memoment editorial

70702

The Israeli-Iranian War: How We Got Here & What It Means

Israel’s strikes against Iran’s military and nuclear infrastructure, as well as its key military and security leadership, shocked the world. How did we arrive here? What did the Israeli strikes accomplish? What options does Iran have? How did the Iranian-U.S. nuclear talks fail to forestall this? Will the United States become a party to the […]

The Israeli-Iranian War: How We Got Here & What It Means Read More »

1 heartless scammers use venmo to steal donations from cancer nonprofit supporters intro

Fake Venmo accounts are stealing donations from real charities

NEWYou can now listen to Fox News articles!
Apps like Venmo, Zelle, Cash App, and PayPal have changed how we move money. They are fast and convenient, but with that ease comes exposure. If you send funds to the wrong person, they are likely gone for good. There is often no real path to recovery, especially when the recipient disappears behind a fake username and an unresponsive support system.This vulnerability becomes even more dangerous in moments of crisis. During natural disasters, high-profile social movements, or health emergencies, people are moved to give. Scammers know this and exploit the impulse. One such scam involved a fake Venmo account pretending to collect donations for a Minnesota nonprofit after the death of George Floyd. The account looked legitimate, but the funds never reached the organization.A similar scam is targeting Miles Perret Cancer Services, a nonprofit based in Louisiana. Scammers have created a fraudulent Venmo account that closely mimics the legitimate Venmo handle of the cancer nonprofit organization. They are using this fake account to trick well-meaning donors into sending money, believing they are supporting the real charity.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Zelle and Venmo apps (Kurt “CyberGuy” Knutsson)Fake Venmo account mimics real charity: How 1 character can fool youMiles Perret Cancer Services (MPCS) provides support to families facing cancer diagnoses. They recently discovered that a fraudulent Venmo account is impersonating their official one. Their real handle is @milesperretcs. The scammer’s account uses @milesperretcs_, a nearly indistinguishable copy.To the average person, the difference is invisible. That is precisely what makes it dangerous.”We reported this account through the app more than 24 hours ago,” Timothy Rinaldi, executive director of MPCS, told Cyberguy. “There has been no follow-up from Venmo. We tried the live chat option, but it was abruptly closed with no resolution.”Instead of helping, Venmo routed Rinaldi through generic FAQs and legal disclaimers. Even after he was connected with a live support agent, the responses were standard scripts. He was told that the issue had been escalated, but no one could provide a timeline beyond a vague window of three to five business days. Real and fake Venmo accounts (Kurt “CyberGuy” Knutsson)FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICECharity scams on Venmo: How scammers trick donors using fake accountsFake Venmo accounts have been used in recent years to exploit donation drives for hurricane relief, animal shelters, medical funds, and other causes. The formula is simple. Take a known nonprofit, tweak the username slightly, and ride the momentum of goodwill. By the time anyone catches on, the money is gone and the damage is done.The incident involving MPCS is not an isolated case. In December 2024, Final Victory Animal Rescue, a nonprofit based in South Carolina, discovered a Venmo account impersonating the organization and collecting donations intended for the real charity. The group’s general manager, Michael Sniezek, confirmed the account had been receiving funds from unsuspecting donors before the issue was flagged. In another case, Alone No More Dog Rescue, a Phoenix-based nonprofit, posted on Facebook that fraudulent Venmo accounts had been targeting its past donors, sending them payment requests and soliciting additional funds under false pretenses.MPCS has filed a report with the Federal Trade Commission, but there is no guarantee of quick resolution. The fraudulent account remains active as of press time. It is unclear how much has already been lost or whether Venmo will recover and return any of it. A hacker at work (Kurt “CyberGuy” Knutsson)THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALLVenmo confirms fake accounts were removed and shares how to stay safeVenmo confirmed that the imposter accounts were removed promptly after being reported. They recommend reporting suspicious activity directly within the Venmo app and contacting customer support for further assistance.To help users avoid future scams, Venmo encourages everyone to review its official security tips on how to recognize impersonation attempts and learn how to spot and avoid charity-related scams.They also shared the following tips to help users verify real Venmo profiles and stay safe when sending money:Double-check the Venmo username (handle): Look closely for misspellings, extra characters or attempts at impersonation. Use Venmo QR codes: Scan QR codes directly from the Venmo app to ensure you’re sending money to the right person. Donate only to verified Venmo charity accounts: These are vetted and marked with verification badges. You can find them here.Heed Venmo’s automatic warnings: If Venmo flags a payment as suspicious, pause and verify before sending money. These alerts are designed to protect you from scams.How to avoid Venmo scams: 11 expert tips to protect your moneyScammers aren’t just targeting charities. They’re after anyone and everyone. Here are a few ways to protect yourself and keep your hard-earned money safe.1) Always access the payment app from the official app or website, and not from any third-party platforms or services.2) Look at the security settings that the payment app offers and make sure they’re all set to the highest and most protective settings.3) Consider using a personal data removal service to protect your privacy and reduce your risk of scams. Scammers who target payment apps like Venmo, Zelle, Cash App, and PayPal often rely on information found on data broker and people-search sites to craft convincing impersonations or phishing attempts. These sites can list your name, address, phone number, and even connections to organizations you support, making it easier for fraudsters to trick you or others into sending money to fake accounts.Personal data removal services work by automatically removing your information from hundreds of data broker sites, making it much harder for scammers to find and misuse your details. By scrubbing your data from these sources, you lower your risk of being targeted in payment app scams and reduce the likelihood that someone could impersonate you or a nonprofit you care about. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web 4) Create a strong, unique and complex password for each of your mobile payment apps and change it often. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.5) Enable two-factor authentication, which means that you need to enter a code or use your fingerprint or face to unlock your account to prevent unauthorized access. This way, even if someone knows your password, they can’t log in without your device or confirmation.6) Lock your device and log out of your apps. You should always lock your phone with a password, PIN, pattern, fingerprint, or face. Never share your password, PIN, or security code with anyone. You should also log out of your mobile payment apps after each use and turn off the auto-login feature. This way, even if someone takes or borrows your device, they can’t access your mobile payment apps without your approval.7) Verify the identity and legitimacy of the sender or receiver. You should always check the name, photo, username, and contact information of the person or organization you are sending money to or receiving money from before accepting or sending any payment requests. You should also confirm the reason and amount of the transaction before you agree to it. If you are not sure or have any doubts, you should contact the person or organization directly through another way, such as a phone call, text message, or email, but only if you know for sure that those forms of communication are legitimate. You should never send money or give your account details to anyone you don’t know or trust, or anyone who asks you to do so out of the blue.8) Link your Venmo to a credit card as opposed to a debit card, so you can dispute a charge from scammers more easily. However, keep in mind, linking a credit card to your payment app can provide additional protection in the event of fraud, but this can come with extra costs in terms of transaction fees.9) Try not to keep a balance in your money-transferring apps. You have a much better chance of being helped by your bank or credit card company when it comes to fraud than you do from a money-transferring app.10) Use strong antivirus software and never click on links from unknown sources, especially when an email or text appears to have come from the payment App. Protect yourself from accidentally clicking on malicious links by running antivirus software on your device.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.11) Monitor your account activity and report any suspicious or unauthorized transactions. You should set up notifications from your payment app and your bank via text or email, and check your account activity regularly. Look for any signs of fraud, such as payments you didn’t make or receive, or changes to your account settings or information.Kurt’s key takeawayUnlike traditional banks, which are bound by federal consumer protection laws and fraud resolution timelines, peer-to-peer payment apps operate in a much looser regulatory environment. Services like Venmo often state in their user agreements that they are not responsible for mistaken or unauthorized payments unless there is clear evidence of account compromise or technical malfunction. Venmo’s only suggestion here was to respond to a support ticket and wait. There was no emergency fraud hotline, no dedicated contact for nonprofits, and no indication that urgent action would be taken. Payment apps that allow donations to flow as quickly as a text message must also bear the responsibility of keeping those transactions safe. When a nonprofit has to beg for support just to protect its own identity, something is broken.Should payment platforms be held responsible for losses caused by impersonation scams? Let us know by writing to us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

Fake Venmo accounts are stealing donations from real charities Read More »

1 new robots make ai something anyone can try at home

New robots make AI something anyone can try at home

NEWYou can now listen to Fox News articles!
Hugging Face, a well-known name in AI development, is making big moves in the world of robotics. The company has just introduced two open-source humanoid robots, HopeJR and Reachy Mini, designed to make advanced robotics more accessible to everyone, from researchers and developers to students and hobbyists.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Reachy Mini (Hugging Face) (Kurt “CyberGuy” Knutsson)Meet HopeJR: The full-size humanoid for real-world tasksHopeJR is Hugging Face’s new full-size humanoid robot. It stands out for its impressive 66 actuated degrees of freedom. This means it can walk, move its arms, and perform a wide range of independent gestures, making it a versatile platform for research, experimentation, and even household tasks in the future. Imagine a robot that can help with chores or serve as a hands-on learning tool. HopeJR is designed to be just that.One of the biggest talking points is price. Hugging Face aims to keep HopeJR affordable, with an estimated cost of around $3,000. That is a fraction of what most full-scale humanoid robots cost, opening the door for smaller labs, schools, and dedicated enthusiasts to get involved in advanced robotics development. HopeJR (Hugging Face) (Kurt “CyberGuy” Knutsson)HUMANOID ROBOT MALFUNCTIONS AND SPARKS VIRAL PANICReachy Mini: A desktop companion for AI explorationIf you are looking for something more compact, Reachy Mini is Hugging Face’s answer. This desktop robot stands about 11 inches tall and is packed with features, including a camera, microphone, speaker, and a full six-degree-of-freedom neck for expressive movement. It can move its head, listen, speak, and interact with AI applications, making it a fun and practical tool for developers and educators alike.Reachy Mini is expected to cost between $250 and $300. It is designed to be a hands-on gateway into robotics, letting users build, customize, and experiment with embodied AI. Plus, it integrates seamlessly with Hugging Face Spaces, giving access to over 500,000 AI apps on the Hugging Face Hub. Reachy Mini (Hugging Face) (Kurt “CyberGuy” Knutsson)AI HUMANOID ROBOT IS CHANGING THE WAY YOU BUY CARS AT DEALERSHIPSWhy open source matters in roboticsBoth HopeJR and Reachy Mini are fully open source. This means anyone can assemble, rebuild, and understand how these robots work. Hugging Face’s CEO, Clem Delangue, emphasized that this approach helps keep robotics open and accessible rather than dominated by a handful of companies with proprietary black-box systems. The community-driven model encourages collaboration and innovation, allowing users to share their improvements and build on each other’s work.HOW CAN I GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES? Reachy Mini (Hugging Face) (Kurt “CyberGuy” Knutsson)CHINESE HUMANOID ROBOT WITH EAGLE EYE VISION AND POWERFUL AIThe road to launch and how to get involvedHugging Face has not set an exact shipping date for these robots, but the company expects to deliver the first units by the end of the year. There is already a wait list open for those interested in getting their hands on HopeJR or Reachy Mini.This expansion into robotics builds on Hugging Face’s recent acquisition of Pollen Robotics, the creators of the original Reachy robot. That partnership gave Hugging Face the expertise needed to accelerate hardware development and bring these new robots to market quickly.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES HopeJR (Hugging Face) (Kurt “CyberGuy” Knutsson)Kurt’s key takeawaysIf you have ever wanted to dive into robotics or just see what AI can do in the real world, now is a great time to jump in. Hugging Face is making it easier than ever for anyone to experiment, build, and learn with robots that are open, affordable, and packed with potential. Whether you are a student, a developer, or just someone who loves to tinker, HopeJR and Reachy Mini could be your ticket to hands-on experience with the future of AI.What would you create or change in your daily life if you had your own open-source humanoid robot at your fingertips? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

New robots make AI something anyone can try at home Read More »

fairy abduction 1920x740 1

Abductions by Fairies and Fairy Imposters

Fairy lore goes back centuries and can be found in a wide variety of diverse cultures. Although the modern image of fairies is that of benevolent glittering winged beings flitting and cavorting amongst the trees of a forest, the attitude towards fairies also varied greatly from tradition to tradition. In some accounts, fairies have a

Abductions by Fairies and Fairy Imposters Read More »

1 a close call with a facebook scam that tried to steal credit card info

A close call with a Facebook scam that tried to steal credit card info

NEWYou can now listen to Fox News articles!
Have you ever received a suspicious email or pop-up that made your heart race, even for a second? You’re not alone. Online scams are getting more convincing every day, and even the most tech-savvy among us can find ourselves just one click away from trouble.Phishing is one of the most common ways scammers can access your personal information. Many people fall victim to it every day, which is why this email we received was not surprising.Just ask “Pamela,” who wrote to us: “I thought I couldn’t be scammed, but I almost was.”Her story is a reminder that anyone can fall for a well-executed scam. We’ll share what happened to her below, how she caught on just in time, some tips on how to avoid being scammed on Facebook, and how to report it.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Facebook app (Kurt “CyberGuy” Knutsson)Facebook scam warning: How Pamela almost fell for a tech support hoax”I was working on my Facebook and it suddenly had a screen flash and voice that said the computer was locked and I needed to call a number to report the breach. I thought it was Microsoft so I called the number. The guy was good. He gave me a name and employee number and we went through some things on my computer which brought up a screen that said ‘scammers were listening’ and my IP was being used on the Porn Hub. I thought, how could that be? But still, I was obtuse.”The screen listed what he said were all my credit cards that had been compromised, but only the beginning numbers: 3xxx, 4xxx, 5xxx, etc. He said in order to make a report to the FTC I needed to tell him all of the numbers. I told him I was not going to do that even though he insisted I had to for the ‘report.’ Then he said he would transfer me to the FTC and gave me a number in case we were disconnected. A different guy answered, gave me his name and said he was Andrew Ferguson, head of the FTC.”I’ve been in politics and business for over 50 years. I looked him up while still on the phone and realized the head of the FTC wouldn’t be answering a support line. When I refused to give him my information, he yelled that my IP was being used on porn sites and didn’t want to stop it. I hung up.”I have great virus software on all my devices and use two-step authentication for almost everything – but I still almost fell for it. I’m sharing this story to help others.”Pamela was fortunate. Her security measures and quick thinking saved her, but these tactics are becoming more common and more aggressive. Here’s what you can do to stay safe.Beware of pop-up scams that impersonate Microsoft or the FTCScammers often use alarming pop-up messages or automated voices claiming your device is compromised, urging you to call a number for help. As described in Pamela’s experience, a pop-up claimed her computer was locked and played a voice message directing her to call what appeared to be a Microsoft support number. The scammer then impersonated both a Microsoft employee and a government official, using fake names and employee numbers, and tried to pressure her into revealing sensitive information.If you ever receive a pop-up or voice message claiming your device is at risk, do not call the number provided or share any personal information. Instead, contact the organization directly using official contact details from their website. Legitimate companies and government agencies will never ask you to provide sensitive information or credit card numbers over the phone in response to unsolicited pop-ups or calls.Protect your online accounts with strong, unique passwordsMake sure each of your online accounts has a unique password. This prevents scammers from accessing multiple accounts if one gets compromised. While password generators provide secure passwords, you can also easily create one that’s hard to crack by looking at three random things in the room and using them to form a password. Consider using a password manager for strong, unique passwords. A password manager helps you generate and securely store complex, unique passwords for each of your accounts. This prevents you from reusing passwords and makes it much harder for scammers to access multiple accounts if one is compromised. Get more details about my best expert-reviewed password managers of 2025 here. A person using their keyboard (Kurt “CyberGuy” Knutsson)GOOGLE’S AI UNLEASHES POWERFUL SCAM-BUSTING FEATURES FOR ANDROIDDon’t fall for urgency: How scammers pressure you to act fastScammers will create a false sense of urgency to make you act quickly without thinking. Take your time to verify any urgent requests, especially those involving money or personal information. Don’t act on impulse.Check URLs carefully before you click them, and use strong antivirus software Verify links before clicking them, especially if they come from someone who randomly contacted you on the internet. Scammers often use URLs that look similar to legitimate sites, but they typically contain slight misspellings or different domains (e.g., payepal.com or Microsoft.xyz). Also, install and update strong antivirus software.Protect all your devices, including computers, tablets, and smartphones, with strong antivirus software. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. (Kurt “CyberGuy” Knutsson)DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXAlways update the software you useBe sure each operating system, browser, and security software you use is updated on your computers and mobile devices. These updates often include patches that fix security vulnerabilities that scammers might exploit.Be cautious with personal information on social mediaThink twice before sharing personal details, such as your birthday, address, or even your pet’s name. Scammers can use information from your social media profiles to guess passwords or craft personalized phishing attacks. A hacker at work (Kurt “CyberGuy” Knutsson)HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAYEnable multifactor authentication (MFA) on all accountsDon’t limit MFA to just your main accounts. Enable it wherever possible, including email, social media, and financial services. Multifactor authentication adds an extra step to the login process, making it significantly harder for scammers to gain access, even if they have your password.Use a personal data removal service to clean up your online footprintScammers often scour the internet for your personal information. Using a personal data removal service can help reduce the amount of your sensitive data available online, making it harder for scammers to target you with convincing attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy.These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web. A man looking at his Facebook account on his laptop and cellphone (Kurt “CyberGuy” Knutsson)Regularly review your financial statements and credit reportsMonitor your bank accounts, credit cards, and credit reports for any unusual or unauthorized activity. Early detection is key. If you spot something suspicious, report it immediately to your financial institution and the proper authorities.Back up your important data regularlyRansomware and other attacks can lock you out of your files. Regularly back up your important data to an external hard drive or a secure cloud service. This ensures you can recover your information if your device is compromised.Report online scams to these official authoritiesIf you encounter a scam, reporting it to the proper authorities can help you recover lost funds and prevent others from falling victim to the same scam. By reporting scams, you contribute to a database that allows law enforcement to track patterns and catch criminals. Places you can report to include the FTC, your local FBI office, the IC3 and your state’s consumer protection office.Kurt’s key takeawaysKeep in mind that scammers are constantly evolving their tactics. You must always be on guard. Do not rely too heavily on technology to protect you, since there is a psychological aspect to their methods as well. Have a skeptical mindset and trust your instincts. By sharing experiences and staying informed, we strengthen our community’s defense against cybercrime.What was your scariest encounter with an online scam, and how did you manage to avoid falling for it? Let us know by writing to us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

A close call with a Facebook scam that tried to steal credit card info Read More »

1 luxury mercedes electric van with 65 inch screen 42 speakers

Luxury Mercedes electric van with 65-inch screen, 42 speakers

NEWYou can now listen to Fox News articles!
This isn’t your run-of-the-mill minivan, far from it. The Mercedes Vision V is shaking things up as a concept that gives us a sneak peek at what luxury vans could look like when they hit production in 2026.Mercedes-Benz is on a mission to make you forget everything you thought you knew about family haulers. If you picture vans as boxy, practical and a little bit boring, the Vision V is here to flip that script with its bold looks, jaw-dropping tech and the kind of comfort that makes road trips feel like first-class flights.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Exterior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)A striking exterior: Chrome, lights, iconic designFrom the moment you see the Vision V, it’s clear Mercedes wants to turn heads. The exterior features sculpted lines and chrome accents, giving it a modern yet unmistakably Mercedes look.At the front, you’ll spot an ornate LED light bar connecting the headlights, just beneath a glowing three-pointed-star hood ornament. The grille has been completely reimagined, combining chrome and illuminated elements for a futuristic touch. Massive 24-inch wheels with illuminated details and a wraparound rear taillight ensure this van stands out on any road. Exterior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)CHEVY MAKES HISTORY AT DAYTONA 500 WITH FIRST ELECTRIC PACE CARStep inside the Vision V: Lounge-inspired luxuryClimb inside, and you’re met with an interior that feels more like a private jet than a van. Mercedes uses rich wood trim, white Nappa leather, white silk, and polished aluminum to create an atmosphere that’s both tranquil and glamorous. The seats are designed for ultimate comfort, featuring flexible tubular cushions that can recline completely flat, transforming into beds for long journeys or restful stops.Entering the Vision V feels special, thanks to a large, automatically opening portal door and an illuminated retractable running board. For privacy, a smart glass partition between the driver and rear passengers can shift from transparent to opaque with just a touch. Interior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)BEST CAR ACCESSORIES 2025Immersive technology: A digital experience like no otherMercedes has packed the Vision V with technology that turns every ride into an event. The centerpiece is a massive 65-inch retractable 4K cinema screen that rises from the floor, instantly transforming the rear cabin into a private theater. The 42-speaker Dolby Atmos surround sound system, including four glass-encased speakers, delivers an audio experience that rivals top home cinemas.Seven hidden projectors in the roof and floor, along with windows that double as projection surfaces, allow for a 360-degree viewing experience. Ambient lighting can sync with your music, and a fragrance diffuser adds another layer of sensory delight. Interior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)FLYING CAR WITH 620-MILE RANGE SCHEDULED FOR UPCOMING LAUNCHSeven digital environments: Personalize every journeyMercedes has created seven unique “digital environments” for passengers to enjoy. In Entertainment mode, you can relax and watch movies or listen to music. Relax mode reclines your seat and fills the screen with soothing landscapes and sounds. If you’re in the mood for gaming, there’s a controller tucked away, and you can even simulate driving while being chauffeured.Work mode lets you take video calls and access productivity tools, while Shopping mode brings a virtual storefront right to your seat. Discovery mode uses augmented reality to let you explore your surroundings in 3D, and Karaoke mode is perfect for those moments when you want to sing along with friends.HOW SECURE IS MY PASSWORD? USE THIS TEST TO FIND OUT Interior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)Built on the VAN.EA platform: The future of electric luxury vansThe Vision V is built on Mercedes’ new VAN.EA electric platform, which will support a lineup of high-end electric vans starting in 2026. This new architecture means a spacious, flat-floor design and the flexibility to include all the advanced features that make the Vision V unique. Mercedes plans to launch production models with names like VLS and VLE, targeting the premium end of the market. Exterior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)Competing in a new segment: Luxury vans for private ownersWith the Vision V, Mercedes is targeting a growing trend of luxury vans for private ownership. While this segment has been popular in Asia, it’s now making its way to the U.S. The Vision V is set to compete with high-end minivans like the Lexus LM and Volvo EM90, but it goes even further with its focus on digital experiences and personalized luxury.GET A FREE SCAN TO FIND OUT IF YOUR PERSONAL INFORMATION IS ALREADY OUT ON THE WEB Exterior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)Cost and pricing expectations for the Mercedes Vision VWhile Mercedes-Benz has not officially announced the price for the production version of the Vision V, early reports and industry speculation suggest that this luxury van could cost around $200,000, especially for models equipped with all the high-end features seen in the concept.For context, the current V-Class starts at about $60,000 in Germany and can exceed $100,000 with options, so it’s reasonable to expect the Vision V to command a significant premium, positioning it well above existing luxury van offerings. As with most high-end vehicles, the final price will likely depend on customization and selected features, but the Vision V is clearly aimed at buyers seeking exclusivity and the ultimate in automotive luxury.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Exterior of Mercedes Vision V (Mercedes) (Kurt “CyberGuy” Knutsson)Kurt’s key takeawaysThe Mercedes Vision V is a clear signal that the luxury van market is about to get a serious upgrade. With its bold design, high-tech features, and focus on comfort, this van is set to offer a travel experience that feels truly special, whether you’re heading to a meeting or taking the family on a weekend getaway. While we don’t know the exact price yet, it’s safe to say the Vision V will be a premium choice for those who want something different from the usual luxury SUV. If you’re looking for space, style, and a bit of wow factor in your next ride, the Vision V is definitely one to watch.If money were no object, would you choose to ride in ultimate comfort and style, even if it meant swapping your dream car for a luxury van like the Vision V? Or does practicality still win out, no matter how tempting the tech and features? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

Luxury Mercedes electric van with 65-inch screen, 42 speakers Read More »

1 over 8m patient records leaked in healthcare data breach intro

Over 8M patient records leaked in healthcare data breach

NEWYou can now listen to Fox News articles!
In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt “CyberGuy” Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt “CyberGuy” Knutsson)DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERSHow healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt “CyberGuy” Knutsson)MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLEKurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn’t gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Over 8M patient records leaked in healthcare data breach Read More »

1 compact machine turns air into ready to use gasoline

Compact machine turns air into ready-to-use gasoline

NEWYou can now listen to Fox News articles!
Recently, Aircela, a fuel company headquartered in New York, publicly demonstrated a machine in Manhattan that produces gasoline directly from air. The event attracted city and state officials, investors and energy professionals who witnessed the launch of this compact, refrigerator-sized unit. Aircela’s technology combines direct air capture with on-site fuel synthesis, providing fossil-free gasoline that is fully compatible with existing engines and infrastructure.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide —  free when you join. Aircela’s air-to-gasoline machine  (Aircela)Understanding the science behind Aircela’s technologyLed by co-founder and CEO Eric Dahlgren (pictured on the right below), Aircela has developed a machine that produces real, engine-ready gasoline from just air and water, powered by renewable electricity and advanced chemical processes. The technology is based on direct air capture research, notably the work of physicist Klaus Lackner (shown on the left below), and is designed for easy installation in residential, commercial and industrial settings.The process begins by drawing in ambient air and using a water-based solution containing potassium hydroxide to efficiently capture carbon dioxide. As air flows through a specially designed chamber, the liquid sorbent absorbs carbon dioxide from the atmosphere, which is then regenerated for repeated use. Next, the system uses renewable electricity to split water into hydrogen and oxygen through electrolysis. The hydrogen is retained for the fuel synthesis process, while the oxygen is safely released into the environment.FLYING CAR WITH 620-MILE RANGE SCHEDULED FOR UPCOMING LAUNCHThe captured carbon dioxide and generated hydrogen are then combined to create methanol, which is subsequently converted into gasoline using established chemical processes. The resulting gasoline contains no sulfur, ethanol or heavy metals, making it fully compatible with existing engines and infrastructure. Each Aircela unit can produce approximately one gallon of gasoline per day from around 22 pounds of captured carbon dioxide with a storage capacity of up to 17 gallons. This innovative machine enables users to generate fossil-free gasoline on site using only air, water and renewable electricity. Physicist Klaus Lackner, at left, and Eric Dahlgren, co-founder and CEO of Aircela, at right   (Aircela)Distributed production sets Aircela apartUnlike traditional synthetic fuel projects that rely on large, centralized plants, Aircela’s approach is modular and distributed. Each unit can produce gasoline on site, making it suitable for off-grid locations, ports, islands or emergency situations. This design allows users to access cleaner fuel without the need to alter their vehicles or fueling routines. Aircela’s air-to-gasoline machine  (Aircela)HYDROGEN FUEL CELL TRUCKS HIT THE ROADS IN GEORGIAInvestment and industry support for AircelaAircela has secured funding from notable investors, including Chris Larsen, founder of Ripple Labs’ Jeff Ubben, a board member at ExxonMobil; and Maersk Growth, the venture capital arm of A.P. Moller-Maersk. During the demonstration, Morten Bo Christiansen, Maersk’s head of energy transition, emphasized the machine’s potential to support global efforts to reduce carbon emissions, particularly in the shipping and logistics industries. Aircela’s air-to-gasoline machine  (Aircela)Environmental and practical advantagesThe process developed by Aircela is intended to be carbon neutral, as the carbon dioxide released when the gasoline is burned is balanced by the amount captured during production. The gasoline works with current engines and fueling systems, so there is no need for costly upgrades. Distributed production reduces reliance on centralized refineries and long supply chains. In addition, the fuel’s purity, free from sulfur and additives, helps lower harmful emissions beyond just carbon dioxide.GET FOX BUSINESS ON THE GO BY CLICKING HERE Aircela’s air-to-gasoline machine (Aircela)Aircela’s next steps and future plansAircela plans to begin initial deployments of its machines in the fall of 2025, with a focus on off-grid, commercial and industrial users. The company’s goal is to increase production, reduce costs and make the technology widely available. While the current output is modest, Aircela aims to provide a practical, climate-aligned alternative to fossil fuels that does not require people to change their vehicles or daily habits.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Signage at Aircela’s air-to-gasoline machine event   (Aircela)Kurt’s key takeawaysAircela’s gasoline-from-air machine shows that sometimes the best solutions are the ones that fit right into our daily routines. Instead of requiring new cars or major changes, this technology lets people keep using what they already have, just with cleaner fuel. Watching carbon pulled from the air and turned into gasoline on the spot feels like a practical step toward a more sustainable future. As Aircela gets ready to roll out these machines, it will be interesting to see how this approach might help ease the transition to cleaner energy for everyone.CLICK HERE TO GET THE FOX NEWS APPWhat would it take for you to fill up your tank with gasoline made from thin air? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Compact machine turns air into ready-to-use gasoline Read More »

1 how addresses are collected and put on people finder sites

How addresses are collected and put on people finder sites

NEWYou can now listen to Fox News articles!
Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online. (Kurt “CyberGuy” Knutsson)How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online. (Kurt “CyberGuy” Knutsson)How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online. (Kurt “CyberGuy” Knutsson)What are the risks of having your address on people finder sites?The Federal Trade Commission (FTC) advises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like “opt out,” “delete my information,” etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

How addresses are collected and put on people finder sites Read More »

minions characters world premiere

Fox News AI Newsletter: Hollywood studios sue ‘bottomless pit of plagiarism’

The Minions pose during the world premiere of the film “Despicable Me 4” in New York City, June 9, 2024.  (REUTERS/Kena Betancur)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Major Hollywood studios sue AI company over copyright infringement in landmark move- Meta’s Zuckerberg aiming to dominate AI race with recruiting push for new ‘superintelligence’ team: report- OpenAI says this state will play central role in artificial intelligence development The website of Midjourney, an artificial intelligence (AI) capable of creating AI art, is seen on a smartphone on April 3, 2023, in Berlin, Germany. (Thomas Trutschel/Photothek via Getty Images)’PIRACY IS PIRACY’: Two major Hollywood studios are suing Midjourney, a popular AI image generator, over its use and distribution of intellectual property.AI RACE: Meta CEO Mark Zuckerberg is reportedly building a team of experts to develop artificial general intelligence (AGI) that can meet or exceed human capabilities.TECH HUB: New York is poised to play a central role in the development of artificial intelligence (AI), OpenAI executives told key business and civic leaders on Tuesday. Attendees watch a presentation during an event on the Apple campus in Cupertino, Calif., Monday, June 9, 2025.  (AP Photo/Jeff Chiu)APPLE FALLING BEHIND: Apple’s annual Worldwide Developers Conference (WWDC) kicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision. FROM COAL TO CODE: This week, Amazon announced a $20 billion investment in artificial intelligence infrastructure in the form of new data centers, the largest in the commonwealth’s history, according to the eCommerce giant.DIGITAL DEFENSE: A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly. Rep. Darin LaHood, R-Ill., leaves the House Republican Conference meeting at the Capitol Hill Club in Washington on Tuesday, May 17, 2022.  (Bill Clark/CQ-Roll Call, Inc via Getty Images)SHIELD FROM BEIJING: Rep. Darin LaHood, R-Ill., is introducing a new bill Thursday imploring the National Security Administration (NSA) to develop an “AI security playbook” to stay ahead of threats from China and other foreign adversaries. ROBOT RALLY PARTNER: Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. DIGITAL DANGER ZONE: Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system.  Fairfield, Ohio, USA – February 25, 2011 : Chipotle Mexican Grill Logo on brick building. Chipotle is a chain of fast casual restaurants in the United States and Canada that specialize in burritos and tacos. (iStock)’EXPONENTIAL RATE’: Artificial intelligence is helping Chipotle rapidly grow its footprint, according to CEO Scott Boatwright. AI TAKEOVER THREAT: The hottest topic nowadays revolves around Artificial Intelligence (AI) and its potential to rapidly and imminently transform the world we live in — economically, socially, politically and even defensively. Regardless of whether you believe that the technology will be able to develop superintelligence and lead a metamorphosis of everything, the possibility that may come to fruition is a catalyst for more far-leftist control.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Hollywood studios sue ‘bottomless pit of plagiarism’ Read More »