memoment editorial

middleast2024

All Analysis and Records Withheld on DoD’s Own Released UAP Footage

The Department of Defense (DoD) has denied a Freedom of Information Act (FOIA) request seeking records connected to the review, redaction, and release of a UAP video published by the All-domain Anomaly Resolution Office (AARO) earlier this year.
The request, filed May 19, 2025, sought internal communications, review logs, classification guidance, legal opinions, and technical documentation tied to the public posting of the video titled “Middle East 2024.” The video, showing more than six minutes of infrared footage from a U.S. military platform, was released in May 2025 and remains unresolved by AARO.
The DoD confirmed that responsive documents exist, but a September 19, 2025, final response stated that all records are being withheld in full.Continue scrolling for more…

The denial cited multiple FOIA exemptions, including:

Exemption (b)(5): covering deliberative inter- and intra-agency material.
Exemptions (b)(7)(A), (B), (C), and (E): law enforcement provisions shielding records that could interfere with enforcement proceedings, risk an unfair trial, invade personal privacy, or reveal law enforcement techniques.

AARO described the video as depicting “an apparent thermal contrast within the sensor’s field of view” that may be consistent with a physical object, but noted that without corroborating data, “the available data does not support a conclusive analytic evaluation.”
The Pentagon’s decision continues a recurring pattern in UAP transparency efforts: footage may be released for public viewing, but records explaining the deliberations and analysis behind such releases remain withheld.
As The Black Vault has previously reported, the DoD has increasingly invoked FOIA’s law enforcement exemption, commonly used to protect criminal investigations, in connection with AARO and UAP-related records. This practice has drawn criticism for applying investigative secrecy provisions to matters that are presented to the public as unresolved anomalies.
The Black Vault has appealed the decision, and the result will be posted, when available.
###
Document Archive

Follow The Black Vault on Social Media:

All Analysis and Records Withheld on DoD’s Own Released UAP Footage Read More »

PSI NewFileDownload pic1

New File Download Process for PSI Large Requests

A recent update to the PSI database improves how large dataset downloads are handled, resulting in more efficient processing for users.

Download requests larger than 1GB are now delivered via email, rather than downloading directly from the website. This allows the system to prepare your files in the background so you can continue working without delays, accessing the files at your convenience once your request is processed.

Why The Change?

This update improves user experience by:

Reducing system lag and download interruptions.

Allowing you to stay productive while files are processed in the background.

Increasing reliability of large downloads.

Delivering files in manageable parts, making them easier to handle and extract.

How Does it Work?

To download files larger than 1GB:

1. Users select 2 or more desired files and click “Download Zip.”

2. In the Prepared Large Download section:

Enter the email address where the download access links should be sent.

Check the box to confirm: “I understand large downloads are delivered in multiple parts via email.”

Click “Send me the links.”

3. Users will receive an email confirming the download request has been submitted.

4. Once the files are ready, users receive a second email with link(s) to access the download. NOTE: Download links are valid for 7 days from the time you receive the email. Be sure to save the requested files before the links expire.

Best Practices

To ensure a smooth and efficient download experience, especially when working with large datasets, follow these best practices to help reduce processing time, prevent errors, and simplify file handling.

Download only what you need: Smaller requests are processed faster.

Split very large requests: If possible, divide and submit large requests into smaller sets to speed up processing.

Avoid simultaneous large requests: Submit one large download at a time for smoother performance.

Before extracting, save all ZIP parts to the same folder: This ensures proper extraction of multi-part downloads.

Download promptly: Remember, download links will expire. Save your files while the link is active.

Use a reliable email address: Double-check for typos and check your spam/junk folder if you don’t receive the emails.

New File Download Process for PSI Large Requests Read More »

google photo 1

Hackers push fake apps with malware in Google searches

NEWYou can now listen to Fox News articles!
When you search Google for apps, it feels natural to trust the first results you see. They’re supposed to be the most reliable, right? Unfortunately, hackers know this too. They’re sneaking fake websites into search results that look just like the real thing. If you click and download from one of these sites, you could end up with malware instead of the app you wanted. In other words, the top search results aren’t always safe, and that’s exactly how scammers trick people. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.NORTH KOREAN HACKERS USE AI TO FORGE MILITARY IDSWhat you need to know about malware in Google searchesResearchers at FortiGuard Labs found that attackers are setting up websites that look almost identical to trusted providers. These sites host installers for apps like Signal, WhatsApp, Deepl, Chrome, Telegram, Line, VPN services and WPS Office. The catch is that these downloads include both the real app and hidden malware.Once you run one, the malware drops files into your system, asks for administrator access and quietly starts spying. It can collect personal information, log everything you type, monitor your screen and even disable your antivirus. Hackers are planting fake apps in Google search results and they look just like the real thing. (Harun Ozalp /Anadolu via Getty Images)Some versions were designed to snoop on Telegram messages. All of this is possible because hackers use a tactic called SEO poisoning, which manipulates Google’s search results so their fake websites appear near the top. Even if you stick to “safe-looking” search links, you could still land on a fraudulent page. How hackers disguise fake apps as real onesSo how do these fake sites end up in your search results in the first place? The attackers use a technique called SEO poisoning. They register lookalike domains, use plugins to game search algorithms and then climb up Google’s rankings. That way, when you search for a trusted app, the fake site may appear as one of the first results.According to FortiGuard Labs, this particular campaign mainly targeted Chinese-speaking users, but the method is being used everywhere. In fact, earlier reports from Cisco Talos showed ransomware groups pushing fake downloads of AI tools like ChatGPT or InVideo. Others used spoofed sites for PayPal, Microsoft, Netflix and Apple. Sometimes, attackers even buy sponsored ads so that their malicious links appear right at the top.The scary part is that you might not even realize you installed something dangerous. Because the fake installer includes the real app, everything seems to work fine. Meanwhile, the hidden malware is already active on your device. That makes it harder to detect and much easier for attackers to steal your data.6 ways you can stay safe from malware in Google SearchesI have listed some steps below that you can take to protect yourself from these fake apps and the malware they carry.1) Download apps only from official sourcesThe safest way to avoid malware is to get software directly from the official website or verified app stores like Google Play or the Apple App Store. Avoid third-party download sites or search results that look suspicious, even if they appear at the top of Google.2) Double-check website domainsBefore clicking “download,” carefully inspect the domain name. Hackers often create lookalike domains that look nearly identical to real ones, adding small spelling changes or extra words. Even small differences can indicate a fake site designed to deliver malware.TOP 5 OVERPAYMENT SCAMS TO AVOID Cybercriminals are disguising malware as trusted apps, tricking users through poisoned search results. (Dilara Irem Sancar/Anadolu via Getty Images)3) Install a reliable antivirus softwareMalware can install itself quietly and avoid detection. Using a strong antivirus solution can help identify and block malicious files before they cause damage. Make sure your antivirus is always updated so it can recognize the latest threats, including Hiddengh0st and Winos variants.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.4) Use a password managerIf malware tries to capture your passwords, a password manager can protect you. It generates strong, unique passwords for each account and stores them securely. Many password managers can also alert you if your credentials appear in a data breach.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.5) Be cautious with ads in search resultsAttackers sometimes buy sponsored Google ads to push malware. Even if an ad looks like it comes from a trusted brand, verify it carefully before clicking. Stick to official websites whenever possible.6) Keep your software and system updatedOutdated operating systems and applications can have vulnerabilities that malware exploits. Regularly updating your software ensures you have the latest security patches and reduces the risk of infection.HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS SEO poisoning is letting hackers hijack Google results targeting user’s data. (Nicolas Economou/NurPhoto via Getty Images)Kurt’s key takeawayHackers are turning Google search into their delivery system for malware. By blending real apps with hidden spyware, they can make almost anyone a victim. The rise of SEO poisoning shows that you cannot rely only on search rankings to stay safe. If you are careful about where you download your apps, you can keep your devices and data out of a hacker’s hands.CLICK HERE TO GET THE FOX NEWS APPHow much do you trust Google to filter out malicious sites before you click? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Hackers push fake apps with malware in Google searches Read More »

hubble lmc n44c potw2536a

Hubble Surveys Cloudy Cluster

This NASA/ESA Hubble Space Telescope image released on Sept. 12, 2025, features a cloudy starscape from an impressive star cluster. This scene is in the Large Magellanic Cloud, a dwarf galaxy situated about 160,000 light-years away in the constellations Dorado and Mensa. With a mass equal to 10–20% of the mass of the Milky Way, the Large Magellanic Cloud is the largest of the dozens of small galaxies that orbit our galaxy.
The Large Magellanic Cloud is home to several massive stellar nurseries where gas clouds, like those strewn across this image, coalesce into new stars. Today’s image depicts a portion of the galaxy’s second-largest star-forming region, which is called N11. (The most massive and prolific star-forming region in the Large Magellanic Cloud, the Tarantula Nebula, is a frequent target for Hubble.) We see bright, young stars lighting up the gas clouds and sculpting clumps of dust with powerful ultraviolet radiation.
This image marries observations made roughly 20 years apart, a testament to Hubble’s longevity. The first set of observations, which were carried out in 2002–2003, capitalized on the exquisite sensitivity and resolution of the then-newly-installed Advanced Camera for Surveys. Astronomers turned Hubble toward the N11 star cluster to do something that had never been done before at the time: catalog all the stars in a young cluster with masses between 10% of the Sun’s mass and 100 times the Sun’s mass.
The second set of observations came from Hubble’s newest camera, the Wide Field Camera 3. These images focused on the dusty clouds that permeate the cluster, providing us with a new perspective on cosmic dust.
@NASAHubble

Hubble Surveys Cloudy Cluster Read More »

b862b0f9 1 north korean hackers use ai to forge military ids

North Korean hackers use AI to forge military IDs

NEWYou can now listen to Fox News articles!
A North Korean hacking group, known as Kimsuky, used ChatGPT to generate a fake draft of a South Korean military ID. The forged IDs were then attached to phishing emails that impersonated a South Korean defense institution responsible for issuing credentials to military-affiliated officials. South Korean cybersecurity firm Genians revealed the campaign in a recent blog post. While ChatGPT has safeguards that block attempts to generate government IDs, the hackers tricked the system. Genians said the model produced realistic-looking mock-ups when prompts were framed as “sample designs for legitimate purposes.”Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter  Example of an AI-Generated Virtual ID card. (Genians)How North Korean hackers use AI for global espionageKimsuky is no small-time operator. The group has been tied to a string of espionage campaigns against South Korea, Japan and the U.S. Back in 2020, the U.S. Department of Homeland Security said Kimsuky was “most likely tasked by the North Korean regime with a global intelligence-gathering mission.” Genians, which uncovered the fake ID scheme, said this latest case underscores just how much generative AI has changed the game.”Generative AI has lowered the barrier to entry for sophisticated attacks. As this case shows, hackers can now produce highly convincing fake IDs and other fraudulent assets at scale. The real concern is not a single fake document, but how these tools are used in combination. An email with a forged attachment may be followed by a phone call or even a video appearance that reinforces the deception. When each channel is judged in isolation, attacks succeed. The only sustainable defense is to verify across multiple signals such as voice, video, email, and metadata, in order to uncover the inconsistencies that AI-driven fraud cannot perfectly hide,” Sandy Kronenberg, CEO and Founder of Netarx, a cybersecurity and IT services company, warned. North Korea is not the only country using AI for cyberattacks.

North Korean hackers use AI to forge military IDs Read More »

1 10 ios 26 tricks that help you get more out of your iphone

10 iOS 26 tricks that help you get more out of your iPhone

NEWYou can now listen to Fox News articles!
iOS 26 has arrived, bringing a mix of practical upgrades and fun new features that make your iPhone smarter and easier to use. Updating only takes a few minutes, and it ensures you get the latest tools along with Apple’s newest security fixes. From smarter spam filters in Messages to custom alarm snooze times and even polls in group chats, iOS 26 is packed with ways to simplify your day. Here’s how to install iOS 26 and start exploring its best features right away.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONESign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter Updating to iOS 26 takes just a few minutes of time. (Kurt “CyberGuy” Knutsson)How to update your iPhone to iOS 26Updating to iOS 26 takes just a few minutes, and it ensures you get the latest features and security fixes. Make sure your iPhone is charged and connected to Wi-Fi before you start.Follow these steps:Open the Settings app on your iPhone.Tap General.Select Software Update.If iOS 26 is available, tap Upgrade to iOS 26.Click Update Now.Enter your passcode if asked, then agree to the terms.Wait for the download and installation to finish. Your iPhone will restart with iOS 26. Your phone will restart with the new update after following the process.

10 iOS 26 tricks that help you get more out of your iPhone Read More »

trump musk ai

Fox News AI Newsletter: Trump, Musk aim for dominance

The Trump administration has reached an agreement with the General Services Administration to implement Grok.  (Getty Images)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Trump admin reunites with Elon Musk in pursuit of AI dominance: ‘Benefit of the country’- Kodiak AI makes $2.5B Nasdaq debut- ‘100 times faster than human thought’: Qualcomm CEO teases new AI laptopGAME CHANGER: The Trump administration agency that manages the government’s real estate holdings, procurement and technology services is partnering with Elon Musk’s xAI in a move it says will cost effectively streamline federal workflow.ROLLING IN IT: Kodiak AI founder and CEO Don Burnette details the company’s ‘completely autonomous’ tractor-trailers on ‘The Claman Countdown.’OUTHINKING HUMANS: Qualcomm CEO Cristiano Amon discusses his partnership with a Saudi-owned A.I. company and the future of PCs on ‘The Claman Countdown.’KICKER: Qualcomm CEO Cristiano Amon discusses his partnership with a Saudi-owned A.I. company and the future of PCs on ‘The Claman Countdown.’TECH IN SPORTS: As the NFL’s popularity has grown, so has football fans’ desire to play fantasy football and run their own teams. Super Bowl champion Nick Foles told Fox News Digital that AI has helped him get into fantasy football in his post-playing career.  Nick Foles, No. 9 of the Indianapolis Colts, drops back to pass during the game against the Detroit Lions at Lucas Oil Stadium on Aug. 20, 2022, in Indianapolis, Indiana. (Michael Hickey/Getty Images)POWERING AI: The $500 billion Stargate project with the aim of giving the U.S. an edge in the artificial intelligence race is moving forward following the announcement of five new AI data center sites revealed on Tuesday by the companies investing in the project.BIG MONEY: Chipmaker Nvidia plans to invest up to $100 billion in artificial intelligence firm OpenAI, the companies announced on Monday.POWER GRID PANIC: The rapid advancement of artificial intelligence is putting newfound urgency in the push for Congress to streamline the permitting process for new energy projects.DANGEROUS MIX: AI browsers are no longer just an idea; they’re already here. Microsoft has built Copilot into Edge, OpenAI is testing a sandboxed browser in agent mode and Perplexity’s Comet is one of the first to fully embrace the concept of browsing for you. AI browsers promise convenience, but security experts warn they can fall for online scams faster than humans. (Photographer: David Paul Morris/Bloomberg via Getty Images)Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Trump, Musk aim for dominance Read More »

phishing scam photo 1

Scammers are abusing iCloud Calendar to send phishing emails

NEWYou can now listen to Fox News articles!
Phishing attacks are becoming increasingly sophisticated, and the latest scam takes exploitation of a trusted platform to a new level. Instead of sending generic or suspicious-looking emails, attackers are now abusing Apple’s iCloud Calendar invite system to deliver phishing content directly from Apple’s own email servers.This clever tactic allows the fraudulent messages to bypass spam filters and appear more legitimate to unsuspecting users. The goal is to alarm you into calling a scammer’s fake support number under the pretense of disputing a fraudulent PayPal transaction. Once contacted, you are manipulated into granting remote access to your devices or sharing sensitive data.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS Scammers exploit Apple’s iCloud Calendar to deliver phishing invites that bypass spam filters. (Brent Lewin/Bloomberg via Getty Images)How the scam uses iCloud Calendar invites to bypass securityThe heart of this scam lies in abusing Apple’s official infrastructure to lend credibility to a phishing attempt. Instead of using a suspicious or easily flagged email address, the attackers send calendar invites from Apple’s genuine domain, noreply@email.apple.com, as reported by Bleeping Computer.The attacker embeds the phishing message in the “Notes” section of the calendar event, making it appear as a legitimate notification. They send the calendar invite to a Microsoft 365 email address they control, which is part of a mailing list. As a result, the invite is automatically forwarded to multiple real targets, broadening the scam’s reach.Typically, when emails are forwarded, SPF (Sender Policy Framework) checks fail because the forwarding server isn’t listed as an authorized sender. However, Microsoft 365 uses a technique called the Sender Rewriting Scheme (SRS), which rewrites the return path so that the message still passes SPF checks.This makes the email appear fully legitimate to both the recipient’s inbox and automated spam filters. As a result, the message is far more likely to reach a user’s inbox without being flagged, increasing the chance the victim will take the bait.SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD Cybercriminals leverage Microsoft 365 forwarding and Apple’s email domain to outsmart filters. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images)Why these phishing scams are particularly dangerousWhat makes this campaign especially dangerous is the sense of legitimacy it conveys. Because Apple’s official servers send the email directly, users are far less likely to suspect foul play. The message itself aims to panic the recipient by falsely claiming a large PayPal transaction occurred without the recipient’s consent. The message includes a phone number to “contact support” and dispute the charge, but, in reality, it connects the victim to a scammer.Once the victim calls the number, the scammer poses as a technical support agent and attempts to convince the caller that the computer has been compromised. The next step is typically to ask the victim to download remote access software under the guise of issuing a refund or securing the account.In reality, this access is used to steal banking information, install malware or exfiltrate personal data. Because the original message passed security checks and seemed credible, victims often don’t think twice before acting.DON’T FALL FOR THIS BANK PHISHING SCAM TRICK Fraudsters are hijacking iCloud Calendar invites to trick users into calling fake support lines. (Jonathan Raa/NurPhoto via Getty Images)6 ways you can stay safe from iCloud Calendar scammersI have listed some useful steps you can take to protect yourself from falling victim to these increasingly sophisticated phishing scams:1) Treat unexpected calendar invites with cautionIf you receive an unexpected calendar invite, especially one containing a strange message or alarming claims, don’t open it or respond. Legitimate companies rarely send payment disputes or security warnings through calendar invites. Always verify suspicious claims by logging into your official account directly.2) Avoid calling numbers listed in emails or calendar invitesPhishing scams often include phone numbers that connect you to fraudsters posing as support agents. Instead of calling the number in the message, use official contact details found on the company’s official website.3) Install trusted antivirus softwareAntivirus programs protect your computer from malware and phishing sites by blocking suspicious downloads and warning you about unsafe websites.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Also, keeping your antivirus updated ensures it can defend against the latest threats.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.4) Remove your personal data from public listingsHackers are able to send you these phishing emails because they have your data. Using a personal data removal service helps scrub your personal information from data broker websites. This makes it significantly harder for attackers to gather details about you and craft convincing, targeted phishing attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.5) Use a password managerA password manager helps you generate and securely store strong, unique passwords for every account. This reduces the risk of reusing weak passwords that scammers can easily exploit to gain unauthorized access to your accounts.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.6) Keep software and systems updatedRegularly updating your operating system, browser and applications helps patch security vulnerabilities that attackers often exploit in phishing scams. Staying current with updates minimizes your exposure to known threats.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayScammers are taking phishing attacks in a disturbing new direction by manipulating trusted platforms to deliver malicious content. The safest approach is to treat any unexpected calendar invite, especially those with alarming messages or strange contact numbers, with extreme caution. Never call the number provided in the message or click on any links. Instead, go directly to official websites or your account’s official dashboard to verify suspicious activity.Have you ever been targeted by a phishing scam disguised as an official message? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Scammers are abusing iCloud Calendar to send phishing emails Read More »

smartphone health photo 1

Best ways to track your meds on iPhone and Android

NEWYou can now listen to Fox News articles!
Keeping track of medications and medical history can feel overwhelming, especially if you’re caring for yourself and a spouse. Olaf from Valley Stream, New York, put it this way:”I’m 86, just switched to iPhone. Have trouble finding a system to keep mine and my wife’s medications and medical histories. It seems we need these for each wellness visit. Appreciate your easy suggestions.”Olaf’s experience is common. Many people struggle to keep their health details organized, especially when doctor visits pile up. The good news? Both iPhone and Android phones come with simple, secure tools that make it easier than ever to track prescriptions, reminders and important health information.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/ newsletter.APPLE WATCH SERIES 11 GETS FDA-CLEARED ALERT FOR ‘SILENT KILLER’ CONDITION Both iPhone and Android phones offer built-in health apps that can track prescriptions, reminders and medical details in one secure place. (Silas Stein/picture alliance via Getty Images)Use the built-in Health appsiPhone Health appYour iPhone already has a Health app installed, and it gives you two ways to manage important health details:Medical ID (for emergency info only)This section is designed so that first responders and doctors can see your critical health details from the lock screen if needed. Adding medications here does not create reminders. It’s best for storing:Medications you’re takingAllergiesConditionsEmergency contactsDoctorsHow to set up Medical ID:Open the Health app (white icon with a red heart).Tap your profile photo in the top right.Select Medical IDScroll down to where you see Medications, Allergies, Emergency Contacts, Conditions, and click Add Add medications, conditions, allergies, doctors and emergency contacts.Then tap Done in the upper rightTurn on Show When Locked so this info is visible on your lock screen in case of an emergency.Everything you add stays private and encrypted, but you can choose to share details with your doctor or family.iPhone medications feature (for reminders & tracking)If you want your iPhone to remind you to take your meds and let you log each dose, you’ll need to use the dedicated Medications feature (introduced in iOS 16):Open the Health app.Tap Browse.Click Medications.Scroll down and tap Add a Medication.Enter the details in the search bar or scan the pill bottle with your iPhone’s camera by clicking the camera icon next to the search bar.Choose the Medication Type and click Next. Add the medication strength and choose Unit. A blue check will appear next to the unit, then click Next.Set the schedule and dosage by first adding “When will you take this?  Then add “At what time?” and the”Duration”. Then tap Next at the bottom of the screen.Choose the Shape of the medication by tapping one of the examples, and then tap Next at the bottom of the screen.Choose colors under Shape and Background, then tap Next. Review details. You can add Optional Details like Display Name or Notes.  Then, click Done. Now, you’ll get notifications on your iPhone and can track whether you’ve taken your meds. The alert will give the option to click, “Taken” or “Skipped”. If you have more than one medication listed you can tap “Log All as Taken.”  Once you click your selection go ahead and click Done. SMART TECH TOOLS THAT HELP YOU AVOID DANGEROUS FALLS Samsung Health and third-party apps like Medisafe or MyTherapy help Android users manage medications and set refill reminders. (Michael Nagle/Bloomberg via Getty Images)Android: Samsung Health appSamsung Health comes pre-installed on most Samsung phones. It works as a standalone tracker for fitness, sleep and even medication, no extra apps required.How to set up the Samsung Health app Settings may vary depending on your Android phone’s manufacturer Open the Samsung Health app (often pre-installed, or download from the Google Play Store).Tap Get Started or Start and allow the necessary permissions.Click Continue.Scroll down and select Medications.Click Get Started.Under Add medication, click Enter medication name.Enter the Medication, Type and StrengthThen tap Next You can choose the shape from the icons provided, upload an image or take an image from the options, or tap Skip Next, you can choose a color , then tap Next Then, set schedule, Every day, Every X days, Every week, Every month or As Needed.Then click Set time and dosage, Once, twice , 3 times, 4 times, 5 times or Custom.  Then tap Done. Then tap Next.Now to Review medication. Under Quantity, you can add the Number of remaining pills. Then, under it you can enable Refill reminder. Hit Save.Steps to set up the Samsung Health app (Kurt “CyberGuy” Knutsson)Under this next section, when you add medications, they’ll be checked for possible interactions with other medications you take, as well as with the lifestyle factors. If any of these factors, such as tobacco, cannabis, alcoho or grapefruit juice, don’t apply to you, you can turn them off so you won’t receive warnings about them. Then tap Next.Next, medications that contain allergens like peanuts, milk and eggs can potentially cause allergic reactions. They’ll let you know if a medication you’ve added contains an ingredient that could cause an allergic reaction. You can click Add new allergy or click the + sign next to Peanut Family, Milk Thistle or Egg and Egg Derivatives. Then click Done.A pop-up will appear at the bottom that reads Medication added. Add another? Click OK.Use medication reminder appsTo track meds, non-Samsung Android users usually need a third-party app like:Medisafe (very popular, integrates with Wear OS watches).MyTherapy (simple reminder app with symptom logging).For a focused tool just for meds, these 3 apps work on both iPhone and Android:1) MediSafe Pill ReminderAdd medications, dosages and schedules. Get reminders when it’s time to take them. You can even manage more than one family member in the app.Download MediSafe from the App Store or Google Play.Tap Get started Open the app and tap “Add Med.”Enter the medication name in the search bar, and then when it appears, tap it. Select “What form is the med?” such as pill, injection, solution, drops, inhaler, powder or other.Enter, “What are you taking it for?”Enter, “How often do you take it?Enter, “When do you need to take the dose? Then, click Next. You are almost done. Would you like to: Set treatment duration, Get refill reminders? Add instructions? or Change the med icon?If not, click Save. A pop-up screen will say, “You have successfully added medication”. With these steps, you’ll never miss a dose, and you can even track medications for your spouse in the same account.2) MyTherapyDownload MyTherapy from the App Store or Google Play.Open the app.Tap Get started.Tap Accept all or Go to settings It will ask you, “To start with what should we call you?” Add a nickname.  or Skip. You’ll be asked to add your Gender, Year of Birth or you can just skip that.Then click “I’m ready!”Tap Medications.Click Search by name Type the medication in the search bar.  Then, click your medication. Choose “How often do you take this medication? Once daily, twice, daily, On demand (no reminder needed). Then tap Next. Add “When would you like to be reminded? Time and Dose. Enable next to where it says, “Enable Critical Alerts”.Tap Next. Next, you will be asked, “Do you want to get reminders to refill your inventory?” If yes, enable next to where it says Remind Me. Next select your Current Inventory and Remind me when. Click Save. It will ask you, What do you take this for? Make a selection and then click Add. Then scroll down to the bottom of the page and click All set!It may ask you to click Allow notifications. Both apps are free to start, simple to use and highly rated, making them great choices for organizing medications and health records.HOW TO TELL IF YOUR SAMSUNG GALAXY TABLET HAS BEEN HACKED Smart pill dispensers add another layer of safety by automatically releasing the right dose at the right time, reducing risky mistakes. (Armin Weigel/picture alliance via Getty Images)Smart pill dispensers prevent risky mistakesEven with phone apps and reminders, some people prefer a hands-off solution. That’s where smart pill dispensers come in. These devices automatically release the right dose at the right time, so you don’t have to worry about forgetting or double-dosing.For older adults, this can reduce dizziness or grogginess from medication mistakes, issues that often raise fall risks. Dispensers also provide peace of mind for caregivers who want to be sure their loved one is staying on track.What to look for in a smart dispenser:Built-in reminders (lights, sounds or phone alerts)Dose tracking so you can confirm meds were takenCaregiver notifications if a dose is missedSmart dispensers cost more than apps, but they add an extra layer of safety and independence for anyone juggling multiple prescriptions. Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysStaying on top of medications can feel like a full-time job, but you don’t have to manage it alone. With the built-in tools on iPhone and Android, plus easy-to-use apps, you can take control of your health with just a few taps. These features give you peace of mind, help you stay consistent and make doctor visits less stressful. For those who need extra support, smart pill dispensers add another layer of safety. They take the guesswork out of managing multiple prescriptions and provide reassurance for both you and your loved ones. By combining apps, reminders, and devices, you can create a system that fits your lifestyle and keeps your health details organized.Would you be more likely to rely on your phone’s built-in health app or a dedicated reminder app to stay on top of your medications? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Best ways to track your meds on iPhone and Android Read More »

iss047e137096orig

Golden Lake

Golden sunglint highlights Lake Balkhash in this May 31, 2016, photo taken from the International Space Station. The large lake in Kazakhstan is one of the largest lakes in Asia and is the 15th largest lake in the world.
Since the space station became operational in November 2000, crew members have produced hundreds of thousands of images of the land, oceans, and atmosphere of Earth, and even of the Moon through Crew Earth Observations. Their photographs of Earth record how the planet changes over time due to human activity and natural events. This allows scientists to monitor disasters and direct response on the ground and study a number of phenomena, from the movement of glaciers to urban wildlife.
In addition, other activity aboard the space station helps inform long-duration missions like Artemis and future human expeditions to Mars.
Image credit: NASA/Tim Kopra

Golden Lake Read More »