memoment editorial

IMG 4518 1024x768 1

AI security wars: Can Google Cloud defend against tomorrow’s threats?

In Google’s sleek Singapore office at Block 80, Level 3, Mark Johnston stood before a room of technology journalists at 1:30 PM with a startling admission: after five decades of cybersecurity evolution, defenders are still losing the war. “In 69% of incidents in Japan and Asia Pacific, organisations were notified of their own breaches by external entities,” the Director of Google Cloud’s Office of the CISO for Asia Pacific revealed, his presentation slide showing a damning statistic – most companies can’t even detect when they’ve been breached.What unfolded during the hour-long “Cybersecurity in the AI Era” roundtable was an honest assessment of how Google Cloud AI technologies are attempting to reverse decades of defensive failures, even as the same artificial intelligence tools empower attackers with unprecedented capabilities.Mark Johnston presenting Mandiant’s M-Trends data showing detection failures across Asia PacificThe historical context: 50 years of defensive failureThe crisis isn’t new. Johnston traced the problem back to cybersecurity pioneer James P. Anderson’s 1972 observation that “systems that we use really don’t protect themselves” – a challenge that has persisted despite decades of technological advancement. “What James P Anderson said back in 1972 still applies today,” Johnston said, highlighting how fundamental security problems remain unsolved even as technology evolves.The persistence of basic vulnerabilities compounds this challenge. Google Cloud’s threat intelligence data reveals that “over 76% of breaches start with the basics” – configuration errors and credential compromises that have plagued organisations for decades. Johnston cited a recent example: “Last month, a very common product that most organisations have used at some point in time, Microsoft SharePoint, also has what we call a zero-day vulnerability…and during that time, it was attacked continuously and abused.”The AI arms race: Defenders vs. attackersGoogle Cloud’s visualization of the “Defender’s Dilemma” showing the scale imbalance between attackers and defendersKevin Curran, IEEE senior member and professor of cybersecurity at Ulster University, describes the current landscape as “a high-stakes arms race” where both cybersecurity teams and threat actors employ AI tools to outmanoeuvre each other. “For defenders, AI is a valuable asset,” Curran explains in a media note. “Enterprises have implemented generative AI and other automation tools to analyse vast amounts of data in real time and identify anomalies.”However, the same technologies benefit attackers. “For threat actors, AI can streamline phishing attacks, automate malware creation and help scan networks for vulnerabilities,” Curran warns. The dual-use nature of AI creates what Johnston calls “the Defender’s Dilemma.”Google Cloud AI initiatives aim to tilt these scales in favour of defenders. Johnston argued that “AI affords the best opportunity to upend the Defender’s Dilemma, and tilt the scales of cyberspace to give defenders a decisive advantage over attackers.” The company’s approach centres on what they term “countless use cases for generative AI in defence,” spanning vulnerability discovery, threat intelligence, secure code generation, and incident response.Project Zero’s Big Sleep: AI finding what humans missOne of Google’s most compelling examples of AI-powered defence is Project Zero’s “Big Sleep” initiative, which uses large language models to identify vulnerabilities in real-world code. Johnston shared impressive metrics: “Big Sleep found a vulnerability in an open source library using Generative AI tools – the first time we believe that a vulnerability was found by an AI service.”The program’s evolution demonstrates AI’s growing capabilities. “Last month, we announced we found over 20 vulnerabilities in different packages,” Johnston noted. “But today, when I looked at the big sleep dashboard, I found 47 vulnerabilities in August that have been found by this solution.”The progression from manual human analysis to AI-assisted discovery represents what Johnston describes as a shift “from manual to semi-autonomous” security operations, where “Gemini drives most tasks in the security lifecycle consistently well, delegating tasks it can’t automate with sufficiently high confidence or precision.”The automation paradox: Promise and perilGoogle Cloud’s roadmap envisions progression through four stages: Manual, Assisted, Semi-autonomous, and Autonomous security operations. In the semi-autonomous phase, AI systems would handle routine tasks while escalating complex decisions to human operators. The ultimate autonomous phase would see AI “drive the security lifecycle to positive outcomes on behalf of users.”Google Cloud’s roadmap for evolving from manual to autonomous AI security operationsHowever, this automation introduces new vulnerabilities. When asked about the risks of over-reliance on AI systems, Johnston acknowledged the challenge: “There is the potential that this service could be attacked and manipulated. At the moment, when you see tools that these agents are piped into, there isn’t a really good framework to authorise that that’s the actual tool that hasn’t been tampered with.”Curran echoes this concern: “The risk to companies is that their security teams will become over-reliant on AI, potentially sidelining human judgment and leaving systems vulnerable to attacks. There is still a need for a human ‘copilot’ and roles need to be clearly defined.”Real-world implementation: Controlling AI’s unpredictable natureGoogle Cloud’s approach includes practical safeguards to address one of AI’s most problematic characteristics: its tendency to generate irrelevant or inappropriate responses. Johnston illustrated this challenge with a concrete example of contextual mismatches that could create business risks.“If you’ve got a retail store, you shouldn’t be having medical advice instead,” Johnston explained, describing how AI systems can unexpectedly shift into unrelated domains. “Sometimes these tools can do that.” The unpredictability represents a significant liability for businesses deploying customer-facing AI systems, where off-topic responses could confuse customers, damage brand reputation, or even create legal exposure.Google’s Model Armor technology addresses this by functioning as an intelligent filter layer. “Having filters and using our capabilities to put health checks on those responses allows an organisation to get confidence,” Johnston noted. The system screens AI outputs for personally identifiable information, filters content inappropriate to the business context, and blocks responses that could be “off-brand” for the organisation’s intended use case.The company also addresses the growing concern about shadow AI deployment. Organisations are discovering hundreds of unauthorised AI tools in their networks, creating massive security gaps. Google’s sensitive data protection technologies attempt to address this by scanning in multiple cloud providers and on-premises systems.The scale challenge: Budget constraints vs. growing threatsJohnston identified budget constraints as the primary challenge facing Asia Pacific CISOs, occurring precisely when organisations face escalating cyber threats. The paradox is stark: as attack volumes increase, organisations lack the resources to adequately respond.“We look at the statistics and objectively say, we’re seeing more noise – may not be super sophisticated, but more noise is more overhead, and that costs more to deal with,” Johnston observed. The increase in attack frequency, even when individual attacks aren’t necessarily more advanced, creates a resource drain that many organisations cannot sustain.The financial pressure intensifies an already complex security landscape. “They are looking for partners who can help accelerate that without having to hire 10 more staff or get larger budgets,” Johnston explained, describing how security leaders face mounting pressure to do more with existing resources while threats multiply.Critical questions remainDespite Google Cloud AI’s promising capabilities, several important questions persist. When challenged about whether defenders are actually winning this arms race, Johnston acknowledged: “We haven’t seen novel attacks using AI to date,” but noted that attackers are using AI to scale existing attack methods and create “a wide range of opportunities in some aspects of the attack.”The effectiveness claims also require scrutiny. While Johnston cited a 50% improvement in incident report writing speed, he admitted that accuracy remains a challenge: “There are inaccuracies, sure. But humans make mistakes too.” The acknowledgement highlights the ongoing limitations of current AI security implementations.Looking forward: Post-quantum preparationsBeyond current AI implementations, Google Cloud is already preparing for the next paradigm shift. Johnston revealed that the company has “already deployed post-quantum cryptography between our data centres by default at scale,” positioning for future quantum computing threats that could render current encryption obsolete.The verdict: Cautious optimism requiredThe integration of AI into cybersecurity represents both unprecedented opportunity and significant risk. While the AI technologies by Google Cloud demonstrate genuine capabilities in vulnerability detection, threat analysis, and automated response, the same technologies empower attackers with enhanced capabilities for reconnaissance, social engineering, and evasion.Curran’s assessment provides a balanced perspective: “Given how quickly the technology has evolved, organisations will have to adopt a more comprehensive and proactive cybersecurity policy if they want to stay ahead of attackers. After all, cyberattacks are a matter of ‘when,’ not ‘if,’ and AI will only accelerate the number of opportunities available to threat actors.”The success of AI-powered cybersecurity ultimately depends not on the technology itself, but on how thoughtfully organisations implement these tools while maintaining human oversight and addressing fundamental security hygiene. As Johnston concluded, “We should adopt these in low-risk approaches,” emphasising the need for measured implementation rather than wholesale automation.The AI revolution in cybersecurity is underway, but victory will belong to those who can balance innovation with prudent risk management – not those who simply deploy the most advanced algorithms.See also: Google Cloud unveils AI ally for security teamsWant to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and is co-located with other leading technology events, click here for more information.AI News is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.

AI security wars: Can Google Cloud defend against tomorrow’s threats? Read More »

Izana 2 joins the laser game to track space debris pillars

Izaña-2 joins the laser game to track space debris

In Tenerife, Spain, stands a unique duo: ESA’s Izaña-1 and Izaña-2 laser-ranging stations. Together, they form an optical technology testbed of the European Space Agency that takes the monitoring of space debris and satellites to a new level while maturing new technologies for commercialisation.  Space debris is a threat to satellites and is rapidly becoming a daily concern for satellite operators. The Space Safety Programme, part of ESA Operations, managed from ESOC in Germany, helps develop new technologies to detect and track debris, and to prevent collisions in orbit in new and innovative ways. One of these efforts takes place at the Izaña station in Tenerife. There, ESA and partner companies are testing how to deliver precise orbit data on demand with laser-based technologies. The Izaña-2 station was recently finalised by the German company DiGOS and is now in use.  To perform space debris laser ranging, Izaña-2 operates as a laser transmitter, emitting high-power laser pulses towards objects in space. Izaña-1 then acts as the receiver of the few photons that are reflected back. The precision of the laser technology enables highly accurate data for precise orbit determination, which in turn is crucial for actionable collision avoidance systems and sustainable space traffic management. With the OMLET (Orbital Maintenance via Laser momEntum Transfer) project, ESA combines different development streams and possibilities for automation to support European industry with getting two innovative services market-ready: on-demand ephemeris provision and laser-based collision avoidance services for end users such as satellite operators. A future goal is to achieve collision avoidance by laser momentum transfer, where instead of the operational satellite, the piece of debris will be moved out of the way. This involves altering the orbit of a piece of space debris slightly by applying a small force to the object through laser illumination.  The European Space Agency actively supports European industry in capitalising on the business opportunities that not only safeguard our satellites but also pave the way for the sustainable use of space. 

Embed code

Izaña-2 joins the laser game to track space debris Read More »

senior citizen phone

How scammers target you even without social media

NEWYou can now listen to Fox News articles!
“I don’t use Facebook. I don’t even have an email. How could scammers possibly know anything about me?”That’s the question I hear from people over 60 all the time. If you assume that by staying off social media and avoiding the internet, you’re invisible to fraudsters, think again.The truth is, even if you’ve never posted a single thing online, scammers can still know your age, home address, relatives’ names, property value, and even when you’ve suffered the loss of a loved one. How? Because the everyday details of your offline life are quietly being collected, digitized, and sold.And scammers are taking full advantage.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS Scammers can still know a lot about you, even if you have never posted anything online. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)How scammers target seniors without social mediaHere’s the uncomfortable reality: you don’t have to “put yourself out there” for your information to appear online. Much of it becomes public record automatically, thanks to the way our legal and government systems work.Some of the biggest sources include:Obituaries: When a loved one passes away, obituaries often list family members, ages, locations, and relationships. To scammers, it’s a family tree of potential targets.Real estate records: Property purchases, sales, and even mortgage details are public. This can tell scammers whether you own your home outright, what it’s worth, and if you might be cash-rich.Probate filings: When estates go through probate, details about beneficiaries and assets are recorded. Scammers can identify heirs and target them with fraudulent “inheritance assistance.”Property tax documents: These are often searchable by anyone. They reveal not only your address but also your financial standing.Court filings: Divorce, bankruptcy, and civil disputes often contain personal details, which are public by law.On their own, these may not seem dangerous. But combined, they create a shockingly detailed portrait of your life.THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY Public records can provide a portrait of your life. (Barbara Eddowes via Getty Images)Bereavement scams and emotional tricks scammers useOne of the cruelest scams I’ve seen lately is what I call the bereavement scam.Here’s how it works:A scammer scrapes local obituaries to see who’s recently lost a spouse or child. They then reach out, by phone, email, or even mail, pretending to be a funeral home, a grief counselor, or a charity. Because they reference real names, dates, and relationships, their outreach sounds painfully authentic.Example: “We saw you lost your husband on March 3rd. We’d like to offer you a free grief support service…”Or: “Your loved one’s final medical expenses may qualify for reimbursement. We just need your banking details to confirm.”When you’re in mourning, your guard is down. Scammers know this, and they exploit grief to steal money and identities.Other emotionally charged scams follow the same playbookFake Medicare calls referencing your age and location.Phony financial advisors offering to “help” with retirement rollovers.Romance scams targeting widows and widowers who live alone.Fake agent scams trick victims into paying thousands of dollars through phone threatsThe unifying factor is that these criminals don’t need Facebook to learn about you. They already have a dossier built from public and brokered data.What’s even worse is that scammers can target your loved ones even years after your passing. They can call or text your close relatives claiming to offer free memorial services, annuities, or other common strategies when people are most vulnerable. Your exposed personal data fuels such morbid scams.9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT A man typing on his laptop (Kurt “Cyberguy” Knutsson)The shocking sources of your personal dataHere’s the part most people don’t realize: scammers rarely dig through dusty courthouse files themselves. They don’t have to. That work has already been done by data brokers. Data brokers are companies whose entire business model is gathering and selling personal information. They collect from:Public records (like those obituaries and real estate filings)Consumer databases (credit headers, magazine subscriptions, surveys)”People search” websites (Spokeo, Whitepages, BeenVerified, and dozens more).The result is a searchable profile that might include:Full name and aliasesCurrent and past addressesPhone numbers and email addressesRelatives and their contact infoAge, income range, home valueLegal or financial historyOnce a broker has your data, they sell it. And once it’s sold, it spreads. Even if you’ve never had a social media account, companies may build a ‘shadow profile’ of you from leaked data, online purchases, or details shared by others, leaving it ready to be abused.How to protect yourself from scammers and data brokersThe good news is, you’re not powerless. While you can’t stop public records from existing, you can make it much harder for scammers to access and weaponize your data. Here’s how:1) Reduce your digital footprintRequest removal from people search sites and data brokers.This prevents your profile from being sold to scammers.Doing this manually can take hours and has to be repeated, but it works.2) Stay alert for emotional manipulationIf someone contacts you after a loss, assume caution.Verify charities and funeral services before engaging.Never share banking or personal details over the phone or email.3) Automate data removalInstead of manually contacting hundreds of data brokers, you can use a service like Incogni.It sends and tracks removal requests across 420+ brokers, and keeps repeating the process so your data doesn’t resurface.With their Unlimited plan, you can request data removal from any other shady website and disappear from the internet.For seniors, this is often the safest and most practical solution.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysNot being on Facebook doesn’t mean you’re invisible. Scammers don’t need you to share your life online. Your offline life is already online without your consent. The obituary in the local paper, the deed to your home, the probate record of your loved one’s estate, these are all turned into data points, sold to brokers, and resold to whoever wants them. That’s why protecting your personal data isn’t about avoiding the internet. It’s about reducing what’s already out there. The less data scammers can find, the harder it is for them to fool you with realistic, emotionally charged attacks. And that’s a big step toward keeping your money, your identity, and your retirement safe.Do you believe it’s time for the government and companies to step in and protect your data privacy?  Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

How scammers target you even without social media Read More »

2025 08 26 18 05 14

FOIA Emails Reveal Pentagon’s Tight Control Over AARO “Historical Record Report” Rollout and Messaging

A new release of Department of Defense (DoD) emails obtained through the Freedom of Information Act (FOIA) sheds light on internal debates about the All-domain Anomaly Resolution Office (AARO), its scope, and how its work is presented to the public. The documents, released under case number 24-F-0894, were obtained by The Black Vault following a request for correspondence involving Pentagon spokesperson Susan Gough containing the terms “AARO” or “Phillips” between February 1 and March 7, 2024.
The request yielded 14 pages of emails, many redacted, that offer a rare glimpse into how the Pentagon handled the rollout of AARO’s congressionally mandated Historical Record Report and managed both internal and external messaging.
Controlled Media Access
The emails reveal that access to AARO’s acting director, Tim Phillips, was tightly restricted. In February and March 2024, multiple journalists, including representatives from Scientific American, the Washington Examiner, and Finland’s national broadcaster YLE, requested inclusion in press briefings or sought interviews with Phillips.Continue scrolling for more…

Those requests were declined. “At this time, we are looking to keep any media engagement with AARO’s acting director to a small group,” Pentagon spokesperson Susan Gough wrote in response to one inquiry. Another journalist expressed disappointment at the exclusion, saying it “seems to be a bit of Pentagon narrative setting versus genuine media outreach”.
A small, invite-only briefing was held on March 8, 2024, with only about seven journalists present. During the session, reporters asked pointed questions that reflected the broader public interest. One journalist pressed Phillips directly about whether high-profile whistleblowers Luis Elizondo or David Grusch had been interviewed for AARO’s review. Phillips declined to confirm, stating: “As a practice, we do not disclose who came in and spoke to us. The individuals are free to share that with you, but I’m not going to talk about who we interviewed. But anybody with knowledge of UAPs or the government covert attempt to reverse engineer or to exploit these materials, we would love to talk to them”.
Phillips also sought to portray the work as unprecedented in scope: “I don’t think there’s ever been a government organization with the authorities and with the amount of funding that we receive from Congress… I don’t believe any previous government attempt to research UFOs, UAPs has ever had that type of top cover”.
While the answers themselves added to the record, the manner in which the information was released raised broader concerns. By holding a private, invitation-only engagement, the Pentagon limited access to a select group of reporters. For others seeking answers, including those who had submitted formal FOIA requests, the arrangement stood in stark contrast to the principles of openness and transparency that Congress intended when it mandated AARO’s historical review.
ODNI’s Role Minimized
Another exchange shows discussion about whether to acknowledge the Office of the Director of National Intelligence (ODNI) in press materials. Although AARO operates within the Department of Defense, its statutory reporting structure, which was established under the FY2023 National Defense Authorization Act (NDAA), requires it to report to both the Deputy Secretary of Defense and the Principal Deputy Director of National Intelligence (PDDNI).
Despite this, internal correspondence about the March 2024 rollout of AARO’s Historical Record Report shows officials deliberately choosing to downplay ODNI’s role. In an email chain on March 5, 2024, while discussing the draft press release, Gough asked whether ODNI should be referenced since “the legislation calls for AARO producing the report — but Dir, AARO reports to PDDNI, too, so wanted to check.” The reply was clear: “Confirming that we’re good without any ODNI mention.” Who that was from was redacted and withheld.
Legally, ODNI sits atop AARO’s chain of accountability, yet in this instance the Department of Defense opted to present the rollout as a DoD-driven initiative.
Congressional Briefings and “KONA BLUE”
During March 6, 2024, classified briefings on the Historical Record Report, congressional staff pressed AARO leadership on the individuals interviewed, the scope of documentation reviewed, and “noteworthy programs,” including one labeled KONA BLUE.

According to a declassified release from the Department of Defense, KONA BLUE originated as a prospective Special Access Program (PSAP) proposed within the Department of Homeland Security (DHS) in 2011. The program was described in interviews as a sensitive compartment established to protect the retrieval and exploitation of “non-human biologics.” However, further investigation by AARO determined that KONA BLUE was never formally established. It received neither funding nor materials, and no data was ever transferred to DHS under its name.
The roots of KONA BLUE trace back to the Advanced Aerospace Weapon System Application Program (AAWSAP)/Advanced Aerospace Threat Identification Program (AATIP), run by the Defense Intelligence Agency (DIA) from 2009 to 2012. Those programs, funded by congressional earmarks, were executed primarily through Bigelow Aerospace in Nevada. DIA ultimately terminated the contract, citing “lack of merit and lack of utility” in the products provided. Following its cancellation, individuals associated with AAWSAP/AATIP advocated for DHS to adopt and fund a successor program under the code name KONA BLUE.
In 2011, DHS’s Under Secretary for Science and Technology approved KONA BLUE as a PSAP, justifying the move on claims that sensitive information and materials required this level of protection. Six months later, the DHS Deputy Secretary disapproved the initiative, citing insufficient justification and lack of credible supporting information. The program was terminated immediately thereafter.
Despite speculation surrounding the name, the official record confirms that KONA BLUE never advanced beyond proposal stage. The Department of Defense has since declassified related documents in coordination with DHS, reaffirming that “no data or material of any kind was ever transferred to or collected by DHS under the auspices of KONA BLUE”.
Gillibrand Presses for Expanded AARO Role
The records also capture friction between Congress and the Pentagon over AARO’s responsibilities. During a Senate briefing on drone incursions, Sen. Kirsten Gillibrand pressed officials on why the Department lacked a central database for unmanned aerial system (UAS) incursions, arguing that AARO should serve that function.

Internal Pentagon correspondence shows immediate pushback. “We do not want to see sUAS added to AARO’s portfolio!” Pentagon spokesperson Gough wrote in an email to David A. Kozik, Director Congressional Activities, Office of the Under Secretary of Defense Intelligence. Kozik repliesd that AARO should serve in a coordinating capacity on counter-UAS issues, but not as the lead office. The discussions underscored a disconnect between congressional expectations and the Department’s vision for AARO’s scope.
What makes this exchange notable is the role of the official raising the concern. Under Department of Defense policy, Public Affairs personnel are tasked with communicating information and providing counsel to commanders, but not with determining mission assignments. Joint Publication 3-61 emphasizes that public affairs officers are the commander’s “principal spokesperson” and serve to advise and align communication, but their role is not directive in setting operational responsibilities. Similarly, DoDD 5122.05 and DoDI 5400.13 define the public affairs function as supporting transparency, releasing information, and coordinating messaging, not deciding organizational missions.
For that reason, Gough’s strong stance appears to move beyond the traditional remit of a spokesperson. While she is entitled to offer her views, it is unusual to see a Public Affairs official weighing in directly on whether a congressional request, which was raised by a sitting Senator, should alter AARO’s mission portfolio.
In short, while the emails show a clear disagreement between congressional intent and Pentagon preference, they also highlight the unusual position of a public affairs spokesperson inserting herself into a debate that doctrine indicates should rest with mission leadership and policymakers, not communications staff.
The newly released emails offer a glimpse into how the Pentagon manages both its internal deliberations and public-facing messaging about UAPs. The records confirm congressional pressure to expand AARO’s mandate, references to sensitive programs like KONA BLUE, and a deliberate effort by DoD and ODNI officials to shape the rollout of AARO’s Historical Record Report.
While heavily redacted, the correspondence highlights an ongoing tension between secrecy, congressional oversight, and public transparency in the government’s handling of unidentified anomalous phenomena.
###
Document Archive
FOIA 24-F-0894 Release Package [16 Pages, 2.2MB]
Follow The Black Vault on Social Media:

FOIA Emails Reveal Pentagon’s Tight Control Over AARO “Historical Record Report” Rollout and Messaging Read More »

italian search and rescue team drone

AI drone finds missing hiker’s remains in mountains after 10 months

NEWYou can now listen to Fox News articles!
A missing hiker’s dead body was finally found in July in Italy’s rugged Piedmont region after 10 months. The recovery team credited the breakthrough to an AI-powered drone that spotted a critical clue within hours. The same process would have taken weeks or even months if done by the human eye.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. TRANSPORTATION DEPARTMENT DEPLOYING ARTIFICIAL INTELLIGENCE TO SPOT AIR TRAFFIC DANGERS, DUFFY SAYSSearch and recovery mission in the Italian AlpsThe hiker, an experienced mountaineer identified as Nicola Ivaldo, had been missing since September 2024 on the northern slopes of Monviso in Italy’s Cottian Alps. This remote section of the mountain is known for sheer cliffs and loose rock. Sudden weather changes often make search efforts slow and hazardous. Italian search and rescuers announced in July 2025 that they had used an artificial intelligence-powered drone to locate the dead body of a hiker who had been missing for months. (Corpo Nazionale Soccorso Alpino e Speleologico – CNSAS)The National Alpine and Speleological Rescue Corps (CNSAS) specializes in high-altitude and cave rescues. They had conducted multiple ground searches since the disappearance. In early 2025, they turned to drone technology to renew the effort. Flying about 164 feet above the terrain, the drones surveyed a 452-acre section of the mountain. During the operation, they captured more than 2,600 high-resolution images. This aerial perspective revealed details in areas that would have been difficult and risky to reach on foot. Drone in flight near the peak of Monviso in Italy’s Cottian Alps during a rescue mission. (CNSAS)How AI technology sped up the searchInstead of relying on human experts to manually scan thousands of photos, AI software analyzed the entire dataset in just hours. Using color and shape recognition, the system highlighted objects that did not match the surrounding environment.One detection stood out: the red helmet belonging to the missing hiker. That small but critical find enabled rescuers to pinpoint the location and plan recovery efforts. Once the site was confirmed, teams navigated steep and unstable ground to reach the area. They worked in challenging alpine conditions to recover the hiker. Officials emphasized that this was a joint success between advanced technology and the skilled human team interpreting the AI’s results.ALASKA HIKER MAULED BY BEAR RESCUED WITH HELP OF ADVANCED DRONE TECHNOLOGY ON REMOTE TRAIL Search and rescue drone flying over mountainous terrain. (Kurt “CyberGuy” Knutsson)The future of AI in search and rescueThis operation marks a turning point in search and rescue tactics. AI-enabled drones can cover vast and dangerous areas without risking human lives. They speed up the search process and increase the chances of finding people alive.Similar AI-aided searches have been used in Canada, Switzerland, and the United States. These missions often deliver faster results than traditional methods. Rescue teams hope that as the technology advances, it will reduce fatal accidents and locate missing persons faster. It could also allow human rescuers to focus their efforts where they are needed most.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.comCLICK HERE TO GET THE FOX NEWS APP Drone in flight near the peak of Monviso in Italy’s Cottian Alps during a rescue mission. (CNSAS)Kurt’s key takeawaysAI drones are changing the game for search and rescue. They can analyze massive amounts of visual data in hours instead of weeks. Combined with expert human teams, this technology could save more lives and make high-risk missions safer.Do you think AI should play a bigger role in rescue operations? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

AI drone finds missing hiker’s remains in mountains after 10 months Read More »

blobid1756176724676

Some Bizarre Cases of UFO Crashes and Crash Retrievals

In the world of UFO phenomena and talk of UFO sightings and aliens, the most spectacular of these reports must surely be those in which these crafts, possibly from other stars, have crashed to earth. Here we have landing right in our laps the answer to whether we are alone in the universe, the physical evidence we need to finally prove that aliens are real. Unfortunately, these alleged crashes have a bad habit of being moved in on by the government to be swept under the carpet, or to otherwise fade into the mists of time while frustratingly denying us the proof we would expect to get from such a spectacular incident. Here we are going to take a look at a few of the more bizarre cases of UFO crashes, and the forces that conspired to make them fade into the mists of time. 
The setting for our earliest bizarre story comes amid a UFO flap that was sweeping the United States at the time. Between the years of 1896 and 1897, some outlandish stories were starting to make the headlines. Beginning in California and working their way east, there began to be reported numerous accounts of what were described as mysterious, metallic cigar-shaped “airships” appearing in the skies, said to be slow-moving and with powerful spotlights that could pierce the night with great precision. The reports were remarkable because this was an era before airplanes, when even balloons and blimps were not a particularly common sight in the skies of these regions, so for so many people to suddenly start reporting giant mystery airships of an unknown design was cause for great concern, making the news regularly.
One town that would be visited by one of these ships was the small, rural farming town of Aurora, Texas. This was an unassuming place that would normally be just another dusty town out in the badlands, nothing remarkable about it or particularly special, a place one could pass right on by without really noticing. Yet according to the Dallas Morning News, on April 15, 1897, one of these mysterious ships allegedly appeared to come sailing down out of the sky to go floating over the center of town. This would have been an otherworldly, awe-inspiring sight to begin with, but things would apparently get more spectacular still when the ship meandered off and seemed to experience some sort of mechanical difficulties, purportedly colliding with a windmill on the rural property of a Judge J.S. Proctor, and causing a “terrific explosion” that wrecked the windmill, a water tank, and the airship, sending debris raining down everywhere.
When the wreckage was investigated by stunned locals, they apparently found that much of the debris was a strange, light metal that none of them had ever seen before, like a “mixture of aluminum and silver.” According to the report they also found the pilot of the craft sprawled out on the ground dead amongst the wreckage, and although there was no really detailed description it was described as a petite humanoid figure and called “a Martian,” with the report stating of its appearance, “while his remains are badly disfigured enough of the original has been picked up to show that he was not an inhabitant of this world.” 

On the creature’s person were supposedly sheets of a paper-like material upon which were scrawled some sort of strange symbols like hieroglyphs, the meaning of which was as enigmatic as the pilot and his weird ship. So, now there seemed to be an actual crashed mystery ship and an alien body, so what did the locals do? Well, according to the tale, they tossed the wreckage into an old well, sealed it off, and then had the tiny “alien” given a Christian burial in the nearby Aurora Cemetery in a grave with a small, unassuming headstone with a crude etching of the alien’s ship on it. Newspapers at the time ran with this story, and before long, it was being talked about all over the place while curiosity seekers came to town to see the area and its cemetery for themselves.
While it might be easy to say that the Dallas Morning News report, which happened to have been written by an Aurora local, must surely have been a made-up joke piece, there were soon numerous other witnesses coming forward to corroborate the story, saying that they had also seen the craft or had even witnessed the crash and the dead alien body, giving weight to the strange account. There was also the odd claim from the new owner of Judge Proctor’s property, a Mr. Brawley Oates, who claimed in 1945 that he had found pieces of the alien ship buried in the well, which had made him ill and forced him to cover the site with cement to seal it away.
As amazing as all of this was at the time, it oddly all sort of faded away and became sort of an obscure historical oddity for decades, the location of the grave forgotten until the account was picked up on by UFO enthusiasts. The case quickly became popular with the UFO-hunting crowd in later years, with many investigations of the claims launched over the years. One of the first of these was carried out by Bill Case, an aviation writer for the Dallas Times Herald and the Texas state director of Mutual UFO Network (MUFON), who interviewed surviving witnesses and checked out the cemetery. He would claim in 1973 to have found the gravestone of what he believed to be the alien’s grave, not much more than a rock, really, small in size and half-broken, carrying what appeared to be part of an etching of a “saucer-shaped structure.” Using a metal detector, it was determined that there seemed to be large metal pieces buried down there in the ground, and the excited investigator tried to get permission from the city to exhume the grave with no success. Making the story more bizarre was that he would claim that upon his next visit, the metal pieces had seemingly disappeared, possibly moved by someone. Not long after this, the gravestone itself was stolen, and the location of the body lost once more.
Another notable investigation was carried out by the television show UFO Hunters in 2008. The team approached the current owner of the Judge Proctor property, Tim Oates, nephew of Brawley Oates, the one who had sealed the well. Oates permitted them to unseal the well to be unsealed, but no pieces of alien wreckage were found, and the water tested was fairly normal except for heightened levels of aluminum present. If there had ever been pieces of an alien airship in there, they had since been removed and lost. UFO Hunters also investigated Aurora Cemetery, looking for the lost unmarked grave with ground-penetrating radar. It seems they found a promising spot and tried to get permission to dig it up, but were denied. Without being able to exhume the remains, it was impossible to determine if they were human or not, and so the mystery has remained. To this day, the location of the grave, or indeed if it ever existed at all, is unknown, although the cemetery itself still bears a plaque listing the alien as one of those interred there.
The tale of Aurora’s UFO crash and its lost alien grave has been much discussed and picked apart in recent years. One prominent idea is that this was all merely a publicity stunt to get more people to come to the town. They had been suffering from a string of calamities, such as a disease epidemic, a devastating fire, and lost crops, so it is possible that the original article was a ploy to get people to go there. After all, at the time, it doesn’t seem that anyone really ever followed up on the original report, and there is also the fact if there was a dead alien of all things, how could it possibly be buried and then its resting place forgotten about? Wouldn’t someone desecrate the grave or even rob it? Other ideas are that the crash really was an alien craft, and the grave is either still out there waiting to be found or the body whisked away by the government, Roswell style. There has also been the idea that this might have really happened, but rather than some alien or inter-dimensional traveler it was perhaps some mad scientist testing out his own airship contraption. Considering the verifiable facts are thin and no evidence has ever really been found that any of this happened as described, we are left to wonder. Did a UFO crash at Aurora, and is there an alien buried in the cemetery there?  Whether it is true or not, it is a strange little historical oddity that stokes the imagination.

Moving along to our next case, on the otherwise peaceful evening of December 9, 1965, the people of the small town of Kecksburg, Pennsylvania, around 40 miles southeast of Pittsburgh, were startled when a strange glowing object sped across the night sky from the north. The object was seen by hundreds of people, many of whom would describe it as somewhat acorn-shaped and emanating wisps of yellow, purple and orange colors, as well as claiming that the object seemed to change directions and to be under intelligent control. One of the witnesses at the time, a boy named Robb Landy, was out with his brother when it roared overhead, and he would say of it:

“We were riding up the road and we just happened to look up into the sky and we saw this thing coming over the tops of the trees.  It just glided right across the sky, like across the horizon of the trees. We were just, like, in awe, you know, as we watched it. Then it disappeared, and we ran.”

It would later turn out that this strange object had been seen by thousands of witnesses streaking across a large swath of the northeastern United States and Canada, and the thing’s eerie trail reportedly was visible for hundreds of miles around. Yet it seems that after this fantastic light display, the object, whatever it was and wherever it came from, would end its journey at Kecksburg, where it reportedly crashed right there in a small wooded hollow near a farm owned by the Kalp family. At the time, many people believed that the object had been simply a plane on fire, and so curiosity seekers were soon flocking to where the smoke and fire of the impact site could be seen. It was not long after that, police and firefighters were also converging on the scene, and this was when it would slowly become apparent that whatever it was that had fallen out of the sky onto that farm was no plane.
Some of the first descriptions of something very weird going on out in those darkened woods were from search teams that had been brought in to find where the crash site actually was, with these teams mostly formed of state troopers and firefighters. Some of these searchers would claim to have seen a very bright blue light flashing intermittently through the trees through the gloom of the smoke, and some even claimed to have come across the object itself. One of the most spectacular reports of this happening would come from volunteer firefighter James Romansky, who would say of the outlandish sight awaiting his team:

“Here was this humongous metal object, half buried in the ground.  About six, seven, eight foot around, and it was every bit of eight, ten, twelve foot long. And to me the object looked like exactly like a fresh acorn that you’d pick off of a tree.  There was no wings, there was no motors. There was no propellers. There was no identification whatsoever that would identify it as a aircraft that I would know.  There was a bumper on the bottom part of it.  On that bumper there was what I call, it looked to me like the ancient Egyptian hieroglyphics. It was markings like stars, and shapes and figures and circles, and lines, and what it was, I don’t know. To this day I’ve never seen anything like it. So we’re all standing around this thing, wondering what in the heck it could be, and finally here come two men down through the woods. And they took one look at the object, and immediately told us to leave. ‘We are in charge, we’re taking command, get out of here.’ So we left there, and by the time we got back down here to the fire hall, I mean, this place was wall to wall military.”

Indeed, by all accounts, the military was amazingly quick to arrive on the scene and take charge, within an hour moving in to disperse curious locals and eject all reporters and local authorities from the area. It was amazingly efficient and quick, but there were several witnesses who allegedly got a peek at what they were up to before being chased off. Some of them saw armed personnel swarming about, trucks marked with a white star, and people entering the area with special instruments and in some sort of radiation or HAZMAT suits. One witness, named Bill Weaver, would say:

“I looked down in there myself. I seen there was something down in there, that had bright lights on it. But I couldn’t see the object itself. Some time later, I seen a van type truck pull up there. There was some men dressed in moon suits, we called them at the time, and they had a light colored box, roughly five foot square. They carried it down into the ravine.”

Many others made similar claims of radiation-suited personnel fanning out over the crash site, but the most interesting accounts are of those who say they saw the military whisking the actual mystery object away, which happened within an hour of their arrival. Most witnesses say they were only able to see a large, flatbed truck, flanked by jeeps and holding something large upon it covered with tarps, but some of them would say that they had seen the actual object, and this is where things get weird, as some witnesses insist that it was a large metallic craft of some kind, while others say it was a smaller object about the size of two suitcases put together. For their part, the military officially stated it was a meteorite and then took off without further explanation. The thing is, everyone who got a glimpse of the object maintains that it was no meteorite, and there is also the very distinctive appearance and behavior it had before it fell to earth, as well as the fact that everything was so hush-hush. UFO researcher Stan Gordon has explained what is wrong with the meteorite theory:

“Astronomers who looked into the case at the time basically felt that the object in question was a bolides, which was a very bright fire-ball type meteor. But we now know the thing basically was coming down from the tip of Ontario, and appeared to have made about a 25 degree turn to the east, near Cleveland, Ohio. And the interesting thing is, now that the new data suggests that the object made a turn towards the south, and then the object made another turn towards the village of Kecksburg where it was proceeding towards the northeast. Within several miles of the crash site, multiple witnesses tell us that this object was coming in at a very, very slow speed of descent. Meteors do not make controlled turns. They do not come in at a slow speed like this. And they in fact do not glide in, which this thing apparently did.”

In the aftermath of the strange incident, the people of Kecksburg and UFO researchers alike have struggled to find an answer for what happened that night in the void of any information from the government. It seems fairly certain and undisputed that something did indeed come down out of the sky in this rural hamlet, and that the military did move in to clear it out, but just what that was has remained hotly debated. One idea is that this was a downed spy satellite, either from a foreign country or domestic, the kind that the government would be keen to sweep under the carpet as much as possible. Another idea is that this was just some random space debris, but if this were the case, then why would the military be on the scene so fast in such full force to so totally lock the place down and keep it all so secret? It has also been found that there are no official records of any space debris being tracked to fall in that area at the time. Neither of these explanations explains the speed and maneuverability of what witnesses had seen. There is also the possibility put forward that this was perhaps some experimental aircraft that crashed, which could explain some of the details of what witnesses claimed to have seen and the military interest. Of course, there is also the idea that this was a genuine UFO and it is being covered up and kept in a secret location. What just about everyone agrees on, except the government, is that this was no meteorite, and Stan Gordon has said:

“There was quite a lot of interest by government agencies as to what the object may have been. There were memos there and requests for information from Houston Space Center, from NORAD, from the Air Force Command Post, the Pentagon, even the Chairman of the Office of Emergency Planning requested information. The official Air Force explanation was that it was likely a meteor. And basically what it goes on to say is, the fact that the search was called off around 2:00 A.M. and that nothing was found.  But evidence indicates that something indeed was found at the site.
Whatever came down in Kecksburg that night, is of high importance to the military agencies. The most mysterious thing about the whole case is the fact that after 25 years, the government still refuses to give us any actual information on what occurred. Either way, we’re dealing with some highly advanced space probe, probably of a foreign nation, that appears to be very highly technical for what we knew about 1965. Or, the possibility exists that we may indeed be dealing with an extraterrestrial spacecraft. I’ve always said this thing was either a very secretive, very advanced man-made space vehicle or it was extraterrestrial. In the 50 years I’ve been doing this, I’ve looked at all sorts of American and Soviet objects and nothing ever seemed to fit the description of what we saw in Kecksburg.
It’s a mystery and after so many years it would be great if we could find that conclusive information about what it was that fell from the sky that night in 1965, but it might be one of those things that we may never have the answer for.”

To this day, the town remembers the event well, hosting a UFO festival every July and keeping a Styrofoam mockup of the UFO that was used for the case appearance on an episode of the TV show Unsolved Mysteries. We are left to wonder just what in the world came down here in this small, rural town. Was it a UFO from another world, a spy satellite, a test aircraft, a meteorite, or what? No one seems to really know, and there has been no forthcoming answer in decades. It certainly seems as if the incident at Kecksburg will live on for some time to come.
Our next incident comes to us from the wilderness of Mexico, where a UFO supposedly crashed into a plane, sending them both crashing to earth and setting off a race between governments to recover the wreckage. The incident began on August 25, 1974, when an American Air Defense radar installation picked up an object moving in from the Gulf of Mexico on a predicted trajectory towards the state of Texas. Whatever it was, it was moving extremely fast, at an estimated speed of around 2,530 miles per hour, and it was at an altitude of around 75,000 feet. It was rather alarming, as it was headed straight towards U.S. airspace, and no one had a clue what it was. It was thought that it was perhaps a meteor, but then it slowed down. Considering that it was slowing down and about to violate U.S. airspace, an alert was issued, and fighters were scrambled for possible interception of an enemy craft, yet it would then surprise everyone again.

The object was tracked to the area of Corpus Christi, Texas, where it suddenly dropped to an altitude of 45,000 feet and slowed down considerably to 1,955 miles per hour, before changing course to take it towards Mexican airspace before any defense could be mounted. It then shot out over Brownsville, Texas, and gently descended once again to about 20,000 feet before suddenly and inexplicably vanishing from radar in the general vicinity of a place called Coyame, in the state of Chihuahua, Mexico, just across the U.S. border. Considering that the object had slowed down, changed course, and descended in smooth, measured steps, it was clear that this was no meteor, and it was also no equipment malfunction, because another military radar installation would report that they had tracked it as well. When the object did not appear on screens again, it was assumed that it must have come down in the desert wasteland near the town, but no one had any idea of what it could have been.
Strangely, civilian radar had apparently not picked this particular event up, but it was found that they had picked up a private aircraft that seemed to have crashed in the same area. However, the flight path of the civilian aircraft did not match that of the mystery object, making any connection between the two murky and differentiating them as two separate phenomena. The only thing anyone knew was that the object the military had tracked and the civilian aircraft seemed to have gone down in precisely the same area at just around the same time. It was all rather odd, but it was apparent that at least an aircraft had crashed, and so the Mexican authorities launched a search for the wreckage, soon finding it among the rugged parched scrubland. That was when the weirdness would continue. In addition to the wreckage of the aircraft, it was soon reported that there was another crash site not far away, and that this one seemed to be oddly circular in shape and mostly in one piece. After that, radio silence was put into effect, and there was no further word on what was going on.
The original reports and communications between the rescue crews had been intercepted by the CIA, who started putting together their own team to go and check it out, and the Mexican government was asked for permission to enter and do their own recovery mission or assist with the operation. These requests would allegedly be either ignored and met with silence or outright denied, but according to eyewitness reports, the Americans didn’t really care and went ahead anyway, mobilizing a group of helicopters at Fort Bliss, which were all painted in light brown colors and without markings. In the meantime, the CIA had apparently picked up satellite imagery showing that there had indeed been two crash sites, and furthermore, there were very large flatbed trucks that had been brought in to move the wreckage, one piece very disk-like in nature, with the trucks stopping in a very remote area away from habitation and then assuming complete radio silence. Alarmed that something weird was going on, the U.S. government ordered a flyby to check it out.
A low altitude, high speed flyby purportedly showed trucks and jeeps stopped in the area and two bodies lying on the ground, and it was decided to send the helicopters in. Four military helicopters were then sent out across the border to the site, where they supposedly found the entire Mexican convoy still, and the personnel all dead for reasons unknown, most of them still sitting lifelessly in their vehicles. On one of the flatbed trucks was found a large, disc-shaped craft that measured about 16 feet in diameter and was composed of smooth silver metal, with no apparent markings, doors, windows, or visible means of propulsion anywhere on it. The disc was also surprisingly only lightly damaged, with merely a small hole and some dents to show for what was seen as an obvious collision with the civilian aircraft. In fact, the wreckage from that aircraft was also carried by the Mexican convoy, and that plane had been completely obliterated, nothing but twisted pieces.

With great caution, this object was allegedly whisked away by the helicopters. According to the story, before leaving the military also made sure to destroy the remains of the convoy, the plane wreckage, and all of the bodies with high explosives, in what appears to have been some sort of nefarious attempt to get rid of the evidence. The disk was apparently taken to a secure facility in the Davis Mountains, after which it was decontaminated and moved to a covered truck, and brought back on roads to an unknown location somewhere near Atlanta, Georgia. The movements of the object are unknown from there, with some reports saying it was put in an underground facility, while others say it was moved yet again. No one really knows. Also, mysteries are why the entire recovery team and convoy sent by the Mexican government were dead, made even more confusing in that none of the American team reportedly had any problem or illness.
It is all a lot to take in, and considering the talk of crashed alien craft in the desert, secretive coverups, and the possession of the UFO wreckage, it has drawn comparisons to the more famous Roswell, New Mexico, crash, to the point that it is often even referred to as “The Mexican Roswell.” Indeed, by far the most complete source and record of the case can be found in the book titled Mexico’s Roswell: The Chihuahua UFO Crash, by Noe Torres and Ruben Uriarte, who have been researching the case for years. Yet the answers remain vague. Was this a crashed extraterrestrial craft or not? There have, of course, been mundane theories put out to explain all of this, such as that it was not a UFO at all, but rather a drug-running plane that had collided with a civilian aircraft. There is also the fact that very few people remain in the area who directly witnessed any of this, and the sources for these rumors are difficult to corroborate, with most of the information gleaned from 2nd or 3rd hand accounts and solid documentation scarce. With so little to go on, it is just a fantastic story relegated to the realm of speculation and debate. What happened out there in those desert badlands, if anything? We may never know for sure, but it is an intriguing case that is sure to capture the imagination for some time to come.
Another case of a supposed UFO crash retrieval starts on May 7, 1989, at around 2 PM, when a South African naval frigate off the coast of Cape Town allegedly radioed in a rather odd report to the Cape Town Naval headquarters. They claimed that they had picked up an unidentified object on their radar that was moving very rapidly towards the mainland at an approximate speed of 5746 nautical miles per hour, and other radar installations, including NORAD installations and D.F. Malan international airport at Cape Town were allegedly picking up the same thing. There were apparently efforts made to establish communications with the incoming object, but there was no response, and it then suddenly and abruptly changed course to shoot out over a remote area. In the meantime, visual confirmation was made, and it was described as looking like a silver disc.
Considering the course change, it was now assumed to be some sort of aircraft, but orders made over the radio to cease its approach continued to go unanswered, and in response, the South African military purportedly began making preparations to engage. Two Mirage fighter jets were scrambled, armed with what was referred to as “experimental aircraft-mounted THOR 2 laser cannons,” supposedly designed to disrupt electrical systems, and as they approached the speeding object, warnings were ignored, and so they were given permission to engage. Both fighters then fired upon it, and according to a report given by an “insider” to the UFO research group Quest International, which would later become UFO Truth Magazine, they made direct hits. The report reads of the incident:

“At 13.59 GMT, the pilot of the fighter reported that they had radar and visual confirmation of the object. The order was given to arm and fire the experimental aircraft-mounted Thor 2 laser cannon. This was done. Squadron leader reported that several blinding flashes emitted from the object which had started wavering whilst heading in a northerly direction. At 14.02 is was reported that the object was decreasing altitude at a rate of 3000 feet per minute. Then at speed it dived at an angle of 25 degrees and impacted in desert terrain 80 miles north of the South African border with Botswana, identified as the central Kalahari desert. Squadron leader was instructed to circle the area until a retrieval team arrived.”

A team of Air Force Intelligence Officers and technical specialists was supposedly soon on the scene in what was called “Operation Silver Diamond,” and the whole story gets even more bizarre from there. A crater was found to have been pounded into the earth, measuring approximately 150 meters in diameter and around 12 meters deep, within which sat a silver, saucer-shaped object half buried at a 45-degree angle. All around it was scorched earth and rocks and sand fused together from an intense heat, and when the team approached, they reported that electronics failed in the vicinity of the object, to the point that one approaching helicopter flying over had severe technical malfunctions that caused it to make an emergency landing, and yet another went down to kill all aboard. The surface of the anomalous object was found to be completely smooth and undamaged, and was devoid of any markings or discernible seams, windows, or hatches, although they apparently did find one strange insignia etched into it ringed by odd hieroglyphics. On the bottom of the craft was found what appeared to be some sort of hydraulic landing gear that had been fully extended, leading to speculation that a landing malfunction, possibly caused by the fighter jet attack, had caused it to go down. Yet, this was not the end of the weirdness.

As the team warily circled the apparently alien craft, there was reportedly a loud noise that issued forth from the craft, and a hatch of some sort cracked open on the side of it. A team was sent in to pry it all the way open, and from within allegedly climbed two humanoid entities, around 4 feet in height, with three-fingered, clawed hands, grayish-blue hairless and scaly skin, and dressed in tight-fitting grey suits. The creatures had oversized heads with large oval eyes and prominent cheekbones, and with slit-like mouths and no noticeable ears. Besides these two, one of the creatures would be found dead inside. The two entities that had emerged were dazed but alive, and they were reportedly quickly apprehended, although they were apparently very vicious and not easily subdued, with one of them supposedly inflicting deep gashes on one of the team with its formidable claws.
The craft was then supposedly whisked off to an Air Force base, and the aliens were detained in a cooled unit, which reportedly made them lethargic and more complacent, after which plans were purportedly made to have them moved to Wright-Patterson Air Force Base in the United States for further tests and analyses. And that is pretty much where the story ends, with no further information on what became of the alleged spacecraft or its outlandish alien crew. The intelligence officer who blew the lid off of it, Captain James Van Greunen, allegedly provided reams of top-secret documentation on the incident, as well as alleged recorded telephone conversations on the matter between top officials, before moving to Germany and going into hiding. It is all completely spectacular and like something out of a movie, an amazing case that has been referred to as “The African Roswell,” but of course, there has been much skepticism aimed at it, even from within the UFO field.
One of the problems is that, although the case has been covered in various magazines and articles over the years, almost all of the information comes from the research done by Quest International, which was the first to be approached by the alleged informant. This does not necessarily mean that it is all false, just that it is hard to independently verify their information. Also rather suspicious is that many of the supposed documents provided by Captain Van Greunen, while looking very official, on closer inspection were found to be riddled with spelling errors, inconsistencies, and discrepancies. 
The African UFO researcher and author Cynthia Hind examined some of the supposed documents and came to the conclusion that it was all just too sloppy for something so top-secret and official. Although it was all very elaborate and in-depth, she concluded that it was all a complicated and well-thought-out hoax, and she would write an article on it in UFO Times called Anatomy of a hoax. The UFO crash on the South African/Botswana border. Gruenen would deny these accusations. Perhaps even more damning than all of this is that there is just no evidence at all that such a crash of any kind happened in the area, let alone an alien spacecraft, and there are only reports from alleged military officials that cannot be confirmed or proven. This could all be due to a cover-up and suppression of the truth, but the UFO crash in the Kalahari is just not very extensively documented or supported by tangible evidence. However, Quest International director Graham W. Birdsall has remained convinced that something very strange happened out there in that desert, so we are left to wonder.
In the end, there is no way to know just what happened on that day out in the middle of nowhere, if anything. There are few additional details, and anything beyond what I have mentioned here has not been forthcoming to the best of my knowledge. If this was a cover-up, then they did a pretty good job of making sure it was pushed into the closet of obscure, forgotten cases, and we will frustratingly probably never know what truth it holds. Was this a hoax, scam, or disinformation, or did something really, truly odd happen on that day? We can only speculate and wonder if that ship isn’t sitting in some military warehouse somewhere.
Here, we have looked at just a few of the supposed UFO crashes that have left us with more questions than answers. What were these mysterious craft? Where did they come from and what set of circumstances caused them to crash in the first place? If these crashes really happened, then what happened to the evidence of these crafts and, in some cases, even the bodies of the aliens themselves? Did any of this happen at all? These are all questions we are unlikely to get the answers to any time soon, and they remain some of the most fantastic, yet frustrating, types of UFO phenomena there are. 

Some Bizarre Cases of UFO Crashes and Crash Retrievals Read More »

google data leak 2 billion users at risk

Over 2B users face phishing risks after Google data leak

NEWYou can now listen to Fox News articles!
A tech leader like Google often seems invincible when it comes to cybersecurity attacks, but that is not the case. Earlier this month, the search giant confirmed that attackers had accessed one of its corporate Salesforce instances. According to a Google spokesperson, this system stored basic, and largely publicly available business information, such as contact details and notes from small and medium-sized companies. It did not store customer data from Google Cloud or consumer products like Gmail, Drive or Calendar.Google says it terminated the malicious activity, completed an impact analysis, and provided mitigations. Therefore, no further action is required by users.NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUDSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  Cybercriminals are exploiting Google’s recent Salesforce data breach to launch vishing calls and phishing attacks against Gmail users worldwide. (Kurt “CyberGuy” Knutsson)Vishing calls target Gmail usersHackers have reportedly accessed Google’s Salesforce database systems, exposing customer and company names. Google confirmed the incident and clarified that the information was mostly public business contact data and did not include passwords or payment information. The company stressed that the breach affected only a corporate Salesforce system, not consumer Gmail or Google Cloud accounts.Still, attackers are exploiting the news of the breach to fuel phishing and vishing scams, tricking people into giving up sensitive information. According to PC World, some users have already reported an increase in phishing attempts that reference Google services.STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVEOne of the main tactics involves scam phone calls, also known as vishing. A Reddit post highlighted a wave of calls coming from the 650 area code, which is linked to Google’s headquarters. In these calls, scammers pose as Google employees and warn victims of a supposed security breach. They then instruct users to reset their Gmail password and share it with them. This locks the rightful owner out of the account and gives the attacker complete control. A user launches Gmail. (Kurt “CyberGuy” Knutsson)Old infrastructure exploited with “dangling buckets”Separately from the Salesforce incident, Google Cloud customers are also facing another type of attack. Hackers are trying to exploit outdated access addresses using a method called the dangling bucket. This can allow them to inject malware or steal data. Both businesses and individuals are vulnerable to losing control over sensitive information if targeted in this way.Gmail and Google Cloud serve nearly 2.5 billion people, which makes the scale of the risk significant. Although the initial breach did not expose passwords, attackers are using the news of the incident to trick people into revealing their login details. A Google search window is on a laptop. (Kurt “CyberGuy” Knutsson)6 ways you can stay safe from scammers targeting Google accountsGoogle accounts are often a prime target for scammers. The good news is that protecting yourself doesn’t require advanced technical skills. A few practical steps can drastically reduce your chances of becoming a victim.1) Avoid clicking on phishing linksPhishing remains the most common way scammers steal Google account credentials. A fake email or text may claim your account has been locked or that you need to verify suspicious activity. Clicking the link usually takes you to a counterfeit login page that looks almost identical to the real Google sign-in screen.To avoid falling for these tricks, check the sender’s email address carefully, hover over links before clicking, and avoid entering your Google password on any page that doesn’t start with accounts.google.com.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 2) Save passwords securelyReusing weak passwords across multiple sites is an open invitation for scammers. If one site is breached, your Google account becomes vulnerable. A strong, unique password is your first line of defense.The easiest way to manage this is with a password manager. It can generate complex passwords, store them securely, and fill them in automatically when you need them. This way, you never have to remember dozens of different logins, and attackers can’t guess their way in.Next, see if your email has been exposed in past breaches. Our #1 password manager pick (see Cyberguy.com/Passwords) includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/PasswordsWHAT TO DO IF YOU GET A PASSWORD RESET EMAIL YOU DIDN’T ASK FOR3) Delete personal data that puts you at riskScammers often use information they find online to craft convincing attacks. If your email address, phone number, or even past passwords are floating around on data broker sites, criminals have more tools to impersonate you or trick you into revealing more.Using a data removal service helps clean up your digital footprint. By reducing the amount of exposed information about you, it becomes much harder for scammers to target you directly.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4) Turn on two-factor authenticationEven the strongest password can be stolen, but two-factor authentication (2FA) adds an extra barrier. When enabled, Google will ask for a one-time code or prompt on your phone before granting access. That means even if a scammer manages to get your password, they can’t log in without also having your device.Google offers several 2FA methods, from SMS codes to app-based prompts and even hardware security keys. For the best protection, choose app-based or hardware verification rather than text messages.5) Keep your devices updatedMany scams rely on exploiting outdated software. If your phone, browser, or operating system isn’t up to date, attackers may use known vulnerabilities to install malware or hijack your session.Set your devices to update automatically whenever possible. This ensures you’re always running the latest security patches, reducing the number of openings a scammer can use.6) Regularly check Google account security settingsGoogle provides built-in tools to help users spot suspicious activity. By visiting your Google Account’s security page, you can see devices that have signed in, recent account activity, and whether recovery options like your phone number and backup email are up to date.Running a Google Security Checkup only takes a few minutes and gives you a clear overview of any weaknesses. Think of it as a health check for your digital life.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayThe incident is a reminder that even tech giants with vast resources are not immune to security lapses. While Google insists that no passwords were exposed, the wave of phishing and vishing scams shows how quickly criminals can weaponize even partial leaks. What began as a breach of business data has spiraled into a threat facing millions of everyday users, raising questions about how secure Google’s ecosystem really is.Do you believe regulators should step in with stricter rules for how cloud providers handle security lapses? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

Over 2B users face phishing risks after Google data leak Read More »

google pixel event jimmy fallon

Google Pixel 10 event brings new phones, smartwatch, earbuds and AI

NEWYou can now listen to Fox News articles!
Google kicked off its Made by Google event last week with blockbuster energy. Jimmy Fallon played host, bringing humor and star presence. Steph Curry highlighted how the Pixel 10 empowers creators and athletes to capture and share their stories. Lando Norris, fresh from the F1 circuit, showed off how Pixel’s speed and AI enhancements fit into fast-paced lives. And the Jonas Brothers premiered a music video filmed entirely on the new Pixel 10 Pro, proving the phone’s camera is ready for professional-grade production.From the first moment, Google made it clear: this was no ordinary reveal. The Pixel 10 family, including the Pixel 10, Pro, Pro XL, and Pro Fold, faced the spotlight alongside the Pixel Watch 4, Pixel Buds 2a, and Pixelsnap accessories, all powered by the next-gen Tensor G5 chip and Gemini Nano AI.Transitioning from star-studded entertainment to deep tech, Google showcased AI-driven upgrades, from Magic Cue anticipating your needs to Pro Res Zoom up to 100x, satellite emergency support on the Pixel Watch 4, and active noise cancellation with hands-free AI on the Buds 2a-all wrapped in smarter, more seamless hardware.TRANSFORM YOUR TECH SETUP WITH THE BEST EARLY LABOR DAY TECH DEALS ON APPLE, SAMSUNG, HP AND MOREWith entertainment and innovation sharing the stage, the event set the tone for Google’s most ambitious hardware lineup yet.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER Host Jimmy Fallon holds Pixel 10 Pro Fold mobile phone during the “Made by Google” event, which introduced the latest additions to Google’s Pixel portfolio of devices, in Brooklyn, New York, Aug. 20, 2025. (REUTERS/Brendan McDermid)Pixel 10 Series: Smarter design, displays, and camerasGoogle’s Pixel 10 lineup is the heart of this year’s Made by Google event. With the Tensor G5 chip, brighter displays, and new AI-powered camera tools, the series delivers meaningful upgrades for everyday users. Here’s what each model brings and why it matters. A man talking on a Google Pixel 10. (Google)Pixel 10: Affordable power with better photographyThe Pixel 10 brings big improvements without the Pro price tag. It features a 6.3-inch OLED Actua display that’s brighter than ever, making outdoor use easy. Google also added better bass in the speakers, so movies, music, and calls sound richer.The headline feature is the first 5x telephoto lens on a base Pixel, complete with 10x optical-quality zoom and up to 20x Super Res Zoom. For anyone who loves capturing moments from a distance, kids’ soccer games, concerts, or city skylines, this is a huge advancement forward.Pixel 10 Pro and Pixel 10 Pro XL: AI cameras for creatorsThe Pixel 10 Pro and Pixel 10 Pro XL models push Pixel photography even further. They introduce Pro Res Zoom up to 100x, powered by generative AI on the Tensor G5 chip. That means close-up shots with detail you’d normally need a DSLR to capture.Both the Pro (6.3-inch) and Pro XL (6.8-inch) feature Google’s brightest Super Actua displays, larger batteries, and up to 16 GB of RAM for faster performance. These phones are made for power users who want the very best in cameras, speed, and AI tools.Pixel 10 Pro Fold: Durability meets flexibility A Google Pixel 10 Pro Fold display is shown. (Google)The Pixel 10 Pro Fold is Google’s most durable foldable yet, designed for people who want a phone that doubles as a tablet. With an upgraded gearless hinge, IP68 water and dust resistance, and a larger battery, it’s built to last years of folding and unfolding.It’s perfect for multitasking, splitting the screen for video calls and apps, or for streaming and gaming on the bigger display. For anyone curious about foldables but worried about durability, this is Google’s most confident answer yet.The Pixel 10, Pro, Pro XL, and Pro Fold all run on the brand-new Tensor G5 chip, which Google calls its most significant upgrade to date. The chip is made by TSMC using a 3nm process, delivering faster, more efficient on-device AI performance with Gemini Nano at its core. Across the entire lineup, Google made thoughtful design upgrades. The iconic camera bar has been refined, the bodies use more recycled materials, and the colors are elegant and modern. Choices include Indigo, Frost, and Lemongrass on Pixel 10, and Moonstone, Jade, Obsidian, and Porcelain on the Pro models.FOLDABLE PHONES ARE IMPRESSIVE TECHNOLOGICAL MARVELS BUT COME WITH SERIOUS COMPROMISESPricing and availabilityPixel 10, Pixel 10 Pro, and Pixel 10 Pro XL are all available for preorder today, starting at $799, $999, and $1199. Pixel 10 Pro and Pixel 10 Pro XL owners will also get a full year of Google AI Pro. Pixel 10 Pro Fold is available for pre-order today and hits shelves on October 9.If you’re not ready to upgrade to the latest model, you can often find great discounts on earlier Pixels around launch season. Check out the Top Android phones of 2025 for deals on previous Android phones by visiting Cyberguy.com/TopAndroidPhones Pixel Buds 2a: Smarter sound at a friendly price A woman wears Pixel Buds 2a. (Google)Google introduced the Pixel Buds 2a as the newest member of the Pixel Buds family. They deliver premium features like Active Noise Cancellation (ANC) and hands-free AI help, all at an affordable $129. With a fresh design, better sound, and smarter connectivity, these buds bring everyday value to anyone who wants high performance without breaking the bank.Lightweight design with a comfortable fitPixel Buds 2a are smaller and lighter than the earlier A-series, making them comfortable enough to wear all day. Inspired by the Pixel Buds Pro 2, they include a twist-to-adjust stabilizer and four different eartips so you can find the perfect fit. With an IP54 sweat and water resistance rating, you don’t have to worry about rain or workouts. The buds also come in two stylish colors, Iris and Hazel, designed to complement other Pixel devices.Clearer, smarter audio powered by Tensor A1At the heart of Pixel Buds 2a is the Tensor A1 chip, built specifically for audio. This brings Active Noise Cancellation with Silent Seal 1.5, a first for Google’s A-series. A custom speaker driver and new high-frequency chamber enhance music and podcast quality. Wind-blocking mesh covers and Google AI improve call clarity, so your voice sounds crisp on the other end.Battery life also gets a boost. You’ll enjoy 7 hours on a single charge with ANC on, and up to 20 hours with the charging case. With ANC off, you get nearly double the listening time compared to the first-generation A-series. For the first time, the case itself includes a replaceable battery, making the buds more durable and sustainable.AI Help without reaching for your phonePixel Buds 2a work as more than headphones; they’re also your AI companion. With Gemini built in, you can get quick answers, check messages, or even ask for coffee shop recommendations on the go. Just say “Hey Google” or customize the press-and-hold gesture for instant help.Easy pairing and smart connectivityPairing with a Pixel phone is seamless, but the buds also support Multipoint, letting you switch between devices without hassle. Fast Pair makes setup quick, and the Find Hub app ensures you never lose them. You can see the exact location on a map or make them ring when nearby.Pricing and availabilityAt just $129, Pixel Buds 2a deliver features once reserved for premium earbuds. They’re available for preorder now and will hit shelves at the Google Store and retail partners on October 9.Pixel Watch 4: Smarter design, AI health, and satellite safety A Pixel Watch 4 is seen with a pink wristband and display. (Google)The Pixel Watch 4 is Google’s biggest smartwatch upgrade yet. It keeps the iconic round look but introduces a domed Actua 360 display that’s brighter, larger, and easier to see, even in direct sunlight. The screen is 50% brighter, the bezels are smaller, and everything feels more fluid thanks to new animations and stronger haptics. Simply put, it looks better and feels more responsive on your wrist.Longer battery, faster chargingBattery life has always been a concern for smartwatches. Google addressed it with a 25% boost. The 41mm model now lasts up to 30 hours, while the 45mm model stretches to 40 hours. With Battery Saver mode, you can extend usage to two or even three days. Plus, the new Quick Charge Dock takes you from 0 to 50% in just 15 minutes, making it easier to power up before you head out.Satellite communications for emergenciesOne of the most groundbreaking features is standalone satellite connectivity. Pixel Watch 4 LTE is the first smartwatch that can dial emergency services even when you’re off the grid. Whether you’re hiking, camping, or driving in remote areas, the watch can connect to geo-stationary satellites and get help when you need it most. That’s peace of mind you can actually wear.Advanced health and fitness trackingHealth remains a core focus. Pixel Watch 4 adds more accurate sleep tracking, enhanced skin temperature sensing, and dual-frequency GPS for precise route logging in tough environments. Cyclists will love the new real-time bike stats, while fitness fans get 50+ exercise modes, including pickleball and basketball. Even if you forget to start a workout, the watch’s AI now auto-detects and logs your activity.Your AI health coach, 24/7With Gemini AI built in, the Pixel Watch 4 goes beyond tracking; it coaches. A new personal AI health coach gives proactive fitness and sleep advice tailored to your goals. It’s like having a trainer and wellness guide on your wrist, available anytime. A preview of this feature arrives in October through the Fitbit app, opening the door to personalized, AI-driven health support.WWDC 2025: IOS 26, LIQUID GLASS DESIGN AND APPLE’S AI SHORTFALLSeamless smart featuresThe Pixel Watch 4 isn’t just about health. With Gemini on your wrist, you can get answers or complete tasks hands-free. Raise your wrist to talk, respond to messages with smart replies, or control your day without pulling out your phone. It’s designed for those busy, in-between moments, when your hands are full but you still need help.Pricing and availabilityThe Pixel Watch 4 is available for preorder now. It launches October 9 with pricing starting at $349 for Wi-Fi and $449 for LTE in the 41mm size, and $399 for Wi-Fi and $499 for LTE in the 45mm size. Google is also offering a wide range of new watch bands, letting you personalize your style to match your Pixel phone or your look.Pixelsnap and Qi2 Charging: Magnetic power made simple A Pixelsnap Charger, Pixelsnap Ring Stand and the Pixel Flex 67W Dual USB-C fast charger are showcased. (Google)The Pixel 10 series is the first major Android lineup to fully embrace Qi2 magnetic charging. Think of it as Google’s answer to MagSafe, only it works with a wider range of devices. Qi2 improves on the old Qi standard by adding magnets, so your phone snaps perfectly into place every time. No more fiddling with alignment, charging is instant and reliable.This upgrade matters because it unlocks a full ecosystem of Pixelsnap accessories, built to make charging and everyday use easier. And since Qi2 is a universal standard, you’re not limited to Google’s products; you can also use MagSafe accessories with your Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, and Pixel 10 Pro Fold.Pixelsnap Charger and StandThe Pixelsnap Charger comes as a simple puck or bundled with a sleek stand. It charges the Pixel 10 Pro XL at up to 25W and other Qi2-certified devices at 15W. The stand looks elegant on a desk or nightstand, and the puck detaches for charging on the go. If you own a Pixel 10 Pro Fold, the stand even supports charging while unfolded, letting you stream, video call, or display widgets on the big screen as your phone powers up.Pixelsnap Ring StandNeed hands-free viewing? The Pixelsnap Ring Stand snaps onto the back of your phone for propping it up. It rotates smoothly thanks to a microfiber liner, making it easy to find the perfect angle for movies or video calls. Slim enough to slip into a pocket or purse, it adds function without adding bulk.Pixelsnap CasesGoogle designed its new Pixel 10 cases to be Pixelsnap-ready. That means you can attach chargers or accessories without ever removing the case. Available in colors like Moonstone, Jade, Obsidian, Porcelain, Indigo, Frost, and Lemongrass, they not only protect your phone but also match the refreshed Pixel 10 design.Pixel Flex 67W Dual Port USB-C Fast ChargerIf you prefer wired charging, Google also introduced the Pixel Flex Dual Port 67W charger. It’s the fastest dual-port charger yet for Pixel phones. Thanks to a custom algorithm, it prioritizes charging your Pixel first while still powering a second device. Compact with foldable prongs, it’s designed to travel as easily as you do.Pricing and availabilityAll Pixelsnap products and the Pixel 10 series are available for preorder now, with retail availability starting August 28.AI Features: Magic Cue, Camera Coach, and more An image of the Tensor G5 chip is seen. (Google)Google made it clear at the 2025 Made by Google event that AI is now at the heart of the Pixel experience. With the Tensor G5 chip and Gemini Nano, Pixel 10 phones deliver more than speed-they anticipate what you need and help you get it done.Magic Cue: Smarter help across your appsThe new Magic Cue acts like a personal assistant inside your phone. It proactively pulls information you need at just the right time. For example, if you’re on the phone with an airline, it can instantly display your flight details from Gmail. When you’re in a group chat, it can surface photos or addresses without making you dig. And because all of this happens on-device, your personal data stays private.Camera Coach: AI that makes you a better photographerPixel cameras are known for their quality, but Camera Coach takes it further. Using Gemini AI, it gives real-time tips to improve your photos. It might suggest a different angle, a tighter frame, or a better composition. For beginners, it’s a helpful teacher. For experienced photographers, it’s like having a second set of creative eyes right in your pocket.Best Take and Pro Res Zoom: Smarter shots every timeFeatures like Best Take automatically select the sharpest face from a series of photos, making group shots easier than ever. Meanwhile, Pro Res Zoom, exclusive to Pixel 10 Pro models, uses a generative AI imaging model to deliver astonishing detail up to 100x zoom. It’s not just cropping in, it’s rebuilding and refining the image to look crisp.Everyday AI that saves you timeBeyond photography, Google packed the Pixel 10 with over 20 generative AI tools that work directly on the device. They help with editing, writing, and even composing replies in your favorite apps. The goal is simple: make the phone feel less like a tool and more like a helpful companion that adapts to your needs.CLICK HERE TO GET THE FOX NEWS APPTake My Quiz: How Safe Is Your Online Security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz Kurt’s key takeawaysGoogle just staged one of its most memorable launches yet. With Fallon, Curry, Norris, and the Jonas Brothers front and center, the event blended entertainment and innovation. That energy carried through to the devices, which brought Google’s boldest AI, camera, and ecosystem upgrades so far. Each product offered clear value. The Tensor G5 chip and Gemini Nano AI make everything faster and more efficient. The Pixel 10 phones push photography and performance further than before. Meanwhile, the Pixel Watch 4 adds health coaching and even satellite emergency support. The Pixel Buds 2a also pack premium sound and smart features at a budget price. In addition, Pixelsnap accessories make charging simple and stylish. Finally, Google’s promise of seven years of updates sets this lineup apart. Combined with thoughtful design and proactive AI, these devices feel built to last.Will Google’s AI-first approach convince you to upgrade, or are you waiting to see what Apple and Samsung do next? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Google Pixel 10 event brings new phones, smartwatch, earbuds and AI Read More »

70702

Cogs of War: Moving at the Speed of War with Horacio Rozanski of Booz Allen

The future fight won’t be won by those with the biggest budgets, most polished strategies, or largest armies. It will be won by those who can translate breakthrough technology into usable capability at speed and scale. Ryan was joined by Horacio Rozanski, the CEO of Booz Allen, to talk about the role his company is playing in this race. Having reoriented Booz Allen into a technology integrator, he shares the cultural and organizational challenges of turning Booz Allen into a company of builders, the bets being made on emerging technologies, and how his personal journey — from immigrant to Booz Allen intern to CEO — shapes how he sees change. This is a special cross-posted episode of Cogs of War, our show on defense tech and industry. Click here to subscribe using your podcast app of choice: https://pod.link/1818133762

Cogs of War: Moving at the Speed of War with Horacio Rozanski of Booz Allen Read More »

schools spy on kids photo 1

Schools’ safety tools are spying on kids — even at home

NEWYou can now listen to Fox News articles!
School is back in session, but here’s something no one told you at orientation: Your kids may have more eyes on them than just their teachers’. Even if you don’t have kids in school, you really need to know about this.A new study from UC San Diego uncovered what’s really going on with those student safety tools schools buy. You know, the ones that are supposed to stop bullying, flag mental health struggles and prevent school shootings? Well, they’ve morphed into 24/7 surveillance machines.Enter to win a new iPhone at www.WinFromKim.com!Get this: 86% of the companies that provide these services monitor kids day and night, not just during school hours and not just on school devices. That’s every Google search, every message, sometimes even at home on personal phones and laptops.Nearly a third of these companies give kids “risk scores” based on what they type or search. The kicker? 71% rely on AI to flag behavior. Yes, an algorithm decides if your child is “risky.” TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS A new study finds that school safety tools are monitoring students 24/7. (Photo by Matt Cardy/Getty Images)Imagine your kid writing an email they never send and that draft gets scooped into some monitoring company’s database. That’s exactly what happened to this teen who got suspended. Creepy doesn’t even begin to cover it.📱 Yes, they’re watching at home, tooAbout 36% of companies monitor student-owned devices. All it takes is a school-required app, plug-in or software. Late-night YouTube binges, private DMs and social media posts could trigger a red flag on some dashboard.📌 Questions every parent should ask the schoolI think these tools can do a lot of good. God knows we don’t want any more school shootings or kids slipping through the cracks. STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE School safety programs are collecting students’ emails, messages, and web activity on their personal devices. (Photo by Sebastian Willnow/picture alliance via Getty Images)But you and your kids need to understand exactly how they work and what happens to the data. Copy these questions and send an email to the school’s administrator or set up a meeting in person.Is our school using GoGuardian, Bark, Gaggle, Securly, Lightspeed or any online monitoring service? What exactly are they tracking?Are you monitoring personal devices at home?What happens if my child is flagged? How can I see my child’s dashboard?How long is student data stored, and can parents request deletion?Is student data ever sold, shared or used for anything beyond monitoring?Make sure your kids know that anything they do on a school-issued device is fair game. And depending on the setup, their personal phone or laptop could be tracked, too. These systems can protect, but they also raise big questions about privacy and oversight.Is this happening with your kid’s school? Drop me a note. I’d love to talk to you about it.STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE Students should assume that school safety programs are monitoring their devices. (Kirk Sides/Houston Chronicle via Getty Images)🚸 Know someone with kids? Share this important information with them now.Get tech-smarter on your scheduleCLICK HERE TO GET THE FOX NEWS APPAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.Daily newsletter: Join 650,000 people who read the Current (free!)Watch: On Kim’s YouTube channelCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Schools’ safety tools are spying on kids — even at home Read More »