memoment editorial

2 ai powered scams target kids while parents stay silent

AI-powered scams target kids while parents stay silent

NEWYou can now listen to Fox News articles!
Kids are spending more time online than ever, and that early exposure is opening the door to a new kind of danger. Artificial intelligence has supercharged online scams, creating personalized and convincing traps that even adults can fall for. The latest Bitwarden “Cybersecurity Awareness Month 2025” poll shows that while parents know these risks exist, most still haven’t had a serious talk with their children about them. This growing communication gap is leaving the youngest internet users vulnerable at a time when online safety depends more than ever on education and oversight.Young children face real risks onlineChildren as young as preschool age are now part of the connected world, yet few truly understand how to stay safe. The Bitwarden survey found that 42% of parents with children between three and five years old said their child had accidentally shared personal information online.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW AI-powered scams are finding new ways to reach kids who go online earlier than ever. (Kurt “CyberGuy” Knutsson)Nearly 80% of kids between the ages of three and twelve already have their own tablet or another connected device. Many parents assume supervision software or family settings are enough, but that assumption breaks down when kids explore apps, games and chat spaces designed to hold their attention. Device access has become nearly universal by early elementary school, but meaningful supervision and honest safety conversations are lagging behind.The AI threat and the parental disconnectArtificial intelligence has changed the nature of online scams by making them sound familiar, personal and hard to recognize. Bitwarden’s data shows that 78% of parents worry their child could fall for an AI-enhanced threat, such as a voice-cloned message or a fake chat with a friend. Despite that fear, almost half of those same parents haven’t talked with their kids about what an AI-powered scam might look like. The disconnect is even stronger among Gen Z parents. About 80% of them say they are afraid their child will fall victim to an AI-based scheme, yet 37% allow their kids full or nearly full autonomy online. In those households, problems are more common. Malware infections, unauthorized in-app purchases and phishing attempts appear at the highest rates among families who worry the most but monitor the least. The paradox is clear. Parents recognize the threat but fail to translate awareness into consistent action.Why parents haven’t had the talkThere are many reasons this important talk keeps getting delayed. Some parents simply feel unprepared to explain AI, while others assume their existing safety tools will protect their children. Only 17% of parents in the United States actively seek information about AI technologies, according to related research by Barna Group. That leaves a large majority relying on partial knowledge or outdated advice. Many parents also juggle multiple devices at home, making it difficult to track every app or game their child uses. Some overestimate how safe their own habits are, even though they admit to reusing passwords or skipping security updates. Without firsthand understanding or personal discipline, it becomes even harder to teach those lessons to children. As a result, many kids face the internet with curiosity but without proper guidance.Smart ways to protect your child onlineThe Bitwarden findings make one thing clear: kids are getting connected younger, and scams powered by artificial intelligence are already targeting them. The good news is that parents can take practical steps right now to reduce those risks and build lasting online safety habits.1) Keep devices where you can see themSet up tablets, laptops and gaming consoles in shared family areas rather than bedrooms. When screens stay visible, you naturally become part of your child’s online world. This not only encourages open conversation but also helps spot suspicious messages, fake friend requests or scam links before they cause trouble. Staying involved in your child’s digital life is the best defense against today’s AI threats. (Kurt “CyberGuy” Knutsson)2) Use built-in parental controlsMost devices have strong tools you can activate in minutes. Apple’s Screen Time and Google Family Link let you limit screen time, approve new app installs and monitor how long your child spends on specific apps. These controls are especially useful for younger kids who, according to the Bitwarden poll, often have little supervision despite heavy device use.TEENS TURNING TO AI FOR LOVE AND COMFORT3) Talk through every downloadBefore your child installs a new game or app, take a moment to check it together. Read the reviews, look at what data it collects and confirm the developer’s name. Explain why some games or “free” apps might ask for camera or contact access they don’t need. This kind of shared review teaches healthy skepticism and helps children recognize red flags later on.4) Make password strength and 2FA a family ruleAI scams thrive on weak or reused passwords. Use a password manager to create and store strong, unique logins for each account. Turn on two-factor authentication (2FA) wherever possible so that even if a password is stolen, the account stays protected. Let your kids see how you use these tools so they learn that security isn’t complicated, it’s just a habit. Many parents delay important online safety talks because they feel unprepared to explain AI, leaving kids curious but without the guidance they need to stay safe. (Kurt “CyberGuy” Knutsson)Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.5) Teach them to stop and tellOne of the best defenses is simple: encourage your child to pause and talk before reacting to anything unusual online. Whether it’s a pop-up claiming a prize, a strange link in a chat or a voice message that sounds familiar, remind them it’s always okay to ask you first. Quick conversations like these can prevent costly mistakes and turn learning moments into trust-building ones.6) Keep devices updated and use strong antivirus softwareOutdated software can leave gaps that scammers exploit. Regularly update operating systems, browsers and apps to close those holes. Add strong antivirus software. Explain to your child that updates and scans keep their favorite games and videos running safely, not just their parents happy.The best way to safeguard from malicious links that install malware, potentially accessing private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.7) Make online safety part of everyday lifeDon’t save these conversations for when something goes wrong. Bring them up casually during family time or when watching YouTube or gaming together. Treat digital safety like any other life skill, something practiced daily and improved with time. The more normal it feels, the more confident your child becomes when facing online risks. Talking about online safety early helps build trust and awareness before trouble starts.  (Kurt “CyberGuy” Knutsson)What this means for youIf you are a parent, guardian or anyone helping a child use technology, this issue deserves your attention. Start talking early, even before your child begins exploring the web on their own. Teach them simple concepts like asking before clicking or sharing. Instead of relying only on parental controls, have ongoing conversations that help them recognize suspicious links, messages or pop-ups. Show them that cybersecurity isn’t about fear but about awareness. Model strong digital habits at home by using unique passwords and turning on two-factor authentication. Explain why those steps matter. When your child understands the reasoning behind the rules, they are more likely to follow them. Make technology part of your family routine rather than a private space your child navigates alone. Regularly check the apps they use and the people they interact with. Set clear expectations and age-appropriate boundaries that can grow with your child’s experience. Staying engaged is the most powerful protection you can offer.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThe numbers from Bitwarden show a clear warning sign. Concern among parents is high, yet actual conversations about AI-powered scams remain rare. That silence gives scammers the upper hand. Children who learn about online safety early are more confident, more cautious and better equipped to handle unexpected messages or fake alerts. It only takes a few minutes of honest conversation to create awareness that lasts for years. By taking action now, you can close the gap between fear and understanding, protecting your family in a digital world that changes every day.Are you ready to start the conversation that could keep your child from becoming the next target of an AI-powered scam? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

AI-powered scams target kids while parents stay silent Read More »

1 google chrome autofill now handles ids

Google Chrome autofill now handles IDs

NEWYou can now listen to Fox News articles!
Google has made Chrome even more capable. The browser can now fill in your passport, driver’s license and vehicle registration automatically. This upgrade joins the list of time-saving autofill options that already include passwords, addresses and payment details.Desktop users with enhanced autofill enabled will start seeing the new options right away. Chrome can even interpret complex form layouts and varying formats across different websites, improving accuracy with every entry.Google says these new autofill features were designed with privacy in mind. This from a company which makes money off of capturing your most intimate details in life. Google says Chrome only saves sensitive data after you give permission. It also encrypts stored information so it’s unreadable to anyone without your authorization. Before any personal info is filled into a webpage, Chrome asks you to confirm — keeping you in control.UPDATE CHROME NOW: GOOGLE PATCHES NEW ZERO-DAY THREATSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Chrome’s enhanced autofill now saves and fills your passport, license and vehicle info with just a click. (Google)Still, autofill exploits by hackers have been known to happen. Infostealer malware has been used historically to capture data entered into web fields manually and with autofill. It is not perfect, but Google and others have come a long way to secure their browser. Keep in mind, Google may ask to share your information with third parties, so be cautious when you give it permission.Passport numbers, driver’s license details and other official records are valuable to cybercriminals, so be careful when you share them online. As always, use the strongest antivirus protection on all devices to ward off trouble. See my 2025 review of the best antivirus protection at Cyberguy.com.The company began rolling out these updates worldwide in all languages and plans to support even more document types soon. The Google Chrome browser encrypts personal data and always asks for confirmation before entering sensitive information. (Google)How to enable Enhanced Autofill in ChromeFor Windows and Mac (Desktop):Open Chrome on your computer.Click the three-dot menu in the top right.Click Settings.On the left pane, select Autofill & passwords (or simply “Autofill” depending on version).Click Enhanced autofill.Toggle On “Enhanced autofill” to allow Chrome to fill in IDs (passport, driver’s license, vehicle info).To enter or edit saved data: while still in the Enhanced autofill section, select Add/Edit under “Saved information” and input your document numbers or vehicle info.Next time you visit a supported form (e.g., for vehicle registration or passport number), Chrome will prompt you to fill it in and ask you to confirm before submitting it.OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAK You can enable Enhanced Autofill in Chrome settings to securely manage and store official identification data. (Kurt “CyberGuy” Knutsson)For iPhoneOpen Chrome on your iPhone or iPad.Tap the three-dot menu (bottom or top right) and select Settings.Go to Autofill & Payments (or similar label) and verify that “Addresses and More,” “Payment Methods” and “Passwords” are enabled for autofill.For AndroidSettings may vary depending on your Android phone’s manufacturer.Open Chrome on your Android device.Tap the three-dot menu (top right).Go to Settings → Autofill & payments (or simply “Autofill and forms”).Under “Addresses and more” (and possibly payment methods), enable the types of info you want filled in automatically.Note: The enhanced autofill update for passports, driver’s licenses and vehicle details is still expanding to mobile. You may not see it yet on iPhone or Android, even with the latest Chrome version. Keep your app updated and check back periodically as Google continues the global rollout.AI updates are driving Chrome forwardThis upgrade follows a wave of artificial intelligence-driven improvements in Chrome. Recently, Google added Gemini integration for all desktop users in the U.S. and previewed new “agentic” features that use AI to automate everyday tasks. Future updates will include password reset suggestions, smarter scam detection and AI-powered form assistance, all designed to make browsing safer and more convenient.CONGRESSIONAL BUDGET OFFICE HIT BY CYBERATTACK, RAISING CONCERNS OVER US GOVERNMENT NETWORK SECURITY The rollout of Enhanced Autofill continues worldwide, adding support for more ID types and expanding beyond desktop users. (Kurt “CyberGuy” Knutsson)Tips to keep your browser secureEven with encryption, there’s more you can do to protect what autofill stores.1) Use strong antivirus softwareInstall trusted antivirus software on all your devices. It blocks malware that could record your keystrokes or hijack autofill data before encryption kicks in.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.2) Use a password manager instead of browser storageDedicated password managers store and encrypt your logins locally, reducing risk if your browser gets compromised.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.3) Enable two-factor authentication (2FA)Pair your Google account with two-factor authentication (2FA). Even if hackers access your browser, they can’t reach your autofill data without your secondary code.4) Keep your browser and extensions cleanType chrome://extensions and remove anything unfamiliar. Malicious add-ons are a common way attackers steal autofill info.5) Use a data removal serviceEven with Chrome’s encryption, your personal information can still surface on data broker sites. A data removal service sends requests to these companies to delete your personal details, like your address, phone number and ID records, before they can be shared or sold. This lowers the risk of your data being used in phishing attempts or identity theft. Regularly clearing your digital footprint adds another layer of protection for Chrome’s autofill feature. It limits what hackers could use if they ever gain access through a breached website or browser extension.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.6) Use a secure email for verificationIf Chrome requests confirmation, make sure your linked Google account uses a private, encrypted email provider.For recommendations on private and secure email providers that offer encrypted addresses, visit Cyberguy.com.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysChrome’s latest autofill update blends convenience with stronger safeguards. But security still depends on your habits. Taking a few extra minutes to manage extensions, enable 2FA and use privacy tools will go a long way toward keeping your personal data safe.Would you trust your passport or driver’s license info to Google Chrome’s autofill, or is that a step too far? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Google Chrome autofill now handles IDs Read More »

1 va overpayment scam alert for veterans

VA issues overpayment scam alert for veterans

NEWYou can now listen to Fox News articles!
As the nation honors veterans for their service, the Department of Veterans Affairs is reminding the community to stay alert to a growing threat, the VA overpayment scam.Reports show that fraudsters are contacting veterans through text, email and phone calls, pretending to be VA employees. They claim you were overpaid on your benefits and must send money or banking details to correct the issue.These criminals often make their messages look official with VA logos, formal wording and even fake caller IDs. Once they gain your trust, they push for quick payment, hoping you act before verifying. Staying informed and cautious is the best way to protect your benefits and your identity.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter. Scammers are claiming veterans were overpaid on their benefits by impersonating VA employees. (Kurt “CyberGuy” Knutsson)How to spot a VA overpayment scamBe on alert for these red flags:Messages demanding urgent payment, especially by gift card, wire transfer or cryptocurrency.Requests for your VA login or password.Emails or texts with links that don’t lead to VA.gov.Caller ID spoofing showing “VA” or “Debt Center” to look official.Messages or letters that lack detailed explanations or account numbers.If you spot any of these, don’t engage; instead, verify the communication directly through VA.gov or by calling the VA’s official number.HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET Legitimate VA communications always direct veterans to VA.gov or the official Debt Management Center.  (Kurt “CyberGuy” Knutsson) How real VA overpayments workWhen the VA determines an actual overpayment, it sends a formal letter explaining the amount and your options to appeal or set up a payment plan. You’ll never be told to pay through text or third-party apps, and you’ll never be asked to share login credentials or banking info outside VA.gov.Real VA notices always direct you to official channels like VA.gov or the Debt Management Center (1-800-827-0648). If something feels off, it probably is, so always verify before taking action. To protect your hard-earned VA benefits stay alert and verify messages through official channels.  (Kurt “CyberGuy” Knutsson)Top ways to protect yourself from VA overpayment scamsStay ahead of scammers by following these simple but powerful steps to protect your VA benefits.1) Verify through your official VA.gov accountWhenever you receive a notice about an overpayment, log in to your VA.gov account directly instead of clicking any link or responding to a message. The site shows your current balance, payment status and any real debts.2) Use official VA payment channelsIf you discover a legitimate debt, handle it only through VA’s official payment options. Call the Debt Management Center at 1-800-827-0648 or make payments through your secure VA.gov dashboard. Avoid sending funds through apps, wire transfers, or prepaid cards as the VA will never ask for those.3) Never share your login informationYour VA login and password are like your house keys. The VA will never ask for them, not by phone, email, or text. Anyone who requests them is a scammer. If you think your credentials were compromised, change your password immediately and enable multi-factor authentication (MFA) if available.Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE4) Avoid suspicious links and attachmentsFraudsters often embed fake links in messages that look real at first glance. Hover over a link before clicking to preview the URL; if it doesn’t start with “https://www.va.gov,” it’s fake. Be equally cautious with attachments, as they can install malware designed to steal your personal data.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.5) Use a data removal serviceData brokers often publish your name, phone number and even veteran status online, information scammers use to target you. Personal data removal services can automatically request data removals from hundreds of broker sites, reducing your exposure and lowering the odds of being targeted.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.6) Watch out for unusual payment methodsScammers love untraceable transactions. Any request for payment through gift cards, Bitcoin, prepaid debit cards, or wire transfers is an instant red flag. The VA does not and will not use these methods to collect payments.7) Limit your social media exposureScammers sometimes gather information from social networks to make messages seem more personal. Review your friends and followers, tighten privacy settings and think twice before posting details about your military service or VA benefits.8) Report suspected fraud immediatelyIf you think someone tried to scam you, contact the VA directly at 1-800-827-1000. You can also report incidents at VSAFE.gov or call (833) 38V-SAFE (833-388-7233). Reporting quickly helps protect others in the veteran community.Kurt’s key takeawaysThis Veterans Day is a time to reflect on service, sacrifice and strength, and that includes protecting what you have earned. Scammers may be persistent, but staying alert and using official VA resources gives you the upper hand. Your benefits represent more than money; they are recognition of your service. Keep them safe, stay skeptical of sudden messages and verify everything before you act.How can technology companies and the government do a better job of protecting veterans online? Let us know your thoughts in the comments below. Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.CLICK HERE TO DOWNLOAD THE FOX NEWS APPCopyright 2025 CyberGuy.com.  All rights reserved.  

VA issues overpayment scam alert for veterans Read More »

1 aerospace tech startup lets you design your own personal aircraft

Aerospace tech startup lets you design your own personal aircraft

NEWYou can now listen to Fox News articles!
The dream of personal flight has always felt just out of reach, until now. A company called AltoVolo has unveiled something that might make it real: the world’s first eVTOL configurator.That might sound technical, but it’s actually simple. “eVTOL” stands for electric vertical takeoff and landing. Think of a small, quiet aircraft that lifts off like a helicopter but flies forward like a plane, all powered by electric or hybrid engines instead of noisy fuel-burning ones. And a configurator? It’s a tool that lets you design your own version online, choosing colors, materials and other personal details. Put the two together, and you’ve got something quite remarkable: the ability to design your own flying vehicle from your laptop.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF With AltoVolo’s world-first online configurator, you can design every detail of your Sigma eVTOL. (AltoVolo)A new kind of personal aircraftAltoVolo’s aircraft is called the Sigma, and it’s unlike anything on the market. It’s a three-seater hybrid-electric vehicle that combines quiet operation with long range. The Sigma can fly about 500 miles, reach speeds over 220 mph and is more than 80% quieter than a helicopter.That quietness isn’t just about comfort; it’s what makes urban air travel possible. Imagine small aircraft quietly taking off from rooftops or open fields, connecting cities and towns without the noise pollution we associate with helicopters today.Safety is built in, too. The Sigma can keep flying even if one of its small electric jet engines fails, and it carries a ballistic parachute for emergencies. It’s compact and light, just under 16 feet wide and weighing a little over 2,100 pounds, making it easier to operate and store than you might expect. The Sigma is over 80% quieter than a helicopter combining sleek hybrid-electric power with quiet performance. (AltoVolo)From concept to customizationThe idea of customizing your own aircraft might sound futuristic, but AltoVolo’s online configurator makes it surprisingly accessible.Like building your own car online, you can choose colors, seat materials, interior details and even the stitching on your seatbelts. Founder and CEO Will Wood says the company’s goal isn’t to compete on price but on experience and technology.”Much like you’d expect from a supercar brand, we’re focused on performance and refinement,” he explained.The first 100 Sigma models will be limited editions, offering special finishes and materials that won’t appear on later production units.NASA’S ‘QUIET’ SUPERSONIC JET COMPLETES FIRST FLIGHT IN POTENTIAL BREAKTHROUGH FOR COMMERCIAL AIR TRAVELTaking flight before you take offAltoVolo isn’t stopping at online design. They’ve built a high-fidelity flight simulator that mirrors the Sigma’s cockpit exactly, right down to its carbon fiber and soft leather interior.Customers can train in the simulator and even use those hours toward a pilot’s license. The simulator gives them a chance to “fly” their customized Sigma before ever leaving the ground.And for everyone else? The company is sharing flight footage from its simulator on YouTube, so people can see how the Sigma handles in the air.”For AltoVolo, opening our order book is a major milestone in bringing the Sigma to life,” Wood tells CyberGuy. “Having early customers make an initial financial commitment shows us real demand. In turn, we are able to raise capital to finalise the product, progress certification and prepare for production. Presenting the flight simulator has been a useful catalyst. Allowing customers to fly in a simulated environment really helps them realise how easy this type of aircraft will be to fly.” An exclusive community for early Sigma owners shapes the future of personal air travel and sustainable innovation. (AltoVolo)Innovation you can feelOne of the most interesting details about the Sigma is something you can’t see: the sound inside the cabin. AltoVolo’s engineers are working to reduce vibration and interior noise, creating a calm, smooth flight experience.At the same time, they’re experimenting with a synthesized soundscape, a gentle background tone that changes with the aircraft’s power use. It helps pilots sense how the vehicle is performing and adds a cinematic touch to the flying experience.It’s part science, part art and a hint at how human-centered this design really is. Future pilots can train in a realistic Sigma cockpit simulator and even log hours toward a license. (AltoVolo)The path to certificationThe Sigma will benefit from new U.S. aviation rules called MOSAIC, which simplify the process for certifying small, advanced aircraft. This means the Sigma can be sold as a light sport aircraft, lowering costs for both the company and future pilots. Certification is also underway in Europe and the UK, which could make global operations possible in the next few years.Building a community around flightBuying a Sigma isn’t just about owning an aircraft; it’s about joining a new kind of community. AltoVolo wants Sigma owners to become collaborators, helping to shape the product and the future of urban flight. The company is also planning a global service and support network, including maintenance and training centers, to make ownership practical for people beyond traditional aviation circles.What this means to youFor most of us, flying still means boarding a big plane at a crowded airport. But companies like AltoVolo are trying to change that. The Sigma represents a future where small, efficient aircraft could handle regional travel, connecting towns, suburbs and cities in new ways. It’s the kind of innovation that could one day make air travel as personal as driving. And while it’s still very early, AltoVolo’s new configurator makes the dream of personal air travel feel a bit more real. Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.comKurt’s key takeawaysAltoVolo’s Sigma may not replace your car anytime soon, but it gives us a glimpse of what’s coming: a world where flight is cleaner, quieter and designed around the individual. It’s a preview of how the future of travel might not be on the road at all, but instead in the air.If you could design your own aircraft, where would your first flight take you? Let us know by writing to us at CyberGuy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter. CLICK HERE TO DOWNLOAD THE FOX NEWS APPCopyright 2025 CyberGuy.com.  All rights reserved.

Aerospace tech startup lets you design your own personal aircraft Read More »

1 the 1 google search scam everyone falls for

The #1 Google search scam everyone falls for

NEWYou can now listen to Fox News articles!
When something goes wrong with your bank account or delivery, your first instinct might be to type the company name into Google and call the first customer service number you see. But that simple search has become one of the biggest traps for scammers, and it’s costing people money, privacy and even control over their phones.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. A simple Google search for a company’s customer service number can lead straight to a scam. The first result isn’t always the safest one. (Kurt “CyberGuy” Knutsson)He Googled his bank’s number and lost control of his phoneHere’s how one man’s quick search for help turned into a nightmare he never expected. Gabriel wrote to us in distress, asking,”I called my bank to check on some charges I didn’t authorize. I called the number on the bank statement, but they told me to go online. I googled the company and dialed the first number that popped up. Some foreign guy got on the phone, and I explained about the charges. Somehow, he took control of my phone, where I didn’t have any control. I tried to shut it down and hang up, but I couldn’t. He ended up sending an explicit text message to my 16-year-old daughter. How do I prove I didn’t send that message? Please help.”Gabriel’s story is frightening, and unfortunately, it’s not rare. This type of attack is called a remote access support scam. Scammers pretend to be bank or tech support, then trick you into installing a program that gives them control of your device. Once inside, they can steal passwords, send messages or lock you out completely.WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL Gabriel thought he was calling his bank, but the number was fake. Within minutes, a scammer took control of his phone and invaded his privacy. (Kurt “CyberGuy” Knutsson)Why this scam worksSearch engines reward paid ads. Scammers take advantage of this by buying ad space to appear above legitimate customer service numbers. The fake pages look professional, complete with company logos and 800 numbers that seem real.Once you call, the fake “agent” sounds knowledgeable and polite. They build trust, then convince you to install remote access software such as AnyDesk or TeamViewer. From that point, they can control everything on your phone.What to do if this happens to youGabriel, what you went through is incredibly upsetting, and you’re right to take it seriously. Here’s what to do right away:1) Disconnect and secure your phoneTurn off your phone immediately. Restart it in Airplane Mode and don’t connect to Wi-Fi yet. Run a full antivirus scan with strong antivirus software. 2) Change all your passwordsUse a secure device that has not been compromised to reset the passwords for your key accounts, including email, cloud storage, phone carrier and banking logins. Create strong, unique passwords for each account and enable two-factor authentication (2FA) for added protection on all your devices and platforms.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com3) Contact your carrier and your bankLet your phone provider know that your device was taken over. Ask them to check for unauthorized remote management apps or SIM-swap activity. Notify your bank’s fraud department and report the fake number you found on Google.4) Report the explicit messageTake screenshots and save everything. Contact local police and explain that the message was sent from your number while your phone was under remote control. If a minor is involved, the case may be referred to the FBI’s Internet Crime Complaint Center (IC3.gov).5) Factory reset your phoneOnce your data is backed up, perform a factory reset on your iPhone or Android to remove any hidden software. Reinstall only apps you recognize from the official app store.HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET Scammers use fake customer service numbers to sound convincing and gain remote access to your devices, turning a simple call for help into a digital takeover. (Kurt “CyberGuy” Knutsson)Tips to stay safe from fake customer service scamsFalling for a fake customer service number can happen to anyone, especially when you’re in a rush or worried about your account. Here’s how to make sure you never get tricked by the same kind of scam that hijacked Gabriel’s phone.Go directly to the company’s official websiteAlways type the company’s web address yourself or use the contact number printed on your card or statement. Scammers often create fake numbers that appear in search results, hoping you’ll call them instead of your real bank.Don’t trust the first search result on GoogleSearch engines sell ad space to anyone, including criminals posing as real businesses. Those top “sponsored” listings can lead straight to scammers. Instead, scroll down until you find the official domain ending in .com, .org or .gov.Never allow remote access to your phone or computerNo legitimate company needs to control your device to verify charges or fix an account issue. If someone asks you to install software like AnyDesk or TeamViewer, hang up immediately. These tools give strangers complete control of your screen and data.Hang up if the caller pressures you to act fastScammers rely on panic. When someone insists you act “right now” or risk losing money, that’s a warning sign. Stay calm, hang up, and verify the problem through your bank’s official website or number.Use strong antivirus protectionInstall and regularly update a trusted antivirus app. Strong antivirus software can block remote-access tools and spyware before scammers gain access. Regular scans also detect hidden threats that may already be on your phone or computer.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.comConsider using a data removal serviceMany scammers find victims through data brokers that sell phone numbers and personal details. A data removal service helps erase your information from these sites. As a result, it’s harder for criminals to target you with fake customer service scams in the first place.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.comMonitor your identity with a trusted protection serviceEven a short breach can expose your private information. Identity-monitoring tools alert you when your name, email or Social Security number appears on the dark web. That gives you time to act before scammers can use it.Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThe internet has made getting help easier than ever, but it has also made it easier for scammers to pretend to be helpful. The top way people are being scammed today isn’t through phishing emails or suspicious links; it’s by trusting fake phone numbers that look official. Take a few minutes to save the real customer service numbers for your bank, phone provider, and credit card company. One quick call to the wrong number could give a stranger access to your entire digital life.With fake customer service numbers flooding search results, should Google be held responsible for protecting you from these scams? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

The #1 Google search scam everyone falls for Read More »

1 evs beat gas after two years study finds

EVs beat gas after two years, study finds

NEWYou can now listen to Fox News articles!
Electric vehicles are proving their worth when it comes to long-term emissions. While building an EV creates more pollution upfront because battery production demands more energy, the balance changes fast once the car is on the road. After about two years of normal driving, an electric car overtakes a gas-powered one in total CO2 savings and keeps widening the gap over time.A peer-reviewed study published in PLOS Climate supports this finding. Researchers Pankaj Sadavarte, Drew Shindell, and Daniel Loughlin conducted the analysis titled, “Comparing the climate and air pollution footprints of Lithium-ion BEVs and ICEs in the U.S. incorporating systemic energy system responses.” Their work examined how manufacturing, fuel production and vehicle operation affect both climate and air quality over a vehicle’s lifetime.POWER ON THE MOVE: IS PILOT PROGRAM THE FUTURE OF EV CHARGING?Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. New research from PLOS Climate shows electric cars surpass gas vehicles in total CO2 savings after just two years on the road. (Kurt “CyberGuy” Knutsson)How the study shows EVs overtake gas cars in emissionsUsing the Global Change Analysis Model (GCAM), the study simulated how U.S. transportation and energy systems interact through 2050 under different rates of EV adoption. The results show that while manufacturing EVs releases about 30% more CO2 than producing gas cars, that gap closes quickly once you drive. By the end of year two, EVs emit less carbon overall, and the advantage widens over time as the power grid shifts toward cleaner energy sources.Each additional kilowatt-hour of battery capacity is projected to eliminate roughly 485 pounds of CO2 by 2030 and about 280 pounds by 2050. That reflects continued progress in electricity generation and efficiency gains across the EV industry. Over an estimated 18-year lifespan, gas-powered vehicles produce two to three and a half times more pollution-related damage than electric ones. Those damages include the social and economic costs of climate change and health issues linked to air pollution. While building EV batteries creates more emissions upfront, cleaner power grids and zero tailpipe output help electric vehicles pull ahead over time. (Kurt “CyberGuy” Knutsson)How the GCAM model worksThe GCAM model links global energy use, economic activity, and emissions across multiple sectors. In this analysis, researchers measured not only tailpipe emissions but also the upstream effects from mining, refining, and fuel processing. They also factored in how growing EV adoption changes the energy mix. As electricity demand rises, cleaner energy sources like wind, solar and nuclear expand their share, while coal steadily declines.By 2050, electricity generation from gas, wind and solar grows while coal falls below 6% of the total mix. This cleaner grid makes charging electric cars progressively less carbon-intensive, strengthening the case for a large-scale EV transition. The study found lifetime health and climate damages from gas cars can be up to 3.5 times higher than from EVs, underscoring the long-term benefits of going electric. (Kurt “CyberGuy” Knutsson)How EVs impact you and the environmentIf you keep a car for more than two years, switching to an EV can meaningfully reduce your carbon footprint. The study found that EVs start paying back their manufacturing emissions faster in regions with renewable-heavy grids. In states still dependent on coal, the break-even point arrives later but still occurs well before a car’s third birthday. The cleaner your local power mix, the faster your EV moves into net-positive territory.INHALERS PRODUCE CARBON EMISSIONS EQUAL TO 530,000 CARS ON ROAD ANNUALLY, STUDY FINDSThe findings also highlight public health benefits. Gas vehicles emit more nitrogen oxides and carbon monoxide, both of which contribute to respiratory illnesses and smog. As EVs replace traditional engines, these pollutants drop, improving air quality and reducing healthcare costs.Context and limitationsThe authors acknowledge that their analysis does not include emissions from recycling or disposing of vehicle parts at the end of life. Nor does it count emissions from building charging networks or new power infrastructure. Despite those exclusions, the study provides one of the most comprehensive long-term looks at how EV adoption affects both the economy and the environment.Because the study uses projections through 2050, results depend on future technology and energy trends. Even so, the consistent pattern across all scenarios is that EVs deliver large reductions in CO2 and air pollutants once on the road.What this means for youIf you drive often and plan to own your car for several years, the data shows an EV can save both emissions and money over time. Charging on a renewable or low-carbon plan speeds the payoff even more. Choosing a vehicle that matches your driving needs helps minimize unnecessary battery production and further reduces your footprint.For communities, broader EV adoption means cleaner local air, fewer health-related costs and lower long-term damage from climate change.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThis PLOS Climate study reinforces that after the first two years, EVs deliver real and lasting climate benefits. As the U.S. grid shifts toward cleaner energy, its impact grows even stronger. The authors note that the analysis does not include emissions from recycling or charging infrastructure, yet it remains one of the most thorough long-term views of EV adoption and its effects on the economy and environment.Would a cleaner grid in your state make you more likely to trade in your gas car for an EV? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

EVs beat gas after two years, study finds Read More »

cop car 1

Alone and an Easy Target: UFO and Alien Encounters on Desolate Roads

For reasons that are not fully known, many cases of UFO sightings and even alien abduction encounters take place on quiet, lonely roads, often when the respective witnesses are the only motorists on the highway, meaning they are vulnerable to such encounters. Indeed, this vulnerability of being alone on long stretches of road might be a large part of why these potentially otherworldly vehicles, or more to the point, their occupants, focus on such targets in the first place.
A good place to start when looking at UFO and alien encounters on lonely roads would be with an incident that unfolded in August 1972 in Minnesota. According to a report in the August 1976 edition of the APRO Bulletin, at around 10 pm on the night in question, a family was returning to Canada via Route 59 after vacationing at Thief River Falls when the main witness – referred to as Mr. H in the report – became aware of a “very bright light in the sky” just ahead of them. He immediately pointed out the aerial anomaly to his wife, who, initially at least, thought the light was nothing more than the top of a nearby radio tower. With their four children asleep in the back seat, and the only sound in the vehicle being the radio, Mr. H dismissed the light and refocused fully on the road. However, when he glanced out of the window around 10 minutes later, he could see that the light was now much closer. Moreover, it appeared to be purposely keeping pace with their car. 
He turned to his wife and noticed that she was also now watching the light, her initial thoughts that it was a light from a radio tower now dismissed. Then, without warning, the glowing object suddenly rushed towards them. As it did so, it lit up the interior of the car as if it were suddenly daylight. What’s more, the light was so bright that it woke all four of the children in the back. The youngest child asked their parents what the light was, to which Mr. H replied that it “looked like a flying saucer”.
Now, more intrigued than anything else, Mr. H asked his youngest son to reach for the flashlight that was in the back of the car and to flash it at the object in four short bursts. He did so, and moments later, the glowing object flashed back four times in response. Astonished, Mrs. H took the flashlight from the youngster and proceeded to flash several long and short bursts of light at the object. Once more, the object responded and replayed the sequence back to the vehicle. As it did so, it moved even closer to their vehicle. Moments later, the car radio began to crackle slightly and lose its signal, while the engine sputtered, as if it were on the verge of dying. At the same time, all in the car noticed that it suddenly felt a lot warmer than it had done only moments earlier. Eventually, the engine cut out, and the car coasted to a stop on the lonely highway. Cautiously, Mr. H stepped out of the vehicle to get a closer look at the strange craft. When he did so, with the curious object now directly overhead, he felt a strange “prickly sensation” run through his body, similar to receiving several small electric shocks. 
He watched the object for several moments before walking to the front of the car and asking his wife to try starting the engine. He later stated that “the engine would turn over, but sparks would jump up from the plug leads and straight across the coil to the metal side of the car and back”, adding that he had “never seen anything like this” before.
As this was happening, Mr. H saw the headlights of a car approaching. He immediately went to the roadside and attempted to wave the motorist to stop to offer assistance. The oncoming vehicle, however, didn’t stop. The object, meanwhile, “moved away at such a speed that it would be impossible to estimate” its speed. He returned to the vehicle where his wife was trying to restart the engine. This time, it started up as normal, and Mr. H immediately got inside the vehicle and set off back down the road.
By this time, the object was “just a speck in the sky,” and it appeared as though the strange event was over. Moments later, however, it began approaching their vehicle once more. Mr. H continued down the road while his wife and their children continued to watch the craft. To their amazement, they saw three small discs emerge from the craft, each flying off in different directions. Then, the larger, glowing object moved away, disappearing into the night sky “at an incredible speed”. 
One final interesting detail of the sighting is the fact that Mrs. H had been suffering from a severe cold when the incident occurred. However, almost immediately after the object had vanished, “her cold was completely gone and she felt really good”. 
A very similar incident unfolded half a decade later in Flora, Mississippi, which involved two police officers who were out on routine patrol. On the evening of February 10th, 1977, Deputy Kenneth Creel and Constable James Luke of the Madison County Sheriff’s Department were around four miles outside the town of Flora when Creel noticed a strange object overhead. To begin with, the object appeared to be nothing more than a bright star. However, in a matter of seconds, it increased in brightness and in size. The closer it got to their moving vehicle, the more they could make out that the object was disc-shaped. 

At this point, Creel radioed the Mississippi Highway Patrol to report what they were seeing, all the while the object continued to approach them. By the time it was around 200 yards from their vehicle, Creel finally brought the patrol car to a stop. Both officers remained as quiet as possible as they listened to any sounds coming from the object, later describing a noise that was similar to a “straining blender”. 
Moments later, the object was directly over the top of their patrol car at an altitude of between 20 and 30 feet. From this distance, they could see several small windows, out of which shone changing colors of blue, red, and green. The two police officers watched the object in awe for around a minute before Creel started the engine of the car. Before he could set off, though, the strange craft suddenly shot straight up into the air and disappeared within a matter of seconds. Creel later stated that:

“I know I’m not crazy. I’ve always said I didn’t believe in this stuff. I don’t know what I saw, but I know I saw something!”

Just prior to the object ascending into the night sky, Highway Patrolman Louis Younger arrived at the scene, just in time to see the craft zip directly upwards. Moreover, although Creel and Luke didn’t know it at the time, several other people had witnessed the curious object, including Deputy Charles Bowering and Highway Patrolman Joe Chandler, as well as Officer Hubert Roberts, who even claimed to have signaled to the object with his patrol car headlights, to which it responded. 
In relatively recent times, in the fall of 1995 in Wedowee, Alabama, another vehicle was approached by a strange aerial object on a lonely road. On the night in question, around 10 to 12 members of a ladies’ church group (the exact number of witnesses was not established due to the case not being investigated until 18 months after it occurred) from LaGrange, Georgia, were traveling to Anniston, Alabama, for a cross-state bingo trip. It was a route they had traveled many times previously, and, as such, all inside the vehicle dreaded the moment they passed a poultry plant in Wedowee due to the overpowering aroma that came from the facility. This evening, though, it wasn’t the smell from the plant that was of concern to them, but rather a strange light that was hovering over the plant. 
To begin with, they thought the light was simply part of the main building. However, when it moved, they realized this assessment was wide of the mark, with one passenger exclaiming that, “It’s not a light, but some flying thing!” This concern increased when the light headed in their direction. When it did, their driver – a local businessman who was also a member of the church – increased the speed of the bus. The bizarre object, however, continued to follow them, seeming to maintain a distance of around 50 feet between it and the bus. The witnesses later described the object as being shaped like a lightbulb, with two of the witnesses even claiming to have seen a “humanoid shape” inside it. Needless to say, with each passing second, the anxiety of the witnesses steadily increased. 
Several of the witnesses stated they could see a “strange beam of light” emerge from the craft that had a “sparkling effect” to it that hurt their eyes to look at. Indeed, aside from having brief peeks outside the window, most of the passengers tried to shy away from the glass in case anything untoward occurred. Incidentally, several of the passengers experienced extreme eye irritation for several days after the incident. 

As the driver took the bus through an underpass, he hoped to lose it, and when it didn’t follow, he and the passengers believed the ordeal was over. However, these hopes were dashed as the bus emerged from the other side of the tunnel. There, directly overhead, was the strange craft, as if it were waiting for them to appear. 
The object continued to follow the bus for several more minutes until the driver brought the vehicle to a stop at an intersection. The object continued past them out over a field before it then suddenly shot up into the air and disappeared, moving so fast that it left a visible streak in the sky that remained for several seconds. Despite the surreal nature of the events, the driver continued to their destination without further incident. 
Several years later, in the summer of 2003, in the Trickum Valley area of Alabama, another encounter of a glowing object following a lone car unfolded. According to the report, on the night in question, two Alabama police officers were on a routine patrol when they suddenly found their vehicle encapsulated in a bizarre, bright glow. When they surveyed their surroundings, they realized that the source of the light was coming from directly above them. Moreover, whatever the object was, it was keeping pace with their vehicle. When the driver of the patrol car increased his speed in an attempt to outrun the curious craft, the object did likewise. 
Realizing they were unable to outpace the aerial anomaly, the officer brought their vehicle to a stop and exited the vehicle in order to investigate further. However, as soon as they did so, the object simply vanished. Perplexed, the two officers got back inside their patrol car. However, when they tried to restart the car, they realized that all of the vehicle’s electrical systems were dead, meaning that although the engine turned over, they had no headlights and so had to proceed with extreme caution. They eventually passed by several campers and so stopped their patrol car to ask if they had seen anything strange overhead. All claimed to have seen a bright light moving across the sky. The incident remains a complete mystery.
While sightings of strange glowing objects along lonely roads are one thing, cases of alien abduction in such locations are another, and the fact is, there are multiple such cases on record, not least one of the first alien abduction cases to have captured the imaginations of the wider public, the Betty and Barney Hill case. Since then, though, there have been many more encounters. 
Without a doubt, one of the most thought-provoking of these occurred in the mid-1970s in the state of Maine. At around 3 am on October 27th, 1975, 22-year-old David Stephens and his friend, Glen Gray, were making their way down a quiet road near the town of Oxford when a glowing object “as big as a football field” appeared ahead of them. Moreover, this curious aerial object was heading straight towards their car. It hovered directly over the top of them for several moments before a bright beam of light emerged from it and struck the vehicle, causing their car to go into a brief skid before it came to a stop around 15 feet down the road. The next thing the pair realized, they woke up inside the vehicle, and several hours had passed. Although they were both confused and disorientated, both realized that something out of the ordinary had taken place. 
While Gray wished to forget about the incident, as the weeks went on, Stephens was increasingly troubled by the events, and eventually sought out hypnotic regression in an attempt to unlock his memories of those missing hours, and these hypnosis sessions would reveal some remarkable and unsettling details, and a fuller picture of the night’s events emerged, including a corroborating witness; a police officer who had reported seeing a large, glowing object at the same time as Stephens and Gray had their encounter. 
It came to light that the two men had experienced some kind of “outside control” of their vehicle at around 2:30 am as they were heading towards Lake Thompson. Although they couldn’t recall how, they suddenly found themselves on a dark “back road” with their car seemingly elevated off the ground. Moreover, there were several different colored lights outside the car before “two big bright lights” suddenly filled their field of vision. 

The next thing Stephens could recall was looking down on the car out of the window in a strange room. Of more concern, inside the room with him was a strange creature, approximately four-and-a-half feet tall and with a large, mushroom-shaped head. This being had large, dark eyes and two small holes where its nose should have been. Stranger still, this unsettling entity wore some kind of robe or sheet. Suddenly, a voice appeared inside his head telling him not to be afraid, before the creature guided Stephens to another room. In this room were several other, identical creatures that were standing around what looked to be an operating table. The voice appeared inside his head once more, this time instructing him to get on the table. Although he didn’t understand why, Stephens did as he was asked, and several samples of his blood were taken. When he was asked to undress, however, Stephens took his chance and lashed out at the creatures, striking one of them. The creatures backed away slightly but still surrounded him. Once more, he was told that no harm would come to him, and once more he was asked to undress for an examination. Realizing he was surrounded and partly simply overwhelmed by the surreal nature of the events, Stephens did as requested. 
He lay back on the table, and a large device resembling an X-ray machine moved over the top of him, making a strange “clicking” sound as it did so. The creatures went about their duties, taking samples of his hair and fingernails, which they then placed into strange-looking tubes. When these procedures were over, Stephens was asked to dress. He did so, and without realizing how, he suddenly found himself in the room he had been in previously, looking out of the window once more. Then, everything appeared to “fast-forward”, and he found himself sitting in the driver’s seat of the motionless car with Glen beside. They both regained consciousness and could see the large craft hovering above them. 
Almost operating automatically, Stephens started the car engine and put the vehicle in motion. They had reached the town of Poland before the object disappeared. It was at this point that Stephens turned the car towards the town of Oxford. A short time after he had done so, however, the car once more came under the external control, and before they knew it, they were driving along a dark lane that overlooked Tripp Pond. Moments later, the car’s engine cut out, and moments after that, a large object appeared ahead of them, at an altitude of around 300 feet. The two men sat in the car, watching the surreal events unfold in front of them. Then, two smaller craft emerged from the water of the lake. They each rose high into the air before diving back to the water and then emerging again. They did this several times before they all shot into the air at an incredible speed and disappeared into the night sky. Once more, Stephens started the car and headed for his parents’ home. By the time they arrived, it was almost light and approaching 7 am. 
The two men went to Stephens’ bedroom and went straight to sleep, each agreeing to keep the bizarre experience to themselves. However, not long after waking, both men began to feel increasingly ill, with Stephens recalling that they both felt “like we were in a daze” and that they were unable to walk, see straight, or even speak properly. Stephens’ mother noticed that even though both of the young men were sweating profusely, they both complained of feeling intensely cold. Moreover, both of the men’s hands and feet were visibly swollen. Around 12 hours after the bizarre encounter, both men began to feel a little better, but it would take several days before they returned to normal. 
Although they had agreed not to speak of the encounter, in part, because of how ill they felt, when the deputy sheriff of Oxford County, Eldon Bartlett, visited the house later that evening, they both told him what they could remember, with Bartlett later noting that the anxiety and fear in both men were clearly evident. It was through his connections with the Oxford Sheriff’s Office that UFO investigator, Brent Raynes, heard of the incident, and the following day, on October 28th, he too visited the Stephens’ family home. He spoke with both of the witnesses, noting, like Bartlett had, that both young men were extremely agitated and fearful of the events they were being asked to recall. Despite this, he managed to convince the two young men to take him to the locations of the incident – the cornfield near the roadside, and the dirt road that overlooked Tripp Pond. However, when they arrived at the respective locations, both of the men refused to leave the car. 
It was during the days that followed that each of the men began experiencing “flashbacks” of the night in question, causing both of them to realize that something truly extraordinary had taken place. The incident soon came to the attention of UFO investigator Shirley Fickett of the International UFO Bureau, and following her visit with the witnesses, Stephens agreed to undergo hypnotic regression. 
The session started on December 2nd, 1975, and was conducted by Dr. Herbert Hopkins, with Stephens’ parents and Fickett all in attendance. Ultimately, Hopkins found Stephens to be “frank, straightforward, and I believe, honest”, elaborating that he was “shy but not evasive”. Although Stephens was forthcoming with most questions he was asked, there were some questions that he failed to answer, even though he was asked several times. Hopkins suggested that it appeared that Stephens “was inhibited by some means by these creatures, so he wouldn’t reveal everything that went on”, adding that “it took a deep level of hypnosis to get anything out of him”. This detail is noteworthy. UFO investigator Derrel Sims, who also uses hypnotic regression, later entertained the notion that such entities were aware of information retrieval through hypnosis. He considered this during his investigation of a mass abduction in Houston, Texas, in December 1992.
Although Hopkins had entered the sessions as a skeptic, by the time they had concluded, he had completely altered his perspective, claiming he was “now convinced they exist”, adding, “UFOs must be of extraterrestrial origin because of the nature of the creatures he described”. Indeed, when Dr. Barry Schwarz examined the case and spoke to Stephens and his family in January 1976, he concluded that “David is telling the truth. It is a weird story, but it hangs together”. 
Incidentally, both Stephens and Gray faced ridicule from their local community, with both men even losing their jobs because of it, which highlights how little they had to gain from speaking of the incident, and adds to their overall credibility. While Gray refused to speak of the incident, especially to the media, Stephens coped with the bizarre events by doing the opposite and trying to understand them. It is also worth noting that in the months and years that followed, Stephens had the constant feeling that “UFOs were watching or following him”, another detail that can be found in multiple other cases of alien abduction. 
Two years earlier, on the other side of the Atlantic, in Langford Budville in the south of England, another unsettling abduction encounter unfolded. It was around 2 am in the early hours of October 16th, 1973, when Gabriella Versacci was driving her car on a lonely motorway when she noticed a single headlight up ahead. To begin with, she thought the light was an approaching motorbike, or even a stranded motorist in need of assistance, and so she began to slow her vehicle as she approached the light. The closer she got, however, the more she could see that the light was not coming from another motorist’s vehicle, and when her car suddenly lost all its power, she realized she was in the middle of a bizarre scenario. 
The light was still some distance ahead of her, but feelings of fright and fear began to run through her. Deciding she didn’t wish to remain stranded in her vehicle on the lonely road, she took her keys out of the car, opened the driver’s door, and stepped outside. As soon as she did, she became aware of a “soft humming sound” that was growing increasingly louder. 
It was as she was looking around her for the source of this humming sound that she suddenly felt a hand strike her on the shoulder. The force of the strike was such that she was knocked to the ground. As she turned in the direction that the strike had come from, she was more than shocked to see a tall, dark-colored metallic figure. She then became aware of multiple multi-colored lights, which were the last thing she saw before she seemingly lost consciousness. 
The next thing she realized, she was standing in the middle of a field with the metallic figure standing beside her. It was then that she noticed a strange, glowing, half-moon-shaped object in front of them. She later described this object as having a flat underside with thick legs supporting it, a rounded top, and a silver-gray exterior. She further recalled a large, oblong window in the side of the craft, from which a bright yellow glow emerged, while she estimated that the craft was around 40 feet wide and approximately 20 feet in height. Then, the strange humming sound began once more, and moments later, she lost consciousness again. 
When she awoke, she found herself lying on a table in a strange room. It was only when she tried to sit up that she realized she was strapped to the table. Moreover, she also realized that she was completely naked, with a “peculiar blanket” spread over her. She looked around the room as best she could, noticing that the floor was covered in some kind of rubber matting. She also saw the robotic metallic figure standing a short distance from her, completely motionless. Once more, we find details that show up in other alien abduction cases. The strange blanket, for example, is reported by other abductees, with some stating the blanket was pulled tightly over their faces with holes cut out for breathing, while the strange rubber matting is another detail that surfaces in other reports. 
Then, the already bizarre encounter turned even stranger.
Three men, all dressed in light blue tunics, skullcaps, long elbow-length gloves, aprons, and facemasks, entered the room. To Versacci’s horror, these men resembled surgeons who were about to operate. The men approached the table and placed a strange cube-like device on her body, which glowed brightly as soon as it made contact with her body. Unable to move, Versacci took in as many details as she could while these procedures were carried out. She recalled, for example, that the men’s eyes were “more rounded than human eyes”, and, of more concern, they were seemingly completely devoid of any emotion. They methodically took samples of her hair, nails, skin, and blood, occasionally nodding at each other as they did so. Although Versacci didn’t feel any pain during the procedures, she recalled feeling extremely cold throughout. However, as soon as the examination was over, another large blanket was placed over her, and she warmed up instantly. 

Versacci also recalled that the robotic figure remained motionless in the corner of the room, almost as if it had been “turned off”. Bizarrely, one of the men noticed he was glancing toward the metallic figure, and he told her that it was a “trained retriever device” whose duty was to bring “specimens for examination and study”. When he told her this, though, Versacci claimed that she didn’t see his mouth move under the facemask, almost as if the sound was simply coming from it would a stereo or radio. 
Following the procedure, the three men simply turned and left the room. As soon as they did, she noticed a purple, flashing light appear on the robotic figure. It is at this point where a slight discrepancy appears in the account. One version claims that Versacci awoke in her vehicle, relatively unharmed, while another states that one of the three men returned her to her car and injected her with a “numbing agent” before sexually assaulting her. Whatever the truth, the case first entered the public domain through the investigation of UFO researcher and member of the Center for UFO Studies, Thomas E. Bullard, who determined that, despite the slight discrepancies, he was certain that “something” happened to Gabriella Versacci that evening near Langford Budville. 
Three years earlier, back in the United States, an even more mind-blowing and thought-provoking encounter unfolded. One late afternoon in 1970, in Paris, Illinois, 22-year-old Terry Matthews was driving her car along the lonely highway. The sun was beginning to set, casting brilliant red and green hues across the landscape, when all around her turned to darkness, followed by a torrential rainstorm that was so severe, her visibility was almost zero. It was at this point that Terry felt some kind of mysterious force pulling her car to the side of the road, causing her to grip the wheel tightly to remain in control of the vehicle. Then, within a second, the rainstorm stopped, and the conditions returned to normal. As perplexed as she was, she continued with her journey home. However, upon her arrival, she discovered she was two hours later than she should have been. She had no explanation for the missing time, and she was left beyond confused about the strange journey. 
As the months and years went by, Terry began documenting any strange and unsettling events that happened to her in a journal, which included further incidents of missing time, intense nightmares, and strange and unexplained markings on her body. By the time she had witnessed several UFOs, she began to suspect that these bizarre incidents, including the missing time episode of 1970, could be indications that she had possibly been abducted by aliens. 
She eventually contacted UFO and alien abduction investigator David Jacobs, and through several conversations, she began to connect the dots of these seemingly random encounters. When she decided she wished to undergo hypnotic regression, Jacobs warned her that doing so would likely drastically alter her perspective on life and reality. However, by this stage, Terry’s desire to understand just what had been happening to her outweighed any such concerns, and she insisted they go ahead. She underwent several hypnotic regression sessions, and the revelations from these were remarkable. 
She was taken back to that late afternoon on the lonely Illinois road in 1970. She recalled the sudden and drastic change in the weather, recalling that she could feel her car “being pulled off the road”, something she couldn’t explain. However, rather than simply continuing to drive, she recalled that she herself brought her car to a stop at the side of the road. There, through the car window, she could see a “huge craft” hovering ahead of her, stretching from one side of the road to the other. She described this curious craft as being a “blunt silver-grey” color and metallic-looking. Moreover, she could see “six beings” emerge from the object and approach her vehicle. She described these strange creatures as having grey skin, large heads, and large, black eyes – essentially, she was describing what most of us would recognize as grey aliens. 
At this point, she was so terrified that she instinctively tried to scream. However, try as she might, she was unable to do so. When she turned to run from the scene, she suddenly found herself encapsulated in a bright light that seemed to come from the object. Then, her surroundings changed once more. 
She suddenly found herself inside a strange room, presumably inside the huge craft she had been trying to run from, with the bizarre entities surrounding her. She was instructed by these disturbing creatures to undress and remove all of her jewelry, something she didn’t wish to do, but somehow felt compelled to obey. After undressing, she was led to a strange table. From here, her encounter turned even more terrifying. She claimed, under hypnosis, that her abductors told her that she was pregnant. However, he claimed that they removed the unborn baby from her womb and replaced it with another (the fate of the removed baby is not detailed). Over the course of several more sessions, Terry uncovered further disturbing details of other abduction scenarios. In fact, she was so disturbed by these revelations that she began recording herself while she slept, hoping such actions would prevent further abductions, or at least record evidence of them happening. 
Interestingly, the abduction encounters did stop after she took such action, which perhaps should force us to ask if her abductors were somehow aware of the recording devices. Of course, if this is true, then it might be an action that other alien abductees might wish to undertake to stop their respective encounters. 
Although the abductions appeared to have stopped, Terry uncovered further details of encounters that had happened over the years, including witnessing each of her children being abducted, all on different occasions, memories which she found “exceedingly traumatic”. This detail is another that shows up in multiple other cases of alien abduction, especially those people who experience repeat alien abduction; that other members of their family, sometimes across several generations, are also abducted, which suggests some kind of highly organized and preemptive program. With this in mind, Jacobs suggested regressing Terry back to that road journey back in 1970 once more, in the hope that further details might emerge, and the details she recalled during this second regression session not only added another layer to her own encounters but also shed light on the potential truth of alien abductions and the agendas driving them.
During this second regression to the 1970 incident, as well as recalling the grey alien creatures in the strange room with her, she also recalled the presence of a woman. However, Terry recalled that this woman was “not normal” and had particularly large eyes. She elaborated that she suspected this woman was a “hybrid” and that she was holding a human baby. She also recalled that she had a sudden memory of holding a baby in the room, perhaps suggesting that the woman had handed the baby to her. This baby, Terry recalled, appeared human-like, but seemed especially thin and frail, as well as having large eyes and a tinge of grey to its skin. Moreover, although the baby appeared to be only a few months old, it had an awareness in its eyes that was years beyond its age. She elaborated that while both babies instinctively curl in towards the person holding them, this baby stayed rigid and upright, seemingly completely aware of its surroundings. Terry further recalled feeding the baby before the woman approached her once more to take it, something that Terry initially resisted. When the woman eventually did remove it from her arms, she recalled feeling a profound sense of loss, something she described as an intense sense of grief “deep” within her. 
Of course, these details are suggestive of some kind of hybridization program being at the heart of the alien abduction phenomenon, something that Jacobs and several other researchers, including Budd Hopkins and John Mack, have also suggested. Terry herself concluded that her abductors are indeed operating a hybridization program, and that these “hybrid children”, in her opinion, are the real victims of these abductions. She explained that while these hybrids might look human, they lack human emotions such as empathy, compassion, and love. 
While this might sound preposterous to some, several researchers, including Jacobs, have documented several abduction encounters where the abductee has seemingly been tasked with educating hybrid children and adults in basic human behavior and social interactions. It certainly gives us a lot to think about. 
While Terry Matthews was uncovering details of her apparent alien abduction encounter, at a little after 11 pm on January 6th, 1976, in Kentucky, three friends – Mona Stafford, Louise Smith, and Elaine Thomas – found themselves in the center of an alien abduction scenario. The three friends had dined at the Redwood Restaurant in Lancaster, Kentucky, to celebrate Mona’s 36th birthday. The three women had been best friends for years, and after enjoying their meal, they set out along US-27 back to their hometown of Liberty, a journey that should have taken around 45 minutes. However, as they made their way down Highway 78, the three women – none of whom had consumed any alcohol – noticed a bright red object overhead.
To begin with, the women thought they were witnessing a plane about to crash. However, the closer the object got to them, the more they saw it was a “metallic grey disc” with a glowing yellow dome on the top. As it got closer still, they could see that it had a line of red lights that circled the middle of it, while on the underside were red and yellow lights. Of more concern, however, a bluish beam of light also appeared to be emanating from the bottom of the craft. 
At this point, their vehicle was traveling at over 80 miles per hour, but Louise, who was driving, was struggling to maintain control of the car. From the passenger seat, Mona tried to assist Louise in regaining control of the vehicle, but found that the steering wheel was locked fast. 
The craft, meanwhile, continued to keep pace with the car; at one point, the blue beam of light shone down from the object and lit up the car’s interior. Louise later described this as the car filling with a “haze-like air – a sort of fog”. Not long after this light entered the vehicle, the women began to feel a burning sensation in their heads. Then, they felt a “bump” shake the vehicle, which halted the car before it began to be violently pulled backward. 

Then, all three of the women must have blacked out, as the next thing they knew, they were back on the quiet road. Bizarrely, the car was in motion and was heading toward Liberty. Perplexed, each of the women could recall the events before the car was pulled backward, but could not recall how they had ended up on the quiet road. Moreover, they all still felt the burning sensation in their heads. They continued with their journey back to Louise’s home. By the time they arrived, however, they discovered it was 1:20 am; a journey that should have taken only 45 minutes had taken over two hours. This meant there were around 80 minutes that they had no recollection of. 
Confused and frightened as to just what had happened to them, the three women contacted the local police and the local Navy recruiting station. Neither of them could assist the women, but the Navy office sent the details of the incident to a Lexington television station, which then reported on the account and thus placed it into the public arena. From there, several UFO researchers and investigators learned of the incident and immediately made their way to Liberty to speak to the three witnesses. The first of these to arrive was Jerry Black from MUFON, who managed to speak to each of the women about their encounter. 
The women, although still feeling immense anxiety regarding the incident, agreed to speak with Black. They informed him that they were still experiencing the burning sensation in their heads and each of them was struggling to focus on their daily lives. More than anything else, though, they had a “fear of what we don’t know”, specifically, the 80 minutes that they couldn’t recall. 
Black noted several details about the three women from this initial conversation. He noted that each of them was suffering from eye infections, seemingly due to the burning blue light that had entered their vehicle. He also noted that Louise had a “half-dollar-sized” pink-grey mark on the back of her neck that she couldn’t explain. Moreover, Louise’s pet parakeet, which typically greeted her enthusiastically when she arrived home, had exhibited signs of fear when she came home that night, even flying back into its cage as if trying to escape her. With this in mind, Black arranged for Louise to approach other “test” birds, all of which reacted almost identically. He also noted that Louise’s wristwatch was working abnormally, with the minute hand moving at the pace of the second hand, while noting further that she was experiencing bizarre issues with her car’s headlights and signal lights. Moreover, all of the women stated they had felt “generally unwell” following the encounter, both physically and mentally. It was because of these initial observations that Black recommended they postpone his planned hypnotic regression. 
Several months later, however, their case caught the attention of UFO investigator, Dr. Leo Sprinkle. Although they were still feeling very much the same levels of stress and fatigue when he spoke to them, the three women agreed to go ahead with hypnotic regression. The first of these sessions took place in March 1976, with follow-up sessions taking place several months later in July. The revelations from these sessions – which included a lie-detector test conducted by Detective James Young of the Lexington Police Department, which each woman passed with “no hint of deception” – were remarkable to say the least. 
Ultimately, each of the women recalled that after feeling the “bump” on the car, it was lifted by some kind of traction beam into the craft overhead. Once onboard, each of the women was forced to undergo a physical examination, during which some kind of invisible force held them down so they couldn’t move. They recalled their bodies being scanned and of feeling an “unpleasant pressure” on their limbs. They further recalled some kind of strange, warm liquid being applied to their faces and torsos. 
The three women also described strange “shadowy figures” that appeared to “float” or “glide” around them during the procedures. Although they couldn’t recall exact details, all of the women offered that these creatures were humanoids with large eyes and “jagged hands”, with each being around four feet tall. Moreover, they recalled that these entities used telepathy to communicate with them, and at one point, Mona recalled looking down at a table with a “helpless woman” being examined by several creatures all dressed in white. Interestingly, she wasn’t sure if this woman was one of her friends or someone unknown to her, or even if it was herself, and she was having some kind of out-of-body experience. 
Perhaps most importantly, it also came to light that other witnesses had also seen the strange craft on the night of the abduction, in the same location and in the same time window. Shortly after 11:30 pm, for example, an anonymous couple reported seeing a “large, luminous object” moving directly over their house, while two teenagers who were driving near the Angel Manufacturing Plant in Stanford reported seeing a disc-shaped object with red-orange lights running along its side. Even more remarkable, the police received several reports of “reddish-orange” lights moving over the town. One of these reports came from the owner of a farmhouse, which was only yards away from where the three women were seemingly abducted. He claimed to have seen a low-flying object flying “just down the road” which emitted a blue “beam of light” towards the ground.
All of these witnesses, although they likely didn’t realize it, likely saw an alien abduction unfold in front of their eyes. The two teenagers, for example, likely saw the craft approaching the women or heading away from them, while the farm owner almost certainly saw the abduction itself. 
Although the case is officially unexplained, the intricate details offered – many of which resonate with other alien abduction cases – as well as the several witnesses who saw the strange craft, suggest that something extraordinary did take place that night in Kentucky. 
One last alien abduction case to examine here occurred several years later, in March 1979, in North Carolina. It is an account that has come to a wider public with the arrival of the Internet, but the Monroe Enquirer-Journal reported on the case in its September 27th, 1981, edition, and the MUFON UFO Journal ran an article on it in its May 1982 edition. 
On the night in question, at around 3 am, 46-year-old Pat Eudy was driving home to Monroe from Locust, where he had spent the evening with a friend. The journey was largely uneventful, to begin with. However, as he neared the Rocky River Bridge close to the house he shared with his mother, he noticed a “bright light in the sky” that filled his vision. Then, his next memory is of him driving past a nearby store. It was now 6:20 am, and he had no memory of approaching the store. In fact, he had no memory of the previous three hours. He further recalled that his “eyes were just burning like anything (and) my skin had a sensation of stinging and itching”. This discomfort lasted for several days. His memory of the missing three hours, however, didn’t return. Troubled by this lack of recall, Eudy eventually contacted psychologist Richard Pinneau, who agreed to regress Eudy in an attempt to unlock his hidden memories. 
He was taken back to the night in question and recalled seeing the bright light as he made his way down the road. Although he still couldn’t recall how, the next thing he realized he was “onboard a UFO”, inside a strange room with an “astronaut in a suit” there with him. He described this figure as being around five feet tall, wearing metallic-type clothing, and with a dark visor covering its face. This strange figure moved silently around the brightly lit room as Eudy asked question after question, all of which went unanswered. 
Several minutes later, the figure led the figure to a different room, this one much darker. As he entered this second room, a wave of fear washed over him. Then, he was “put in a chair like a doctor’s chair and strapped down”, which only increased the fright he was already feeling. He had the impression that this figure was performing some kind of tests or examinations, during which he recalled feeling pain in his fingers and hands, perhaps suggesting that blood samples were being taken. 
His next memory after that was of being back in his car passing the store near his house. Eudy speculated in the wake of these hypnotic sessions that the UFO had likely picked up his entire car using “some form of magnetism”. Ultimately, however, while he had managed to recall a little more information, the incident remains a mystery. Eudy, though, stated that what memories he did recall had “eased his mind” and that he was now certain he hadn’t blacked out or imagined the missing time episode. 
As we can see, then, cases of UFO encounters and even alien abductions on lonely roads are much more prevalent than many of us might think. Perhaps the first question we should ask here, especially with the notion of alien abduction in mind, is are these incidents are completely random or are they much more premeditated, the targeting of certain individuals when they are most vulnerable. In fact, if we take this a stage further, we might ask if the “buzzing” of UFOs over cars is the intelligence behind these aerial anomalies, assessing the respective motorists as being suitable for alien abduction. Like all facets of the UFO and alien mysteries, questions lead to more questions while answers appear even more out of our collective grasp.

Alone and an Easy Target: UFO and Alien Encounters on Desolate Roads Read More »

the louvre in paris

Thieves steal $100M in jewels from Louvre after museum used own name as surveillance password

NEWYou can now listen to Fox News articles!
When thieves stole $100 million in jewels from the world-famous Louvre Museum in Paris, France, they shocked the art world and revealed a serious digital weakness. French media reports say the museum once used its own name, Louvre, as a password for its surveillance system.That detail may sound unbelievable, yet it highlights how often people still rely on weak passwords even in high-security places that should know better.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter Thieves reportedly stole more than $100 million in jewels from the world-famous Louvre Museum in Paris, exposing surprising gaps in security. (AP Photo/Thibault Camus)Louvre password security flaws revealed in investigator’s auditA decade-old French cybersecurity audit reportedly showed troubling gaps in the museum’s defenses. The Louvre is said to have once run outdated Windows Server 2003 software and had unguarded rooftop access, something eerily similar to how the recent thieves used an electric ladder to reach a balcony.The biggest mistake? Using “Louvre” and “Thales” as passwords. One of them was even said to be visible on the login screen. That was like leaving the keys under the doormat of the world’s most famous museum.CyberGuy reached out to the Louvre for comment, but did not receive a response before our deadline.LOUVRE DIRECTOR GRILLED ON SPECTACULAR SECURITY FAILURES, INCLUDING CAMERA POINTING AWAY FROM KEY BALCONYAnd while the Louvre may have tightened security since then, experts warn that password habits like these are still widespread among businesses and individuals.Why Louvre’s weak passwords matter for your online securityYou might not have priceless jewels to protect, but your personal data, financial info and digital identity are just as valuable to hackers. With the holiday shopping season here, cybercriminals ramp up their attacks, knowing millions of you are logging in, buying online and often reusing old passwords.How to create stronger passwords Reports revealed the museum once used simple passwords like “Louvre” and “Thales,” raising serious cybersecurity concerns. (AP Photo/Thomas Padilla)REPORTER’S NOTEBOOK: A PARIS JEWEL HEIST STRAIGHT OUT OF THE MOVIESProtecting yourself online doesn’t have to be complicated. Follow these tips to boost your defenses:Avoid using your name or anything easily guessed.Mix uppercase and lowercase letters, numbers and symbols.Change passwords if a company you use reports a data breach.Skip sticky notes or digital files with unencrypted passwords.LOUVRE HEIST IN BROAD DAYLIGHT AMID APPARENT SECURITY LAPSES PUTS GLOBAL MUSEUMS ON ALERTThink beyond your phone or laptop. Your Wi-Fi router, smart home devices and even security cameras all have passwords that need attention.Stay safe with a password managerIf keeping up with dozens of unique passwords sounds overwhelming, a password manager can help. These tools generate strong, unique, complex passwords for every account and store them securely in one encrypted vault. This reduces the risk of password reuse. Many password managers also alert you to compromised passwords or sites hit by data leaks.LOUVRE HEIST ADDS TO HISTORY OF HIGH-PROFILE MUSEUM BREACHES, LEAVES OTHER GALLERIES ON EDGENext, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com Cybersecurity experts say everyone should strengthen passwords and consider using a password manager to stay protected online. (Neil Godwin/Future via Getty Images)Kurt’s key takeawaysThe Louvre’s massive heist shows that even the most respected institutions can make simple cybersecurity mistakes. You can learn from their example by strengthening your own passwords and taking digital safety seriously. Start by creating unique, complex passwords for every account and consider using a password manager to keep them secure and organized. A few minutes of effort today can protect you from financial loss, identity theft or worse.CLICK HERE TO DOWNLOAD THE FOX NEWS APPHave you ever spotted a weak password or security risk that made you shake your head? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com. All rights reserved.  

Thieves steal $100M in jewels from Louvre after museum used own name as surveillance password Read More »

josh hawley senate hearing

AI could drive US unemployment to 20%, senators warn as new bill targets job tracking

NEWYou can now listen to Fox News articles!
A new bipartisan push in Washington is shining a spotlight on AI’s impact on jobs. Senators Josh Hawley, R-Mo., and Mark Warner, D-Va., introduced the AI-Related Job Impacts Clarity Act, which would require major companies and federal agencies to report AI-related job impacts to the U.S. Department of Labor (DOL).The legislation is designed to shed light on how artificial intelligence is affecting the U.S. workforce.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletterKey requirements of the AI-Related Job Impacts Clarity ActThe AI-Related Job Impacts Clarity Act sets out several core obligations:Covered entities must quarterly disclose job effects tied to AI. This includes layoffs, hires and positions left open because tasks were automated.The DOL must compile those disclosures and publish a public report, including to Congress.Non-publicly traded companies may be included under certain thresholds.TRUMP’S AI PLAN IS A BULWARK AGAINST THE RISING THREAT FROM CHINAThe goal is to create a clear, consistent data source on how AI changes employment.Why the AI-Related Job Impacts Clarity Act mattersAI is already reshaping the American workforce, and lawmakers from both parties say the country needs a clear view of what that means for jobs. Sens. Josh Hawley and Mark Warner join forces on a new bipartisan bill to track how AI is changing American jobs. (Valerie Plesch/Bloomberg via Getty Images)Hawley warned that the trend is accelerating. “Artificial intelligence is already replacing American workers, and experts project AI could drive unemployment up to 10 to 20% in the next five years,” Hawley said. “The American people need to have an accurate understanding of how AI is affecting our workforce, so we can ensure that AI works for the people, not the other way around.”Warner agreed, saying good data is key to good policy “This bipartisan legislation will finally give us a clear picture of AI’s impact on the workforce, what jobs are being eliminated, which workers are being retrained, and where new opportunities are emerging,” he said. “Armed with this information, we can make sure AI drives opportunity instead of leaving workers behind.”PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANSTheir shared goal is simple. The AI-Related Job Impacts Clarity Act would make AI’s workforce impact visible and accountable. It gives you and policymakers the hard data needed to guide smarter decisions about automation and employment.Challenges in tracking AI-related job impactsWhile the bill sounds promising, several hurdles remain. The biggest challenge is consistency. Each company decides what counts as an AI-related job impact, which could lead to uneven or incomplete reporting.Smaller businesses might also escape the rules altogether if they fall outside the reporting thresholds. That could leave big gaps in understanding how automation affects local or niche industries.Data quality is another concern. Even with reporting requirements, the system relies on companies to share accurate information. The Department of Labor will need strong verification to make sure the reports reflect reality.LIZ PEEK: AI LAYOFFS COULD SPARK A SOCIALIST SURGE IF AMERICA IGNORES THE WARNING SIGNSAnd while transparency is valuable, it doesn’t automatically protect jobs. The law can expose the problem, but real progress will depend on what policymakers and employers do with that data. The AI-Related Job Impacts Clarity Act would make companies report when automation replaces, adds or reshapes jobs. (Kurt “CyberGuy” Knutsson)What this means for youIf you work in an industry where AI tools are becoming common, this bill could directly affect you. It would make it easier to see how automation changes jobs across the country. You’ll be able to find out which roles are being replaced and which ones are being created.This new level of visibility could also pressure employers to be more transparent about layoffs. Companies may start explaining whether job cuts are truly due to AI or part of broader business shifts. That accountability could help workers plan smarter for the future.With clearer data, policymakers and training programs can step in faster. If large numbers of people in a certain field lose work because of automation, the government could push for retraining or job placement efforts. It may even help workers prepare earlier by learning new digital or technical skills before AI impacts their roles.SEN SANDERS: AI MUST BENEFIT EVERYONE, NOT JUST A HANDFUL OF BILLIONAIRESOverall, this bill puts information in the public’s hands so workers can understand what’s happening to their jobs instead of being left in the dark.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysThe AI-Related Job Impacts Clarity Act marks a major step toward tracking how automation changes the American workforce. It doesn’t stop AI from transforming industries, but it gives workers and policymakers the facts they need to respond. Transparency can’t stop every job loss, but it can help guide smarter policies, retraining programs and career planning. The Department of Labor would publish regular reports showing where AI is creating challenges and new opportunities for workers. (Getty)CLICK HERE TO DOWNLOAD THE FOX NEWS APPIf this new data shows your field is being reshaped by AI, would you start retraining now or wait to see how it plays out? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter Copyright 2025 CyberGuy.com. All rights reserved.  

AI could drive US unemployment to 20%, senators warn as new bill targets job tracking Read More »

crypto scam photo 1

Connecticut man loses life savings in crypto scam

NEWYou can now listen to Fox News articles!
When Joe A. from Shelton, Conn., received a text about a crypto investment opportunity, he thought it was his chance to rebuild after a divorce. Instead, he lost every dollar he had. Joe’s story is a heartbreaking reminder of how easy it is to fall for an online investment scam that promises quick success and easy money.Joe has allowed Cyberguy to tell his powerful story so that others can learn from his experience and protect themselves from similar scams. Here is how it all went down and how you can protect yourself from falling into the same trap.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET After his account access vanished, scammers allegedly demanded more cash to “reactivate” it. By then, Joe’s retirement savings were wiped out. (Gabby Jones/Bloomberg via Getty Images)How the online investment scam beganIn August, Joe got a message from a company calling itself “ZAP Solutions.” They promised that if he invested $30,000, he’d soon have $368,000 in returns. It sounded like a smart move. Like many victims, Joe believed the pitch because it seemed professional and legitimate.But soon, he was led deeper into a trap. Each “short-term investment” required another wire transfer. Before he knew it, Joe had sent every penny, his 401K, IRA, and other investments.When the investment scam fell apart The moment Joe was locked out of his account, panic set in. The scammers demanded more money to “reactivate” it. By the end, Joe had lost $228,000.His mother, Carol, was devastated when she found out. “I was shocked,” she said. “He showed us the screenshots, the messages, he emptied everything.”Joe and his family filed a police report with local authorities and contacted the FBI. But according to officers, recovery is unlikely. “They told us there’s no way to get it back,” Carol said. “These cyber stalkers move the money too fast.”The bigger picture: Online investment scams are rising Joe’s story isn’t unique. The FBI reports that cyber criminals have stolen more than $50 billion from Americans in just five years. Scammers prey on emotion, targeting people who are hopeful, lonely, or in transition.”If it seems too good to be true, it probably is,” Joe said, stating a phrase we all should remember.How to protect yourself from online investment scamsStaying safe starts with awareness and consistent action. Cybercriminals are getting more creative, so protecting your finances means staying alert every step of the way. Follow these proven steps to safeguard your accounts and identity.1) Research before you investAlways verify any investment opportunity before sending money. Look up the company through official government or financial websites, such as the SEC’s Investment Adviser Public Disclosure database or FINRA’s BrokerCheck. Read reviews, confirm licenses and search for scam alerts online.2) Be suspicious of unsolicited messages and use strong antivirus softwareIf a text, email or social media message promises high returns, stop and think. Legitimate firms never cold-contact people about investment offers. Delete suspicious messages immediately and never click on links from unknown sources. Install and regularly update strong antivirus software on all your devices. This can block phishing attempts, malicious downloads, and fake investment platforms designed to steal your data.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Joe’s mother says the family filed police and FBI reports, but recovery is unlikely as criminals move money fast across borders and accounts. (Photo by Silas Stein/picture alliance via Getty Images)Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.3) Check email addresses and website domainsScammers often use domains that look almost identical to real ones. Double-check for misspellings, extra letters or unusual web extensions like “.co” or “.biz.” If you’re unsure, search for the official company site separately in your browser.4) Never wire money to strangersOnce you wire money to a scammer, recovery is nearly impossible. Never send money to someone you’ve only met online, even if they claim to represent a reputable company. Always confirm payment details through verified sources.5) Talk to a trusted financial advisorBefore you invest large sums, get a second opinion from a licensed financial advisor. A professional can spot red flags and unrealistic promises that you might overlook.6) Use a data removal serviceProtect your personal information by using a data removal or privacy service that scrubs your phone number, address and other details from people-search sites. This reduces the chance of scammers finding and targeting you.While no service can guarantee the complete removal of your data from the Internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.7) Enroll in an identity theft protection serviceIf scammers have your personal details, they could try to open credit cards or loans in your name. Enrolling in a reputable identity theft protection service adds another layer of security by monitoring your credit and alerting you to suspicious activity.Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT From antivirus and data-removal services to identity-theft monitoring, CyberGuy shares concrete steps to block phishing, verify firms and protect your money. (Gabby Jones/Bloomberg via Getty Images)See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.8) Report suspicious activity immediatelyIf you believe you’ve been targeted or scammed, act fast. Contact your local police department, your bank and file a report with the FBI’s Internet Crime Complaint Center (IC3). Quick action can sometimes limit further loss or help investigators trace the fraud.Kurt’s key takeawaysJoe’s story is painful, but it’s also powerful. His honesty may stop someone else from losing everything. Online scams thrive when people stay silent, but sharing stories like Joe’s helps others stay alert. So before you trust anyone promising quick profits online, take a pause, verify everything and remember Joe’s story because one moment of caution could save you from a lifetime of regret.CLICK HERE TO GET THE FOX NEWS APPHave you ever received an investment offer that seemed too good to be true? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Connecticut man loses life savings in crypto scam Read More »