memoment editorial

1 cigarette butts make roads stronger than ever before

Cigarette butts make roads stronger than ever before

NEWYou can now listen to Fox News articles!
Cigarette butts are the most littered item on the planet. People toss out an estimated 4.5 trillion cigarette butts each year, and that number may double by the end of 2025 as e-cigarette use grows. These small, toxic waste items pollute city streets, beaches and waterways. They also take years to break down.But that may be starting to change. Scientists have developed a way to recycle cigarette butts into asphalt, creating roads that are both stronger and more sustainable. Research teams from the University of Granada in Spain and the University of Bologna in Italy have studied the process closely, highlighting its potential to improve road performance while cutting down on waste.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.OOH LA LAW: FRANCE SNUFFING OUT SMOKING IN PARKS, BEACHES, MORE A littered cigarette butt on an asphalt road   (Kurt “CyberGuy” Knutsson)Why cigarette butts make a good asphalt additiveModern road construction often relies on additives to improve the strength and flexibility of asphalt. Some road-building materials already use cellulose fibers like those found in cigarette filters. That sparked the idea to take used butts, clean them up and put them to work.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?E-cigarette filters are especially promising. They are longer and packed with fibers like cellulose and polylactic acid (PLA) fibers, making them ideal for reinforcing asphalt.  Person holding cigarette butt in hand    (Kurt “CyberGuy” Knutsson)How cigarette butts are recycled into road materialThe recycling process involves several steps:1. Collecting and sorting: Filters from traditional and e-cigarettes go through a collection and cleaning process. Ash and residue are removed, leaving behind usable fiber material.2. Shredding and mixing: Machines shred the cleaned fibers and combine them with synthetic hydrocarbon wax, which serves as a binder.3. Pellet formation: The blended material is pressed, heated and cut into small pellets that can be easily stored and transported.4. Asphalt integration: These pellets are added to reclaimed asphalt and bitumen. During heating, the pellets melt and release reinforcing fibers that strengthen the final asphalt mix.Up to 40% of the final road material can come from these recycled components.GET FOX BUSINESS ON THE GO BY CLICKING HEREStronger roads and a cleaner planet thanks to cigarette butt recycling Recycled cigarette butts make asphalt stronger, more flexible and longer-lasting. The fibers released during mixing act as micro reinforcement, improving fatigue resistance and helping roads withstand heavy traffic and temperature changes. The wax in the pellets lowers the temperature needed to mix asphalt, reducing both energy use and emissions during production. Beyond performance, this method gives cigarette waste a second life. By repurposing billions of discarded filters, cities can reduce litter and pollution while building more sustainable infrastructure. Illustration of a traditional roadway surface (Kurt “CyberGuy” Knutsson)What cities are doing next with recycled cigarette butts This technique is still emerging, but interest is growing worldwide. In Bratislava, Slovakia, city officials have already started collecting cigarette butts specifically for road construction. One road built with this recycled asphalt is already in use, setting an example for other cities to follow.As more pilot projects roll out and awareness spreads, cigarette butts could shift from toxic litter to a valuable resource in sustainable infrastructure.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayRecycling cigarette butts into asphalt solves two problems at once. It clears toxic waste from public spaces and makes roads that last longer. This approach turns one of the world’s most common pollutants into a valuable construction material. As more cities explore cleaner, smarter infrastructure, this kind of solution could play a big role in the future of street design.Would you support roads built with recycled cigarette butts in your city?  Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Cigarette butts make roads stronger than ever before Read More »

1 google ai email summaries can be hacked to hide phishing attacks intro

Google AI email summaries can be hacked to hide phishing attacks

NEWYou can now listen to Fox News articles!
Artificial intelligence is everywhere these days — in your phone, your car, even your washing machine. I saw one just the other day featuring built-in AI. And while that might sound a little over the top, there’s no denying that artificial intelligence has made life easier in a lot of ways.From boosting productivity to unlocking new creative tools, it’s changing how we work and live. The most common version you’ve probably encountered? Generative AI, think chatbots like ChatGPT. But as helpful as this tech can be, it’s not without its problems.If you’ve used Google’s Workspace suite, you may have noticed the company’s AI model, Gemini, integrated across apps like Docs, Sheets and Gmail. Now, researchers say attackers can manipulate Gemini-generated email summaries to sneak in hidden phishing prompts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS Google Gemini app on a mobile device  (Kurt “CyberGuy” Knutsson)How Gemini summaries can be hackedResearchers at Mozilla’s 0Din have discovered a vulnerability in Google’s Gemini for Workspace that allows attackers to inject hidden instructions into email summaries. The issue, demonstrated by Marco Figueroa, shows how generative AI tools can be misled through indirect prompt injection. This technique embeds invisible commands inside the body of an email. When Gemini summarizes the message, it interprets and acts on those hidden prompts.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The attack does not rely on suspicious links or attachments. Instead, it uses a combination of HTML and CSS to conceal the prompt by setting the font size to zero and the color to white. These commands remain invisible in Gmail’s standard view but are still accessible to Gemini. Once you request a summary, the AI can be tricked into presenting fake security alerts or urgent instructions that appear to come from Google.In a proof of concept, Gemini falsely warned a user that a Gmail password had been compromised and included a fake support phone number. Since Gemini summaries are integrated into Google Workspace, you are more likely to trust the information, making this tactic especially effective. A Google sign on a building   (Kurt “CyberGuy” Knutsson)What is Google doing about the flaw?While Google has implemented defenses against prompt injection since 2024, this method appears to bypass current protections. The company told CyberGuy it is actively deploying updated safeguards.GET FOX BUSINESS ON THE GO BY CLICKING HEREIn a statement, a Google spokesperson said, “Defending against attacks impacting the industry, like prompt injections, has been a continued priority for us, and we’ve deployed numerous strong defenses to keep users safe, including safeguards to prevent harmful or misleading responses. We are constantly hardening our already robust defenses through red-teaming exercises that train our models to defend against these types of adversarial attacks.”Google also confirmed that it has not observed active exploitation of this specific technique. Google Gemini app on the home screen of a mobile device    (Kurt “CyberGuy” Knutsson)6 ways you can stay safe from AI phishing scamsSo, how can you protect yourself from phishing scams that exploit AI tools like Gemini? Here are six essential steps you can take right now to stay safe:1. Do not blindly trust AI-generated contentJust because a summary appears in Gmail or Docs does not mean it is automatically safe. Treat AI-generated suggestions, alerts or links with the same caution you would any unsolicited message. Always verify critical information, such as security alerts or phone numbers, through official sources.2. Avoid using summary features for suspicious emailsIf an email seems unusual, especially if it is unexpected or from someone you do not recognize, avoid using the AI summary feature. Instead, read the full email as it was originally written. This lowers the chance of falling for misleading summaries.3. Beware of phishing emails and messagesWatch for emails or messages that create a sense of urgency, ask you to verify account details or provide unexpected links or contact information, even if they appear trustworthy or come from familiar sources. Attackers can use AI to craft realistic-looking alerts or requests for sensitive information, sometimes concealed within automatically generated summaries. So, always pause and scrutinize suspicious prompts before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech 4. Keep your apps and extensions updatedEnsure that Google Workspace and your browser are always running the latest version. Google regularly releases security updates that help prevent newer types of attacks. Also, avoid using unofficial extensions that have access to your Gmail or Docs.5. Invest in a data removal serviceAI-driven scams like the Gemini summary attack don’t happen in a vacuum. They often begin with stolen personal information. That data might come from past breaches, public records or details you’ve unknowingly shared online. A data removal service can help by continuously scanning and requesting the removal of your information from data broker sites. While no service can wipe everything, reducing your digital footprint makes it harder for attackers to personalize phishing attempts or link you to known breach data. Think of it as one more layer of protection in a world where AI makes targeted scams even easier.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan6. Disable AI summaries for now if you’re concernedIf you’re worried about falling for an AI-generated phishing attempt, consider disabling Gemini summaries in Gmail until Google rolls out stronger protections. You can still read full emails the traditional way, which can lower your risk of being misled by manipulated summaries.How to disable Gemini features on desktopOpen Gmail on desktop.Click the Settings gear icon in the upper right.Click See all settings.Scroll to “Google Workspace smart features” and click Manage Workspace smart feature settings.Disable the toggle for Smart features in Google Workspace.Then, click Save.Note: This will turn off Gemini summaries as well as other smart features.How to disable Gemini features on mobileOn iPhone:If you use the Gemini mobile app specifically:Open the Gemini app.Tap your Profile picture.Tap Gemini Apps Activity.At the top, tap Turn off.On Android:Settings may vary depending on your Android phone’s manufacturerOpen the Gmail app on your Android.Tap the Menu icon (three horizontal lines) in the upper left corner.Scroll down and tap Settings.Select the relevant email account.Scroll down and tap Google Workspace smart features and uncheck the box to turn them off.Key caveats to know:Disabling Smart Features may remove other convenient functionalities, such as predictive text and automatic appointment detection.The Gemini icon or summary buttons may still appear, even after disabling these features. Some users report having to physically hide them via browser tools.There is no centralized single “off switch” to completely remove all Gemini AI references everywhere, but these steps significantly reduce the feature’s presence and risk.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayThis vulnerability highlights how phishing tactics are evolving alongside AI. Instead of relying on visible red flags like misspelled URLs or suspicious attachments, attackers are now targeting trusted systems that help users filter and interpret messages. As AI becomes more deeply embedded in productivity tools, prompt injection could emerge as a subtle but powerful vector for social engineering, hiding malicious intent in the very tools designed to simplify communication.How comfortable are you letting AI summarize or filter your emails, and where do you draw the line? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER Copyright 2025 CyberGuy.com.  All rights reserved.  

Google AI email summaries can be hacked to hide phishing attacks Read More »

1 would you eat at a restaurant run by ai

Would you eat at a restaurant run by AI?

NEWYou can now listen to Fox News articles!
In the heart of Dubai, just steps from the Burj Khalifa, the future of food is taking shape. A new restaurant called Woohoo plans to serve more than just dinner. It offers a futuristic food experience designed in part by artificial intelligence. Opening in September, Woohoo calls itself “dining in the future.” But what does that actually mean?Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERFOX NEWS AI NEWSLETTER: MIKE ROWE’S PREDICTION ON AMERICAN JOBS The Woohoo restaurant driven by AI in Dubai (Woohoo)How Chef Aiman powers Dubai’s AI-driven restaurant menuAt Woohoo, your waiter might be human, but the creative mind behind your dish is not. That job belongs to Chef Aiman, a large language model trained on food science, global culinary traditions and molecular gastronomy. The name Aiman blends “AI” and “man,” reflecting the partnership between technology and human creativity. Aiman doesn’t taste or smell. Instead, it analyzes ingredients by texture, acidity, umami and dozens of other variables to invent dishes that push boundaries.Woohoo offers rotating menus that fuse global cuisines, designed entirely by this AI chef. Expect bold flavors, artistic presentation and creative combinations you won’t find anywhere else. Each visit brings something new, exciting and full of surprises. However, Woohoo goes far beyond the plate.GET FOX BUSINESS ON THE GO BY CLICKING HEREUnlike a typical restaurant, it uses artificial intelligence to shape your entire dining journey. From the lighting and sound to the pace of service and flow of the meal, every detail is curated by AI. The goal is to create a multi-sensory experience that feels futuristic but still personal. While the dishes challenge tradition, the atmosphere adapts to create a mood that feels just right, every time. Then comes the human touch. Interior of the Woohoo restaurant driven by AI in Dubai  (Woohoo)Why human chefs still play a key role at WoohooWhile Chef Aiman designs the initial recipes, Dubai-based chef Reif Othman and his kitchen team take charge of refining each dish. They taste, adjust and perfect the AI-created ideas to ensure the flavors and presentation meet high culinary standards. This collaboration blends the precision and innovation of AI with the experience and intuition of skilled chefs. Rather than replacing human creativity, Chef Aiman enhances it by opening new possibilities and inspiring chefs to explore unique flavor combinations. WHAT IS ARTIFICIAL INTELLIGENCE (AI)?How Woohoo uses AI to cut kitchen waste and boost sustainabilityChef Aiman is trained to reuse ingredients many kitchens throw away, like fat and trimmings. These otherwise discarded components become key ingredients in entirely new dishes. Ahmet Oytun Cakir, one of the founders and the CEO of Gastronaut, says this feature could help reduce kitchen waste worldwide. Eventually, the hope is to license Chef Aiman to restaurants around the globe. nterior of the Woohoo restaurant driven by AI in Dubai (Woohoo)What this means for youIf you’re planning a trip to Dubai, Woohoo offers more than a photo-worthy meal. It’s a chance to taste what happens when artificial intelligence and culinary artistry work hand in hand. Beyond the dining room, this experiment has bigger implications. AI could help chefs everywhere become more sustainable, more creative and more efficient without losing the human touch that makes food special.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysWoohoo isn’t just another flashy concept. It’s part of a bigger shift in how we think about food, tech and creativity. AI isn’t taking over the kitchen. It’s teaming up with real chefs to spark new ideas and reduce waste. Whether you’re a foodie looking for something new, a tech geek chasing the next innovation or just curious about what’s next, Woohoo gives you a front-row seat to the future of dining. And, yes, you can taste it.Would you trust an AI to design your next fine dining experience, or should some things stay purely human? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Would you eat at a restaurant run by AI? Read More »

70702

The Chip That Crossed the Line? NVIDIA, China, and the Great Power Tech Race

We’re diving into a major development at the intersection of tech, trade, and national security: the U.S. government’s decision to allow NVIDIA’s H20 chips back into the Chinese market. Brad Carson (former defense official and member of Congress) of Americans for Responsible Innovation and Liza Tobin (former CIA and National Security Council staffer) of Garnaut Global join Ryan to explore what this reversal says about America’s approach to protecting its tech edge, whether NVIDIA’s justifications hold water, why normal Americans should care about this, and what it could mean for the future of AI and semiconductor strategy.  This episode also features a short clip from our new, free show, Cogs of War. You can listen to this exciting new show on defense tech and industrial issues on your podcast app of choice.

The Chip That Crossed the Line? NVIDIA, China, and the Great Power Tech Race Read More »

1 159 year old company embraces driverless trucks

159-year-old company embraces driverless trucks

NEWYou can now listen to Fox News articles!
A bold new pilot program is bringing autonomous trucking to the heart of Texas. Steves & Sons, a sixth-generation American door maker, just partnered with autonomous freight startup Bot Auto and logistics giant J.B. Hunt. The goal? Launch a real-world test of driverless freight deliveries between San Antonio, Dallas and Houston. That means robots are about to hit some of the country’s busiest shipping lanes, with doors in tow.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER HAWLEY URGES DOJ PROBE OF CHINESE TRUCKING COMPANY Bot Auto is running disengagement-free routes in Houston, Texas  (Bot Auto)Steves & Sons partners with Bot Auto for driverless freightFor over 150 years, Steves & Sons has delivered high-quality millwork to builders and homeowners. Now, it’s making history again, this time by modernizing the supply chain. The pilot will use Bot Auto’s driverless trucks to carry freight between manufacturing plants and customers. These are not fantasy test runs. These are real orders, real deliveries and real stakes. J.B. Hunt, which already manages logistics for Steves & Sons, will oversee how autonomous freight fits into their broader transportation system.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Bot Auto is running disengagement-free routes in Houston, Texas (Bot Auto)Why autonomous trucking in Texas could reshape freightMore than 70% of U.S. freight moves by truck. Rising costs, driver shortages and tight delivery windows all add pressure. Bot Auto claims its technology can do more than keep up; it can outperform. Its Level 4 autonomy doesn’t need a driver in the cab. That means longer hauls, fewer delays and potentially lower costs. The big takeaway? Autonomy is moving from hype to hardware.GET FOX BUSINESS ON THE GO BY CLICKING HERE Bot Auto is running disengagement-free routes in Houston, Texas (Bot Auto)What this means for youIf you’re in manufacturing, retail or logistics, this pilot is a sign of things to come. Autonomous trucking could soon reduce shipping costs, shrink delivery windows and reshape how supply chains are built. And for consumers? It might mean faster delivery of big-ticket items like doors, furniture or appliances. Steves & Sons is betting that smart logistics will make it even more competitive and more sustainable.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThis move marks more than a tech test; it’s a signal. Steves & Sons, J.B. Hunt and Bot Auto are rethinking what freight delivery can be. They’re putting automation to work in a high-volume, real-world setting that could serve as a model nationwide. Autonomous trucking still has hurdles to clear, including regulation, safety and public trust. But this Texas pilot could be one of the first true benchmarks of commercial viability.Would you trust an autonomous truck to deliver your next major purchase or share the highway with one? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

159-year-old company embraces driverless trucks Read More »

1 dont fall for this chase bank phishing scam trick

Don’t fall for this bank phishing scam trick

NEWYou can now listen to Fox News articles!
That bank email in your inbox might look legitimate, but it could be a dangerous scam designed to steal your personal information. We recently received one ourselves, and it’s alarmingly convincing. It warns of an unrecognized device trying to sign in and urges you to “verify your activity” via a provided link. While it appears helpful, this email is anything but safe.In reality, it’s part of a growing wave of phishing attacks that mimic trusted companies like Chase. These emails are loaded with deceptive links that lead to malware infections, and the consequences can be severe.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS Actual bank phishing scam email  (Kurt “CyberGuy” Knutsson)How the bank phishing scam email worksThis scam starts with what looks like a typical security alert from Chase or another bank. The email claims someone tried to log in from an unknown device. To “protect” your account, it asks you to confirm your identity by clicking a link.What happens next is where things take a dark turnClicking the link launches a fake webpage designed to distract you while a hidden file quietly runs in the background. This file is often an HTA file, a type of HTML application commonly used to deliver malware. It then drops a DLL file onto your computer, essentially a backdoor that opens your system to hackers.From there, the malware uses a technique called Reflective DLL Injection to inject malicious code directly into your browser’s memory. This allows attackers to:GET FOX BUSINESS ON THE GO BY CLICKING HEREMonitor your keystrokesSteal login credentials and credit card numbersGain access to your accountsCreate long-term backdoors on your systemThis scam isn’t just trying to scare you; it’s designed to take full control. Scam phishing email   (Kurt “CyberGuy” Knutsson)Signs you’re looking at a bank phishing scam emailScammers rely on urgency and fear to prompt you into quick action. Here’s how to recognize a phishing attempt like this:Check the sender’s email address: Hover over the sender’s name to see the actual email address. In our case, “JP Morgan” was linked to a Gmail address, a clear red flag. Legitimate companies don’t use personal email services like Gmail or Yahoo for official communication.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Actual bank phishing scam email  (Kurt “CyberGuy” Knutsson)Unusual language or grammar: Scammers often use awkward phrasing or capitalization errors like “Security access your accounts.”Generic greetings: Real banks usually use your name. Scams often begin with “Dear Customer.”Suspicious links: Hover over any link to see the actual URL. If it looks off, don’t click.Unexpected requests: If the email urges immediate action, especially involving account access, take a step back.Tips to stay safe from bank phishing scam emailsYou don’t need to be a tech expert to avoid falling for phishing scams. A few simple habits can go a long way in protecting your identity, finances and devices. Here are some essential steps anyone can follow:1. Avoid clicking suspicious links and use strong antivirus softwareNever click on links in unsolicited emails. Instead, type the official website URL into your browser or use the company’s verified app. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech2. Use two-factor authentication (2FA)Enable two-factor or multi-factor authentication on all sensitive accounts. This adds an extra layer of security, making it harder for hackers to break in.3. Use a personal data removal serviceThese services help you remove your personal information from data broker sites that scammers may use to craft convincing phishing attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4. Strengthen passwords with a password managerA trusted password manager helps you create strong, unique passwords for every site and stores them securely so you don’t have to remember them all.Get more details about my best expert-reviewed Password Managers of 2025 here at Cyberguy.com/Passwords5. Keep your software updatedRegularly update your operating system, browser and all apps to close security gaps that hackers often exploit. Many phishing attacks rely on outdated software to launch malware, so turning on automatic updates is one of the easiest ways to stay protected.6. Pause and verify urgencyIf an email pushes urgency, like a locked account or an unfamiliar login, slow down. Contact the company directly using a number or email from its official website.7. Review email senders carefullyAlways hover over the sender’s name to check the actual email address. If it ends in something like @gmail.com and claims to be from a major bank, it’s likely fake.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysPhishing scams like this Chase bank email are getting harder to spot. They look professional, include real logos and mimic the tone of official messages. But with a few safety habits, you can protect yourself from even the most convincing attempts.Would you click the link without thinking, or would you pause and investigate? Let us know how you handle suspicious emails and whether you’ve seen scams like this in your inbox lately by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Don’t fall for this bank phishing scam trick Read More »

1 how to secure your 401k plan from identity fraud

How to secure your 401(k) plan from identity fraud

NEWYou can now listen to Fox News articles!
Your 401(k) might be one of the most valuable things you’ve got. And scammers are well aware of this. So, while you’re focused on building a nest egg, they’re out there coming up with new ways to take it from right under you. The tricky part is that most of us don’t check our 401(k) accounts all that often, which makes it harder to spot unusual charges. And that gives cybercriminals the upper hand. This isn’t ideal for anyone, but the risks become even more serious the closer you get to retirement. For one thing, you’ve likely saved up a good sum. But, what’s worse, a single successful attack could leave you without the cushion of your savings at a vulnerable time in life. This doesn’t mean you’re defenseless, though. There’s plenty you can do to protect yourself. I’ll go over how criminals gain access to 401(k) accounts, what I personally recommend for locking things down, and what to do if something doesn’t feel right.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS 401(k) written on a tablet. (Kurt “CyberGuy” Knutsson)Common types of 401(k) identity fraudContrary to popular belief, criminals don’t always need to “hack” their way in. In fact, 99% of cyberattacks require you to let them in. So, social engineering is a favorite tactic. However, you should also be wary of traditional, less sophisticated attacks.These are the tactics I see criminals use most often:Phishing emails and fake logins. These look legit, but they take you to a fake site designed to steal your login. Criminals may make the message appear to come from your provider or the bank, then steal your information by asking you to “verify” your account.Phone scams and robocalls. You may receive calls from the “IRS” or “retirement office” saying there’s a problem with your 401(k). These scams always have a sense of urgency, using fear to pressure you into handing over personal information.Loan and withdrawal fraud. Criminals may ask for an early withdrawal or loan and reroute the money to their own account.401(k) rollover scams. Scammers may ask you to move your funds into an individual retirement account (IRA), then try to convince you to make high-risk or worthless investments.Business email compromise. Criminals may pose as HR or payroll and ask you to change your contribution settings or give them access to your account.AI-powered impersonation. Cybercriminals can use deepfake voice tech and advanced chat tools to trick you into thinking you’re speaking with someone you trust, like your financial advisor or even your spouse.Mail theft. One of the easiest ways to steal from your 401(k) is by intercepting rollover checks sent through the mail. All they really need is your address.SIM swapping and malware. Scammers can intercept security codes and log in to your account by hijacking your phone number or infecting your device. A woman viewing her 401(k) info on her laptop. (Kurt “CyberGuy” Knutsson)How I recommend securing your 401(k)It comes down to a few small habits to maintain your digital hygiene. Most of these focus on keeping your sensitive information private and secure. Data brokers actually collect and sell that information, making it easier for scammers to target you, things like your contact details, employment history, address, date of birth, and more. These companies have even been caught intentionally selling scammers data belonging to elders (who, unsurprisingly, later fell victim to elder fraud). Here’s what I recommend you do to protect yourself from 401(k) scams:WHAT IS ARTIFICIAL INTELLIGENCE (AI)?1) Keep your personal information locked downYour data is the biggest weapon in a cybercriminal’s arsenal. Taking it away reduces the risk of ever ending up on their radar to begin with. I use a data removal service to handle this part for me. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.2) Use a strong passwordMake sure it’s unique (never reuse passwords), at least eight characters, and complex. Try to keep it completely random and use a mix of numbers, symbols, and upper and lower case letters. This makes it much harder to crack. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords. 3) Enable multi-factor authentication (MFA)If your provider offers this option, it adds an extra layer of security. Check out my top picks for the top multi-factor authentication apps to protect your accounts.4) Check your 401(k) regularlyI log in about once a month just to see if anything looks off. Many attacks don’t result in obvious signs, so it may be too late to notice them in time unless you’re actively looking.5) Turn on notifications and keep contact details up to dateMost providers let you enable alerts for logins, withdrawals, and password changes. This way, if anyone does gain access, at least you’ll know.6) Avoid using public Wi-FiIf you’re checking your account from a café or airport, cybercriminals can intercept your login credentials or other sensitive information. If it can’t be avoided, make sure to use a good VPN to keep the connection secure.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN. A woman viewing her 401(k) info on her laptop. (Kurt “CyberGuy” Knutsson)If you suspect 401(k) fraud, act fastSpeed is everything when it comes to financial fraud. These steps can help stop the damage and improve your chances of recovery:GET FOX BUSINESS ON THE GO BY CLICKING HERE1) Contact your plan provider immediatelyCall your 401(k) provider and request a freeze or lock on the account to prevent further activity.2) Notify your employer or plan administratorIf your retirement plan is through your job, loop in HR or your plan administrator right away. They may be able to escalate your case faster.3) Report the fraud to the governmentFile a complaint at IdentityTheft.gov and contact the Federal Trade Commission (FTC). If you lost money, also report it to your local police department.4) Freeze or flag your creditPlace a fraud alert or credit freeze with the major credit bureaus-Equifax, Experian, and TransUnion. This helps prevent further identity theft or loan fraud.5) Document every detailWrite down everything you know while it’s still fresh-dates, suspicious activity, phone calls, emails, and names of people you spoke with. This information will be critical during any investigation.6) Check related accountsIf your 401(k) was compromised, check your bank accounts, credit cards, and other investment accounts for signs of suspicious activity.7) Change all related passwordsImmediately change the login credentials for your 401(k), email, and any accounts connected to it. Use strong, unique passwords and enable multi-factor authentication.8) Watch for follow-up scamsFraudsters may try again, posing as recovery services or investigators. Be cautious of anyone who contacts you unsolicited about the fraud.The faster you move, the better your chances of mitigating the damage (and maybe even getting some of it reversed).CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysYour 401(k) should be building your future, not funding a scammer’s payday. While most people check their retirement accounts less often than their email, that’s exactly what cybercriminals count on. They’re hoping you’ll let your guard down. The good news? You have more control than you think. By locking down your personal info, checking your account regularly, and setting up the right alerts, you can stay one step ahead. It takes just a few small habits to protect one of your biggest financial assets. Don’t wait until something goes wrong. A little attention now could save you everything later.If someone drained your 401(k) tomorrow, how long would it take you to notice? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

How to secure your 401(k) plan from identity fraud Read More »

1 skechers airtag shoes let you track your kids steps

Skechers’ AirTag shoes let you track your kids’ steps

NEWYou can now listen to Fox News articles!
Skechers is stepping into the smart shoe game. Its latest kids’ trainers include a hidden slot for an Apple AirTag, letting parents track their child’s shoe location using Apple’s Find My app. Priced at between $52 and $58, these sneakers aim to offer a modern mix of comfort and digital oversight. But while the tech feels reassuring, there’s more to consider than just being able to spot your child’s sneakers on a map.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.IPHONE NOTES TRICK LETS YOU MESSAGE IN SECRET Skechers GO RUN Elevate 2.0 – Find My Skechers. (Skechers)How these trackable shoes workInstead of baking in a GPS system, Skechers took a simpler route. The model, officially called Skechers GO RUN Elevate 2.0 – Find My Skechers, features a screw-secured compartment beneath the insole. That’s where you can insert your own Apple AirTag. Once inside, the AirTag becomes invisible and unnoticeable to the child wearing the shoes. From there, all tracking happens through Apple’s Find My app, which works on any iPhone. It updates the tag’s location as long as it remains near an Apple device. Since AirTags were made to track objects like keys and bags, slipping one into a shoe was just a matter of time.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The pros: Clever design and smart functionalitySkechers designed these shoes with both practicality and peace of mind in mind. They feature an adaptive closure system with stretch laces and an adjustable instep strap, making it easy for kids to slip them on and off without help. Comfort isn’t an afterthought either. Each pair includes a Skechers Air-Cooled Goga Mat insole with high-rebound cushioning, giving growing feet the support they need throughout the day. Plus, they’re machine washable, which saves parents time and effort. The standout feature is the hidden AirTag-compatible compartment tucked beneath the heel of the insole. It comes with a screw-tight cover that keeps the tracker secure and discreet. There’s no external AirTag branding, so the shoes look like any regular pair of Skechers. With a breathable mesh and synthetic upper, durable rubber outsole, and 1 1/4-inch heel height, the design delivers both style and function. They’re available in sizes for boys and girls, and even without an AirTag, they work perfectly as everyday sneakers. Skechers GO RUN Elevate 2.0 – Find My Skechers. (Skechers)The cons: Tracking isn’t foolproofStill, parents should be aware: these are not GPS shoes with real-time, all-the-time tracking. AirTags rely on nearby Apple devices to update their location. If the tag moves out of range or its battery dies, the updates stop. Another issue? Anyone who has access to your Apple account can view the tag’s location. While you can manage and revoke access in your iPhone settings, this means privacy depends on your own security habits. And yes, it’s possible for someone to remove the battery and disable an AirTag in seconds. That means this shoe-tracking feature won’t replace supervision; it’s simply a backup.GET FOX BUSINESS ON THE GO BY CLICKING HERE Skechers GO RUN Elevate 2.0 – Find My Skechers. (Skechers)What this means for youIf you’re a parent looking for a low-cost way to track where your child’s shoes are, this is a creative solution. It’s less intrusive than giving them a phone and more flexible than a built-in GPS system. You control the tracker, you install the battery, and you decide who gets access. But don’t confuse shoe tracking with child safety. These trainers can offer location updates, but they can’t think, speak, or call for help. Think of them as one extra tool, not your only one. Here’s how to set up and use Apple AirTags to track items.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysSkechers’ AirTag-ready shoes bring smart design to a simple parenting problem: knowing where your kid’s shoes are. They’re clever, budget-friendly, and discreet. But while they offer convenience and comfort, they don’t offer total protection. As with any tech aimed at families, it’s important to balance innovation with caution. The shoes give you more visibility, but not full security.Would you trust a sneaker to help keep your child safe? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

Skechers’ AirTag shoes let you track your kids’ steps Read More »

1 captchageddon signals a dangerous shift

CAPTCHAgeddon signals a dangerous shift

NEWYou can now listen to Fox News articles!
What looks like a simple “Are you human?” check is now one of the most dangerous tricks on the internet. Fake captchas have evolved into full-blown malware launchpads, thanks to a sneaky new method called ClickFix. It copies commands to your clipboard and tricks you into running them, without ever downloading a file.This shift in attack tactics is so big that researchers are calling it “CAPTCHAgeddon.” It’s not just a new scam. It’s a viral malware delivery system that’s more convincing, stealthy, and widespread than anything before it. Let’s break down how this new wave of attacks works and what makes it so hard to stop.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS Illustration of fake content behind fake Captcha. (Guardio)How fake CAPTCHAS took overBack in 2024, security experts warned about fake browser update pop-ups. Victims were told to download files that turned out to be malware. But those tricks are now outdated. Enter ClickFix. Instead of asking users to install something, ClickFix loads a fake CAPTCHA screen. It looks legit, just like Google reCAPTCHA or Cloudflare’s bot checks. But when you click “verify,” it secretly copies a malicious PowerShell or shell script to your clipboard. From there, you’re just one paste away from installing malware that steals your accounts, passwords, and files. This new trick is more convincing than any old download prompt. And it’s spreading like wildfire.5 STEPS TO PROTECT YOUR FINANCES FROM FAMILY SCAMSFrom pop-ups to full-scale CAPTCHA campaignsFake captchas didn’t stay in sketchy ad pop-ups for long. Attackers realized they could hide these tricks in places people already trust:Compromised WordPress blogsGitHub repositoriesReddit threadsBlurred-out news sitesBooking.com phishing emailsEach attack blends into the site or service it mimics. Some CAPTCHAS  even display site logos, making the trick look like it came from the page itself. This isn’t a spray-and-pray scheme anymore. It’s targeted social engineering wrapped in sleek design. Illustration of expanding CAPTCHA narrative over time. (Guardio)The tech behind the CAPTCHA trickThese aren’t low-effort scams. Attackers constantly evolve their tactics to avoid detection. Here’s what makes this malware so stealthy:Clipboard hijacking: Instead of downloading a file, it pastes the attack right into your clipboard.Obfuscated code: PowerShell and shell scripts are hidden with misspellings, symbols, and encoding.Trusted hosts: Some payloads come from Google Scripts, making them look safe.Cross-platform reach: They target Windows, macOS, and Linux users alike.Attackers also serve the payloads through trusted-looking domains and even legitimate-looking JavaScript libraries.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Tracking the malware’s DNASecurity researchers at Guardio didn’t just look at one attack. They analyzed thousands. By clustering command structures, domains, and payload patterns, they identified multiple threat actors using similar tactics, each with a slightly different twist. Some groups use heavily obfuscated code. Others go for speed with clean, readable scripts. But all of them rely on the same core trick: fooling you into clicking something that seems harmless. Illustration of evolution of CAPTCHA scams. (Guardio)How to protect yourself from fake CAPTCHA attacksThese new ClickFix scams are stealthy, convincing, and hard to detect, but you can stay safe with the right habits and tools. Here’s what to do immediately: 1) Keep your browser and antivirus software updatedAlways run the latest version of your browser and operating system. Updates patch security holes that attackers exploit. Also, use a strong antivirus software and keep it updated.  The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech.GET FOX BUSINESS ON THE GO BY CLICKING HERE2) Avoid copying and pasting commands from unknown sourcesIf a site asks you to paste a command into your terminal or browser console, stop. That’s the main delivery method for ClickFix malware. Legitimate services will never ask you to do this.3) Check links and domains carefullyPhishing campaigns are hiding fake CAPTCHAs in legit-looking URLs on Reddit, GitHub, and even news sites. Always hover over links before clicking and double-check the domain, especially if prompted to “verify you’re human.”4) Use a personal data removal serviceThese attacks often target users whose emails or personal details are already circulating online. These services can reduce your digital footprint by requesting removal from data broker sites. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap – and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.5) Use a browser with built-in phishing protectionModern browsers like Brave, Chrome, Firefox, Safari, and Opera offer real-time protection that blocks malicious websites, including fake CAPTCHA pages. Microsoft Edge also includes strong phishing defenses through its SmartScreen filter. Make sure features like Enhanced Safe Browsing or SmartScreen are turned on. These tools detect threats before you click, giving you a critical layer of defense. 6) Use a password manager with phishing detectionPassword managers don’t just store your logins; they can also alert you when a site looks suspicious. If your manager won’t autofill a password on a CAPTCHA screen or login page, that’s a red flag. It usually means the site isn’t recognized as legitimate. This small moment of hesitation can help you avoid falling for a scam.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.7) Report fake CAPTCHA sitesIf you land on a shady CAPTCHA page, don’t just close the tab; report it. Most browsers have a “Report a security issue” option, or you can use Google Safe Browsing (safebrowsing.google.com). Flagging malicious pages helps stop the scam from spreading and protects others from falling victim to the same trap. 8) Warn your friends and family about CAPTCHA scams Most people don’t know about these clipboard-based attacks. Share this article and talk about it. Raising awareness can stop the scam from spreading.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysCAPTCHAgeddon marks a turning point. Malware isn’t just hiding in shady downloads anymore. It’s hiding in plain sight, on familiar websites, in trusted apps, and inside the buttons you click every day. This trend replaces the fake browser update scam entirely. It’s smarter, faster, and harder to detect. And unless we understand how it spreads, it will only grow. Security now means thinking twice about the everyday. Even a CAPTCHA.Have you ever encountered a suspicious CAPTCHA or a strange prompt online? What tipped you off, or did you almost fall for it? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

CAPTCHAgeddon signals a dangerous shift Read More »

New Documents Detail Slow, Multi-Agency Vetting of “Skinwalkers at the Pentagon”

Newly released Department of Defense records reveal the prolonged and often frustrating prepublication review process for the 2021 book Skinwalkers at the Pentagon: An Insider’s Account of the Secret Government UFO Program by James Lacatski, Colm Kelleher, and George Knapp. The documents, obtained by The Black Vault under FOIA case 22-F-0035, detail how the Defense Office of Prepublication and Security Review (DOPSR) took more than a year to complete its review, despite what appears to be no substantive objections from the reviewing agencies.
The records show the manuscript, originally submitted in March 2020, was routed to multiple agencies including the Defense Intelligence Agency (DIA), U.S. Air Force, and Department of Homeland Security. All three cleared the manuscript, though DIA required some amendments before public release. On May 11, 2021, DOPSR issued its final determination: CLEARED AS AMENDED. The changes were largely to address privacy concerns involving personally identifiable information and protected health information, as well as the names of certain government employees.
James Lacatski
For Lacatski, who served as a key figure in the Pentagon’s Advanced Aerospace Weapon System Applications Program (AAWSAP), the delays were a source of growing frustration. Email exchanges show repeated inquiries about the status of the review, with him noting at one point that the process had reached “the fourteen month point” and suggesting that holding up publication “may very well be one person” delaying the work. In another message, he urged DOPSR to give the lagging office “a firm deadline” or assume no further comments would be provided.Continue scrolling for more…

Kelly McHale, the DOPSR security review specialist assigned to the case, repeatedly cited slow responses from reviewing components, pandemic-related telework restrictions, and the complexity of coordinating input from multiple agencies as factors in the delay. “We never intend for reviews to take this long,” McHale wrote, assuring Lacatski that she was “keeping the pressure on”.
The delays not only impacted the authors’ timeline but also forced consideration of alternative publication strategies. In one April 2021 email, Lacatski proposed adding a statement to the book’s copyright page indicating that the manuscript was under DOPSR review, so the work could be sent to the editor without waiting for final clearance.
Dr. Colm Kelleher
In a post-release interview on Coast to Coast AM, co-author Colm Kelleher outlined what DOPSR required before publication: “they made us take out some fairly specific references to various offices and also some of the security-related verbiage,” and they insisted that “any active military people or people who are still working in the government service had their names changed.” He said “all of the names that are in the book are actually pseudonyms for all active-duty service people,” noting that “one of the four Tic Tac pilots from the famous Tic Tac incident back in 2004” was discovered to still be active duty and was therefore given a pseudonym. Kelleher added that DOPSR “sent the book out to four separate agencies for review,” and the process “did take… about 14 months,” which he believed was “because of the COVID.” When asked if the review was fair, he said officials “left in a lot of the details,” including Appendix One’s “full summary of over 100 separate reports… delivered to the Defense Intelligence Agency,” adding, “we expected to have some of that removed but none of it was removed.”
The DOPSR process, designed to protect classified and sensitive information, often draws criticism from current and former government employees. The Skinwalkers at the Pentagon case highlights how these reviews can extend well beyond initial projections, even for manuscripts that ultimately face minimal redactions.
While the FOIA release contains no revelations about the classified and/or sensitive content removed from the book, it provides a detailed view of the bureaucratic hurdles faced by authors with government ties. The prolonged review, combined with the authors’ public comments about omitted material, underscores the tension between national security vetting and timely public disclosure.
###
Document Archive
FOIA Case 22-F-0035 Release Package [108 Pages, 3.6MB]
Follow The Black Vault on Social Media:

New Documents Detail Slow, Multi-Agency Vetting of “Skinwalkers at the Pentagon” Read More »