memoment editorial

1 fbi warns over a million android devices hijacked by malware

FBI warns over 1 million Android devices hijacked by malware

NEWYou can now listen to Fox News articles!
Everything that connects to the internet can be hacked by malware. This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either.But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Remote control and smart TV (Kurt “CyberGuy” Knutsson)FBI warns: Over 1 million smart devices infected with BadBox 2.0 malwareThe FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces.FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOWOnce infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people’s accounts.The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection. A person holding a tablet (Kurt “CyberGuy” Knutsson)DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXBadbox malware history: From TV boxes to over 1 million infected devicesBadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers “sinkholed” the malware’s command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN’s Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds. These are not official Android TV OS products and are not protected by Google Play Protect.Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look. Smart TV (Kurt “CyberGuy” Knutsson)ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELYHow to tell if your device might be infected with BadBox 2.0If you’re wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do.1. You bought a low-cost Android-based device from an unknown or no-name brand: Devices sold online through third-party sellers or unknown brands, especially if advertised as “unlocked,” “jailbroken” or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware:Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ2. Your device is not Google-certified: If your Android device doesn’t support Google Play Protect or doesn’t show the Play Protect certification in the Play Store settings, it’s likely running on an uncertified version of Android. That’s a major red flag. To check:Open the Google Play Store.Tap your profile icon > Settings > About.Look for Play Protect certification. If it says “Device is not certified,” that’s a problem.3. Suspicious behavior or strange apps: Look for unfamiliar apps you didn’t install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded.4. Google Play Protect is disabled: If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise.5. Your home internet is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network.6. The device came with outdated or unofficial firmware: If your device doesn’t receive software updates or has a strange update process, that’s another potential sign it’s not legit or may be compromised.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE8 ways to protect your devices from BadBox 2.0 and Android malwareWant to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats.1. Use strong antivirus software: Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Only buy certified and trusted devices: Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled.3. Avoid sideloading apps from unofficial sources: Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats.4. Check your device settings for tampering: Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised.GET FOX BUSINESS ON THE GO BY CLICKING HERE5. Monitor your network for unusual activity: If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router’s settings or a network monitoring app to track strange behavior or unauthorized connections.6. Disconnect and replace suspicious hardware: If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller.7. Keep your devices and apps updated: Install system and app updates regularly. Even though cheap devices may not always offer updates, keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches.8. Secure your router and home network: Your devices are only as safe as the network they’re connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals.THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALLKurt’s key takeawayIt’s alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.CLICK HERE TO GET THE FOX NEWS APPWith over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

FBI warns over 1 million Android devices hijacked by malware Read More »

1 ai tennis robot coach brings professional training to players

AI tennis robot coach brings professional training to players

NEWYou can now listen to Fox News articles!
Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. Tenniix brings smart technology and adaptability to your training sessions, making it easier to get the most out of your time on the court.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Tenniix, the AI-powered tennis robot (T-Apex)What is Tenniix? Meet the AI tennis robot transforming practice sessionsTenniix is an AI-powered tennis robot that is compact and weighs only 15 pounds, which is much lighter than traditional ball machines. Despite its small size, it serves balls at speeds of up to 75 mph, with spins reaching 5,000 RPM, and holds up to 100 balls at a time. The robot’s movable base allows it to deliver shots from different angles, keeping practice sessions dynamic and engaging.TENNIS PRO ERIN ROUTLIFFE EXPLODES OVER LACK OF ‘ROBOTS’ AT AUSTRALIAN OPEN A player lifting the Tenniix, an AI-powered tennis robot, out of the vehicle. (T-Apex)NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOTAI tennis coaching: How Tenniix delivers realistic, pro-level practiceOne of the standout features of Tenniix is its AI-driven coaching. The robot has been trained on over 8,000 hours of professional tennis data, allowing it to adjust its shots based on your position and playing style. This gives you a realistic and challenging experience every time you step on the court. Tenniix offers a wide variety of training modes, with more than 1,000 drills and three skill levels, so you can focus on everything from timing and footwork to shot accuracy. Tenniix, the AI-powered tennis robot being carried (T-Apex)WILL 3D TECH CHANGE SPORTS FOREVER?Smart and simple: How to control Tenniix with voice, gestures or your phoneControlling Tenniix is simple and intuitive. You can use voice commands or gestures to change spin, speed or shot type without interrupting your practice. Tenniix also features convenient app controls, letting you select training modes, adjust settings and review session data right from your smartphone for a fully customized and trackable experience. The robot’s modular design means you can start with the model that fits your needs and upgrade as your skills improve. With a built-in camera and AI chip, Tenniix analyzes your shots and provides instant feedback, helping you track your progress over time. Tenniix, the AI-powered tennis robot (T-Apex)SKYROCKET TO A HEALTHIER LIFESTYLE WITH THIS GEAR IN 2025Advanced tracking and movement: How Tenniix adapts to your game in real timeTenniix uses a combination of visual tracking and ultra-wideband sensors to know exactly where you and the ball are on the court. Its motorized base moves smoothly to deliver a wide range of shots, from high lobs to fast groundstrokes, at different speeds and spins. The battery lasts up to four hours, which is enough for a solid training session. Tenniix, the AI-powered tennis robot (T-Apex)BEST FATHER’S DAY GIFTS FOR EVERY DADPractice like the pros: Train against Nadal-style shots with TenniixAnother feature that sets Tenniix apart is its ability to mimic the playing styles of tennis greats like Nadal and Federer. This helps you prepare for matches by practicing against shots and spins similar to those you’ll face in real competition. Coaches and players have noted how Tenniix creates realistic rallies and adapts to different skill levels, making training both efficient and enjoyable. Tenniix, the AI-powered tennis robot (T-Apex)Portable, smart and backed by support: Why tennis players love TenniixTenniix is easy to carry and set up, making it convenient for players who want to practice anywhere. With thousands of shot combinations and drills, your workouts stay fresh and challenging. The smart technology, real-time tracking and instant feedback help make every session productive. Each robot comes with a one-year warranty and reliable customer service.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Tenniix, the AI-powered tennis robot (T-Apex)Tenniix models and pricing: Which AI tennis robot is right for you?There are three Tenniix models to choose from. The Basic model is priced at $699, the Pro at $999 and the Ultra at $1,499. Each model offers a different set of features, with the Ultra version including advanced options like the movable base and enhanced vision system. Tenniix was launched through a Kickstarter campaign, giving early supporters a chance to back the project and receive the robot at a special price.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Tenniix, the AI-powered tennis robot (T-Apex)Kurt’s key takeawaysTenniix feels less like a machine and more like a smart tennis partner who’s always ready to help you improve. Whether you want to polish your technique or get serious about your game, it offers a flexible and engaging way to train. If you’re looking for a training partner that adapts to you, Tenniix is worth checking out.CLICK HERE TO GET THE FOX NEWS APPWould you rather challenge yourself playing against a robot like Tenniix, or do you prefer training with a human opponent? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

AI tennis robot coach brings professional training to players Read More »

underground 1 1920x740 1

Haunted Undergrounds, Lost Civilizations, and Secret Rail Networks: The Mysteries and Terrors of the Subterranean World!

There are many haunted and indeed haunting locations above the ground around the planet, each offering its own unique blend of spooky goings-on and bone-chilling accounts. There are, though, just as many such locations beneath the ground. When we venture into these subterranean lairs, we find the levels of terror and fright are taken up

Haunted Undergrounds, Lost Civilizations, and Secret Rail Networks: The Mysteries and Terrors of the Subterranean World! Read More »

redd ai dominance elements.00 00 00 00.still001

Trump’s nuclear strategy takes shape as former Manhattan Project site powers up for AI race against China

NEWYou can now listen to Fox News articles!
Over 80 years after scientists of the ‘Manhattan Project’ harnessed the power of the atom to end World War II, the top-secret worksite has a new mission to help dominate AI before China does. The first phase of the United States’ latest uranium enrichment facility opened in Oak Ridge, Tennessee in May. Uranium powers the nuclear reactors the AI data centers are turning to for reliable energy. They will use more energy as AI becomes more sophisticated, according to Orano USA CEO Jean-Luc Palayer.”The United States can lead in AI, only if we can power AI,” Palayer said. “Having that in mind and our new project on enrichment in Oak Ridge, Tennessee, we step forward on a new mission of equal consequence.”Numerous Tennessee lawmakers joined Palayer for a ribbon cutting of his new facility in Oak Ridge.  The first phase of the Orano USA uranium enrichment facility opened on May 29. (Fox News)The U.S. Energy Information Administration reported 99% of U.S. nuclear fuel is imported from other countries. In 2023, most of America’s uranium products came from Russia, Canada, Australia, Kazakhstan, and Uzbekistan. The U.S. banned the import of uranium products from Russia in May 2024, but companies can still apply for waivers until 2028.FIRE DEPARTMENTS TURN TO AI TO DETECT WILDFIRES FASTER”America is staring down the barrel of an energy crisis,” Tennessee Gov. Bill Lee said. “We can’t lose the AI war to China. We can’t lose the energy war to Russia. In order to do that, we have to win the nuclear energy renaissance war in America.” The site of the top secret ‘Manhattan Project’ of the 1940’s was crucial to the development of the atomic bomb that ended World War II. (Fox News)At the end of May, President Trump signed four executive orders aimed at quadrupling domestic nuclear energy production by 2050. The orders include a deadline for the publication of a report on how to strengthen domestic uranium conversion capacity and enrichment capabilities. It orders the government to update its nuclear energy policies to streamline production. At least 10 large nuclear reactors must be under construction no later than 2030, according to the order. FDA APPROVES FIRST AI TOOL TO PREDICT BREAST CANCER RISKMeanwhile, China plans to build 10 new nuclear power reactors each year for the next decade, totaling 100 reactors by 2035. A list of U.S. nuclear reactors posted by the National Energy Institute shows the U.S. has built three in the last 30 years.  China plans to build 100 nuclear reactors in the next decade. Meanwhile, the U.S. has built three in the last 30 years. A Trump executive order aims to quadruple domestic nuclear energy production by 2050. (Fox News)Despite rapid capacity growth in 2022, nuclear power made up only about 5% of China’s cumulative power generation that year. Nuclear power accounts for about 18% of the electricity generation mix in the United States.CLICK HERE TO GET THE FOX NEWS APP”We can’t wait 10 years to build nuclear reactors in this country. “That’s how long it used to take to approve them, to permit them, to build them,” Lee said. “We don’t have 10 years. China will have built 150 in 10 years.”In 2023, the Department of Energy reported data centers used an estimated 176 TWh. That number is expected to rise to between 325 and 580 TWh by 2028. The department estimated AI data centers will use about 12% of U.S. energy annually by 2028, enough to power New York City for 11 years. 

Trump’s nuclear strategy takes shape as former Manhattan Project site powers up for AI race against China Read More »

1 when clicks turn into scams on facebook ads

When clicks turn into scams on Facebook ads

NEWYou can now listen to Fox News articles!
Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system. From fake crypto endorsements by celebrities to malware disguised as video game betas, the landscape of digital scams is smarter, faster and more dangerous than ever.Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up! Facebook login page displayed on a laptop (Kurt “CyberGuy” Knutsson)DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXHow Facebook scam ads have evolved with AI and deepfakesScammers used to rely on low-effort clickbait, but that era is over. Now, sophisticated schemes are leveraging AI-generated content. Technology is being used to create convincing videos of celebrities endorsing fake products or services. These ads exploit the trust users place in public figures and the perceived legitimacy of Facebook’s advertising platform. These tools can mimic a person’s appearance and voice with alarming accuracy, making it challenging for users to discern real from fake. And these tools are no longer out of reach. Scammers use a mix of freely available AI generators and private networks to mass-produce scam campaigns that look more real than ever.ONE CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERSReal examples of Facebook scam ads using celebrity deepfakesOn Reddit, users have posted screenshots of bizarre scam ads that made it through Facebook’s filters:One features an AI-generated video of Kelly Clarkson promoting a suspicious cash giveaway. There are reportedly over 20 accounts using variations of the name “Kelly Clarkson Live.” These ads ask users to comment “Christmas” to receive free money, then instruct them to contact a WhatsApp number to claim their prize, which is a common tactic used to harvest personal information or initiate payment scams.AI CYBERSECURITY RISKS AND DEEPFAKE SCAMS ON THE RISE Screenshots of bizarre Facebook scam ads (Reddit)Another uses Billie Eilish’s face to endorse a knockoff shopping site. The design mimics standard e-commerce ads, making it easy to fall for, especially for fans or younger users. Screenshots of Facebook scam ads (Reddit)How AI tools and deepfake tech power Facebook scam adsThese scams are not the work of lone fraudsters. They are coordinated efforts that mirror real digital marketing operations.Deepfake software is used to create fake video footage of celebrities.AI voice clones make fake endorsements sound eerily convincing.Text generators churn out fake user reviews, comment threads and testimonials.Scam kits with ad templates and deployment instructions circulate in private Telegram groups and Discord servers.These operations are designed to appear legitimate. Landing pages mimic reputable news sites. Comment sections feature AI-written praise. Every element is optimized to build trust and get the click.Who Facebook scam ads target and why you could be nextScammers do not just blast out ads at random. They use Facebook’s ad targeting system to handpick the most vulnerable audiences.Older users are often targeted with health scams or celebrity cash giveaways.Men aged 25-45 are frequently shown crypto or investment ads featuring tech figures.Fans of specific celebrities or shows may see fake endorsements tied to those interests.Users who click on giveaways or contests are more likely to be targeted again, since Facebook tracks interaction history.These groups are targeted because they are either perceived as trusting, impulsive or unfamiliar with how digital scams operate.HOW TO ESCAPE FACEBOOK’S CREEPY AD TRACKINGWhy Facebook scam ads keep getting past Meta’s moderationDespite Meta’s claims of robust ad review, scam ads still make it through frequently and quickly. Here is why:Most ads are approved by automated systems that cannot catch nuanced AI fakery.Scammers use geographic targeting to show ads in regions less likely to report fraud or where enforcement is weak.The ads often run for only a short time before disappearing, making them harder to catch.Even with tools like facial recognition being tested to detect unauthorized celebrity use, these systems have not been widely implemented. Meanwhile, investigations by consumer advocacy groups and cybersecurity firms have found that a significant portion of crypto-related Facebook ads are fraudulent. With scammers paying for ad space, Meta has little financial incentive to aggressively remove them.Common signs of Facebook scam ads: What to watch forScam ads can be surprisingly well-made, but common themes show up again and again. Watch for:Free game betas or giveaways, especially ones that require downloads.Celebrity endorsements promoting crypto, weight-loss pills or supplements.Mimicked news articles or fake media logos.Urgent claims or miracle results, which are classic scam tactics.If an ad prompts you to download a file, especially a .zip or .rar, it is almost certainly a trap. Facebook app on home screen of a smartphone (Kurt “CyberGuy” Knutsson)HOW TO SPOT THE RED FLAGS FOR THIS LATEST FACEBOOK MARKETPLACE SCAMHow to protect yourself from AI-powered Facebook scam adsHere is how to stay safe and help others do the same:1. Check the source: If it is an ad, approach it with extra skepticism. Look it up independently.2. Do not download files from ads: Especially avoid compressed formats like .zip or .rar, which often contain malware.3. Verify endorsements: If a celebrity is promoting something, check their official social media or public statements.4. Report suspicious ads: Even if you are not sure, reporting helps Meta identify fraudulent activity.5. Talk to friends and family: Especially older adults, who may be more trusting of what they see on Facebook.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?6. Be wary of unsolicited messages or friend requests and install strong antivirus software: Scammers often use fake profiles to send scam ads or phishing links via Facebook Messenger or friend requests. Avoid clicking links from unknown contacts. Also, install strong antivirus software, which adds a layer of defense that can block malware from scam links. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.7. Consider using a password manager: If your credentials are compromised, this minimizes the risk of attackers accessing other accounts. A password manager can securely store and generate complex passwords. It will help you create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account, so that you never have to remember them yourself. The fewer passwords you remember, the less likely you are to reuse them for your accounts. Get more details about my best expert-reviewed password managers of 2025 here.8. Turn on two-factor authentication (2FA): 2FA can prevent unauthorized logins even if your password is stolen.9. Regularly update your software and apps: Keeping your operating system, browsers and Facebook app updated ensures you have the latest security patches that can block known vulnerabilities exploited by scammers.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawaysScam ads on Facebook are evolving fast, using AI-generated content, fake celebrity endorsements and deepfakes to trick users into clicking. What looks like a game beta or cash giveaway can actually lead to malware, phishing scams or fake crypto schemes. Facebook’s ad review system isn’t catching these in time, which means users need to stay alert. Be skeptical of ads, avoid downloading files, install trusted antivirus software and talk to family members who may be more vulnerable.CLICK HERE TO GET THE FOX NEWS APPGiven how widespread and sophisticated scam ads have become on Facebook, do you think Meta should be held more accountable for protecting users, and if so, what actions should they take to better prevent these scams? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

When clicks turn into scams on Facebook ads Read More »

1 wwdc 2025 apple announces ios 26 liquid glass design and more but the ai crisis remains intro

WWDC 2025: iOS 26, Liquid Glass design and Apple’s AI shortfall

NEWYou can now listen to Fox News articles!
Apple’s annual Worldwide Developers Conference (WWDC) kicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision. We are seeing a unified naming scheme, with every software version getting a “26” suffix. This means iOS 26, macOS 26, iPadOS 26, watchOS 26 and more. Beyond the name changes, the software has received major updates across devices, including a new Liquid Glass design that reminds me a bit of the old Windows Vista.All of this sounds great, but I couldn’t help but notice that the AI features this year feel subpar. They seem even duller when you consider the cutting-edge AI announcements Google made last month.Let’s dive deeper into WWDC 2025 and Apple’s ongoing AI crisis.Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up! iPhones (Apple)iOS 26 and iPadOS 26: Unified naming and the new Liquid Glass designOne of the most noticeable changes this year is Apple’s decision to unify the naming across all its platforms. Instead of traditional version numbers, Apple is now using the year after release as the version name. So the new names are iOS 26, iPadOS 26, macOS 26, watchOS 26, tvOS 26 and visionOS 26. These updates will arrive in late 2025, but the new naming makes it much easier to keep track compared to older versions like iOS 19, watchOS 12 or macOS 16.FIRST 15 THINGS TO DO OR TRY FIRST WHEN YOU GET A NEW IPHONEOn iOS 26 and iPadOS 26, the updates bring a fresh look thanks to the Liquid Glass design. This design language uses translucent materials and subtle animations to create a sense of depth and clarity. Some might say it feels a little nostalgic, reminding me of the old Windows Vista’s glossy glass effects.New features in iOS 26 and iPadOS 26: Safari, camera, Messages and moreSeveral core apps have received noticeable redesigns. The Camera app now looks cleaner and easier to navigate, while Safari introduces updated tab management and new tools to improve browsing. The Phone app moves to a unified layout, combining Favorites, Recents and Voicemails in one place, making call management simpler than before.Messages also gets some fun and useful additions. You can now add custom backgrounds to conversations, letting you personalize your chats in a new way. Group chats become more interactive with new features like quick polls, making it easier to gather opinions from your friends or family.iPadOS 26 brings Mac-like power to the iPadApple is making iPads a lot more Mac-like with iPadOS 26. It introduces new windowing capabilities that let you resize app windows, place them anywhere on the screen and open more windows at once. It also introduces a more precise mouse pointer and a new menu bar that allows you to swipe down on an app to view various options and commands. iPadOS 26 also gains a version of the Mac’s Preview app, letting you view and annotate images and files with ease. iPads (Apple)DOES MY IPHONE NEED ANTIVIRUS PROTECTION?macOS 26 Tahoe: Liquid glass design and smarter spotlight searchmacOS Tahoe 26, the successor to macOS Sequoia, brings Apple’s new Liquid Glass design to the Mac, giving the Dock, toolbars, app icons, widgets and system colors a translucent, glass-like look.The update also introduces a dedicated Phone app that works with a paired iPhone via Continuity. It combines Favorites, Voicemails, Call Screening and Hold Assist. Live Activities from your iPhone, such as tracking an Uber, now appear in the Mac menu bar for quick updates.Spotlight gets its biggest update yet, letting users run Shortcuts and actions inside the current app. Quick keys enable faster commands such as sending messages or adding reminders. Spotlight can also act as a mini launcher, showing all your apps, including those mirrored from your iPhone, with results prioritized by relevance. Mac (Apple)OPENAI’S $6.5B NEW ACQUISITION SIGNALS APPLE’S BIGGEST AI CRISIS YETApple integrates ChatGPT for smarter writing, Siri enhancements and expanded AI featuresAs part of Apple Intelligence, Apple announced the integration of OpenAI’s ChatGPT directly into system-wide features such as writing suggestions and Siri. When Siri encounters a question or task it can’t handle, it can now request assistance from ChatGPT, but only after explicitly asking for the user’s permission each time. Users can access ChatGPT within apps like Mail and Notes to generate summaries, compose replies or brainstorm content ideas on demand.This partnership marks the first time OpenAI’s GPT-4o has been embedded into the Apple ecosystem for fallback AI tasks. The integration is tightly controlled and opt-in: Users must grant permission before any information is sent to ChatGPT, and Apple emphasizes robust privacy protections, including obscuring IP addresses and not sharing personal data unless a user connects their ChatGPT account.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Additionally, ChatGPT’s capabilities extend to creative tools such as Image Playground, where users can generate images in new styles like oil painting or vector art, and to Visual Intelligence features, which allow users to ask ChatGPT about content on their screens or search for similar products and images. This integration is designed to enhance productivity and creativity while keeping user privacy at the forefront.Notably, Apple Intelligence also includes on-device foundational models for privacy, preserving AI tasks such as notification summaries, text rewriting and app actions separate from ChatGPT integration.GET MY IPHONE TIPS HERE iPad (Apple)Apple intelligence at WWDC 2025: Are the AI features falling behind?Apple’s artificial intelligence features took a backseat at WWDC 2025. While the company introduced a visually striking redesign across platforms with Liquid Glass and rolled out new apps and quality-of-life improvements, its AI announcements were limited in scope.New features under the Apple Intelligence banner include live translation across Messages, FaceTime and the Phone app, a capability Android users have had for several years. Apple also introduced Workout Buddy, a fitness tool that uses an AI-generated voice to provide spoken encouragement. While functional, these additions do little to shift the broader AI narrative in Apple’s favor.By contrast, Google, Microsoft and OpenAI have all rolled out monthly or even weekly AI advancements, highlighting Apple’s slower pace.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICESWhere is Siri? Apple’s AI assistant still missing in actionNotably absent were any major upgrades to Siri. Last year, Apple announced a more dynamic version of its virtual assistant. Many of those promised features remain unreleased.Craig Federighi, Apple’s senior vice president of software engineering, during the keynote gave Siri only a passing mention.”As we have shared, we are continuing our work to deliver the features that make Siri even more personal,” he said. “This work needed more time to reach our high-quality bar, and we look forward to sharing more about it in the coming year.”That vague timeline of “in the coming year” suggests we will not see major Siri news until 2026 at the earliest.This is definitely not good news for the company as competitors push out updates every few weeks. Apple originally pitched the new Siri as the next big step for the company, with personalized capabilities based on your relationships, conversations, routines and more. But one year later, those ambitions are still just promises. In fact, the new Siri experience is currently available only in limited beta on iPhone 15 Pro models and select iPads or Macs with M-series chips, further underscoring the slow rollout.5 AI TERMS YOU KEEP HEARING AND WHAT THEY ACTUALLY MEANKurt’s key takeawayApple’s WWDC 2025 brought plenty of polish and a few welcome surprises. The Liquid Glass design gives every device a more modern feel, and the unified naming system finally brings some consistency. But the company’s AI story still feels like it is lagging behind. There’s no doubt Apple is laying the groundwork for something bigger. But for now, the most ambitious AI updates remain out of reach, and the gap between Apple and its competitors continues to grow.CLICK HERE TO GET THE FOX NEWS APPDo you believe Apple can regain its edge in AI innovation? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

WWDC 2025: iOS 26, Liquid Glass design and Apple’s AI shortfall Read More »

1 mind controlled prosthetic arms are now becoming a reality

Mind-controlled prosthetic arms are now becoming a reality

NEWYou can now listen to Fox News articles!
If you’ve ever wondered what’s next for prosthetic technology, you’re not alone. For many people living with limb loss, finding a prosthetic that feels natural and works seamlessly with their body has always been a challenge. Now, a California startup called Atom Bodies is making headlines for its groundbreaking approach to prosthetic technology. By combining artificial intelligence, machine learning and advanced sensor systems, Atom Bodies is developing mind-controlled robotic arms that could soon make highly advanced prosthetics accessible to thousands of amputees.Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up! A man wearing an Atom Touch prosthetic arm (Atom Bodies)How the Atom Touch prosthetic arm uses AI and muscle signalsAtom Bodies’ flagship product, Atom Touch, is setting a new standard in prosthetic arms. Unlike traditional prosthetics, which often offer only basic movement and can be uncomfortable to wear, Atom Touch uses EMG (electromyography) sensors placed on the user’s skin to detect muscle activity. These signals are then interpreted by machine-learning algorithms, allowing users to control individual fingers, the wrist and the elbow with remarkable precision just by thinking about the movement they want to make.AI ENABLES PARALYZED MAN TO CONTROL ROBOTIC ARM WITH BRAIN SIGNALSThe arm is powered by the Atom A1, an AI neural interface that can be trained in minutes for intuitive, natural control. The design also includes a load-balanced harness, which distributes weight across the torso, making the device lighter and more comfortable for all-day use. A man wearing an Atom Touch prosthetic arm and playing soccer (Atom Bodies)SOFT ROBOTIC PROSTHETIC HAND USES NERVE SIGNALS FOR MORE NATURAL CONTROLKey features of the Atom Touch AI-powered prosthetic armAtom Touch stands out for several reasons. It is the first prosthetic arm to offer true individual finger movement, which means users can perform tasks like typing, gripping and delicate manipulation with much greater ease. The device uses the Atom A1 AI neural interface, which learns from the user’s muscle signals to provide seamless, natural movement. Dozens of sensors in the hand generate haptic feedback, so users can better gauge grip strength and control. With more than 10 motors in the hand alone, Atom Touch offers a near-human range of motion and dexterity. The load-balanced harness system also makes the arm lighter than a human arm and comfortable enough for extended wear, addressing a challenge that many current prosthetics have yet to solve.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A person wearing an Atom Touch prosthetic arm and carrying a tray (Atom Bodies)WORLD’S FIRST TOUCH-SENSING BIONIC HAND WITH LIGHTNING-FAST RESPONSEWhy mind-controlled prosthetics like Atom Touch matter for amputeesFor the more than 2 million Americans living with limb loss, current prosthetic options are often expensive, uncomfortable and limited in capability. Jason Morris, who lost his arm due to a work accident and is Atom Bodies’ lead test user, notes that most prosthetics can only be worn for about two hours due to discomfort. Atom Touch is designed for initial wear of four to six hours, with the goal of achieving all-day use. Atom Bodies has already attracted significant interest, with over 11,000 people on its wait list and plans to begin clinical trials within the next year, pending FDA approval. Jason Morris, Atom Bodies’ lead test user (Atom Bodies)WIRELESS WATERPROOF BIONIC HAND WITH 360-DEGREE WRIST ROTATIONAtom Touch pricing: How affordable is this advanced prosthetic arm?One of the most transformative aspects of Atom Touch is its price point. While state-of-the-art myoelectric arms can cost around $200,000, Atom Bodies plans to offer Atom Touch for approximately $25,000. This brings the cost in line with basic hook prosthetics, making advanced bionic limbs accessible to a much larger population.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES A woman wearing an Atom Touch prosthetic arm and assembling furniture (Atom Bodies)BEST FATHER’S DAY GIFTS FOR EVERY DADKurt’s key takeawaysSeeing Atom Bodies bring this level of innovation to prosthetics feels like a real turning point for people with limb loss. With technology that’s both advanced and affordable, Atom Touch could help many regain abilities and comfort that have been out of reach for years. As the company moves closer to launching, there is a sense of real possibility for a future where high-quality prosthetics are available to many more people who need them.If you or someone you know could benefit from this technology, what would be the most important factor in choosing a prosthetic arm? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

Mind-controlled prosthetic arms are now becoming a reality Read More »

screenshot 2025 06 10 at 4.08.46 pm e1749600981839

Fire departments turn to AI to detect wildfires faster

NEWYou can now listen to Fox News articles!
ASPEN, Colo. – A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly.In Aspen, Colorado, fire officials say wildfire risk has shifted from being a seasonal concern to a year-round threat. To meet that challenge, they’re using AI-powered cameras to detect smoke — sometimes before 911 calls even come in.Arvind Satyam is the co-founder and chief commercial officer of Pano AI.”They’re getting a full 360-degree picture of the landscape,” said Satyam.2 DEAD AFTER HOUSE BURNS DOWN IN NEW JERSEY FOLLOWING ‘GIGANTIC EXPLOSION,’ CRIMINAL INVESTIGATION UNDERWAYHigh in the mountains, rotating cameras scan the terrain for smoke. If the system detects a potential fire, the alert is reviewed by a human team. Verified alerts are then sent to Aspen Fire via text or email, along with the exact location, Satyam said.”We run a smoke detection algorithm,” Satyam said. “So essentially looking at the imagery to determine is that smoke or not smoke.” Aspen Fire Chief Rick Balentine says wildfire risk has shifted from being a seasonal concern to a year-round threat. (Kennedy Hayes/ Fox News)Satyam said the devices can also give satellite views of the terrain, and overlay a picture of the weather to understand wind speed and relative humidity.Aspen Fire was the first department in the U.S. to adopt the technology four years ago, when rising wildfire risk began driving up insurance costs in the area, Pano AI leaders and Aspen Fire Department officials said.SOUTHERN CALIFORNIA COMMUNITY MEMBERS RETURN FOR FIRST TIME TO SITE WHERE CHURCH BURNED DOWN AHEAD OF EASTER”It gives us that instantaneous intelligence and not off of, you know, hoping we get someone there quickly,” said Jake Andersen, deputy chief of operations for Aspen Fire.Aspen officials aim to have crews on the scene within five minutes — something they say would be nearly impossible without precise location data. Fire officials say their fire crews can also access the Pano AI map on their phones while responding to calls. The system can track heat signatures at night and monitor hot spots for days after a fire.175 WILDFIRES IN NORTH AND SOUTH CAROLINA FORCE SOME EVACUATIONSAspen Fire Chief Rick Balentine said the device especially helps with the terrain in Aspen. Balentine said a recent example of when they used Pano AI was for Aspen’s Sunnyside Prescribed Fire. The 900-acre Sunnyside Prescribed Fire was ignited back in April of this year on the south face of Red Mountain, fire officials said. Pano AI cameras are mounted high up in the mountains and can detect smoke. (Pano AI)The department used Pano AI cameras to monitor that fire and prevent it from spreading beyond the designated area, Baletine said.The system is now used across 10 states: Colorado, California, Oregon, Washington, Idaho, Texas, Wyoming, Utah, Arizona and Montana. Multiple fire agencies can share alerts across those regions and coordinate response efforts. Aspen fire shows how Pano AI was able to help control a prescribed burn, Aspen’s Sunnyside Prescribed Fire. (Kennedy Hayes/ FOX News)CLICK HERE TO GET THE FOX NEWS APP “Having this type of tool for our department, it makes all the difference in the world to understand the conditions we are sending our firefighters into,” said Ali Hammond, Aspen Fire’s director of community wildfire resistance. 

Fire departments turn to AI to detect wildfires faster Read More »

1 how to tell if your ipad has been hacked intro

How to tell if your iPad has been hacked

NEWYou can now listen to Fox News articles!
Apple’s iPad has a strong reputation for security. Thanks to the system architecture of iOS, a non-jailbroken iPad isn’t susceptible to typical viruses or malware infections. However, that doesn’t mean it’s completely safe from every threat. As with any computer, there are still vulnerabilities that determined hackers can exploit.iPads are generally secure devices, but it’s still possible for hackers to gain access, so knowing the warning signs of a hacked iPad can help you act quickly to protect your data. Moreover, an iPad often contains a lot of personal information about you and your family, so if it’s ever hacked, it can be quite alarming.Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up! An Apple iPad (Kurt “CyberGuy” Knutsson)How to tell if your iPad has been hackedBe on the lookout for these signs that could indicate your iPad’s security has been compromised:1) iPad running slow? It could be a sign of malwareIf your iPad suddenly feels more like a sluggish turtle than the speedy device it used to be, that’s a warning sign. When a device is hacked, malicious software might be running in the background, using up memory and processing power. This can make apps slow to open, cause lagging or freezing and even lead to more frequent crashes. You might also notice the battery draining much faster than usual along with the slowdown, since unwanted software can chew through battery life while it secretly runs in the background.2) Pop-up ads on iPad? You might have adware or a virusA sudden flood of pop-up ads or strange messages on your iPad screen is a big red flag. Under normal circumstances, iPads should not bombard you with random pop-ups, especially outside of safe apps or websites. If you start seeing lots of unsolicited ads or “Your iPad is hacked!” alerts popping up, it could mean an adware program or scam has found its way onto the device. These pop-ups might try to trick you or your kids into clicking links or downloading something harmful, so they’re not just annoying, they’re dangerous signs that something is wrong. An Apple iPad (Kurt “CyberGuy” Knutsson)HOW TO PROTECT AN IPHONE & IPAD FROM MALWARE 20253) Unusual data usage on iPad? Watch for these network hacking signsKeep an eye on how the iPad is using the internet. An unusual spike in data usage or constant network activity (even when no one is actively using the iPad) might indicate the device is secretly sending or receiving information without your permission. For example, if your data plan suddenly maxes out or you notice the Wi-Fi icon flickering with activity when the iPad is idle, it could be a sign that a hacker’s software is communicating in the background. Such suspicious network activity is concerning because it suggests someone else might be remotely accessing the iPad or siphoning off personal data.HOW TO TRANSFER INFO FROM AN OLD IPAD TO A NEW IPAD4) iPad hacked? Look for these Apple ID account changesOne clear warning sign is finding changes to your Apple account that you didn’t make. If your Apple ID password was changed without your knowledge or you receive security alerts about logins you never did, be wary; a hacker may have gained access to your account.You might also discover that account details or settings (like your recovery email or trusted phone number) have been altered. Another clue is seeing unfamiliar charges or App Store purchases on your Apple ID bill, since unauthorized purchases or subscriptions often mean that someone has compromised your account and is using it maliciously. An Apple iPad (Kurt “CyberGuy” Knutsson)BEST VPNS FOR IPHONES & IPADS – CYBERGUY PICKS 2025Top tips to protect your iPad from hackers and malwareIf you suspect your iPad has been hacked, taking immediate action can secure your device and give you peace of mind. Here are a few basic steps to help you respond:1) Reset your passwords: Change your Apple ID password right away (and any other important account passwords used on the iPad) to lock out any intruders. Using a strong password (think long, random and unique to each account) greatly reduces that risk. A password manager can help you generate and store complex passwords so you don’t have to remember them all yourself. Get more details about my best expert-reviewed password managers of 2025 here.2) Remove unfamiliar apps: Check the iPad for any apps you or your child didn’t install. If you find an unknown app or a suspicious profile, delete it immediately. This helps eliminate any malicious programs the hacker may have added. To do this, open Settings, tap General  > iPad Storage, scroll to find the unfamiliar app, tap it, then tap Delete App and confirm.3) Update iOS: Make sure the iPad is running the latest version of iPadOS. Apple frequently releases security updates to fix vulnerabilities, so updating the software can shut down any loopholes the hacker might have used. Turning on automatic updates is a good idea to stay protected going forward.4) Enable two-factor authentication: If you haven’t already, turn on two-factor authentication for your Apple ID account. This feature adds an extra verification step (like a code sent to your phone) whenever someone tries to sign in, which can stop hackers in their tracks even if they somehow know your password. It’s an excellent safeguard to prevent unauthorized access.5) Have strong antivirus protection on all devices: Malware, spyware and viruses can run quietly in the background or compromise enough data before it is discovered. While not being hacked in the first place is the best position to be in, it is worse to give access to your iPad’s data to a hacker for a prolonged period of time. That’s why having strong antivirus software running consistently in the background of your device is a great way to prevent compromises from happening in the first place. Best antivirus security software and apps to protect you.CAN IPHONE TEXTS HAVE MALWARE? SPOT & AVOID SMS SCAMSKurt’s key takeawayIt’s important to remember that many of these symptoms can have innocent explanations, so don’t panic at the first sign of trouble. For example, a new iOS update or a heavy app can temporarily slow down your iPad’s performance, so one isolated issue doesn’t always mean you’ve been hacked. However, if you notice multiple warning signs at the same time or anything that just doesn’t feel right, it’s best to act quickly and err on the side of caution.Do you think Apple should do more to help users spot and respond to potential hacks? Let us know your experience or questions by writing us at Cyberguy.com/Contact. Your story could help someone else stay safe.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

How to tell if your iPad has been hacked Read More »

TEMPS (Transportable Electromagnetic Pulse Simulator) Final Reports, 1973

The two volumes of the TEMPS (Transportable Electromagnetic Pulse Simulator) Final Report, dated August 1973 and prepared for the Defense Nuclear Agency by Physics International Company, provide a detailed technical overview of the design, construction, testing, and performance evaluation of a mobile high-voltage EMP (Electromagnetic Pulse) simulator. Volume I: System Overview and Technical Design Volume

TEMPS (Transportable Electromagnetic Pulse Simulator) Final Reports, 1973 Read More »