memoment editorial

1 hyundai autoever america breached know the risks to you

Hyundai AutoEver America breached: Know the risks to you

NEWYou can now listen to Fox News articles!
Hyundai AutoEver America discovered on March 1, 2025, that hackers had compromised its systems. Investigators found the intrusion began on February 22 and continued until March 2. Hyundai AutoEver America (HAEA) provides IT services for Hyundai Motor America, including systems that support employee operations and certain connected-vehicle technologies. While the company works across Hyundai’s broader ecosystem, this incident did not involve customer or driver data.According to the statement provided to CyberGuy, the breach was limited to employment-related information tied to Hyundai AutoEver America and Hyundai Motor America. The company confirmed that about 2,000 current and former employees were notified of the incident in late October. HAEA said it immediately alerted law enforcement and hired outside cybersecurity experts to assess the damage.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Cybercriminals targeted Hyundai AutoEver America’s systems, exposing sensitive data. (Kurt “CyberGuy” Knutsson)Why this Hyundai AutoEver America breach mattersThe exposed data reportedly includes names, Social Security numbers and driver’s license numbers, making this breach far more serious than one involving passwords alone. Experts warn that these details can be used for long-term identity theft and financial fraud. Because Social Security numbers cannot easily be changed, criminals have more time to create fake identities, open fraudulent accounts and launch targeted phishing attacks long after the initial breach. Experts warn that stolen Social Security and driver’s license information could be used for identity theft and fraud. (Kurt “CyberGuy” Knutsson)Who was affected in the Hyundai AutoEver America data incidentAEA manages select IT systems tied to Hyundai Motor America’s employee operations, along with broader technology functions for Hyundai and Genesis across North America. Its role includes supporting connected-vehicle infrastructure and dealership systems.According to the company, this incident was limited to employment-related data and primarily affected approximately 2,000 current and former employees of Hyundai AutoEver America and Hyundai Motor America. No customer information or Bluelink driver details were exposed. While some filings reference sensitive data types such as Social Security numbers or driver’s license information, the incident did not involve Hyundai customers or the millions of connected vehicles HAEA supports.Earlier reports suggested that 2.7 million individuals were affected, but Hyundai says that figure is unrelated to the breach. Instead, 2.7 million is the estimated number of connected vehicles that Hyundai AutoEver America helps support across North America. None of that consumer or vehicle data was accessed.GENESIS PREVIEWS G70 SPORTS SEDAN WITH NEW YORK CONCEPTHyundai also clarified that the United States has about 850 Hyundai dealerships and emphasized that the scope of this incident was narrow and contained.We reached out to HAEA for a comment, and a representative for the company provided CyberGuy with this statement:”Hyundai AutoEver America, an IT vendor that manages certain Hyundai Motor America employee data systems, experienced an incident to that area of business that impacted employment-related data and primarily affected current and former employees of Hyundai AutoEver America and Hyundai Motor America. Approximately 2,000 primarily current and former employees were notified of the incident. The 2.7 million figure that is cited in many media articles has no relation to the actual security incident. The 2.7 million figure represents the alleged total number of connected vehicles that may be supported by Hyundai AutoEver America across North America. No Hyundai consumer data was exposed, and no Hyundai Motor America customer information or Bluelink driver data was compromised.” Scammers may now pose as company representatives, contacting people to steal more personal details. (Kurt “CyberGuy” Knutsson)What you should do right nowMonitor your bank, credit card and vehicle-related accounts for suspicious activity.Check for a notification letter from Hyundai AutoEver America or your car brand.Enroll in the two years of complimentary credit monitoring offered by HAEA if you qualify.Enable multi-factor authentication (MFA) on all important accounts, including those tied to your vehicle.Be cautious of emails, texts or calls claiming to be from Hyundai, Kia or Genesis. Always verify through official websites.Smart ways to stay safe after the Hyundai AutoEver America breachWhether you were directly affected or just want to stay alert, this breach is a reminder of how important it is to protect your personal information. Follow these practical steps to keep your data secure and reduce the risk of identity theft or scams.HYUNDAI TO RECALL GENESIS CARS TO FIX BRAKES1) Freeze or alert your creditContact major credit bureaus — Experian, TransUnion and Equifax — to set a fraud alert or freeze. This helps block new accounts from being opened in your name.2) Protect your vehicle appsIf you use apps tied to your vehicle, update passwords and enable multi-factor authentication. Avoid saving login details in unsecured places. Also, consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com3) Watch for fake support messagesScammers may use news of the Hyundai AutoEver America breach as a way to contact Hyundai, Kia or Genesis owners, pretending to be from customer support or the dealership. They might claim to help verify your account, update your information or fix a security issue. Do not share personal details or click any links. Type the brand’s web address directly into your browser instead of clicking links in messages or emails. Always confirm through the official brand website or by calling the verified customer service number.4) Use strong antivirus protectionUsing strong antivirus software helps block phishing links, malware downloads and fake websites that might appear after a data breach. It can also scan your devices for hidden threats that may try to steal login data or personal files.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Use a data removal serviceData removal tools automatically find and delete your personal information from people-search and data-broker sites. These services reduce the chances that criminals will use leaked data to target you with phishing or social-engineering scams.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.6) Monitor your digital footprintConsider using identity monitoring services to track your personal information and detect possible misuse early.Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.7) Keep your devices updatedRegularly install security updates on your phone, laptop and smart car systems to reduce the risk of further attacks.8) Report suspicious activity the right wayIf you notice unusual account activity, fraudulent charges, or suspicious messages that appear tied to this breach, report it immediately. Start by contacting your bank or credit card provider to freeze or dispute any unauthorized transactions. Then, file a report with the Federal Trade Commission (FTC) at IdentityTheft.gov, where you can create an official recovery plan. If you suspect a scam message or call, forward phishing emails to reportphishing@apwg.org and report fake texts to 7726 (SPAM).CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThis incident highlights how much personal data is connected to modern cars and how vulnerable those systems can be. When your vehicle is linked to your identity, protecting your data becomes just as important as maintaining the car itself. Stay alert, use the tools available to safeguard your accounts and report any suspicious activity right away.Should companies like Hyundai AutoEver be doing more to keep customer data secure? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Hyundai AutoEver America breached: Know the risks to you Read More »

1 washington judge rules ai camera images are public

Washington court says Flock camera images are public records

NEWYou can now listen to Fox News articles!
A Skagit County Superior Court judge ruled that images from Flock Safety automated license plate reader cameras in Stanwood and Sedro-Woolley qualify as public records under Washington’s Public Records Act.Judge Elizabeth Yost Neidzwski said the images are “not exempt from disclosure” and explained that an agency does not need to physically hold a record for it to fall under the law.The request that led to the rulingThe case began when Washington resident Jose Rodriguez asked Stanwood for one hour of Flock camera images. That request prompted Stanwood and neighboring Sedro-Woolley to ask the court to declare that vendor-stored data did not count as public records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Judge Neidzwski rejected that argument. She said the cities’ ALPR images support a government purpose and meet the definition of a public record.SEATTLE ELECTS DEMOCRATIC SOCIALIST KATIE WILSON AS MAYOR Flock Safety cameras use AI to capture license plate images in real time, tracking vehicles as they move through neighborhoods. (Flock Safety)However, Rodriguez will not receive the specific images he sought. The city had already allowed the footage to auto-delete after 30 days, and it expired before the ruling.We reached out to Flock Safety, and a spokesperson provided CyberGuy with the following statement:”The Court merely declined to exempt these records from disclosure under Washington’s extremely broad public records law. Nothing changed in the status quo in Washington as a result of this ruling — these records were covered by the law before the ruling, and remain so following the ruling. Unfortunately, some individuals in Washington have abused the breadth of the public records law to extort significant settlements from Washington communities for technical violations of the disclosure requirements, which we cannot believe is the intent of the law. We are supporting efforts to enact a legislative fix to this situation, which is costing Washington communities tens of thousands of dollars to stave off frivolous lawsuits.” The Washington court ruling marks a major step toward transparency in how police collect and store surveillance data. (Flock Safety)Why the decision matters for transparencyFlock’s automated license plate reader cameras capture multiple still images of passing vehicles along with time, location and license plate information. Cities use the system to assist law enforcement with investigations, relying on stored images to identify vehicles connected to crimes or alerts.The court’s ruling raises broader questions about how local agencies manage these images once they’re created. By finding that the images qualify as public records, the decision forces cities to examine how long they retain this data, how it is stored and who may request access under state law. Privacy advocates say the ruling highlights the need for clear policies around retention and transparency, while law enforcement groups argue that access rules must still protect ongoing investigations.AI DASHCAMS ENHANCE TRUCKER SAFETY WHILE RAISING PRIVACY CONCERNS The debate continues as communities weigh the balance between public safety, privacy and the right to know what’s being recorded. (Flock Safety)How this ruling impacts privacy and surveillanceFor years, cities and police agencies have argued that data stored by third-party vendors falls outside public records laws. They often make this claim even when the data documents activity on public roads. The Washington ruling did not settle broader questions about surveillance, but it rejected the idea that Flock camera images are exempt simply because a vendor stores them. This decision exposes a growing tension between how agencies use surveillance tools and what the public can access under state law.Beryl Lipton of the Electronic Frontier Foundation, a nonprofit dedicated to defending digital privacy, free expression and transparency in technology, told Cyberguy, “The use of third-party vendors for surveillance and data storage is widespread and growing across the country, and allowing this to undermine the public’s right to know is very dangerous. The government’s primary obligation should be to its constituents, which includes protecting their rights under public records laws, not to the private vendors that they choose to employ while conducting mass surveillance. Whether an agency stores images and information on their own devices or on the private server of a vendor should not affect the appropriate disclosure of these records under public records laws. If the use of these devices makes it too difficult for a city to comply with the law, then the response should not be to circumvent the laws they find inconvenient, but rather it should be to only use vendors that won’t get in the way of a city’s ability to fulfill its responsibilities to their citizenry. Otherwise, they should not use these tools at all.”What this means for youIf your town uses Flock or other automated license plate readers, this ruling shows how Washington courts may handle future records requests. It confirms that ALPR images can count as public records, even when a vendor stores the data.The debate over privacy and safety continues. Supporters say public access builds trust and oversight. Critics worry that releasing vehicle data could expose sensitive details without strong safeguards or redactions.CLICK HERE TO DOWNLOAD THE FOX NEWS APPTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis ruling shows how courts may handle data from automated license plate readers. It also reveals how much vehicle information cities collect. As a result, it raises new questions about who should access these records. In addition, the decision may guide future transparency debates in Washington. However, it will also spark fresh conversations about how surveillance tools fit within state records laws.Do you think public access to AI camera footage improves accountability or puts privacy at risk? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Washington court says Flock camera images are public records Read More »

bec1

The Potentially Shared and Unexplained Agenda of the Black-Eyed Children and the Men In Black!

As the Internet was rolled out across the planet during the 1990s and into the twenty-first century, many tales that would have likely remained localized and, essentially, hidden from the wider public came to the surface. Undoubtedly, one of the more intriguing, if unsettling, of these is accounts of Black-Eyed Children.
What is interesting, however, is that these encounters with these strange entities are remarkably similar to encounters with Men In Black, who themselves appear to stretch back through history. We might ask, then, if Black-Eyed Children are just a different manifestation of the Men In Black, perhaps repackaged for the modern age. If this is the case, then we should ask, why? What are these strange creatures, and why do they have such an interest in interacting with humanity? Indeed, both of these strange entities appear to share traits with other legendary figures such as vampires and their need to be invited into a building before they can enter it, and even shapeshifting creatures; many people who have encountered either state their belief that they appeared to get weaker the longer the respective interactions go on, almost as if they were struggling to maintain their form. Moreover, those who have reported interactions with either of these strange figures have stated how they felt an overwhelming and largely unexplainable sense of fear in their presence, almost as if the beings themselves were placing that fear into their consciousness. 
Of course, the Men In Black are seemingly connected to the UFO phenomenon, but further study into this group appears to suggest a much more nuanced organization and agenda, an agenda that, by and large, remains as much of a mystery today as it did when people began reporting encounters with them. 
Before we explore some of the most disturbing encounters with the Men in Black, we will start with just some of the equally disturbing cases of encounters with Black-Eyed Children. While these encounters didn’t become widespread until the 1990s and early 2000s with the arrival of the Internet, like the Men in Black, researchers have uncovered encounters with them going back centuries. Indeed, some have suggested that the Black-Eyed Children are extraterrestrials in another guise, while others suggest there is something more demonic about them. One thing is certain: encounters with these bizarre entities are some of the most unsettling on record. 

Arguably, the first account with the Black-Eyed Children to gain widespread traction was that of a journalist with the Abilene Reporter-News, Brian Bethal, who had a particularly distressing encounter with these bizarre creatures in 1996 in Abilene, Texas. He reported that, on the night in question, he had made his way to the (then) location of Camalott Communications, which was one of the area’s original Internet providers, in order to pay his bill. The location of the Camalott building was close to a movie theatre, and Bethal was “using the light of the theatre’s marquee” to write his check, which he planned to place in Camalott’s night drop-box. It was as he was doing so that a sudden knock on the driver’s side window shook him to attention. 
When he turned to the window, there were two young boys, each dressed in a hooded pullover, standing outside his car, who he guessed were aged between nine and 12 years old. To begin with, he thought the youngsters were going to ask him for money, so he opened the driver’s side window just a little bit. As soon as he did so, however, he was “immediately gripped by an incomprehensible, soul-wracking fear”, something he couldn’t explain. 
He described the older boy as being “somewhat suave”, with olive skin and dark curly hair, and who appeared to be the “spokesman” of the pair. The other boy, the younger one, was a “red-headed, pale-skinned, freckled young man” who stayed very much in the background. The older boy then proceeded to explain to Bethal that they had planned to see the movie Mortal Kombat, but they had left their money at their mother’s house, and asked if they could drive them there so they could pick it up. As Bethal reported, this was “plausible enough”, but all the while, the “irrational fear continued and grew” inside of him. He elaborated that he had “no reason to be frightened of these boys,” but he was, terribly. It was at this point that Bethal glanced up at the Movie theatre signs before turning his attention to the digital clock on the car’s dashboard. He realized that the last showing of the evening had already started, meaning that even if he did agree to give them a ride to their mother’s house, by the time he returned, the movie would have almost finished. 
Despite this, the “spokesman” assured Bethal that the journey “wouldn’t take long”. Bethal again hesitated. Then, the surreal scenario turned beyond terrifying. He wrote:

“In the short time I had broken the gaze of the spokesman, something had changed, and my mind exploded in a vortex of all-consuming terror. Both boys stared at me with coal-black eyes. Soulless orbs like two great swathes of starless night!”

Despite the intense fear that now fully gripped his body, Bethal did his best to remain outwardly calm, while at the same time offering the first excuse that came into his mind and then winding up the window before starting the car’s engine and putting the vehicle into reverse. As he did so, the older boy “banged sharply on the window” before shouting to Bethal that “we can’t come in unless you tell us it’s okay”, before demanding, “Let us in!” Bethal stated that the words, as well as the anger with which they were spoken, “echo in my mind even today”.
He stated in his report that he pulled away from the parking lot “in blind fear”, surprised that he didn’t hit another car as he did so. After a moment, he looked in the rearview mirror and was beyond shocked to find the two boys were no longer there. He wrote that: 

“Even if they had run, I don’t believe there was any place they could have hidden from view that quickly!”

Just what Bethal might have actually seen or encountered remains a point of discussion, at least to some researchers. However, as the years went on, more and more encounters with these bizarre and unsettling characters surfaced.
One of the earliest encounters with a Black-Eyed Child occurred almost half a century earlier, in Virginia in 1950. The account comes to us from the research files of David Weatherly, with the witness being a 16-year-old boy named “Harold” in the report. On the afternoon in question, Harold was making his way home from school when he came across another boy, approximately the same age, leaning against a fence next to the footpath. Harold said hello to the boy, but he didn’t respond. Thinking the boy hadn’t heard him, Harold went on his way. However, a moment later, the boy stepped out and stated, “I want to go to your house – you’re going to take me to your house!”
It was when the boy turned to face Harold that he could see he had jet back orbs for eyes, with no white visible at all. Harold immediately thought that he should run away from the boy, but no sooner had the thought entered his mind than the boy spoke to him again, stating, “Now, don’t you run away from me, you’re going to take me to your house!” Harold stared at this menacing youth a moment longer before turning and sprinting away as fast as he could. He didn’t stop until he finally arrived home. He recalled, however, that as he was running, he could hear a piercing scream similar to a bobcat; a sound he was almost certain came from the black-eyed boy. 
He immediately told his parents of the encounter, who, despite the bizarre nature of the claims, believed what he was saying. So much so, in fact, that his father retrieved his gun and went in search of the assailant who had threatened his son. Meanwhile, his mother, convinced that Harold had encountered the Devil himself, took Harold to a local priest so that he could be “cleansed of the evil influence”. Just what Harold encountered that afternoon as he made his way home remains a complete mystery, but there are many more encounters to explore. 

Around a quarter of a century later, in the autumn of 1974, on the other side of the Atlantic in the small village of Aisne in the Picardy region of France, another disturbing encounter unfolded, another, incidentally, documented by the previously mentioned David Weatherly. On this particular afternoon, at around 3 pm, “Alain G” and “Patrick V” were driving through the small village when they drove past a rather ominous-looking house, or more to the point, five ominous-looking “figures” that were standing in the garden of the property. Moreover, these figures appeared to be staring directly at the two motorists. 
The two witnesses stared at the figures for several moments, noting that each of them wore the same, identical garments. Each of them was around four to five feet tall, and each had long hair down to their waist. Most disturbing of all, though, each of the figures had “solid black eyes” that filled the two men with fear. When the figures began beckoning the two men to enter the property, this fear increased, and the men put the car in motion and drove away as quickly as they could. After calming themselves, the two men returned to the property a short time later, but the figures were no longer there. They did, though, happen to speak to a neighbor of the strange property who informed them that the strange figures were often seen in the yard, simply staring out in an effort to entice anyone who might pass by into the garden. 
In more recent times, in Ohio in July 2010, a worker at a data center had an encounter with two Black-Eyed children while taking a cigarette break on a night shift. On the night in question, at a little after 5 am, the witness (named only by his online tag as Noetic) was smoking his cigarette just outside the door of the building when he suddenly noticed what appeared to be two teenage boys standing across the street. Much like the other encounters we have explored, as soon as he noticed them, he felt an unexplained sense of anxiety and uneasiness wash over him. When he realized the two figures were seemingly staring straight at him, this uneasiness morphed into intense fear. He quickly finished his cigarette and went back inside the building. 
Once inside, the fear began to lessen, and ten minutes later, he was back to work, the encounter largely gone from his mind. Then, the intercom on the front door of the building – the same place he had smoked his cigarette – was pressed. He immediately turned to the monitors, not least as there were hardly any night calls at this time. On the screens, he could see the two boys who had been standing on the other side of the street. Tentatively, he spoke into the intercom, asking the two boys what they wanted. No response came back, but one of the boys motioned into the camera that Noetic should come outside to see them. He remained where he was, speaking into the intercom once more, telling the two boys that they should leave. 
He then turned away from the monitor and returned to work, hopeful that the two boys would realize he was not going to venture outside and would go on their way. However, when he turned to the monitors again several moments later, both of the boys were staring directly into the camera. Moreover, Noetic couldn’t shake the notion that they were staring through the monitor directly at him, even though he knew this wasn’t possible. He returned to his work, doing his best to ignore the two boys, feeling sure they would get bored and leave. However, when they were still there ten minutes later, Noetic decided to go to the door and confront the pair. 
He approached the front door of the building, but before he opened the door, he looked through the one-way glass to get a close-up look at the disturbing pair. When he did, though, he could see that the two youngsters didn’t look like normal teenage boys at all. He could now see that where their eyes were was nothing but total blackness. He took a moment to process what he was seeing, and once more, decided to confront the two boys and tell them to leave or he would call the police. As soon as he opened the door, however, it seemed the two boys had read his thoughts, with one of them saying to him, “That will not be necessary – we simply need to use your phone. Can you let us in?” Noetic refused, stating that only employees were allowed in the building before returning inside and pulling the door firmly shut. Once back at his desk, he took a look at the monitors. He could see that one of the boys had made his way to the other side of the street once more. The other, though, was still outside the front door of the building, staring into the security camera, once more, as if he was looking directly at Noetic. Noetic eventually called the police, but by the time they arrived at around 6 am, both of the boys had vanished. 
Only two years later, in November 2012, in Northeast Louisiana, a particularly unsettling encounter with Black-Eyed Children unfolded. The account came to light in September 2015 when the witness spoke of the incident on Darkness Radio. According to the report, at around 3 am on the night in question, the witness was in the middle of their night shift at a 24-hour gas station when the area experienced a sudden power cut, plunging them into complete darkness. Using the torch on his mobile phone to see, he made his way to the backup generator and powered it up. Within moments, the back-up lighting came on, which lit up the till register and the parking lot, although the rest of the gas station, like the surrounding area, remained in total darkness. 
As there had been high winds in the region, the witness assumed this to be the cause of the blackout, and so he returned to the till register and waited for the power to be restored. However, as he stared blankly out of the window, he suddenly noticed something moving at the edge of the blackness that surrounded the gas station. He immediately focused on the movement, eventually making out what appeared to be three young children riding bikes. Whether coincidence or not, as soon as he recognized them as children, two of them brought their bikes to a sudden stop and got off them, heading straight for the locked door of the gas station kiosk. Instead of trying to open the door, however, the two children – a boy and a girl, each aged between nine and 12 years old – simply stood there, staring inside. 
Although he was beginning to feel a little more unsettled at this point, the witness made his way to the front door and opened it. Rather than coming inside, though, the two children simply stood there, completely motionless. The witness asked the two youngsters if they were okay, pointing out that it was extremely late for them to be out on their own. Instead of answering him, however, the young girl asked if she could use his phone. He immediately reached for his mobile and went to hand it to her. When he did, though, she refused to take it, saying instead, “No! I need the real one”, motioning to the landline that was on the wall. It was at this point that the witness caught a glimpse of the young girl’s eyes, noticing immediately that they were completely black.
As soon as he saw the jet-black orbs, the witness slammed the door shut and locked it. Through the locked door, the youngster asked again to use the phone. Trying his best to stay calm and not show any signs of fear, the witness stated that the children should “go home” as it was late. Instead of doing as he suggested, the two children remained at the doorway, staring in through the glass. Then, after several moments, they both turned around and made their way back to their bikes, joining the third child, who had remained on the outskirts of the gas station parking lot. A moment later, all three of the youngsters took off into the darkness on their bikes. 
The following morning, when his shift was finished, the witness reported the disturbing incident to his manager, asking him to look qt the CCTV footage to see if it had picked up the strange children. However, because of the power outage, the CCTV had stopped recording, and consequently, no footage of the encounter was captured. Of course, we might ask if the power outage was caused by the three strange youngsters or whether it was nothing but a coincidence. 
Two years after that, in September 2014, in the United Kingdom, an article appeared in several national newspapers regarding several encounters with a Black-Eyed Girl of Cannock Chase, something that UK researcher Lee Brickley had been investigating for several years. According to Brickley’s report, a local woman was on the chase when she heard a sudden piercing scream ring out, leading her to believe that a young child was in trouble. She immediately made her way to where the sound was coming from, although she couldn’t see anything out of the ordinary. Then, however, she got a sudden feeling that someone – or something – was behind her. 
She spun around immediately, and there behind her was a young girl wearing a white dress with her hands completely covering her eyes, “as if she was waiting for a birthday cake!” The woman watched the young girl for several seconds, who remained completely still and silent. Cautiously, the woman approached the youngster, asking if she was okay as she approached. Instead of answering her, however, the girl simply removed her hands from her eyes and stared straight at the woman. The witness later stated, “That’s when I saw they (her eyes) were completely back – no iris, no whites, nothing!”

Now feeling beyond terrified at the surreal scene before her, the woman reached for her daughter and ran from the scene as fast as she could. As she did so, she glanced behind her, worried that this strange figure would be following her. However, to her shock, the girl was nowhere to be seen, as if she had vanished into thin air. 
Interestingly, Brickley’s aunt had a very similar encounter when she was only a teenager in 1982. According to what he informed the newspaper, his aunt was on the chase when she heard a young girl calling for help. When she turned in the direction the calls were coming from, she could see a young girl wearing a white dress who appeared to be running in the direction away from her. Worried about the youngster, Brickley’s aunt ran after her, eventually catching her up. She put a hand on the young girl’s shoulder in an effort to turn her around and check that she was okay. However, when the young girl faced her, Brickley’s aunt could see that where her eyes should have been, there were just two jet-black orbs. The pair stared at each other for several seconds before the girl turned around once more and ran in the opposite direction, eventually disappearing into the distance. Incidentally, Cannock Chase is a hotspot of such activity, with reports of everything from the Black-Eyed Girl to UFOs and even cryptid creatures. 
Without a doubt, one of the most disturbing encounters with Black-Eyed Children occurred one bitterly cold night in January 2016 in Vermont in the United States. On the night in question, in the middle of a snow blizzard, an unnamed husband and wife were woken suddenly by the sounds of knocking at their front door. As perplexed as they were, they both got out of bed, wondering who would be knocking at their door in such atrocious conditions and at such a late hour. Perhaps, they reasoned, someone had broken down outside and theirs was the first house they had come to. Before opening the door, the woman peered outside. Although she was able to see two sets of footprints in the freshly fallen snow, she couldn’t see any sign of a car on the road. 
Then, the knocking at the door came again, and although she couldn’t explain why, she suddenly felt a great sense of unease. It was at this point that she ensured her husband was beside her, and as the knocking came again, he made his way to the front door and prepared to open it. There on the doorstep was not a stranded motorist, but two young children – a boy and a girl – each around eight years old. As soon as the woman saw the two children, the unease in her increased, and she even began to feel a genuine sense of fear. At the same time, she noticed how inadequately dressed they were for the brutal, snowy conditions, and, despite the growing unease inside her, she invited the pair inside. 
They accepted the invitation, and she promptly led them to the living room. Interestingly, and perhaps something that should have been taken as a warning, as the children walked into the house, the couple’s two cats suddenly appeared extremely agitated, with one of them even hissing at the youngsters. She brushed it off as nothing to worry about and told the children to make themselves comfortable on the sofa, asking them if they would like a hot chocolate. However, instead of answering her, the pair simply stated, “Our parents will be here soon!” It was only later, after the pair had left, that the woman realized that whatever she said or asked them, this was the only response they gave, as if they couldn’t speak English but had managed to recall this particular phrase, at least to begin with. 
At this point, the woman left the room and went into the kitchen to prepare the hot chocolates. When she returned around a minute later, the woman noticed for the first time that where the children’s eyes should have been, there were just “two jet-black balls”, similar to two gigantic pupils. Upon seeing this, she stared at them in shock for several moments, eventually managing to compose herself despite the increasing fear she felt about the entire situation. Then, both of the children stood up and asked in unison if they could use the bathroom. The woman replied that they could and that it was at the end of the hall. The youngsters headed in that direction without responding. Whether coincidence or not, as soon as they did, the woman’s husband’s nose began to bleed. Then, a moment after that, the power in the property went out, plunging everyone into darkness, with the only light in the house being that which came from outside through the windows. It was as she was reaching for a tissue in this limited light that the woman realized the two children were standing at the end of the hall, watching them silently.
After several seconds, the two children suddenly came to life, both exclaiming, “Our parents are here!” before making their way to the front door. They opened it and stepped outside into the bitterly cold, icy night. The woman headed towards the front door, eager to shut it as quickly as she could. Before she did so, however, she could see the two children stepping into a black car, next to which stood two mysterious and ominous-looking men, each dressed in the same style dark suit, as if they were part of a security unit. She was almost positive there had been no car outside their property when the children had arrived, and he didn’t recall seeing the headlights of the vehicle approaching the house, which, given there was no light inside the property, she surely would have done. 
When the two children were inside the car, the two men got in also, and it moved away, disappearing into the night. As soon as it did so, the power in the house suddenly came back on. In a bizarre and tragic twist, both witnesses experienced ill health in the weeks and months that followed, with both of them regularly having nosebleeds. Although they couldn’t explain it, both were certain that this sudden downturn in their health was a direct consequence of their encounter with the two strange children. 

It is interesting that the last encounter we have examined would appear to have a direct connection to the Men in Black, if we assume that the mystery gentlemen who arrived to pick up the pair were indeed the infamous group, and now would be a good time to turn our attention to these equally mysterious and disturbing organizations.
Although, as we shall examine shortly, the Men In Black appear to have had a presence on Earth for centuries, one of the first reports to captivate the wider public occurred in the winter of 1966, when Woodrow Derenberger had several interactions with a man who claimed he was called Ingrid Cold, a person who approached Derenberger on a lonely road after a UFO had landed close up.
Another intriguing encounter occurred in the early 1970s when Dr. Hopkins, who had been investigating UFO sightings for several years, claimed to have received an out-of-the-blue visit from a strange man dressed in a black suit, black hat, and a large black coat. When this mysterious visitor removed his hat, Dr. Hopkins could see that he was completely hairless and overly pale. Ultimately, this strange gentleman “recommended” that Dr. Hopkins cease his UFO research before stating that he had to leave as his “energy was running low”. 
One of the most thought-provoking encounters with the Men In Black, however, happened several years before each of these at the start of the 1960s, and it is to that account we will turn our attention next. 
In November 1961, Paul Miller, along with three friends, was returning home in North Dakota from a hunting trip. It was as they were making their way along the quiet highway that they noticed a strange-looking object overhead, which proceeded to land in a field by the roadside. To begin with, the four friends thought they were seeing a small plane make an emergency landing, and so they slowed their vehicle in case those involved required help. However, as they approached close to where the object had come down, it simply disappeared. 
They continued on their way, each of them rather perplexed by what they had seen, and unable to offer a rational explanation. Several moments later, however, the object suddenly reappeared, and this time, two humanoid figures emerged from inside of it. Miller brought their vehicle to a stop and stepped outside. He raised his gun and fired it at the two strange humanoids, appearing to wound one of them. Now fearful of this bizarre scenario unfolding in front of them, Miller jumped back into the car and they drove away as fast as they could. It was only when they were approaching the town of Minot that the men realized they couldn’t account for the last three hours. Realizing something out of the ordinary had taken place, the four men agreed to keep the encounter to themselves and not report it. The following day, however, things took an even stranger turn. 
Miller, despite still feeling shaken by the bizarre events of the previous evening, went to work at his Air Force office. Not long after he arrived, three men in black suits arrived asking to speak with him. Miller asked to see their identification, something they declined to show, stating only that they “worked for the government”. They then stated to him that they “hoped he was telling the truth” about the UFO he witnessed, something that froze Miller on the spot. He asked how they knew about the incident, given that he and none of the other witnesses had reported it, to which the men simply stated they had “had a report”. Miller later recalled that these men “knew everything about me; where I worked, everything”, adding that even how they asked questions about the sighting, it was clear that they already knew the answers, and, as such, would know if he was lying. Miller was sufficiently shaken by the meeting, so much so, that it was several years before he finally reported the incident to UFO investigators. 
A very similar encounter occurred several years later in July 1967 in Toledo, Ohio, when Robert Richardson was driving to a meeting of the Aerial Phenomena Research Organization (APRO). Richardson recalled that as he was rounding a bend in the road, he was suddenly confronted with a bizarre object that had suddenly appeared in front of him. He didn’t have time to fully apply the brakes, and his car collided with the object, although the impact was minimal. Then, to his utter shock, the object simply disappeared before his eyes. 
He immediately reported the incident to local police, who accompanied him back to the scene of the incident. However, when they arrived, all they found were his tire marks on the road where he had put on his brakes. Richardson returned home, but the encounter swirled around in his mind, so much so that he returned to the scene a short time later. This time, he discovered a “small lump of metal”, which he contemplated could have come from the mystery object. He picked up the piece of metal and took it home with him. 
He thought that would be the end of the incident, but three days later, at around 11 pm, a knock came on Richardson’s front door. When he answered it, he was confronted with two men, both seemingly in their 20s and both dressed in dark suits. Although they didn’t identify themselves, they entered his home and began questioning him, making it discreetly clear that they were privy to knowledge that was not available to the wider public. They stayed for around ten minutes before leaving in a black Cadillac, leaving him a card with a phone number on it. Interestingly, when Richardson tried calling the number a short time later, he received an automatic message that the number was “not yet issued!”

Over the next week, Richardson began to put the episodes out of his mind, believing that whatever had taken place, the surreal events were now behind him. However, one evening, again completely out of the blue, two different men, again dressed in dark suits, arrived at his property. They spoke to him about the UFO he had seen, attempting to convince him that he hadn’t seen or hit anything unusual. However, it was when they mentioned the piece of metal he had recovered that he was rocked somewhat, not least as he had only told two close APRO colleagues about it. Richardson informed the men that the piece of metal had been sent for analysis, to which the men responded that:

“If you want your wife to stay as pretty as she is, then you’d better get the metal back!”

Richardson wondered if these mysterious visitors had obtained information by interrogating the APRO investigators, through phone taps, or perhaps by more paranormal means (something we will explore later). He also noticed that while one of the men spoke perfect English, the other had a heavy, unidentifiable accent. There was something “vaguely foreign” about them.
Two decades later, one of the most chilling Men In Black encounters on record unfolded in Wytheville, Virginia. In early July 1987, radio journalist Danny Gordon was working for the country music radio station WYVE when he became aware of a UFO report from the Sheriff’s department, with several of the witnesses being serving police officers. Although he had no real interest in such matters, and he was skeptical of the report, as it was his hometown, he decided to investigate the sighting further and then presented a “light-hearted” piece on his show. To his surprise, as soon as the show aired, multiple listeners rang in to report their own sightings. In fact, there were so many reports from listeners that he set up a program dedicated to such reports, describing the response as a “lightning rod moment”. Indeed, the more reports from listeners that came in, the more people reported their own encounters, with descriptions tending to be of “egg-shaped” objects with “red, green, and white flashing lights” around them. 
Although Gordon believed that his listeners were definitely seeing “something”, he was still certain that a rational explanation could be found. The military, for example, saw fit to comment that what people were witnessing was nothing more than military aerial refueling missions, something that was rejected by many people. Gordon looked to clarify this explanation and contacted an Air Force General at the Pentagon. He was told that such refueling missions would only occur at an altitude of over 13,000 feet, and “under no circumstances” would they take place below this. As many of the reports were of objects at an approximate altitude of around 5000 feet, the military explanation suddenly seemed on shaky ground 
At this point, Gordon sought the help of his friend Roger Hall to assist with the investigations. They decided they needed to see one of these objects for themselves, and so began traveling to locations where they had been reported. They spent several hours in one such location but didn’t spot anything out of the norm, and so decided to drive toward the main town. It was during this journey that the men spotted a “very unusual object coming across the horizon”. Gordon brought their vehicle to a stop so they could take in as much detail as possible, describing the object as “very large” with a “dome-shaped top” and a “strobe putting out multi-colored lights from the right side”. Hall described the object as being the size of “two football fields” with “three huge picture windows” at the back and moving at an altitude of around 1000 feet. Stranger still, Gordon reported seeing a red orb-like object approach the larger craft and dock with it.
The pair were so shocked by what they were seeing that they completely forgot to take any photographs of the aerial anomaly, but when they returned to the location the following evening, they managed to capture several images, although the images themselves were blurred and only captured part of the object. By this stage, Gordon realized they were investigating something of importance and so arranged for a press conference so as to reach a wider audience. The night before the press conference, however, things took an ominous turn when Gordo received a rather unsettling phone call from a mysterious individual who declined to identify themselves. Ultimately, he was told that “the CIA and the Federal Government” were very interested in the sightings that had been reported in Wythe County, and that he should “leave it alone” and not “mess in defense matters”. 
Not deterred, Gordon went ahead with the press conference. However, when he returned home the following evening after his regular radio show, he was shocked to find his home had been broken into. Despite the carnage and mess he found the place in, it didn’t appear that anything had been taken, although he was now beginning to question just what he had become involved in, and even his wife urged him to pull back a little from his investigations. The reports, though, continued to come in.
Things settled down somewhat for several weeks. Then, Gordon, along with his wife and daughter, witnessed another of these mysterious aerial vehicles. They had spent the day at a shopping center and were heading back to their car when they noticed several children looking upward and pointing to the sky. They turned their attention to where the children were looking and were shocked to see “four different aircraft flying in formation”. Moreover, the objects, despite their size, moved in complete silence. Realizing he had his camera with him, Gordon once more managed to capture a photograph. However, coincidentally or not, the moment after he had done so, all four of the objects vanished. He estimated that around 200 people witnessed this event alone, and by early October – around three months after his initial show detailing such sightings – he had in excess of 1500 reports in his files. 
It wasn’t long after this mass sighting that Gordon received another chilling phone call at his home. This time, the person claimed they were a “retired military intelligence officer” who told Gordon to record their conversation “in case anything happened to him”. This former intelligence officer then stated that he, too, had investigated UFO sightings for years, and that he had also received interrogating phone calls and outright threats. Most concerning, though, were his claims that as a consequence of his actions, his son had been “given” leukemia, from which he had sadly died. He then warned Gordon that “they will try to hit you if they think it is advisable for their purposes”, and they would do this with “skin contact chemicals” placed on his door handle or his steering wheel. Moreover, he was warned he would almost certainly be unaware of such action until he became ill. Incidentally, part of this conversation was aired on the television show Unsolved Mysteries several years later. 
Needless to say, Gordon was shaken by what he was told and now began to reconsider his investigations into such matters. Then, several weeks later, Gordon received a visit at his home from two men who claimed to be journalists who were interested in his work. Both appeared professional and neatly dressed, and so Gordon agreed to be interviewed. The interview lasted around 45 minutes, with one man speaking to Gordon and the other casually walking around the house, every now and then taking a picture. Then, the two men left, giving Gordon a card with their contact details on and promising to send him a copy of the newspaper with the interview in it. Several days passed, and when no newspaper arrived at this property, Gordon contacted the newspaper to ask if the article had appeared. To his shock and growing uneasiness, he was informed that the newspaper had no journalists under the names he had given working for them. Moreover, they had no plans to run an article on his investigations. 
This revelation caused Gordon to recall the interview, and he realized just how much information the two men–whatever they were–had obtained from their visit, not only what he had willingly told them, but from them speaking with his wife and daughter, as well as viewing all of his photographs. He then recalled the man who had wandered around his home during the interview. When he checked his negatives from the shopping center sighting, he discovered they were missing. 
These latest disturbing events proved to be the breaking point for Gordon and his family, with his wife moving out of the house with their daughter, terrified at who might call at their home next. Although Gordon didn’t receive any more visits from mysterious gentlemen, nor receive any further unsettling phone calls, he suffered a heart attack not long after, believed to have been caused by stress. He, too, eventually left Wythe County, stating several years later that if he could go back in time, he would “not report the UFO story”, adding that it had caused “too many problems” in his life. We should contemplate that the so-called journalists were Men In Black, and it was perhaps they who were behind the many problems, break-ins, and phone calls Gordon received, and, on this occasion, their tactics appeared to work. 
It isn’t just in the United States that these encounters with Men in Black take place. There are many such reports from all over Europe (some of which, as we shall see shortly, are on record from hundreds of years previously. One of the most unsettling of these Men In Black cases from outside of the boundaries of The West unfolded in Tokyo, Japan, and comes to us from the research files of respected researcher and fellow Mysterious Universe writer, Brent Swancer. 
The basic account features a UFO enthusiast named Nobu, who had managed to capture several pieces of footage of UFOs over central Tokyo. After working late one evening at his office, Nobu was riding home on the late-night bus. To begin with, he was the only passenger. However, after several stops, a strange “elderly gentleman”, who was dressed entirely in black, got on the bus also. Despite the bus being empty other than Nobu, this man chose to sit in the seat directly opposite his, something that immediately unnerved him. Nobu faced forward, not wanting to make any kind of eye contact with the strange man, although he occasionally stole a sideways glance at him. When he did, he could see the man was looking out of his window, although not at the moving terrain outside, but to use the window as a make-shift mirror to watch Nobu.
Eventually, Nobu turned to face the man to take in as much detail as possible. He could see that the man’s suit was ill-fitting and loose, while on his lap, he had a black, leather briefcase that he fidgeted with constantly. The man also wore a strange, black hat that was a cross between a bowler hat and a fedora. Most unsettling of all, though, was the man’s unusually long, thin fingers, as well as his skin, which appeared to have streaks on it, as if he was wearing some kind of make-up that was running and so revealing a much paler skin underneath. 
So unsettled was Nobu that he decided to get off the bus a few stops early, not looking back at the man once. As he stepped onto the street and the bus pulled away, however, he decided to take a look at the vehicle towards the window seat where the disturbing man had been sitting. To his utter shock, though, the man was no longer there, and the bus was empty. Had he gotten off the bus unseen? It seems unlikely. Whatever the truth, Nobu was deeply disturbed and unsettled by the encounter. 
While the Men In Black encounters we have explored so far have all taken place in the modern era, many accounts stretch much further back in time, many of which are documented in the book Casebook on the Men In Black by Jim Keith. Keith points out, for example, that the moniker “the Black Man” was often synonymous with Satan in the Middle Ages, although it is perfectly possible that these shadowy figures were the same figures we would recognize as the Men In Black in our modern era. 

One of the earliest accounts Keith documents involved two shepherds in France in 1520, who confessed to meeting a “tall, dark man” who told them he was “the Devil’s bondsman”. This shadowy figure seemingly influenced the shepherds to do their bidding, and they went on to murder five people before eating their victims, crimes for which they were executed. A similar incident occurred just over half a century later, also in France, in 1577, when a woman named Catherine Doree encountered a “tall, dark man” who convinced her to sacrifice her own child. 
Around a decade after that, in Great Britain, Dr. John Fian was accused of plotting to kill the future King James I and was put on trial for witchcraft and for being a part of a witches’ cabal. One of those on trial with him, Agnes Sampson, stated during the proceedings that they had regularly conversed with a strange, mysterious man who was dressed in all-black clothing and wore a black hat. This man, Sampson offered, had a face that was “terrible”, glowing eyes, and claw-like hands.
A particularly intriguing encounter unfolded in Salem, Massachusetts, in 1692, and adds another layer of nuance and complexity to these mystifying encounters. According to the account, a “West Indian slave” claimed to have met a particularly “tall man with white hair in black clothes”. It is not entirely clear what the purpose of this meeting was from the tall man’s perspective, but the witness claimed he was accompanied by an equally tall creature who was “hairy” all over but who stood “upright like a man”. Could this hairy man have been a Bigfoot, a creature often seen in locations of UFO sightings, which themselves have a connection to the Men In Black? 
One last thing to mention here are apparent sightings of these Men In Black figures during times of plagues and outbreaks of disease. Perhaps the most infamous of these is the Black Death, records of which, as limited as they are, document several strange sightings of “black-cloaked men” seen spraying some kind of mist in wheat fields. Chris Pittman even notes that some witnesses reported seeing these strange, dark-clothed men “mowing down wheat” with “scythes” that made a strange “swooshing sound” but did not cut the wheat. As Pittman speculates, could these scythes actually have been some kind of technical device? Moreover, could these mysterious, cloaked men have given rise to claims of the Grim Reaper, who, in turn, could have been the Men In Black of the Medieval Age? 
These are just a small handful of these encounters with “tall, dark” men, usually dressed in black clothing that can be found across the centuries from the 1500s onwards, and we can only imagine how many others might have gone unrecorded in the centuries before that. Were these strange individuals the Men In Black of their age, and if so, perhaps we need to readjust what the Men In Black’s agenda might be in our modern world. It is interesting to note that there are no accounts of these tall, dark men that are in the same time window as strange “bronze shields” or “ships” being spotted in the skies. Moreover, are these tall, dark entities somehow connected to the Black-Eyed Children, perhaps as a different manifestation from the same source? 
Indeed, we should perhaps remind ourselves of the words of Albert Bender, who, after his research resulted in arguably one of the first books on the UFO subject to gain traction in the wider public arena, received a visit from the Men in Black, and shortly after this visit, Bender pulled back significantly from his research. He would, though, eventually state that the Men in Black’s “true form” was so “monstrous” that they used their Men in Black appearance to disguise themselves. If this is true, then, once more, might we imagine that the Black-Eyed Children might be another “form” of these strange figures? Indeed, it is interesting to note that those who have encountered the Men In Black, even in the modern era of the 2000s, claim their attire and general appearance appear to be locked into the late 1940s and 1950s, when the Modern UFO era began. Might we find that future encounters with Black-Eyed Children would see these strange youngsters have the appearance and clothing of 1990s children?
There are also other clues as to the presence of the Men In Black and the Black-Eyed Children in the many myths, legends, and folklore around the world. If we go all the way back to the ancient Egyptian civilization and its mythology, we find the god Anubis, who was often depicted as a tall, cloaked figure who acted as a guardian of the dead and a judge of souls. In Mesopotamian legends, we can find tales of the Apkallu, who are often associated with hidden teachings and esoteric knowledge, and, of particular interest to us here, held great influence over humanity, something that we detailed earlier in many of the speculative Men In Black encounters of the Middle Ages throughout Europe. If we stay in Europe for a moment, it is worth mentioning the Alp-luachra of Celtic lore, who seemingly have the same ability as the Black-Eyed Children to instill unexplained fear in those they encounter. 
With all of this in mind, then, the overriding question is whether there is a connection between the Black-Eyed Children and the Men in Black? If we recall the 2016 encounter with the Black-Eyed Children in Vermont, for example, it appears the men who arrived to collect the children were, for all intents and purposes, the Men in Black. It is worth noting such details as witnesses to both of these strange entities being left confused and frightened, as well as the notion, particularly with the Black-Eyed Children, of having to be invited into a building before they can enter (perhaps reminiscent of vampire legends). 
Ultimately, if there is a connection between these two mysterious figures, then we might ask, for what purpose do they interact with humanity? While the answer to that question eludes us, one thing that would appear to be certain is that these interactions are not for humanity’s benefit. 

The Potentially Shared and Unexplained Agenda of the Black-Eyed Children and the Men In Black! Read More »

2025 11 17 04 37 08 1024x661 1

Amelia Earhart Declassified: New Government Records Released and Indexed by The Black Vault

Amelia Earhart’s disappearance in 1937 remains one of the most enduring mysteries in aviation history, inspiring investigation, speculation, and government inquiry for nearly nine decades. As federal agencies prepared records across generations, much of the documentation remained scattered, classified, or only partially accessible to the public. That situation changed in 2025, when President Donald J. Trump ordered the release of government records “related to Amelia Earhart, her final trip, and everything else about her.” The directive initiated a government-wide effort to identify, declassify, and publish material across the intelligence, military, diplomatic, and archival communities, culminating in the first comprehensive public release of federal Earhart records.
{ Click here to immediately jump to The Black Vault’s Amelia Earhart Search Engine }
On November 14, 2025, the Office of the Director of National Intelligence announced the initial posting of these documents. Director of National Intelligence Tulsi Gabbard detailed how the President’s order prompted agencies to locate and review both known and previously overlooked materials. The initial release includes reports, maps, telegrams, weather data, communications assessments, and early investigative records from the immediate days after Earhart vanished. Newly declassified NSA files and other intelligence-derived material are also among the documents now available, reflecting both the scope of the original government response and the degree to which the case intersected with intelligence collection during a period of global tension. Gabbard characterized the release as part of a broader effort to increase transparency, remove unnecessary secrecy, and provide the public with direct access to historical government holdings.Continue scrolling for more…

The National Archives and Records Administration serves as the central repository for this initiative. Many Earhart-related records had been transferred to NARA over the years through routine processes, while others remained siloed within agencies or bound by classification until the new directive forced a government-wide review. As agencies continue to identify additional material, they are required to send the records to NARA for digitization and public posting. The process is ongoing and records will be added on a rolling basis, meaning the full collection will expand over time.
Earhart’s disappearance has long fascinated historians, investigators, and the public because it occurred at the intersection of pioneering aviation, early long-distance radio communication, and rising geopolitical uncertainty. Earhart and her navigator, Fred Noonan, vanished on July 2, 1937, while attempting to reach Howland Island during a globe-circling flight. Despite an extensive naval and Coast Guard search, no confirmed wreckage or remains were ever found. The absence of physical evidence has allowed multiple explanations to persist. Some researchers argue that navigational errors and fuel exhaustion caused the aircraft to ditch into the Pacific. Others suggest Earhart diverted to Nikumaroro Island, where anecdotal accounts and ambiguous artifacts have been periodically cited as possible clues. Additional claims, particularly after World War II, proposed that Earhart may have been captured by Japanese forces, though no definitive evidence has surfaced. Still others have speculated that U.S. or foreign intelligence agencies held data about intercepted signals, search operations, or classified assessments that were never fully acknowledged publicly. The newly released records provide an opportunity to re-examine these claims using primary source material, rather than relying on assumptions or folklore.
The release of previously classified documents also raises questions about why some records were withheld for so long. Many intelligence-era documents, including those involving signals collection, wartime assessments, or sources and methods, were historically classified by default, even when they did not relate to contemporary national security threats. Other files may simply have been overlooked or unprocessed within agency archives until required to be reviewed. The new directive forces a level of disclosure that earlier administrations did not prioritize, allowing researchers to evaluate how much of the historical secrecy was tied to legitimate intelligence concerns, bureaucratic inertia, or gaps in archival processing.
To assist the public in navigating this growing body of material, The Black Vault has created a full-text search engine dedicated to the Amelia Earhart document releases. The tool mirrors the features used in the JFK, RFK, and MLK archives, offering a clean, modern interface that indexes filenames, OCR-converted text, and available metadata. Users can search across the entire collection as it evolves, review individual PDFs, and explore the content using keywords, phrases, and Boolean logic. The search engine will be updated as new sets of documents are added by NARA, ensuring ongoing access to the full digital record.

The release of the Amelia Earhart files represents the first government-backed effort to unify federal records about her disappearance into a single location accessible to the public. While these documents may not resolve the mystery, they offer the most complete and transparent view of what various agencies collected, analyzed, and concluded across decades. Their publication makes it possible for historians, researchers, journalists, and the public to examine the underlying evidence for themselves, without relying solely on secondary interpretations or long-standing speculation. Whether these records ultimately reshape the understanding of Earhart’s fate remains unknown, but they mark a significant step toward illuminating a case that has captivated generations.
Follow The Black Vault on Social Media:

Amelia Earhart Declassified: New Government Records Released and Indexed by The Black Vault Read More »

1 fake flight cancellation texts target travelers

Fake flight cancellation texts target travelers

NEWYou can now listen to Fox News articles!
When your phone buzzes with a message saying your flight is canceled, your first instinct is to panic. Scammers are counting on that. A new travel scam is spreading through fake airline texts that look convincing but connect you to fraudsters instead of customer service.These cybercriminals claim to help rebook your trip. In reality, they’re after your credit card or personal details.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.How the flight cancellation text scam worksThe scam starts with a text that looks like it’s from your airline. It may include your name, flight number and a link or phone number. The message includes urgent language that says your flight is canceled or delayed and tells you to “call this number” or “click to rebook.”PILOT WARNS ‘SHORT-HANDED, STRESSED’ AIR TRAFFIC DELAYS WILL LINGER AFTER SHUTDOWN Scammers send fake flight cancellation texts that look official, using real airline names, flight numbers and logos to trick travelers into calling them. (Kurt “CyberGuy” Knutsson)Once you do, you’re talking to a scammer pretending to be an airline agent. They’ll offer to “help” rebook your flight for a fee. They might ask for payment details or personal information like your birth date or passport number.In some cases, they’ll send confirmation emails that look official to make the lie more believable. AI-generated messages make these scams harder to spot, mimicking airline alerts so well that even frequent flyers can be fooled during busy travel seasons. (Kurt “CyberGuy” Knutsson)Why the scam feels realScammers use real airline names, logos and flight numbers to make their messages look official. Many now use AI tools to generate convincing language and fake confirmations that mimic real airline alerts. These messages often arrive during busy travel seasons or storm delays, which makes them feel even more believable.The Federal Trade Commission (FTC) warns that criminals impersonate airline customer service through fake texts and calls that say your flight is canceled. They use that panic to push you into rebooking or sharing personal details.Meanwhile, the Better Business Bureau (BBB) reports a surge in fake cancellation notices that include phony phone numbers leading straight to scammers.Because these alerts look real and use urgent language, even experienced travelers can mistake them for genuine updates. Staying calm and verifying directly with the airline is the best defense. Staying calm and verifying through official airline apps or websites is the safest way to protect your money and personal information before you take action. (Kurt “CyberGuy” Knutsson)Steps to stay safe from fake flight cancellation textsScammers use fear and urgency to trick travelers into clicking bad links or calling fake numbers. Follow these steps to keep your trip and information safe.1) Verify flight changes only through official airline sourcesAlways confirm flight updates using the airline’s official website or mobile app. Log in directly instead of clicking on links from unexpected texts or emails. Scammers design fake links that look real, but one tap can expose your personal information.PILOT GOES VIRAL FOR REVEALING REAL REASON YOU NEED TO SET YOUR PHONE TO AIRPLANE MODE BEFORE FLYING2) Call only verified airline phone numbersIf you need to call customer service, use the number listed in your booking confirmation, the airline’s app or on its verified website. Never trust a phone number sent by text or social media message. Real airlines will never change their contact information mid-trip.3) Stay calm and spot urgency trapsScammers count on panic. Messages that say “call now,” “act fast” or “your seat will be canceled” are meant to rush you. Slow down and verify before responding. Taking a minute to check the official flight status can prevent you from losing money or data.4) Protect your personal and financial informationLegitimate airline staff will not ask for gift card numbers, wire transfers or your bank login. Use a strong antivirus program to block phishing sites and malware designed to steal personal data if you accidentally click a bad link.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Remove exposed data before scammers find itUse a data-removal service to help scrub your personal details from people-search websites. These sites make it easier for scammers to target travelers by name, location and phone number. Keeping your information private reduces your risk.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com.6) Report suspicious messages immediatelyForward scam texts to 7726 (SPAM) and report fake airline messages to the Federal Trade Commission at reportfraud.ftc.gov. Sharing reports helps agencies shut down active scams and protect other travelers.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysFake flight cancellation scams are spreading fast, especially during busy travel seasons. Stay calm, verify changes through official airline sources, and never click random links or call unknown numbers. Technology makes travel easier, but awareness and caution are still your best defense.Have you ever received a fake flight alert that almost fooled you? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Fake flight cancellation texts target travelers Read More »

1 adaptive power in ios 26 boosts iphone battery life

Adaptive Power in iOS 26 boosts iPhone battery life

NEWYou can now listen to Fox News articles!
Battery life matters more than ever as your iPhone takes on heavier workloads from streaming and gaming to AI-driven tasks. Every extra minute of charge now makes a difference in how smoothly your day runs.With iOS 26, Apple introduced Adaptive Power, an intelligent feature that quietly learns how you use your phone and adjusts performance to stretch battery life when you need it most. It is designed to keep your iPhone running stronger for longer without you having to lift a finger.What Adaptive Power doesAdaptive Power helps your iPhone battery last longer when your daily use increases. It works automatically in the background and learns your recent activity to predict when extra power will be needed. When active, it can make small adjustments, such as lowering screen brightness, limiting background activity or turning on Low Power Mode when your battery reaches 20%.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.APPLE, MICROSOFT HIT $4T MILESTONEIt uses on-device intelligence to understand your habits, then fine-tunes performance without requiring any input from you. Apple notes that Adaptive Power pauses its adjustments during tasks that demand maximum performance, like using the camera or gaming with Game Mode turned on. Adaptive Power in iOS 26 learns your daily habits to extend your iPhone’s battery life automatically. (Apple)How Adaptive Power affects real-world useThink of Adaptive Power as a smart battery assistant that adjusts only when needed. It balances performance and power consumption throughout the day, helping your phone last longer without noticeable slowdowns. It trims energy use in high-demand moments, like recording videos, editing photos or multitasking, without disrupting what you’re doing. When it activates, you might see a small notification letting you know it’s working, but otherwise, it operates quietly in the background. The Adaptive Power feature uses on-device intelligence to adjust brightness, limit background tasks and keep performance balanced throughout the day. (Apple)Make sure you have iOS 26 installedTo use Adaptive Power, your iPhone must be running iOS 26. If you’re unsure, here’s how to check and update:Open Settings on your iPhone.Tap General.Tap Software Update.If you see iOS 26 available, tap Download and Install.Keep your phone plugged in and connected to Wi-Fi during the update.Once the update finishes, restart your phone. The feature activates automatically on supported models.Which iPhones support Adaptive PowerOnly iPhones that can run Apple Intelligence will see this feature. Here’s the list:iPhone 17, 17 Pro and 17 Pro MaxiPhone AiriPhone 16, 16 Plus, 16 Pro and 16 Pro MaxiPhone 16eiPhone 15 Pro and 15 Pro MaxAdaptive Power is on by default for iPhone 17 models and iPhone Air. It’s off by default for iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 16e, iPhone 15 Pro and iPhone 15 Pro Max.While some iPad and Mac models also run Apple Intelligence, Adaptive Power is currently exclusive to iPhones.APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERSHow to turn Adaptive Power onIf you’ve got a newer model like the iPhone 17 or Air, Adaptive Power is already on. For others, it’s just a few taps away:Open Settings on your iPhoneTap BatterySelect Power ModeToggle Adaptive Power to turn it onTo be notified when it activates during the day, turn on Adaptive Power Notifications. Even if you turn off alerts, the feature will continue to extend battery life automatically. Steps to enable Adaptive Power in iOS 26 on iPhone. (Kurt “CyberGuy” Knutsson)What this means for your charging habitsYou may not see dramatic gains every day, but the effect adds up. Adaptive Power could extend the lifespan of your iPhone just by updating to iOS 26. Even though you might still need to charge overnight, the feature can buy you extra hours when you’re away from an outlet. Just remember: battery life often dips briefly after major updates while your system re-indexes data, but it levels out in a few days.Pro tip: Use strong antivirus softwareUse trusted antivirus software as an extra layer of protection for your iPhone. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast and fully protected between iOS updates.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysAdaptive Power represents Apple’s move toward smarter, self-managing devices that adapt to you. By learning your habits and adjusting power use dynamically, it helps your battery last longer without sacrificing performance. It’s one of those invisible upgrades that can quietly make your phone feel newer for longer.Would you trust your iPhone to manage power automatically, or do you still prefer to control it yourself? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Adaptive Power in iOS 26 boosts iPhone battery life Read More »

tiktok malware scam

TikTok malware scam tricks you with fake activation guides

NEWYou can now listen to Fox News articles!
Cybercriminals are again turning TikTok into a trap for unsuspecting users. This time, they’re disguising malicious downloads as free activation guides for popular software like Windows, Microsoft 365, Photoshop and even fake versions of Netflix and Spotify Premium.Security expert Xavier Mertens first spotted the campaign, confirming that the same kind of scheme was seen earlier this year. According to BleepingComputer, these fake TikTok videos show short PowerShell commands and instruct viewers to run them as administrators to “activate” or “fix” their programs.In reality, those commands connect to a malicious website and pull in malware known as Aura Stealer, which quietly siphons saved passwords, cookies, cryptocurrency wallets and authentication tokens from the victim’s computer.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.3,000+ YOUTUBE VIDEOS DELIVER MALWARE DISGUISED AS FREE SOFTWARE Cybercriminals are using fake TikTok videos to trick users into downloading malware disguised as free activation guides. (Kurt “CyberGuy” Knutsson)How the TikTok scam worksThis campaign uses what experts call a ClickFix attack. It’s a social engineering trick that makes victims feel they’re following legitimate tech instructions. The instructions seem quick and simple: run one short command and get instant access to premium software.But instead of activating anything, the PowerShell command connects to a remote domain named slmgr[.]win, which downloads harmful executables from Cloudflare-hosted pages. The main file, updater.exe, is a variant of the Aura Stealer malware. Once inside the system, it hunts for your credentials and sends them back to the attacker.Another file, source.exe, uses Microsoft’s C# compiler to launch code directly in memory, making it even harder to detect. The purpose of this extra payload isn’t fully known yet, but the pattern follows previous malware used for crypto theft and ransomware delivery.META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE Those short “activation” commands secretly connect to malicious servers that install info-stealing malware like Aura Stealer. (Kurt “CyberGuy” Knutsson)How to stay safe from TikTok malware scamsEven though these scams look convincing, you can avoid becoming a victim with the right precautions.1) Avoid shortcutsNever copy or run PowerShell commands from TikTok videos or random websites. If something promises free access to premium software, it’s likely a trap.2) Use trusted sourcesAlways download or activate software directly from the official website or through legitimate app stores.3) Keep security tools updatedOutdated antivirus or browsers can’t detect the latest threats. Update your software regularly to stay protected.4) Use strong antivirus softwareInstall strong antivirus software that offers real-time scanning and protection against trojans, info-stealers and phishing attempts.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com5) Sign up for a data removal serviceIf your personal data ends up on the dark web, a data removal or monitoring service can alert you and help remove sensitive information.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com6) Reset credentialsIf you’ve ever followed suspicious instructions or entered credentials after watching a “free activation” video, reset all your passwords immediately. 7) Reset passwordsIf you’ve ever followed suspicious instructions or entered credentials after watching a “free activation” video, reset all your passwords immediately. Start with your email, financial and social media accounts. Use unique passwords for each site. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com8) Enable multi-factor authenticationAdd an extra layer of security by turning on multi-factor authentication wherever possible. Even if your passwords are stolen, attackers won’t be able to log in without your verification.  If you’ve followed suspicious steps, change your passwords, enable two-factor authentication, and stay alert for future scams. (Getty Images)Kurt’s key takeawaysTikTok’s global reach makes it a prime target for scams like this. What looks like a helpful hack could end up costing your security, your money, and your peace of mind. Stay alert, trust only verified sources and remember that there’s no such thing as a free activation shortcut.CLICK HERE TO DOWNLOAD THE FOX NEWS APPIs TikTok doing enough to protect its users from scams like this? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

TikTok malware scam tricks you with fake activation guides Read More »

ai ivf treatment

How AI is making IVF more predictable

NEWYou can now listen to Fox News articles!
In-vitro fertilization (IVF) can take a serious toll on families, not only emotionally but financially, especially when every cycle comes with new bills and no clear sense of what the full journey might cost. Gaia Family aims to change that by removing the guesswork around pricing with a blend of tech and AI-driven forecasting. Instead of worrying about unpredictable costs, couples pay a fixed upfront price or monthly installments that cover their planned IVF treatment, medications, embryo transfers and built-in protections if cycles or transfers aren’t successful. It gives families a clearer path forward and support that lasts through the entire process.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.ROBOTS POWER BREAKTHROUGH IN PREGNANCY RESEARCH, BOOSTING IVF SUCCESS RATES Artificial intelligence is giving hopeful parents more clarity about their chances over multiple IVF cycles, helping them plan their journey with clearer expectations instead of guesswork. (Kurt “CyberGuy” Knutsson)How Gaia Family was bornGaia Family was founded by Nader AlSalim, a former Goldman Sachs executive who knew the IVF struggle firsthand. After spending over $50,000 across five IVF rounds in multiple countries, he and his wife finally had a son. The experience left him frustrated by how little clarity the system offered and how emotionally draining the process could be.He saw that most fertility systems were built around procedures, not people. His goal with Gaia Family was to build something different, a program that uses data to empower families instead of leaving them to navigate uncertainty and mounting debt. That personal experience became the foundation of Gaia Family’s mission to bring agency, transparency and compassion to fertility care.TRUMP ROLLS OUT PLAN TO SLASH IVF COSTS FOR AMERICAN FAMILIES THROUGH NEW PHARMA PARTNERSHIP Gaia Family gives families one fixed IVF price with built-in protection and full support every step of the way.  (Kurt “CyberGuy” Knutsson)How Gaia Family’s plan worksChoose your clinic: Gaia partners with more than 100 fertility clinics across the U.S.Get your personalized quote: Your doctor designs your treatment plan, and Gaia uses it to calculate your fixed cost upfront.Start with confidence: Pay monthly or upfront, then begin treatment knowing all your major expenses are covered.If a cycle doesn’t result in viable embryos, Gaia’s built-in protection covers another attempt, helping families try again without financial shock. Once you have viable embryos, your Gaia Plan allows you unlimited frozen embryo transfers (usually $5,000 each) at no extra cost until you have a baby. And, if none of those transfers result in a live birth, then Gaia will give you money towards another cycle. Plus, you have the option of including all of your PGT-A testing and your medication for a fixed cost, so you have even more protection throughout your journey. AlSalim, tells CyberGuy the company’s mission goes beyond technology.”At Gaia Family, we’re using AI not to replace the human element of fertility care, but to bring more confidence to it,” AlSalim said. “Fertility treatment can feel like a game of chance — our technology helps turn it into a guided, informed journey. By analyzing millions of data points, we can forecast the most effective and affordable pathway for each individual, so patients can make decisions grounded in data rather than uncertainty. Ultimately, it’s about giving hopeful parents more agency, transparency, and peace of mind in one of the most emotional experiences of their lives.”SKIN DNA BREAKTHROUGH COULD LET 60-YEAR-OLD WOMEN HAVE GENETICALLY RELATED KIDS For many couples, this combination of data and compassion is transforming uncertainty into confidence and renewed hope. (Kurt “CyberGuy” Knutsson)Why Gaia Family’s model mattersIVF in the United States can cost as much as $30,000 per cycle, and most couples need several tries. Each failed attempt adds more bills and stress. Gaia Family’s fixed-cost model gives families financial predictability while keeping them emotionally supported. It also encourages clinics to focus on outcomes rather than repeated treatments.This approach is transforming how people view fertility care. Instead of relying on luck, families can benefit from AI insights to make better decisions. While it may not lower the medical costs yet, it changes how couples experience one of life’s most emotional challenges, turning fear into informed planning and despair into hope. Gaia removes the spiraling costs, making couples’ outcomes so much more cost-efficient.What this means for youIf you are thinking about IVF or egg freezing, Gaia Family’s model could make your path more manageable. It provides upfront transparency about costs, protection against financial loss and a data-driven forecast of success. It helps you make decisions based on evidence rather than guesswork.Still, while AI can analyze data patterns, it cannot alter biology. Factors like age, health and genetics continue to shape outcomes. Even so, Gaia Family’s system gives couples a sense of control that traditional fertility care rarely provides by serving everyone, with no eligibility criteria in terms of age or health factors. Knowing that your finances are protected can ease stress and allow you to focus on what matters most: building your family. Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysGaia Family is blending AI and empathy to rewrite how fertility care works. It replaces uncertainty with insight and transforms risk into reassurance. For many, it’s not just about technology, it’s about restoring hope and fairness to one of life’s most personal journeys.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWould you trust artificial intelligence to guide your path to becoming a parent? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved. 

How AI is making IVF more predictable Read More »

pennsylvania capitol

Pennsylvania bill seeks to legalize flying cars

NEWYou can now listen to Fox News articles!
Pennsylvania may soon join the few states ready to welcome flying cars. State Sen. Marty Flynn from the 22nd District has reintroduced Senate Bill 1077, also known as the Jetsons Act, during the 2025-2026 Regular Session.The proposal amends Title 75 of the Pennsylvania Consolidated Statutes, creating a new legal category for roadable aircraft. These vehicles would have the unique ability to operate both on public roads as motor vehicles and in the air as aircraft.The legislation was referred to the Senate Transportation Committee on Nov. 5, 2025. Although a similar version failed to pass last session, Flynn remains committed to positioning Pennsylvania as a leader in advanced transportation technology. He believes that laying the groundwork now will allow the state to adapt quickly when these vehicles become commercially viable.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF Lawmakers hope clear rules today will make tomorrow’s skyways as safe as the highways below. (Rachel Wisniewski/Bloomberg via Getty Images)Why this bill mattersTechnology is advancing faster than most laws can keep up. The rise of advanced air mobility is blurring the line between cars and aircraft.Several companies, including Alef Aeronautics, Samson Sky and CycloTech, are developing vehicles that can take off vertically or transform from cars to small aircraft within minutes.Some states are already laying the groundwork for this new era. Minnesota and New Hampshire have passed legislation formally recognizing “roadable aircraft,” making them the first states to treat flying cars as both vehicles and aircraft under state law. Pennsylvania now hopes to follow their lead with its own version through Senator Marty Flynn’s Jetsons Act.At the same time, the Federal Aviation Administration (FAA) has begun approving real-world tests. In 2023, the FAA granted a Special Airworthiness Certificate to SpaceX-backed Alef Aeronautics for its Model A prototype, allowing it to operate on roads and in the air for research and development. That approval marked the first time a flying car received official clearance for combined ground and flight testing in the United States.Senator Flynn wants Pennsylvania to be part of this growing national conversation. In his co-sponsorship memo, he explained that proactive legislation will help the state prepare for the next wave of innovation.WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR? The Alef flying car is made of ultra light material, allowing it to fly and drive on roads. (Alef Aeronautics)How the Jetsons Act would workUnder Senate Bill 1077, Pennsylvania would officially define a “roadable aircraft” as a hybrid vehicle capable of both driving and flying. These vehicles would need to register with the state, display a unique registration plate and meet standard inspection requirements. When operated on highways or city streets, they would be subject to the same rules as other vehicles. When used in flight, they would remain under federal aviation oversight.The bill also clarifies how drivers and pilots must transition between ground and air operations safely. It allows take-offs and landings only in approved areas, except during emergencies. Flynn emphasizes that clear definitions and consistent oversight will prevent confusion for both motorists and law enforcement. He hopes this clarity will also encourage manufacturers to consider Pennsylvania a test site for future flying car technologies.CHINESE AUTO GIANT WANTS TO MAKE FLYING CARS YOUR NEXT COMMUTE OPTION Pennsylvania’s Jetsons Act aims to prepare the state for the future of flying cars before they take off. (CycloTech)What this means for youIf you live in Pennsylvania, this bill could one day change how you think about personal transportation. While flying cars remain in development, legislation like this sets the stage for their eventual arrival. Drivers may one day register, inspect and insure a flying car just like a regular vehicle. Pilots could use the same roadways to reach take-off zones before switching to flight mode.Even for residents who never plan to own a flying car, the ripple effects could be significant. New rules may influence local zoning, airspace management and infrastructure planning. Communities might see new vertiports or designated landing pads as part of urban development. Insurance companies and safety regulators will need to rethink how they handle this new class of hybrid travel.The bill also signals a broader change in how states approach innovation. Rather than waiting for federal action, Pennsylvania wants to establish a framework that welcomes new technologies while protecting public safety.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysSenator Flynn’s Jetsons Act might sound futuristic, but it reflects a growing reality in transportation. As autonomous vehicles, drones and hybrid aircraft evolve, state governments must adapt to keep up. This legislation shows Pennsylvania’s willingness to lead rather than follow. While it may take years before you see a flying car parked in your driveway, the groundwork is already being laid. Lawmakers are thinking ahead about licensing, safety and how to integrate flying cars into existing traffic systems. That forward-thinking approach could one day make Pennsylvania one of the first states to see cars take to the sky.Do you think flying cars will ever be for everyday folks, or will they stay a luxury reserved for the wealthy? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Pennsylvania bill seeks to legalize flying cars Read More »

settlement scam messages

Geek Squad scam email: How to spot and stop it

NEWYou can now listen to Fox News articles!
You open your inbox and see a message titled “Payment order settled” with an official-looking invoice from Geek Squad. At first glance, it looks legitimate. It includes your email address and even a phone number for help. That is exactly what happened when I received one of these messages this week.This new Geek Squad scam email is designed to make you panic, call the fake number and share sensitive information before realizing it is a trap. Before you know it, your curiosity could turn into a costly mistake, so let’s look at the red flags to watch for and how you can protect yourself.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR Fake Geek Squad invoice emails are flooding inboxes, seeking to trick recipients into handing over private financial information. (pixelfit/Getty Images)Red flags that give the scam awayWhen I looked closer, several warning signs stood out:The email said “Dear User” instead of using my name.It also says TO: KAREN HILL, which is obviously not me.The sender’s address was from a Gmail account, not Geek Squad.It listed a phone number urging me to call customer support to cancel the renewal or my account will be debited.The invoice said $580.57 would be charged for a two-year Geek Squad subscription, even though I never signed up for one.These details are meant to create urgency and push you to react before thinking.BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS This fake Geek Squad invoice looks professional, but small red flags, like a generic greeting, expose the scam. (Kurt “CyberGuy” Knutsson)How the scam worksThe scam depends on fear and confusion. Once you call the number, the person on the line sounds polite and professional. They might say they need to verify your payment or reverse a charge. In reality, they are trying to get your credit card number or convince you to install software that gives them access to your computer.In some cases, they claim to refund too much money by accident and ask you to send part of it back. That is how victims lose hundreds or even thousands of dollars.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Scammers want you to panic and call their number. Remember, real companies never ask for sensitive details over the phone or email. (Kurt “CyberGuy” Knutsson)Why these scam emails look so realScammers have refined their tactics. In this Geek Squad scam email I received, they copied the official logo, used clean layouts and included my actual email address to make it look legitimate. They often get this information from data leaks or security breaches found online.Artificial Intelligence (AI) now makes these scams even harder to spot. It helps scammers write natural messages, design fake invoices and create support scripts that sound real. With these tools, they can make almost anyone believe the email is genuine.Always pause before reacting. Read carefully, check the sender and question anything that feels suspicious. If you want to stay one step ahead, here are some other things that can help keep you safe.How to stay safe from scam emailsScam emails like the fake Geek Squad invoice are becoming more common and more convincing. They use fear and urgency to make you click or call before you think. Protecting yourself means slowing down, verifying every detail and strengthening your digital defenses. Here is how you can stay safe.1) Do not call or click anything in the email, and use strong antivirus softwareThe phone number or link in the message connects you directly to scammers, so don’t click or call.  Once you engage, they can pressure you into sharing personal details or even install harmful software on your device. The moment I saw that “Payment order settled” email, I realized something was off because I don’t even have a Geek Squad account. That alone was a major red flag. If you ever get a message about a service you never signed up for, delete it right away. Instead of calling the number in the message, go to the official Best Buy or Geek Squad website to confirm if there is a real issue with your account. Also, sign up for strong antivirus software. Antivirus software acts as your digital guard. It scans downloads, detects malicious links and warns you before dangerous sites load. Choose a trusted program that updates automatically and includes email protection features. This extra layer of defense can prevent malware from taking hold if you accidentally click something suspicious.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.2) Check the sender’s email address carefullyScammers often use email addresses that look real but have slight differences, such as extra numbers, misspelled words, or unusual domains. A genuine Geek Squad or Best Buy email will come from @bestbuy.com. Always hover over the sender’s name to see the actual address before responding.3) Never share personal or payment details with unexpected callersIf someone contacts you claiming to be from Geek Squad or Best Buy, stay calm and skeptical. Real companies do not ask for banking details, gift card payments, or remote access to your computer over the phone. Hang up and contact the company directly through its verified website or customer service number.4) Use a data removal serviceMany scams start with stolen or leaked personal data. A data removal service can help delete your information from data broker sites that sell contact lists to marketers and scammers. Reducing your digital footprint makes it harder for criminals to target you with fake invoices or phishing emails.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.5) Watch your bank and credit card statementsEven with precautions, it is smart to monitor your accounts. Check your bank and credit card activity weekly for any charges you do not recognize. If you see something suspicious, contact your financial institution right away to report and dispute the charge.6) Enable Two-Factor Authentication (2FA)Two-factor authentication adds another barrier between you and scammers. Even if someone steals your password, they cannot log in without the secondary code sent to your phone or authentication app. Turn on 2FA for your email, online shopping and banking accounts.7) Use strong, unique passwordsWeak or repeated passwords make you an easy target. Create long, unique passwords for each account. A password manager can securely store them and generate complex combinations that are hard to guess or crack.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.8) Update your software regularlyOld software is one of the easiest ways for hackers to slip in. Keep your operating system, browser and security programs updated. Turn on automatic updates so you do not have to think about it. These patches often close known security holes that scammers exploit.9) Check official accounts before panickingBefore reacting to any invoice or payment alert, go straight to the official account or service mentioned, such as Geek Squad, PayPal, Amazon or your bank. Log in directly through their website or app to verify the details. If nothing shows up there, the email is a scam. This quick step can save you from a costly mistake.10) Report the email as phishingReporting suspicious emails helps stop scammers from targeting others. Most email services, including Gmail, Outlook and Yahoo, allow you to mark messages as phishing. You can also forward the email to reportphishing@apwg.org, which goes to the Anti-Phishing Working Group (APWG), or to abuse@bestbuy.com to alert the proper teams.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysReceiving one of these fake invoices can be stressful, but remember that many people get the same message every day. The goal is to recognize the signs, refuse to respond and report them to protect others.Have you ever received a convincing scam email like this? How did you handle it? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Geek Squad scam email: How to spot and stop it Read More »