friend with, but while sharing it, someone who wasn't supposed to know it overheard it.A real-life example is the AT&T data breach mentioned earlier. Your call logs and text interactions that were meant to be private and which you trusted AT&T to protect ended up in the hands of hackers. These details can now be used by bad actors to scam you. GET FOX BUSINESS ON THE GO BY CLICKING HERE breaches can happen in a few ways. Hackers might target specific organizations or launch broad attacks hoping to steal certain kinds of data. They can also use targeted cyberattacks to go after specific individuals.Sometimes, data breaches occur due to honest mistakes or oversights by employees. Weaknesses in an organization's systems and infrastructure can also leave them vulnerable to data breaches. MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS' PERSONAL INFORMATION TO CYBERCRIMINALS Here's what typically happens in a data breach that's deliberately caused: Research: Cybercriminals often begin by identifying a target , such as a large corporation like AT&T, focusing on the type of data they want, which could include personal customer information. They search for weaknesses in the company's security, which might involve exploiting system flaws or targeting network infrastructure. Attack: The attackers make their initial move using either a network or social attack. Common methods include phishing attacks, where individuals are tricked into revealing personal information; malware attacks that can steal or encrypt data; and denial-of-service attacks that disrupt services. These tactics can compromise the personal information of customers, such as names, addresses, phone numbers and even payment information. Exfiltration: Once inside the company's systems, cybercriminals tunnel their way to confidential data. For individuals, this means that their personal information can be extracted and sold on the dark web, used for identity theft or for other malicious purposes. The impact on individuals can be severe, including financial loss, damage to credit scores and the emotional stress of having personal information exposed and misused. WORLD'S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM Once the hackers obtain protected and confidential data, they have various ways to profit from it. They can use compromised data for illegal activities, including identity theft, financial fraud, spamming or even extortion. Information such as email addresses and phone numbers can be used in phishing scams.Sometimes, this data is also posted on dark web forums for sale . It can be purchased by other criminals, who may use it for various illicit activities. Just as you don't hear about every burglary, homicide or battery, you don't hear about each instance of these criminal activities.They only make headlines when something significant occurs, such as the incident where hackers scammed a Colorado woman out of $25,000 or when a man was arrested for scamming a Kalispell, Montana, woman of $150,000.Data breaches impact not only customers but also the companies involved. These companies may face government fines or lawsuits. For example, AT&T is currently dealing with a class-action lawsuit due to a security breach in 2022 that exposed months' worth of data from nearly all its customers . Similarly, T-Mobile is facing a lawsuit related to a data breach that affected millions of people. CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE It's primarily the responsibility of companies or online services to keep your data safe, but if it gets exposed, here are some tips to keep in mind:If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn't recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.Activate two-factor authentication (2FA) for an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud. CLICK HERE FOR MORE US NEWS If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. These services employ advanced tools and techniques to identify and eliminate your data from people-search sites, data brokers and other platforms where your information might be exposed. By using a data removal service, you can minimize the risk of identity theft and fraud, especially after a data breach. Additionally, these services often provide ongoing monitoring and alerts, keeping you informed of any new instances of your data appearing online and taking immediate action to remove it. Check out my top picks for data removal services here . Identity theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft .If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.The impact of a data breach may not be immediate, but once your data is on the internet, it can be misused by bad actors. They can steal your hard-earned money, cause emotional and mental harm or affect your loved ones. So, even if you don't see the immediate impact of a data breach, take action. Ensure your devices are protected, and keep a close eye on your bank accounts.Have you ever noticed unusual activity in your accounts after a data breach was reported? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

US Air Force's XQ-67A drone thinks, flies, acts on its own

Have you ever wondered what the future of warfare might look like? Well, it's starting to take shape right above our heads.  The U.S. Air Force has just unveiled a new aircraft that's turning heads and raising eyebrows across the globe.But don't expect to see a pilot in the cockpit. This high-tech innovation flies itself. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE On a sunny California day in February 2024, something extraordinary took flight. The XQ-67A , a sleek unmanned aircraft, soared into the sky for the first time, giving us a glimpse into the future of aerial combat and reconnaissance.The XQ-67A is what's known as a drone or unmanned aerial vehicle. This aircraft is packed with cutting-edge technology that allows it to fly without a human pilot on board. Instead, it can be controlled remotely or even fly on its own, making decisions based on its programming and the data it collects. A NEW BREED OF MILITARY AI ROBO-DOGS COULD BE MARINES' NEW SECRET WEAPON So, what makes the XQ-67A stand out in a world where drones are becoming increasingly common ? For starters, it's part of a program called the off-board sensing station. This fancy name essentially means it's designed to be the eyes and ears of the Air Force, gathering crucial information in situations that might be too dangerous for human pilots.But here's where it gets really interesting: The XQ-67A is built on what engineers call a "common chassis." Think of it like a car frame that can be used to build different types of vehicles. This approach allows the Air Force to create various types of drones quickly and cost-effectively. All of these are based on the same core design. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES COULD THESE CREEPY, DEAD STUFFED BIRDS BE USED AS DRONES FOR MILITARY? The XQ-67A isn't alone in this new era of aviation. It's actually based on an earlier drone called the XQ-58A Valkyrie. And there's more on the horizon. The Air Force is also developing something called the off-board weapon station, which could be thought of as the XQ-67A's more combat-oriented cousin.This family of drones represents a shift in military thinking. Instead of relying solely on expensive, manned aircraft, the Air Force is moving towards a mix of crewed and uncrewed vehicles working together. It's a concept they call "Loyal Wingman," where these autonomous drones support and protect human pilots in the air. GET FOX BUSINESS ON THE GO BY CLICKING HERE The implications of this technology are huge. With drones like the XQ-67A, the Air Force can gather intelligence, conduct surveillance and potentially even engage in combat without putting pilots directly in harm's way. It's not just about reducing risk to human life; it's about expanding capabilities.These drones can fly longer missions without the limitations of human endurance. They can be sent into dangerous or contaminated areas without hesitation. And perhaps most importantly, they can make split-second decisions based on data and algorithms, potentially reacting faster than a human pilot could. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET As exciting as the XQ-67A is, it's just the beginning. The technology behind these autonomous aircraft is advancing rapidly, and it's not hard to imagine a future where swarms of artificial intelligence-controlled drones work in perfect coordination with human pilots.But this future also raises important questions. How will the role of human pilots evolve? What are the ethical implications of having machines make life-and-death decisions in combat? And how might this technology change the nature of warfare itself? WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The XQ-67A represents a pivotal moment in military aviation. The skies of tomorrow will be filled with aircraft that think, decide and act on their own, working alongside human pilots to accomplish missions we can only imagine today. Whether this prospect fills you with excitement or concern, one thing is certain: The future of aerial warfare is here, and it's autonomous.What are your thoughts on this new technology? Does the idea of autonomous military aircraft intrigue you, or does it give you pause? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Your bank wants your voice. Just say no.

You already gave your bank your address, date of birth, Social Security number and your mother's maiden name. Now, they want your voice .Banks say it's an extra layer of biometric protection against fraud and cybercrime . But with the rise of hackers stealing voice data for deepfakes, is it worth the risk? You need a vacation. We're giving away a $1,000 getaway gift card for your favorite airline.  Enter to win now! IT NEVER ENDS! WHAT TO DO AFTER A DATA BREACH No matter how much money you have in the bank, a hacker or scammer wants it - and they're always one step ahead.If you're skeptical of your bank having your voice data on record, you're not crazy - you're smart . A voice can be cloned using AI with as little as 10 seconds of audio and a few bucks.Call your bank's customer service line and ask to opt out of voice authentication . It takes two minutes. If you can do it now, great. If you can't, I highly recommend you set a reminder to do it later. This is important. Pro tip: Scammers have been known to plant fake numbers in search results. Don't just Google search the name of your bank and call that number. Go directly to your bank's website or call the number on the back of your debit or credit card. YOUR KIDS MAY BE TREATING VIDEO GAMES LIKE BANKS AND PLAYING WITH REAL MONEY. THE GOVERNMENT HAS QUESTIONS Because you're smart, you use strong unique passwords, you enable 2FA, you don't bank on public Wi-Fi, and you always monitor your accounts. (More on all that below if you need help.)But it might be worth a phone call or trip to your local bank branch to ask if they offer extra security features. Popular options include: Secure keys: This physical or digital device generates one-time passcodes that are usually only good for 30 seconds for safer online banking. Banking alerts: Set up text or email notifications for real-time account activities, such as large transactions or account changes. It's a bit of a pain when you have to approve all your charges, but it has saved me from scams and phony charges. Account lockout features:  Many banks offer options to automatically lock your account after a certain number of failed online login attempts. Advanced access : This is enhanced security for certain activities using additional verification steps. For example, Morgan Stanley asks me for a one-time passcode if I log in at a new location. OWN A HOME? SHOPPING OR SELLING? YOU'RE A SCAM TARGET Maybe you need to get the basics in order first. That's OK, and it's definitely not too late to take a couple smart steps.With 2FA enabled, a secondary form of verification is required to prove your identity instead of just entering your username and password to log in to an account.The second form of verification can be something only you know (an answer to a question), something you have (your device), or who you are (a fingerprint, voice pattern or facial scan). You enter the temporary code, and voila - you're in.  My pick:   An authenticator app. Biometrics (your face or fingerprint scan) are a close runner-up. A text code is the most hackable.Looking at you, random coffee shop Wi-Fi. Public Wi-Fi networks do little to nothing to protect your privacy. Cybercriminals know this and use free Wi-Fi networks to find victims. Malware, phony hotspots, unsecured networks and nefarious passers-by might all be able to cut in, compromising your data and account.If you connect to public Wi-Fi without taking precautions, thieves can steal login credentials to any account you sign into while on the network, including your bank accounts.If you must connect to free public Wi-Fi, don't do it without a virtual private network (VPN). A VPN allows you to browse the internet while encrypting your sensitive information. This helps hide your online credentials and IP address. I use  ExpressVPN , a sponsor of my national radio show.Now, help me get the word out. Share this story with friends and family to keep them safe before the tsunami of voice-cloning scams hits. They're coming.Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

The rise of dumbphones in a smartphone world

Most of us know how much smartphones can become a distraction. Even if we make our very best effort not to grab our phone when we are bored immediately, the average American spends 4.1 hours a day staring at their smartphone screen. Not only does this affect our eyes, posture and attentiveness, it also impacts our mental health and feelings of isolation and loneliness.Some people's dependency on smartphones has led them to ditch them altogether and replace them with what's now known as a "dumbphone."But what exactly is a " dumbphone ," and is this the answer to our smartphone and social media woes? CLICK TO GET KURT'S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO'S TO MAKE YOU SMARTER TOP AFFORDABLE CELLPHONE PLANS Dumbphones are basic '90s-inspired cellphones that lack the vast array of apps found on smartphones. Remember that old Nokia that you could play "Snake" on or that snazzy flip phone that was once all the rage but took a long time to send one text message?Dumbphones focus on providing core functionalities like texting and calling, avoiding the high screen time associated with smartphones we use every day. These phones are part of a growing market providing offline alternatives for those seeking to reduce their digital footprint and be more present in their physical environments. IS YOUR SMARTPHONE SPYING ON YOU WITHOUT YOU EVEN KNOWING IT? The shift towards dumbphones is driven by a growing awareness of the adverse effects associated with prolonged screen time, such as loneliness, addiction and mental health issues like anxiety or depression. Desire for simplicity: Many advocate for a return to simpler devices that focus on basic functionalities like texts and calls, reducing the constant bombardment of information and notifications. Reduction in digital footprint: Using a dumbphone helps decrease online presence and data sharing, appealing to privacy-conscious users. HOW TO STOP ANNOYING ROBOCALLS The popularity of dumbphones is on the rise. These trends suggest a robust future for dumbphones, especially among younger generations embracing other retro technologies. The market is evolving, with new models and options becoming available that cater to a desire for simplicity and a break from constant connectivity. Get Kurt's picks for the best dumbphones HOW TO KNOW IF YOUR SMARTPHONE IS LISTENING TO YOU Consider a dumbphone if you feel overwhelmed by your smartphone usage or are concerned about its impact on your mental health. Many users of dumbphones still keep a smartphone but switch between the two depending on their needs, which could be a practical approach for those unsure about fully transitioning. Trying out a dumbphone could be a beneficial experiment if you frequently find yourself distracted by your phone or looking for ways to enhance real-life interactions. Get Kurt's picks for the best dumbphones SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES If you're part of the older generation and have only ever used your smartphone for calling, texting and maybe email, then perhaps you don't have all the other concerns that heavy smartphone users have. Therefore, getting a dumbphone may only be advantageous if you're looking to save money on your phone bill and don't need all the bells and whistles. But, if you find yourself a little distracted by your smartphone, then resorting back to a dumbphone might be the way to go.Do you know anyone who has gotten themselves a dumbphone? What was the straw that broke the camel's back that made them do so? Would you consider trading in your smartphone for a dumbphone ? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Giant battery-powered dump truck dumps diesel for electric

In the world of heavy industry, change often comes at a glacial pace. But every once in a while, an innovation emerges that sends shock waves through the sector. Enter Hitachi Construction Machinery's latest creation: the world's first ultra-large, fully electric mining dump truck. This isn't just another incremental improvement; it's a game-changer that could reshape the future of mining operations worldwide. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Picture a machine as tall as a three-story building, capable of hauling over 200 tons of earth in a single trip. Now, imagine that this colossus runs entirely on electricity without a drop of diesel in sight. That's exactly what Hitachi has achieved with their groundbreaking electric dump truck.Developed in collaboration with ABB Ltd., a leader in electrification and automation, this electric titan represents the culmination of years of research and development. The project, which kicked off in 2021, aimed to tackle one of the mining industry's most pressing challenges: reducing greenhouse gas emissions without sacrificing productivity. THIS $112K LUXURY EV FROM CHINA CAN SHAKE AND JIGGLE OFF SNOW What sets Hitachi's electric dump truck apart is its innovative charging system. Unlike electric cars that need to stop and plug in, this behemoth keeps on rolling thanks to a clever combination of overhead charging lines and regenerative braking.As the truck moves along its route, it draws power directly from overhead lines, much like an electric train. Simultaneously, its regenerative braking system captures energy that would otherwise be lost during deceleration, feeding it back into the batteries. This dual-charging approach allows for continuous operation, eliminating the downtime associated with traditional battery charging.The result? A mining truck that can operate for up to 20 hours a day, 350 days a year, matching the grueling schedules of conventional diesel-powered vehicles while slashing emissions to zero. BULLET TRAIN-LOOKING GIANT SEMI TRUCK TO HIT US HIGHWAYS Hitachi isn't content with proving their concept in controlled conditions. Instead, they've taken their electric dump truck to the heart of the mining world : First Quantum's Kansanshi copper and gold mine in Zambia.This choice of location is no coincidence. Zambia, with its abundance of renewable energy sources, provides the perfect backdrop for testing a zero-emission vehicle. The country's energy grid, powered by hydroelectricity and an expanding portfolio of solar and wind projects, aligns perfectly with the ethos behind Hitachi's electric truck.Moreover, the Kansanshi mine already boasts an extensive network of overhead power lines for its existing fleet of trolley-assisted trucks. This infrastructure, coupled with the site's varied terrain and real-world operating conditions, offers an ideal proving ground for Hitachi's revolutionary vehicle. MONSTER PLANE COULD REPLACE TRUCKS AND TRAINS The implications of Hitachi's electric dump truck extend far beyond the confines of a single mine. If successful, this technology could pave the way for a dramatic reduction in the mining industry's carbon footprint.Consider this: a single one of these electric giants could eliminate the need for 1,200,000 liters of diesel fuel annually. That translates to a staggering 3,000 metric tons of CO2 emissions avoided each year per truck. Now, multiply that by the hundreds of trucks operating at major mining sites worldwide, and the potential for emissions reduction becomes truly monumental.However, the benefits don't stop at the environmental impact. The electric dump truck's design, with its smaller battery pack and dynamic charging system, allows it to maximize payload capacity. This means more efficient operations, potentially leading to increased productivity and reduced operating costs for mining companies. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET As the two-year trial at the Kansanshi mine unfolds, all eyes in the mining industry are on Zambia. The success of Hitachi's electric dump truck could signal the beginning of a new era in mining operations, one where the roar of diesel engines is replaced by the quiet hum of electric motors.This shift wouldn't just benefit the mining industry. The technologies developed for these massive vehicles could find applications in other heavy industries, from construction to logistics. We might be witnessing the first steps towards a broader electrification of heavy-duty vehicles across various sectors.As we watch this electric titan tackle the rugged terrain of Zambia's copper belt, we're not just observing a new piece of machinery at work. We're witnessing the potential dawn of a new, cleaner era in mining. It's a future where the extraction of Earth's resources no longer comes at the cost of polluting its atmosphere. The road to a zero-emission mining industry may be long and challenging, but with each electric haul, Hitachi's dump truck is bringing that future a little bit closer. And that's something worth digging into.What other big machines or vehicles do you think could go electric next? How might that change things in your city or town? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Top 12 elderly fraud scams of 2024

Senior citizens are often targets for scams, and as scams are getting more sophisticated, it's getting easier to deceive even the most tech-savvy person. Elder fraud involves a variety of scams targeting seniors, from fake prizes to pleas for help from their "grandchildren," resulting in an annual loss of $3 billion, according to the FBI . Seniors are often targeted due to their good credit, financial security and trusting nature. Here are the top elderly fraud scams of the year: GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE In this scam, people pose as tech support or home repair professionals from reputable companies like Amazon, offering to fix non-existent issues. Seniors should be wary of unsolicited calls and independently verify the caller's identity. In some cases, they may even show up at your front door, telling you that they noticed your roof needs repair or something along those lines. BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS This scam is one of the worst ones . Fraudsters claim to be a grandchild or close relative urgently needing financial help. The scammers will say something like their grandchild has been in an accident and needs money to help them get to the hospital or something along those lines.If the senior catches on and realizes it's a scam, the fraudster will say they have kidnapped their grandchild and won't release them until the senior pays up. In most cases, it's a scam. Before acting, always verify the story with other family members and try calling your grandchild. (This is a good excuse to encourage them to answer the phone more often.) HOW TO STOP ANNOYING ROBOCALLS 5 INNOVATIONS TO HELP SENIORS LIVE BETTER This is when scammers pretend to be officials from agencies like the IRS, DEA or FBI and threaten legal action unless a payment is made. Scammers can also do this by phone spoofing , making it so that when they call the person they are targeting, their name and number actually show up in the caller ID as one of these agencies. Remember, these agencies will never call to demand money, and most companies won't, either.Wouldn't it be nice to find out you've just won the lottery? Well, chances are, the exciting news is actually a scam. The sweepstakes or lottery scam happens when seniors receive calls from a scammer claiming they've won a sweepstakes or lottery but must pay a fee to claim their prize. They'll never ask you to pay money first if it's an authentic sweepstakes.Scammers place ads for fraudulent services on TV or radio, tricking seniors into calling and handing over money, whether for a certain product or service. Always research companies thoroughly before buying from them. PREVENT PHONE SCAMS AGAINST THE ELDERLY In this particular scam, fraudsters send fake Geek Squad invoices via email, prompting seniors to call a provided number. During the call, scammers steal personal information under the guise of resolving a fake issue . Avoid clicking on suspicious links, and verify invoices through official company contacts. DON'T FALL FOR THIS EMAIL SCAM THAT ALMOST COST AN ELDERLY WOMAN $25,000 If you're one to balance your checkbook the "old-fashioned" way, then you may have a hard time falling for this scam. Here, they'll trick victims into believing they were accidentally overpaid for an item, service, bill or subscription, convincing them to refund the fake overpayment. To do this, they'll ask for your sensitive data, including your bank account information. Always verify such claims with your bank or the relevant company before taking any action.Similar to the above, emails in your inbox that claim to help you unsubscribe from services are often actually phishing attempts to steal personal information. Sometimes, there will even be an "unsubscribe" link right in the email. Always use official websites to manage subscriptions and avoid clicking on unknown email links.When it's that time of year again to enroll in your health insurance plan, be on the lookout for scammers that take advantage of this. They'll call offering fake health insurance plans or services, pretending to be health insurance brokers or what have you, often requesting personal information to "see what you're eligible for." Verify any health insurance offer with your provider directly.It's not uncommon for elderly people to be generous with their giving. But you don't want to give too much or give it to a charity that's not really a charity! Another tactic by fraudsters is to manipulate elders by soliciting donations for fake charities, especially after natural disasters. In this day and age, it's not very common for these charities to call, but they could. Never give out your information or money right away. Thank them for their call, take the time to research an organization and make sure it is legitimate before deciding what to do.Finally, scammers build fake romantic relationships online to extract money from seniors. A senior who's feeling lonely and wants to build a connection with someone may fall for this scam without realizing it, assuming the person is genuine. If they do ask for money, they justify it by feeling connected to the person until it's too late. Though plenty of seniors find genuine love online, sometimes meeting lifelong partners, be cautious about sharing personal information or sending money to someone you've only met online. There could be ulterior motives.Artificial intelligence (AI) scams are becoming increasingly sophisticated and pose a significant threat to seniors. These scams use AI technology to create convincing fake audio, video or text messages that appear to come from trusted sources. Here are some key points about AI scams targeting the elderly:To protect against AI scams, seniors should be cautious of unsolicited communications, verify identities through trusted channels, and stay informed about the latest AI-based fraud techniques. It's crucial to educate older adults about these evolving threats and encourage them to report suspicious activities to the National Elder Fraud Hotline . BEST TECH FOR SENIORS As scams targeting seniors become increasingly sophisticated, it's crucial for older adults to arm themselves with knowledge and caution. The following 12 tips can help seniors stay one step ahead of fraudsters and protect their financial well-being and personal information. 1) Be wary of unsolicited calls, emails or messages . Never give out personal information or send money to unknown individuals. 2) Take your time and don't act quickly under pressure. Scammers often create a false sense of urgency. 3) Verify the identity of callers claiming to be relatives in distress . Contact other family members to confirm the story before taking any action. 4) Be suspicious of requests for unusual payment methods like gift cards or wire transfers. 5) Keep computer and smartphone security software up to date and use two-factor authentication when possible. 6) Carefully review bills and credit card statements for unauthorized charges. 7) Be cautious of "free" offers that require payment for shipping or other fees. 8) Don't trust caller ID alone , as scammers can fake legitimate numbers. 9) Be skeptical of unsolicited investment opportunities or deals that seem too good to be true. 10) Report suspected scams to local law enforcement, the National Elder Fraud Hotline (833-372-8311) or the Federal Trade Commission. 11) Don't click on links in emails or text messages from unknown sources. If you're unsure, go directly to the official website by typing the address into your browser. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . 12) Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of continuously removing your information from hundreds of sites over a longer period. Remove your personal data from the internet with my top picks here . By staying vigilant and following these precautions, seniors can better protect themselves from falling victim to fraudulent schemes.Scammers generally don't care who their victims are, but they know who they can target to execute their tactics better. Don't fall for them. If anything in your gut tells you the situation is unusual, it probably is. After all, you've gained much life experience to know if something isn't right. The general rule of thumb is that the more urgent the situation is that they are asking for money, chances are it is a scam. Don't let your emotions get involved, and take a minute to figure out what's really going on.Have you ever been in a situation like this where you realized it was a scam? Or, have you maybe even fallen for one of these before? What happened? What did you do? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

AI bicycle safety device could warn of dangerous car collision

The roads are becoming increasingly dangerous for cyclists, and the numbers paint a grim picture. Recently, we hit a heartbreaking milestone: the highest number of bicycle fatalities ever recorded in the United States. The National Highway Traffic Safety Administration reported that 1,105 cyclists lost their lives on public roads. It's a stark reminder that, despite well-intentioned efforts from various government agencies, we still fall short in keeping cyclists safe.But here's how things could improve. A game-changing gadget called Survue could keep cyclists safe on the roads. Sure, we've seen bike radar systems before, but Survue? It appears to be in a league of its own. By tapping into the power of artificial intelligence, this device is taking cyclist protection to a whole new level.Let's be honest. I am sure there are a lot of you out there who would love to hop on a bike more often but are held back by safety worries. Who can blame you? With Survue hitting the road, we might just see a shift in how you view cycling safety. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Developed by Maine-based entrepreneur Josh Fox, Survue is an innovative device that looks to address the limitations of existing bicycle radar systems. While conventional systems primarily focus on the speed of approaching vehicles, Survue takes a more holistic approach by considering multiple factors to assess potential risks.While Survue is not the first AI-based bicycle safety device to enter the market, it intends to differentiate itself through its comprehensive approach and compact design. Survue's key features include AI-powered vehicle detection, 3D location and path prediction, vehicle type identification, automatic video recording and an enhanced taillight alerting system.In case you are wondering what Survue actually means, it is derived from two French words: sûr, meaning safe, and vue, meaning view. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET A PEDAL-ELECTRIC HYBRID THAT'S HALF BIKE, HALF CAR Unlike traditional radar-based systems, Survue utilizes a camera and sophisticated AI algorithms to analyze the road behind the cyclist. The device can detect approaching vehicles, determine their speed and location, and even predict their trajectory. This advanced analysis allows Survue to differentiate between passing vehicles and those that pose a potential collision risk. HOW THIS EXERCISE BIKE IS GENERATING BACKUP POWER IN WAR ZONES When Survue detects a potentially hazardous situation, it alerts the cyclist in multiple ways. These include an audible alarm on the device, notifications via an optional iOS/Android app, and visual displays on a handlebar-mounted smartphone. It alerts motorists or distracted drivers by increasing the flashing frequency of the integrated 80-lumen tail light. ELECTRIC CARGO BIKE AIMS TO REPLACE YOUR SUV Survue weighs 125 grams and measures 3.5 inches by 2 inches x 1.5 inches. Its battery life is up to six hours between charges. It can detect vehicles at a range of up to 360 feet and features an 80-lumen light visible from one mile away. The device also supports Bluetooth connectivity for integration with third-party apps. It is also compatible with most bike computers.One of Survue's standout features is its ability to automatically record video footage of approaching vehicles from the rear that trigger elevated alerts. This feature provides cyclists with valuable evidence in case of accidents or legal proceedings.Survue is currently available through a Kickstarter crowdfunding campaign. With a modest goal of $5,000, the campaign has already surpassed expectations. Head over to Survue's Kickstarter page to learn more about the pledge tiers and be among the first to experience this AI-powered cycling safety device.By combining AI-powered detection, predictive analysis and automatic video recording, Survue offers cyclists a more comprehensive and proactive approach to road safety. As cycling continues to grow in popularity, innovations like Survue may play a crucial role in making roads safer for all users. However, the actual test of Survue's effectiveness will come once it reaches the hands of everyday cyclists.Would an AI-powered safety device like Survue make you feel safer and bike more often? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

The best free sites for sharing photos and videos with your family

In a world where every moment is captured, the question isn't just about taking photos and videos. It's about sharing them with those who matter most. Kim from Tinton Falls, New Jersey, echoes a common concern: How can a family share digital memories , both past gatherings and present moments, in a way that's secure, private and shareable? Here's her question to us:"My extended family wants to find a way to share lots of photos and videos (from days of older and also when we gather). We are hoping to find a free site, and a site that won't be pervasive or have dangerous privacy policies. We would like everyone in our family to have access to upload into their own folders that they can name, and everyone in the family to download them." - Kim, Tinton Falls, New JerseyKim's dilemma is one many families face. They seek a platform that's free, non-invasive and respectful of privacy. A virtual space where each family member can contribute to their personalized folders, with the freedom to download cherished memories at will. Ideally, this platform would empower users to set expiration dates on their shared content, ensuring their digital footprints don't linger indefinitely in the cloud.Here are some recommended solutions that meet Kim's criteria for privacy, security and ease of use for family photo sharing. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE GET FOX BUSINESS ON THE GO BY CLICKING HERE How to set up Google Photos How to create a shared Google Photos album How to set up Dropbox How to upload files How to create a shared folder How to organize files How to set up Box How to upload files How to create a shared folder How to organize files While these solutions directly address Kim's needs for family photo sharing, it's also worth considering device-specific options and additional cloud storage services. These can complement your chosen family-sharing platform or provide alternative solutions depending on your devices and preferences. Also, with the solutions of sharing with family members, you should be aware of the need to increase storage space if needed. ▶️ SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The solution you choose may also depend on the devices your family uses. Whether you're an Apple owner, have an Android device or use a mix of both, there are options tailored to your needs. Let's explore some device-specific and cloud-storage solutions: Apple iCloud offers a free tier with 5 GB of storage, featuring seamless integration, automatic backup and shared albums. Paid tiers include 50 GB for $0.99 per month, 200 GB for $2.99 per month, and 2 TB for $9.99 per month. Google Photos provides an unlimited free tier at limited resolution, with smart search, automatic organization and shared albums. Google One plans offer 15 GB for free with various paid pricing options. Amazon Prime Photos is included with an Amazon Prime subscription and offers unlimited full-resolution storage and family sharing. For a fee, Amazon Photos provides additional storage options. CAN AI MAKE PHOTOS OF YOU LOOK BETTER THAN YOU DO IN REAL LIFE? With iCloud Photos , you can make more space available on your device and still have access to your entire full-resolution collection wherever you go. To get started with iCloud Photos:When Optimize Storage is turned on, full-resolution photos and videos are stored in iCloud, and space-saving copies are stored on your device when needed. As long as you have enough space in iCloud, you can store as many photos and videos as you want. CLICK HERE FOR MORE U.S. NEWS HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   S ettings may vary depending on your Android phone's manufacturer  Dropbox offers 2 GB of free storage with features like file syncing, easy sharing and a mobile app. It also has paid plans such as Plus, which provides 2 TB for $9.99 per month, and a family plan that offers a shared 2 TB for $16.99 per month. Box provides 10 GB of free storage and includes collaboration tools and secure sharing options. It offers business plans that come with more storage and additional features. IDrive gives you 5 GB for free and is designed for backing up multiple devices, along with file versioning. Its personal plans include 2 TB of storage for $69.50 per year.   Flickr allows users to store up to 1,000 photos or videos for free and is known for its community and photo organization features. It offers a pro subscription with unlimited storage for $7.99 per month. 500px permits only limited uploads for free users but is a platform dedicated to the photography community and includes portfolio features. Its Awesome plan is priced at $6.49 per month, and the Pro plan is available for $12.99 per month. SAY IT WITH PHOTOS: THE BEST DIGITAL PHOTO FRAMES These days, sharing family memories securely is both a challenge and a necessity. For Kim and families like hers, platforms such as Google Photos, Dropbox and Box offer free, secure solutions that balance privacy with ease of use. While device-specific options provide seamless integration, cloud services ensure cross-platform accessibility. Remember to regularly review privacy settings, use strong passwords and consider the 3-2-1 backup rule for your precious memories. By choosing the right platform and following best practices, you can create a private, shared digital space to cherish your moments together, both past and present.What challenges or benefits have you experienced in trying to balance convenience, privacy and meaningful connection when sharing photos and videos with loved ones? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Robots take the wheel as San Francisco opens streets to driverless taxis

The future of urban transportation is here, and it's taking the form of sleek, autonomous vehicles traveling through city streets. Across the United States, self-driving car companies are racing to revolutionize how we move, promising safer roads, reduced traffic and a new era of mobility. But it's in San Francisco that this future is suddenly now a reality for thousands.Waymo, the Google-owned autonomous vehicle pioneer, is available to everyone in the city by the bay. Imagine cruising through the iconic streets of San Francisco without worrying about parking, navigating steep hills or designating a driver after a night out. That's the promise Waymo is offering. But what does this sudden availability of autonomous rides mean for daily commutes, weekend plans and the very fabric of urban life in one of America's most dynamic cities? GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Remember when you needed an exclusive invite to ride in a Waymo ? Well, those days are now in the rearview mirror. Now, anyone in San Francisco can hail a driverless Waymo ride. Just download the app , and you're good to go. But here's the thing. Nearly 300,000 people - that's more than a quarter of San Francisco's population - had already signed up on Waymo's waiting list. Talk about pent-up demand. It seems like everyone wanted to try out the self-driving robotaxi service. GET FOX BUSINESS ON THE GO BY CLICKING HERE IS THIS PINT-SIZED ELECTRIC VEHICLE ABOUT TO BE A BIG DISRUPTOR IN THE US? Waymo isn't just changing how people get around. It's potentially reshaping the city's social and economic landscape. Did you know that about 30% of Waymo rides in San Francisco are to local businesses? That's a potential boost for the local economy right there.And get this. Over half of Waymo riders surveyed said they've used the service for medical appointments. Plus, 36% use it to connect to other forms of transit like BART or Muni . It's not just a taxi service; it's becoming an integral part of the city's transportation ecosystem.Oh, and for the eco-conscious among us, here's a fun fact. Waymo's fleet is all-electric and uses 100% renewable energy from the city's CleanPowerSF program. It claims to have helped curb carbon emissions by an estimated 570,000 kilograms since August 2023. HOW TO STOP ANNOYING ROBOCALLS CRAZY TWO-IN-ONE ELECTRIC VEHICLE COMES EQUIPPED WITH A TWO-SEAT AIRCRAFT HIDDEN INSIDE  Waymo isn't just cruising the famously steep hills of San Francisco. It's also got wheels on the ground in the sunny streets of Los Angeles and the desert landscapes of Phoenix. And guess what? Austin, Texas, you're next on the list. Looks like the robotaxi revolution is spreading faster than you can say "autonomous vehicle." THE TINY ELECTRIC CAR THAT COMES DISASSEMBLED AND DELIVERED IN BOXES Now, I know what you're thinking. "Is it safe?" Well, Waymo sure thinks so. It boasts about its "unparalleled" safety record, claiming it's even safer than human drivers. With over 20 million miles logged since 2009, it's got some serious road cred.But it's not just talk. Waymo cites statistics suggesting its driverless cars are safer than human-operated vehicles. It claims to have been involved in 17 fewer crashes with injuries and 12 fewer police-reportable crashes compared to human drivers over 3.8-plus million rider-only miles in San Francisco.Before you get too excited and toss your driver's license in the shredder, the National Highway Traffic Safety Administration (NHTSA) has opened an investigation into Waymo. It's looking into 22 incidents involving the self-driving tech. We're talking about collisions with objects, parked cars and some traffic control hiccups. Yikes.The NHTSA's probe covers 444 of Waymo's vehicles. That's a lot of robots under the microscope. It's a reminder that even as we race toward a driverless future, there are still some speed bumps to overcome. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET It's not just Waymo in the spotlight. Other companies like Zoox, owned by Amazon, are also under the NHTSA's microscope. Even big names like Ford and Tesla are feeling the heat as autonomous technology becomes more widespread. Meanwhile, GM's Cruise is planning a comeback after suspending its service due to safety concerns. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? On one hand, the idea of hopping into a car without a driver could mean safer roads, less traffic and more accessibility for those who can't drive. But, on the other hand, are we ready to trust our lives to algorithms and sensors? The NHTSA investigation shows there are still kinks to work out. And let's not forget the potential impact on jobs in the transportation sector. It's not just about cool tech; it's about how it affects real people's livelihoods. One thing's for sure. The future of getting from point A to point B is changing rapidly. Whether you're excited or skeptical, it looks like robotaxis are here to stay.Would you take a spin in a Waymo, or are you sticking to human-driven rides for now? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Beware of TikTok's danger that could be a malware menace to your life

TikTok is having a tough time, and hackers are working hard to add to its misery. A malicious code took over accounts on TikTok and compromised the official presence of celebrities and brands, including Paris Hilton and CNN.The hackers behind this sent malware via direct messages (DMs) on the platform. Users didn't have to click any links or download any files to get hacked. Just opening the message was enough for a device to be infected. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Hackers are apparently targeting high-profile TikTok accounts. So far, accounts from CNN, Sony and Paris Hilton have been targeted. CNN was the first account that got hacked, and it was reportedly down for several days after the incident.The attack reportedly happens without the account owner needing to click on or open anything, known as a zero-click attack. All they need to do is open a DM, and the account can be taken over, leaving the rightful owner locked out. The vulnerability might lie in how content is processed when a DM is opened. Similar weaknesses have been identified before, such as vulnerabilities in the Chromium browser triggered by fabricated images. RETAIL PRICES CAN JUMP IN SECONDS WITH HIGH-TECH STORE PRICE TAGS We reached out to TikTok, and a spokesperson told CyberGuy, "Our security team is aware of a potential exploit targeting a number of high-profile accounts. We have taken measures to stop this attack and prevent it from happening in the future. We're working directly with affected account owners to restore access, if needed."The hack appears to be a "zero-day" attack, which means the bad actors discovered the vulnerability in TikTok's code before the developers did. TikTok had zero days to prevent it.
ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA This is not TikTok's first hacking incident. In 2023, over 700,000 accounts in Turkey were hacked because TikTok's two-factor authentication system wasn't secure enough. This all happened right before an important presidential election in Turkey , which made things even messier.In 2022, security experts at Microsoft found a major flaw in the TikTok app. All it took was clicking a bad link and hackers could hijack your account. Concerns about TikTok's data security and its connection to ByteDance, its Chinese parent company, have also captured the attention of lawmakers. The U.S. government fears China uses the app to spy on Americans or to influence the messages they see. President Biden has even signed a bill forcing ByteDance to either sell its U.S. TikTok operations or face a ban in the country. HOW TO PROTECT YOURSELF WHEN YOUR CELLPHONE NUMBER IS EXPOSED ON DARK WEB ANDROID USERS AT RISK AS BANKING TROJAN TARGETS MORE APPS To make sure your TikTok account doesn't get hacked by malicious DMs, follow these steps. 1. Use strong antivirus software to protect against phishing attempts: Stay vigilant when it comes to emails, phone calls or messages from unknown sources asking for personal information. Avoid clicking on suspicious links or providing sensitive details unless you can verify the legitimacy of the request.The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices . 2. Use strong and unique passwords: Create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you're logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts. Get more details about my best expert-reviewed password managers of 2024 here. 3. Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. 4. Keep your TikTok app up to date . Regularly update your TikTok app to avoid getting hacked. While you're at it, update your antivirus software, web browsers and other applications to ensure you have the latest security patches and protections. 5. Review and adjust privacy settings: Ensure that your TikTok privacy settings are appropriately configured. Limit who can send you direct messages, comment on your videos and view your profile. This reduces the risk of unwanted interactions with potential hackers. 6. Monitor account activity: Regularly check your account activity for any unusual behavior or unauthorized access. TikTok provides a log of devices that have accessed your account. If you notice any unfamiliar devices, immediately change your password and log out of all devices. Also, to report suspicious activity on your account, TikTok provides channels to report a problem in its app . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  TikTok needs to strengthen its system to ensure hackers don't access users' accounts. While the latest incident seems to be affecting celebrities and high-profile accounts, bad actors may also start targeting common users. Given these security concerns, it should come as no surprise that I advise against using TikTok, or at the very least, to use it with extreme caution. Meanwhile, be cautious. If someone messages you asking you to click on something or send them something, don't just do it. Scammers love pressuring people to act fast. So, take a breath and think twice before you click. HUMANPLUS ROBOT CAN GO FROM PLAYING PIANO TO PING-PONG TO BOXING Do you think government intervention is necessary to improve the security of social media platforms? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.
 

CARMEN the robot companion can help boost your memory and cognition

Have you ever walked into a room and forgotten why you're there? Or misplaced your keys for the umpteenth time this week? If you've been noticing these little memory hiccups more often, you're not alone.As we age, our cognitive functions can start to slow down, and for some, it might be a sign of mild cognitive impairment. But don't worry. Help is on the way in an unexpected form. Say hello to CARMEN, a new robot designed to give your brain the workout it needs. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE TOYS 'R' US AI-GENERATED AD SPARKS FEAR, FASCINATION CARMEN stands for Cognitively Assistive Robot for Motivation and Neurorehabilitation. Fancy name, right? But don't worry, CARMEN's job is simple - to help people with mild cognitive impairment (MCI) sharpen their mental skills from the comfort of their own homes. This small, tabletop robot was developed by researchers at the University of California San Diego. Think of CARMEN as a personal trainer for your brain, ready to guide you through exercises that can boost your memory, enhance your attention and improve your problem-solving skills. What makes CARMEN special is that it's the only robot out there that focuses on teaching compensatory cognitive strategies. In other words, it helps you find clever workarounds for cognitive challenges. THIS MIND-READING TECH USING AI CAN CONVERT BRAIN ACTIVITY INTO TEXT    Here's the deal. About 20% of folks over 65 have MCI, which is like a middle ground between normal aging and dementia. It's not just a minor inconvenience. Up to 15% of people with MCI transition to dementia each year. While there aren't any miracle pills to stop MCI from progressing, behavioral treatments can make a real difference. That's where CARMEN comes in. As Laurel Riek, a professor at UC San Diego and the project's senior author, puts it, "We wanted to make sure we were providing meaningful and practical inventions." HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET   HOW ELON MUSK'S NEURALINK BRAIN CHIP WORKS Imagine having a personal trainer for your brain right on your tabletop. CARMEN leads you through fun, interactive games and activities designed to boost your memory, attention and problem-solving skills. If you need help remembering where you put your keys, CARMEN can teach you to create routine places for important objects.If you're struggling to keep track of appointments, CARMEN's got note-taking strategies for that. These aren't just random exercises. They're part of a well-validated compensatory cognitive training (CCT) intervention, which CARMEN delivers autonomously. SIMPLE STEPS TO BUILD YOUR OWN WEBSITE: A BEGINNER'S GUIDE
ELON MUSK'S CREEPY BRAIN-COMPUTER INTERFACE GETS GREEN LIGHT FOR HUMAN TRIALS   CARMEN wasn't born in a vacuum. The clever folks at the University of California San Diego teamed up with doctors , people with MCI and their caregivers to create this little robot. They wanted to make sure CARMEN would be truly helpful in real-life situations.The team designed CARMEN with some key features in mind. It's plug-and-play, with few moving parts, so you can use it without supervision. It works even with limited internet access. It communicates clearly and shows empathy. It gives you breaks after tough tasks to keep you engaged.After spending a week with CARMEN, users reported trying out new strategies they thought were impossible before. Most found CARMEN easy to use and understand, though one user did find it a bit challenging. The best part? Everyone wanted more time with their new robotic pal."We found that CARMEN gave participants confidence to use cognitive strategies in their everyday life, and participants saw opportunities for CARMEN to exhibit greater levels of autonomy or be used for other applications,"the researchers reported. HOW TO STOP ANNOYING ROBOCALLS CARMEN is built on the FLEXI robot platform from the University of Washington. However, the UC San Diego team made significant hardware modifications and wrote all the software from scratch. They're using ROS (Robot Operating System) to run CARMEN's brain. SCIENTISTS CREATE CREEPY LIFELIKE FACES WITH REAL HUMAN SKIN FOR ROBOTS The team is planning to test CARMEN in more homes. It also wants to teach CARMEN how to have conversations while keeping your privacy safe . This is both an accessibility issue and a response to people's expectations of being able to talk with home systems. The researchers are also exploring how CARMEN might help people with other conditions, like ADHD.But they're being careful too. As Riek notes, "We want to be mindful that the user still needs to do the bulk of the work, so the robot can only assist and not give too many hints."   While we don't know the eventual cost or exact release date yet, CARMEN's development shows promise for accessible, at-home cognitive support in the future. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES While CARMEN represents an exciting development in cognitive assistance for those with mild cognitive impairment, it's worth noting that it's not the only player in the field of brain training technology. We've previously covered another innovative system called Sens.ai, which offers a different approach to cognitive enhancement.Sens.ai is a 5-in-1 brain training system that uses a comfortable headset and a gamified app to help users achieve various cognitive goals. Unlike CARMEN, which is specifically designed for those with mild cognitive impairment, Sens.ai caters to a broader audience looking to improve sleep, cognition, well-being or meditation skills.The Sens.ai system employs a range of advanced technologies, including brainwave sensors, heart rate monitors, transcranial photobiomodulation, and objective functional brain testing. These tools work together to measure and enhance brain performance across different areas of cognitive function.While CARMEN is still in the research phase, Sens.ai is already available to consumers, offering a free trial of its membership program. It's backed by scientific research and has garnered positive testimonials from users.The existence of technologies like Sens.ai alongside research projects like CARMEN demonstrates the growing interest and investment in cognitive enhancement tools. As this field continues to evolve, we may see a variety of options become available to support brain health and cognitive function for different user needs and preferences. CARMEN represents an exciting step forward in how we approach cognitive health. By bringing clinically validated exercises into people's homes through a friendly, interactive robot, we're making brain health more accessible and engaging. While CARMEN is still in the research phase, it's not hard to imagine a future where these kinds of AI assistants become common household helpers, especially for our aging population. They could be a game-changer in extending independence and quality of life for many people.So, what do you think? Would you welcome a little robot like CARMEN into your home to help keep your mind sharp? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Cybercriminals taking advantage of CrowdStrike-linked global computer outage

The global IT outage triggered by a faulty CrowdStrike software update has created a perfect storm for cybercriminals to exploit. In the wake of this unprecedented disruption affecting Windows computers worldwide, threat actors are now launching phishing campaigns and distributing malware-laden links.These malicious actors are preying on individuals and organizations desperate for information and solutions, tricking them into clicking on contaminated links under the guise of offering updates or fixes for CrowdStrike-related issues. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE AUTO PARTS GIANT EXPOSED: 2.3 MILLION CUSTOMERS AT RISK IN MASSIVE DATA BREACH As airlines, banks, grocery stores, 911 emergency communications, medical centers and virtually every organization running Windows computers with CrowdStrike Falcon attempt to recover from what could be the most destructive tech tsunami, criminals are being observed attempting to offer fake help with a payload of trouble. BEST ANTIVIRUS FOR PCS - CYBERGUY PICKS 2024 The Department of Homeland Security's Cybersecurity & Infrastructure Security Agency, known as CISA, is tracking this online criminal activity, which now poses a secondary threat to Americans . Here is the CISA statement:"CISA has observed threat actors taking advantage of this incident for phishing and other malicious activity. CISA urges organizations and individuals to remain vigilant and only follow instructions from legitimate sources. CISA recommends organizations to remind their employees to avoid clicking on phishing emails or suspicious links."The massive outages started at 1:20 a.m. ET Friday when CrowdStrike began rolling out a faulty update to its Falcon security product that protects Windows hosts. Screens around the world turned blue, freezing on a crippling message known as the "blue screen of death." RETAIL PRICES CAN JUMP IN SECONDS WITH HIGH-TECH STORE PRICE TAGS CrowdStrike's CEO George Kurtz addressed the global glitch it caused, and an updated statement puts it in perspective:"We understand the gravity of the situation and are deeply sorry for the inconvenience and disruption. We are working with all impacted customers to ensure that systems are back up and they can deliver the services their customers are counting on." HOW TO GROUP TABS IN DIFFERENT BROWSERS TO STOP TAB OVERLOAD CrowdStrike is actively working through its official channels to roll out a previous version of its Falcon software, but not before the disruptive damage was done worldwide. If you have a Windows PC or laptop experiencing trouble, there are alternative workarounds to help you fix it. The company offers the following additional steps that can be taken if your Windows computer is still having trouble.Note: Bitlocker-encrypted hosts may require a recovery key. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Cybercriminals are quick to take advantage of tech troubles like this massive Windows disruption caused by CrowdStrike. The lesson is to take privacy and security into your own hands by being as resilient as possible to attacks. I recommend running good antivirus protection on every device in you and your family's lives. See the 2024 review of the Best AntiVirus Protection here for options.What measures do you believe governments and tech companies should implement to prevent and mitigate the impact of such large-scale IT disruptions in the future? Let us know by writing us at Cyberguy.com/Contact For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:Copyright 2024 CyberGuy.com.  All rights reserved.

Retail prices can jump in seconds with high-tech store price tags

Have you noticed how technology is rapidly transforming our shopping experiences? From online marketplaces to self-checkout kiosks, the retail landscape is evolving at breakneck speed. Today, let's explore one of the latest innovations set to shake up the way we shop for everyday items: digital price tags. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Imagine walking into a store where prices change in real time, just like they do on your favorite shopping websites. Well, that future is closer than you might think. Retailers across the globe are experimenting with dynamic pricing systems, bringing the flexibility of online shopping to brick-and-mortar stores. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Several factors are propelling this shift towards digital pricing. Stores can update thousands of prices instantly, saving time and labor. This improves accuracy, eliminating discrepancies between shelf prices and checkout totals. The system also allows retailers to quickly respond to market changes or competitor pricing. Additionally, there's a sustainability angle, as digital tags reduce paper waste from traditional price tags. EXPOSING THE TOP SCAMS TARGETING COSTCO SHOPPERS Electronic shelf labels (ESLs) or digital shelf labels (DSLs) are at the heart of this retail revolution. These small, battery-powered e-paper displays are wirelessly connected to a central system, allowing for quick and easy price updates. But they're more than just digital price tags; they're a gateway to a more interactive shopping experience. 5 SECRETS TO SHOPPING SMARTER ON AMAZON These smart labels are multifunctional devices. They can display prices and product information, show QR codes for additional details, guide store employees for restocking and assist with order fulfillment for online purchases. It's like giving each product its own mini-computer.This new technology could bring both benefits and challenges for consumers. On the plus side, we can expect more accurate pricing and the potential for better deals on soon-to-expire items. Shoppers will have access to more product information right at their fingertips.There's also a possibility of lower prices due to increased store efficiency. However, it's not all rosy. We might see the introduction of dynamic pricing, similar to surge pricing in ride-sharing apps. This could lead to rapid price fluctuations. There are also privacy concerns with the increased data collection that comes with these systems. BEST HOME SECURITY SYSTEMS Now that we've covered the basics, let's look at some specific examples of how this technology is being implemented. America's largest retailer, Walmart, recently announced plans to introduce digital shelf labels in 2,300 stores by 2026. Given Walmart's massive market share in the U.S. grocery sector, this move could expose millions of shoppers to the technology.According to Daniela Boscan, a Walmart food and consumable team lead, "A price change that used to take an associate two days to update now takes only minutes with the new DSL system. This efficiency means we can spend more time assisting customers and less time on repetitive tasks."While Walmart's announcement made headlines, they're not the first to experiment with this technology. Other major players include Kroger, Whole Foods (owned by Amazon), Ahold Delhaize, and Schnucks, a Midwestern chain. A recent market study estimates that about 26% of grocers and general merchandisers were capable of using ESL technology in 2023, indicating a growing trend in the industry. HOW TO STOP ANNOYING ROBOCALLS When a store decides to make the leap from traditional paper tags to digital ones, it's not just a simple overnight change. It's a massive undertaking that requires careful planning and execution. Picture this: a small army of workers descending upon the store, armed with digital price tags and determination.These "price tag transformers" swarm the aisles, systematically replacing each paper tag with its high-tech counterpart. Shelf by shelf, aisle by aisle, the store undergoes a visible transformation. The familiar sight of paper tags gradually gives way to the sleek, uniform appearance of digital displays. SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES The adoption of digital price tags in grocery stores is part of a larger trend toward dynamic pricing in various industries. We've already seen this in ride-sharing apps like Uber and Lyft, airline tickets, live music, event sales and fast food, as evidenced by the recent Wendy's controversy. This shift raises questions about how consumers will adapt to more fluid pricing structures in their day-to-day purchases.As we stand on the brink of this digital revolution in retail, it's important to consider both the opportunities and the challenges it presents. On one hand, the increased efficiency and flexibility could lead to better shopping experiences and potentially lower prices. On the other hand, the introduction of dynamic pricing to everyday purchases might require a shift in how we approach our shopping habits.As this technology rolls out, it's crucial for you to stay informed and adapt your shopping strategies accordingly. Monitor price trends, take advantage of additional product information and provide feedback to retailers about your experiences.What's your take on this digital retail revolution? Are you excited about the potential benefits or concerned about the challenges? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to group tabs in different browsers to stop tab overload

If you're anything like me, you probably have several tabs open on your browser. I often have tabs open dedicated to my emails, research for work, articles I'm writing and additional tabs off to the side for news.A simple way to keep everything organized is by creating group tabs. Today, we will show you how to create group tabs in our favorite browsers: Chrome, Edge, Safari and Firefox, but first let's go over the basics of tab browsing.Tab browsing allows you to have multiple websites open in the same browser window. This multitasking capability is essential for keeping track of various online resources simultaneously, whether it's your email, research, work articles or the latest news. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE Creating a new tab is like adding another piece of paper to your desk. It's simple:Once you have all your tabs open, it's time to organize them. Here's how to group tabs in Google Chrome, Microsoft Edge, Safari and Firefox browsers:Grouping tabs in Google Chrome is quick and easy to do: HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET The process of creating tab groups in Microsoft's Edge browser is also easy to do: BEWARE OF BING CHAT AND ITS AI CONVERSATIONS THAT LURE YOU INTO MALWARE TRAPS Creating a tab in Apple's Safari browser is a bit different from the two above. Follow these steps to create a tab group: HOW TO TELL IF YOUR BROWSER HAS BEEN HIJACKED While tab groupings are a built-in feature in most browsers, Firefox doesn't support them by itself. The easiest way to do this is by using one of our favorite browser extensions: OneTab . OneTab is available for Chrome , Edge , Safari , in addition to Firefox , and you may like its features more than the built-in tab grouping features of the browsers we've already highlighted.Here's how to install and setup OneTab for Firefox:OneTab is a great browser extension that allows you to save all the tabs you have open as a list, making it easy to restore them whenever you want. As an added bonus, OneTab helps cut down on browser RAM costs, helping your online browsing experience function faster. OneTab also lets you:Available on: Chrome , Firefox , Edge , Safari SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES OneTab is one of our favorite browser extensions, but now that Chrome, Safari and Edge have introduced tab groupings, it's now only a must-have if you use any other browser such as Firefox. Luckily, installing and setting up OneTab is just as easy as creating tag groups in any browser. Browser tabs are a great way to keep yourself organized, especially if you work with multiple browser windows open at once. I've always been a browser hoarder, and creating groups of tabs is a great way to keep everything under control.How do you balance the convenience of having multiple tabs open with the need to maintain focus and efficiency in your digital workspace? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

How to securely lock your iPhone, iPad from prying eyes

Keeping your personal information safe is more important than ever. Your iPhone and iPad contain a wealth of sensitive data, from personal photos to financial information. This guide will walk you through the process of securing your Apple devices from prying eyes. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE The first line of defense for your device is a strong passcode. Here's how to set one up: HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE For an additional layer of security, enable biometric authentication, if your device supports it: TOP IPHONE CASES OF 2024 To further protect your iPhone and iPad, follow these additional security measures. 1) Make sure to use a password manager to keep track of all your passwords. It will also help you generate and store complex passwords.  2) Use two-factor authentication (2FA) as an extra shield to prevent hackers from getting into your accounts.  3) Keep your operating system and all software up to date to protect against security threats. 4) Regularly backup your data in case you need to restore it in the future. 5) Have strong antivirus software. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET Securing your iPhone and iPad is a crucial step in protecting your personal information. By following these steps to set a strong passcode and enable biometric security, you've significantly increased the security of your device. Remember that security is an ongoing process, so regularly updating your software and backing up your data are essential practices to maintain the safety of your digital life. Stay vigilant and keep your devices locked away from prying eyes.What additional steps do you take to secure your mobile devices, and have you ever experienced a situation where these security measures proved crucial? Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channels:Answers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Vacation goal: Take family pictures that don't suck

We've all had that moment. You open up your phone's gallery to swipe through the family pictures you shot on your beach vacation, at the lake or on some random day with the kids.Womp womp, they're blurry, everyone looks caught off guard, and there's a random guy and his dog in the background of the one good option. You poor thing. I can help. 20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER I'm giving away a $1,000 gift card to your favorite airline.  Try my free tech newsletter to enter!   Use your phone's timer Both iPhones and Android have built-in photo timers. Using a timer, you don't have to ask some random stranger to take a photo, which could lead to something worse. My friend handed her phone to someone to take a picture of her and her daughter, and the guy ran away with her phone.For your iPhone:On Android: Stability, people Tripods are one pro secret to getting amazing shots. No more balancing your phone on something and hoping it stays. You don't need to be anything close to a pro to use this secret yourself. CHARGING AND TRAVEL: 5 MALWARE MISTAKES MOST PEOPLE MAKE Get better smiles "Say cheese" is the classic photo prompt, but it can result in fake-looking smiles. Your best bet is to make a joke about eight seconds into that 10-second timer to get everyone to smile. I like this one: "I love to go Komando!" Otherwise, try a word that ends with an -uh sound, like "yoga." It always works best to pick a word to make your people laugh or smile. Clean up your pics At a family barbecue? You might not want that beer bottle or red plastic cup spoiling your pic.Facetune ( iOS Android ) is the big app everyone's using these days - so much so that when people think a pic is edited, they accuse it of being "Facetuned," not "Photoshopped!"If you're on a Mac , a touch-up tool is built right into the Photos app.  AI EXPERT: CHATGPT PROMPTS YOU'LL WISH YOU KNEW SOONER On a PC, you can use the new Generative Erase tool in the Windows Photos app. It uses AI to remove something you don't like in a pic (a rando in the background) and fill it in with something you want (the sunset). One final word of advice: Genuine smiles and real moments always make the best photos. Encourage your family to relax. That means no more yelling "Hold still and smile," OK? Get tech-smarter on your schedule Award-winning host Kim Komando is your secret weapon for navigating tech. CLICK HERE TO GET THE FOX NEWS APP Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Apple hits record high as analysts bullish on AI push

IN TODAY'S NEWSLETTER:- Apple hits all-time high as Morgan Stanley touts stock as 'top pick' for AI- Toys 'R' Us AI-generated ad sparks fear and fascination- Are you ready to trust your next ride to a robot chauffeur? 'TOP PICK': Apple shares rose to a record high during Monday's trading session after Morgan Stanley designated the stock as a "top pick" due to the company's artificial intelligence push to boost device sales. AI AD DEBATE: The iconic toy retailer, Toys "R" Us, is back, and it's not just reopening stores. It's embracing cutting-edge artificial intelligence technology to tell its origin story in a way that's as innovative as it is nostalgic. AI CAR CHAUFFEUR: Scientists at the University of Tokyo, led by Dr. Kento Kawaharazuka, have taken a novel approach to driverless cars. Instead of creating a fully autonomous vehicle, they've developed a robot that can drive a regular car. CREEPY LEGO ROBOT: Imagine a Lego creation that can not only move but also see, hear and talk back to you. That's exactly what Creative Mindstorms has achieved with Dave, the world's most advanced artificial intelligence Lego robotic head. FOLLOW FOX NEWS ON SOCIAL MEDIA Facebook
Instagram
YouTube
Twitter
LinkedIn SIGN UP FOR OUR OTHER NEWSLETTERS Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health DOWNLOAD OUR APPS WATCH FOX NEWS ONLINE Fox News Go STREAM FOX NATION Fox Nation Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News  here .

Auto parts giant exposed: 2.3 million customers at risk in massive data breach

Advance Auto Parts, an auto parts retailer with stores throughout the U.S. , has been affected by a data breach impacting over 2.3 million people. The incident is reported to be related to other breaches, such as the recent one at Ticketmaster. Advance Auto Parts has confirmed that cyberattackers managed to access information , including Social Security numbers, driver's licenses and other government ID numbers. GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE On June 19, Advance Auto Parts confirmed that it had been impacted by a data breach , but it only puts current and former employees and job applicants at risk. Advance has now completed its internal investigation into the incident and has determined that it has impacted 2,316,591 people. GET FOX BUSINESS ON THE GO BY CLICKING HERE "Our investigation determined that an unauthorized third party accessed or copied certain information maintained by Advance Auto Parts from April 14, 2024, to May 24, 2024," states the notice sent by Advance Auto Parts to affected individuals. "We conducted a detailed review and analysis of the affected information to determine the types of information contained therein and to whom the information relates."The company has confirmed that the breach has exposed data, such as full names, Social Security numbers, driver's licenses and government ID numbers, to hackers. This data is collected as part of Advance's hiring process, so it seems only employee and applicant data has been leaked. HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET  While Advance didn't name the hacker responsible for the attack, a threat actor known as "Sp1d3r" began selling a massive 3TB database on June 5, 2024. This database allegedly contains 380 million Advance customer records, including orders, transaction details and other sensitive information. Although the number claimed by Sp1d3r is significantly lower than the 2.3 million figure reported by Advance, it's possible that Sp1d3r was behind the attack.Hackers gained access to Advance Auto Parts' data stored on Snowflake, a cloud storage service, for over a month starting in mid-April 2024. This incident reportedly was part of a larger attack targeting Snowflake accounts with stolen credentials. Other companies impacted by this campaign include Pure Storage, Ticketmaster and more. CLICK HERE FOR MORE US NEWS HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS ce Auto Parts says it promptly terminated the unauthorized access and took proactive measures to prevent future unauthorized access. The company also notified law enforcement and is collaborating with third-party cybersecurity experts to further harden its systems.The impacted individuals have also been offered free credit monitoring and identity theft protection for 12 months. They can enroll by Oct. 1, 2024.We contacted Advance Auto Parts for a comment on this story but did not hear back before our deadline. WORLD'S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM If you think you have been affected by the Advance Auto Parts data breach, follow these steps to protect yourself and your personal data. 1. Stay informed: Keep up to date with the latest news from Advance Auto Parts data breach and other reliable sources to know the status of the systems and services. 2. Monitor your accounts and transactions: You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud. 3. Use identity theft protection: Identity theft protection companies can monitor personal information, like your home title, Social Security Number, phone number and email address, and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft . 4. Change your passwords: Although Advance Auto Parts says your personal details like phone number and email address haven't been leaked, it's still advisable to change your passwords. Consider using a password manager to generate and store complex passwords. 5. Vigilance against phishing : Be extra cautious of phishing attempts as cyberattacks often lead to an increase in phishing emails and calls trying to exploit the situation. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have strong antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices . 6. Be wary of mailbox communications : Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. 7. Invest in personal data removal services:  While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here . PHARMA GIANT'S DATA BREACH EXPOSES PATIENTS' SENSITIVE INFORMATION Hackers are launching campaigns that target big corporations. Recently, we saw a cyberattack that paralyzed CDK Global , and now, again in the automobile industry, Advance Auto Parts has been targeted. These companies need to fortify their systems so that they don't get affected by such attacks. Also, the government needs to come up with required laws that should ban the retention of customers' personal details, unless necessary.How important is a company's cybersecurity track record to you when deciding where to shop? Let us know in the comments below. Let us know by writing us at Cyberguy.com/Contact . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter . Ask Kurt a question or let us know what stories you'd like us to cover . Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions: Copyright 2024 CyberGuy.com. All rights reserved.

Distributed by aarss.com.