memoment editorial

1 why iphone users are the new prime scam targets

Why iPhone users are the new prime scam targets

NEWYou can now listen to Fox News articles!
New research may shock a lot of Apple fans: iPhone users are actually more likely to fall for online scams than Android owners. The problem isn’t the device itself; it’s the habits of the people using it.The survey from Malwarebytes, a global cybersecurity company, of 1,300 adults across the United States, United Kingdom, Austria, Germany and Switzerland, found that many iPhone owners put blind trust in Apple’s security. That confidence makes them easier targets for scammers who count on overconfidence.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONESign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter New research suggests iPhone users are more likely to fall for online scams than Android users. (Kurt “CyberGuy” Knutsson)The truth about iPhone security habitsHere’s what the Malwarebytes survey uncovered:More than half of iPhone users (53%) admitted they’ve fallen for a scam, compared to 48% of Android users.Only 21% of iPhone owners add security software, while 29% of Android users do.Just 35% of iPhone users set unique, strong passwords, compared to 41% of Android owners.47% of iPhone users grabbed a “best price” deal from shady sellers, compared to 40% of Android users.41% of iPhone owners DM’d sellers for discounts on social media, compared to 33% of Android owners.The takeaway? It’s not the phone that makes you safe, it’s your choices every time you go online. A survey from Malwarebytes found that many iPhone owners blindly trust Apple’s security measures, which makes them easier targets for scammers who count on overconfidence. (Kurt “CyberGuy” Knutsson)Why this mattersFor years, Apple’s reputation led iPhone users to believe they were automatically safer. This study proves otherwise. Cybercriminals don’t care what brand of phone you carry; they care about how easy it is to trick you. And right now, too many iPhone users are letting their guard down. Many iPhone software updates contain security patches that block new threats to keep users safe.  (Kurt “CyberGuy” Knutsson)7 ways to stay safe on iPhoneEven if you love your iPhone, staying safe means making smarter choices online. Follow these steps to keep scammers one step behind you.1) Stop and double-checkIf something feels off, whether it’s a text, link, or offer, pause. Scammers rely on urgency to trick you.2) Avoid random links and shady DMsNever click on links or QR codes from unknown senders. Always visit the company’s website directly. Also, use strong antivirus software to block malicious links before they reach you. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech3) Keep your software updatedApple pushes out updates for a reason. Many contain security patches that block new threats. Make sure your iPhone is always running the latest iOS and app updates.How to update iOS:Go to SettingsTap GeneralClick Software Update and install any available updates. Manually updating apps:Open the App Store.Tap your profile icon at the top right.Scroll down to see pending updates.Tap Update All (or update individual apps).Enabling Automatic App Updates:Open Settings.Scroll down and tap App Store.Under Automatic Downloads, toggle on App Updates.This way, your phone will always stay current, reducing the chances that hackers can exploit old vulnerabilities.IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO4) Pick stronger, unique passwordsUsing the same password everywhere is a hacker’s dream. Create unique ones for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at CyberGuy.com/Passwords5) Consider using a personal data removal serviceScammers thrive on the personal details they can easily find about you online, and iPhone users in particular tend to overshare and trust their device to keep them safe. That leaves a bigger trail for criminals to exploit. A personal data removal service helps wipe your information from data broker sites and shady lists that fuel targeted scams. While no service can erase everything, it makes it much harder for crooks to connect the dots and trick you. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/DeleteGet a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan6) Turn on two-factor authentication (2FA)Turning on two-factor authentication (2FA) is one of the most powerful ways to lock down your accounts. It adds an extra login step that blocks criminals, even if they already have your password. On your iPhone:Open the Settings app.Tap on [your name] (your Apple ID at the top).Select Sign‑In & Security.Tap Turn On Two‑Factor Authentication, then tap Continue.Enter a trusted phone number to receive verification codes (via text or call), tap Next, and enter the code sent to you to complete the setup.Once set up, you’ll get a code each time you or someone else tries to sign in.7) Don’t trade personal info for dealsSkip giving out your phone number or email just to snag a coupon, unlock a discount code, or enter a giveaway. Scammers use those details to target you later with spam, phishing attempts, and even identity theft schemes. Instead, create and use an alias email address for sign-ups, promotions, or contests. That way your real inbox stays private, and suspicious offers won’t expose your personal data.For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/MailCLICK HERE TO GET THE FOX NEWS APPWhat this means for youIf you own an iPhone, don’t assume Apple’s built-in tools are enough. Android users appear to be more proactive, but everyone is vulnerable. Real security comes from your habits, not your hardware.Kurt’s key takeawaysThe bottom line: iPhone users are falling for scams more often because they trust too much and protect too little. The fix is simple: be cautious, be skeptical, and add extra protection. Because when it comes to scams, it’s not about the device, it’s about you.Do you still believe Apple makes you safer, or are you ready to admit that scammers can outsmart any phone? Let us know by writing to us at CyberGuy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/NewsletterCopyright 2025 CyberGuy.com.  All rights reserved.  

Why iPhone users are the new prime scam targets Read More »

1 the future of shopping 5 tech terms you need to know

5 e-commerce tech terms every shopper should know

NEWYou can now listen to Fox News articles!
Shopping has gone digital, and with it comes a whole new language. From the way you pay to the platforms you browse, technology is rewriting the rules of retail. We’ll break down five essential terms that directly shape how you shop today, from affiliate links powering influencer recommendations to same-day delivery that gets products to your door in hours.Stay tuned for more in this series as we decode the tech jargon behind the evolving world of e-commerce, answering the top questions we get from readers like you.10 THINGS I WISH I KNEW BEFORE BUYING REFURBISHED ELECTRONICSSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter Online shopping comes with its own set of terms native to the digital space. (Kurt “CyberGuy” Knutsson)1) Digital walletYour phone, your walletA digital wallet is an app that securely stores your credit cards, debit cards, tickets and even IDs on your smartphone. Instead of swiping plastic, you can simply tap your phone or smartwatch to pay at checkout.Where you’ve likely used it:Apple Pay or Google Pay at a coffee shop.Samsung Pay at a grocery store.Storing boarding passes, concert tickets or loyalty cards.Digital wallets use encryption and biometric security (like Face ID) to keep your payment data safe. They also cut down on physical clutter—no more fumbling with cards at the register.Want to make sure your digital wallet is safe? Check out my guide to setting strong authentication and avoiding scams targeting mobile payments.2) Buy now, pay laterHow installment plans reshape shoppingYou’ve probably seen “Pay in 4” or “Buy Now, Pay Later” (BNPL) at checkout. Some websites and services allow you to split purchases into smaller payments over time, typically with no interest if paid on schedule.Why it matters:Makes big-ticket items more accessible.Helps you budget, but late fees can add up.Retailers sell more by lowering the upfront cost.If you want even more ways to manage expenses, take a look at my guide on saving big at the grocery store using simple, proven hacks. For even more ways to stretch your dollars, check out my guide on the best ways to save money on gas with apps and loyalty programs.9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT A digital wallet is an app that securely stores your credit cards, debit cards, tickets and other items like IDs on your smartphone. (Jakub Porzycki/NurPhoto via Getty Images)3) Same-day fulfillmentFrom warehouse to your doorstep in hoursThe phrase same-day fulfillment describes when retailers use advanced logistics to process, pack, and ship your order so you get it within hours instead of days. Think Amazon Prime Now or Walmart’s express delivery.How it works:Local warehouses and stores act as mini shipping hubs.Algorithms map the fastest routes for couriers.Automation speeds up picking, packing, and delivery.It’s convenience at its peak, and for urgent needs (like a birthday gift you forgot), same-day fulfillment is a lifesaver. Be sure to check out my list of the 5 best secrets to shopping smarter on Amazon to save time and money.4) Social commerceShopping where you scrollSocial commerce is the blend of social media and online shopping. Instead of just seeing ads, you can now buy directly through platforms like TikTok Shop, Instagram Checkout or Pinterest.What makes it unique:Seamless shopping without leaving the app.Real-time recommendations from influencers and creators.Viral products can sell out within hours.For consumers, it’s impulse buying made easier. For businesses, it’s a new way to reach audiences where they already spend time.Want to avoid scams? Stick to verified shops and use buyer protection options when available. For more ways to stay safe while shopping online, check out my CyberGuy guide on how to tell if an online store is real or a scam.  Social commerce blends the experiences of online shopping and browsing social media. (Kurt “CyberGuy” Knutsson)5) DropshippingSelling without the stockroomDropshipping is a retail model where the seller doesn’t keep products in stock. Instead, when you place an order, it’s sent directly to a third-party supplier who ships it straight to your door.How it works:You buy from an online shop.The shop forwards your order to a manufacturer or wholesaler.That supplier handles storage, packing and shipping.Why it’s popular:Entrepreneurs can start online stores without investing in warehouses.Stores can offer a wide variety of products without holding inventory.The downside? Shipping times may be longer, product quality can vary and customer service sometimes suffers since the seller isn’t handling the goods directly. Still, dropshipping has become a cornerstone of e-commerce, powering countless online shops you scroll past every day. For some advice on how to start and grow an online store, visit CyberGuy’s guide on 10 easy ways to help launch a successful online shop.CLICK HERE TO GET THE FOX NEWS APPPro tip: protect yourself while shopping onlineEven as shopping gets more convenient, cyberthreats also grow. Fake stores, phishing scams, and shady links can put your data at risk. That’s why running a strong antivirus program is essential.Why antivirus matters for e-commerce:Scans links and downloads before they harm your deviceBlocks malicious pop-ups on retail and social sitesWarns you about suspicious checkout pagesUsing strong antivirus software gives you peace of mind while shopping online. It’s a small step that keeps your personal and financial information safe as e-commerce evolves.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech Kurt’s key takeaways:E-commerce is moving faster than ever. By understanding these five terms, you shop with confidence and spot trends before they become mainstream. From digital wallets to dropshipping, each concept shapes how products reach your hands. Stay curious, keep learning, and watch how retail continues to evolve.What changes in online shopping do you think will matter most in the next few years? Let us know by writing to us at CyberGuy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/NewsletterCopyright 2025 CyberGuy.com.  All rights reserved.  

5 e-commerce tech terms every shopper should know Read More »

ai browsers photo 1

How AI browsers open the door to new scams

NEWYou can now listen to Fox News articles!
AI browsers are no longer just an idea; they’re already here. Microsoft has built Copilot into Edge, OpenAI is testing a sandboxed browser in agent mode and Perplexity’s Comet is one of the first to fully embrace the concept of browsing for you.This is agentic AI stepping into our daily routines, from searching and reading to shopping and clicking. Instead of simply assisting us, these tools are beginning to replace us.But with this shift comes a new era of digital deception. AI-powered browsers may promise convenience by handling shopping, emails and other tasks, yet research shows they can stumble into scams faster than humans ever could. This dangerous mix of speed and trust is what experts call Scamlexity, a complex, AI-driven scam landscape where your agent gets tricked, and you pay the price.HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREESign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Falling for the same old tricksAI browsers are not immune to classic scams. In fact, they can fall for them even faster. When researchers at Guardio Labs told an AI browser to buy an Apple Watch, it confidently completed the purchase on a fake Walmart store set up in minutes. It autofilled personal and payment details without hesitation. The scammer got the money, while the human never saw the red flags. AI browsers promise convenience, but security experts warn they can fall for online scams faster than humans. (David Paul Morris/Bloomberg via Getty Images)Handling phishing emails from “your bank”Old phishing tactics also remain effective. In testing, researchers at Guardio Labs sent a fake Wells Fargo email to the AI browser. The browser clicked the malicious link with no verification and even helped the user fill out login credentials on the phishing page. By removing human intuition from the loop, the AI created a perfect trust chain that scammers could exploit.PromptFix: A modern AI injection scamThe real danger comes from attacks designed specifically for AI. Researchers at Guardio Labs created PromptFix, a scam disguised as a CAPTCHA page. While humans would only see a checkbox, the AI agent read hidden malicious instructions in the page code. Believing it was “helping,” the AI clicked the button, triggering a download that could have been malware. This type of prompt injection bypasses human awareness and targets the AI’s decision-making directly. Once compromised, the AI can send emails, share files or execute harmful tasks without the user ever knowing.The growing risks of AI browsersAs agentic AI becomes mainstream, scams will scale at an alarming speed. Instead of fooling millions of people individually, attackers need only to compromise one AI model to reach millions at once. Security experts warn this is a structural risk, not just a phishing problem.Tips to protect yourself from AI browser scamsAI browsers can save time, but they can also put you at risk if you rely on them too much. Use these practical steps to stay in control and reduce your chances of becoming a victim.1) Stay in control of your AIAlways double-check sensitive actions like purchases, downloads or logins. Keep final approval in your hands instead of letting the AI complete tasks on its own. This way, you prevent scammers from sneaking past your awareness.2) Use a personal data removal serviceScammers rely on exposed personal details to make their tricks more convincing. A trusted data removal service can help scrub your information from broker sites, reducing the chance that your AI agent hands over details that are already floating around online. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS AI browsers still click malicious links and autofill login credentials with no human oversight or verification to stop them. (Avishek Das/SOPA Images/LightRocket via Getty Images)3) Use strong antivirus softwareInstall and keep strong antivirus software updated. It adds an extra line of defense that can catch threats your AI browser may miss, including malicious files and unsafe downloads. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.4) Consider using a password managerA trusted password manager helps you generate and store strong, unique passwords. It can also alert you if the AI agent tries to reuse weak or compromised passwords when logging into sites.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.5) Watch your accounts closelyReview your bank and credit card statements often. If your AI agent shops or manages accounts for you, always cross-check receipts and login records. Quick action on suspicious charges can stop a scam from spreading further.6) Beware of hidden AI instructionsScammers hide malicious instructions in the code your AI reads, and the agent may follow them without question. If something feels wrong, stop the task and handle it manually.HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS   (Business Wire)Kurt’s key takeawaysAI browsers bring convenience, but they also bring risk. By removing human judgment from critical tasks, they expose a wider scam surface than ever before. Scamlexity is a wake-up call: The AI you trust could be tricked in ways you never see coming. Staying safe means staying alert and demanding stronger guardrails in every AI tool you use.CLICK HERE TO GET THE FOX NEWS APPWould you trust an AI browser to handle your banking and shopping, or is the risk of Scamlexity too high? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

How AI browsers open the door to new scams Read More »

mark zuckerberg at meta connect fox news 002

Fox News AI Newsletter: Zuckerberg’s demo fail

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Zuckerberg’s AI glasses suffer live demo hiccup at major tech event- OpenAI announces measures to protect teens using ChatGPT- OPINION: Speed up B-21 Raider stealth bombers to counter China Meta CEO Mark Zuckerberg wears the Meta Ray-Ban Display glasses, as he delivers a speech presenting the new line of smart glasses, during the Meta Connect event at the company’s headquarters in Menlo Park, California, U.S., September 17, 2025.  (REUTERS/Carlos Barria)THAT ZUCKS: Mark Zuckerberg’s much-anticipated demo of Meta’s new AI glasses tanked Wednesday at the Connect 2025 keynote, with glitches playing out in front of a packed audience.‘WORTHY TRADEOFF’: OpenAI on Tuesday announced new measures aimed at creating a safer experience for teens who use ChatGPT.SPARTAN SOARS: She’s nicknamed “Spartan.” The second B-21 Raider stealth bomber fittingly flew on Sept. 11, from its factory in the high desert of Palmdale, California, to adjacent Edwards Air Force Base.  The B-21 Raider was unveiled to the public at a ceremony Dec. 2, 2022, in Palmdale, California. Designed to operate in tomorrow’s high-end threat environment, the B-21 will play a critical role in ensuring America’s enduring airpower capability. (U.S. Air Force photo)BUTLER BOT: What if a robot could handle cleaning, serving and even complex tasks around your home or workplace? That’s exactly what X Square Robot hopes to deliver with its latest launch. THREAT SOURCE: Netskope CEO Sanjay Beri explains how his cybersecurity company uses A.I. models to protect customers and its path to profitability on ‘The Claman Countdown.’ Sanjay Beri, chief executive officer of Netskope Inc., during the company’s initial public offering (IPO) at the Nasdaq MarketSite in New York, US, on Thursday, Sept. 18, 2025. Netskope Inc.’s shares jumped 21% in its trading debut, after the cybersecurity firm raised $908.2 million in an initial public offering.  (Michael Nagle/Bloomberg via Getty Images)’SPEED TO POWER’: U.S. Energy Secretary Christopher Wright announces ‘Speed to Power’ initiative designed to cut red tape and accelerate major grid infrastructure projects nationwide on ‘Mornings with Maria.’Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeXLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Zuckerberg’s demo fail Read More »

used tech photo 1

10 things I wish I knew before buying refurbished electronics

NEWYou can now listen to Fox News articles!
Buying refurbished electronics sounds like a no-brainer. You get the latest gadgets at a fraction of the cost while giving devices a second life, which is better for the environment. It seems like the perfect solution for those on a budget, but it isn’t always that simple. Not every refurbished device is equal, and the fine print matters more than you think.Some sellers do a fantastic job restoring products, while others barely touch them before reselling. If you’re considering refurbished tech, here are important lessons I wish I knew beforehand. These insights will help you make smarter choices, avoid headaches and get real value for your money.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.AMAZON’S SECRET RENEWED STORE DEALS: SAVE ON APPLE PRODUCTS, NINJA AIR FRYERS, SHARK VACUUMS AND MORE Researching a seller’s track record is more important than chasing after the lowest refurbished price point. (Photo Illustration by Thomas Imo/Photothek via Getty Images)1) Refurbished does not always mean like newIn the tech industry, the label refurbished carries no uniform standard. From factory-certified devices that meet stringent quality checks to third-party refurbishments that address only surface-level defects, the range is vast. My experience shows that treating refurbished items as “like new” is a mistake. Many come with cosmetic blemishes or partially worn components, and some sellers stop at a basic reset and cleaning.The key is to scrutinize the seller’s refurbishment process and request detailed specifications or photos to ensure the item is in good condition. Look for transparency about what has been repaired or replaced. A reputable refurbisher will disclose whether critical components such as screens, batteries or motherboards were replaced or simply tested.Pro tip: Many refurbishers use a grading system (A, B, C). Grade A means near new, Grade B usually has light scratches, while Grade C shows heavier wear. Knowing the grade helps set realistic expectations.2) Check the warranty and return policyOne of the most overlooked yet critical aspects of buying refurbished electronics is the warranty and return policy. Through years of testing products, I’ve seen warranties vary wildly from generous 90-day coverage to none at all. A solid warranty is not just a formality; it’s a reflection of the refurbisher’s confidence in the quality of the product. Without it, you’re taking a gamble.Industry best practices suggest opting for sellers who provide at least a 90-day warranty and a clear, no-hassle return window. I have consistently seen reliable refurbishers like Amazon Renewed, eBay Certified Refurbished and Back Market stand by their work with transparent policies.Also look at Apple Certified Refurbished and Dell Outlet, which are industry leaders for high-quality laptops, tablets and phones.3) Know the seller’s reputationNot all sellers are equal when it comes to refurbished tech. My years covering consumer electronics have made it clear that choosing a reputable seller is more important than chasing the lowest price. Factory-certified refurbishers and authorized resellers tend to follow strict testing and quality control procedures. In contrast, independent sellers often vary in quality and reliability.I always emphasize researching the seller’s history, reading verified customer reviews and ensuring they offer clear refurbishment guarantees. Established marketplaces and brand-certified stores provide additional layers of security, including dispute resolution mechanisms.Red flags include: vague warranty language, listings with only stock photos, “open box” items marketed as refurbished and any product sold “as-is.” If you see those, walk away.4) Don’t forget accessories and packagingA less obvious but important consideration is the state of accessories and packaging. In industry practice, refurbished products rarely arrive in original packaging or with the full set of accessories. I’ve seen that some sellers ship devices with generic boxes and subpar third-party accessories or omit chargers and manuals altogether.If accessories are important to your workflow, don’t assume they’ll be included. Always verify the listing description and, when in doubt, ask the seller directly. Knowing exactly what comes in the box prevents surprises and ensures you don’t have to hunt for compatible chargers or cables after the fact, potentially eroding any savings you initially gained.5) Battery life may not be the sameA common misconception is that refurbished devices come with batteries that perform like new, but that’s not the case. Batteries naturally degrade with use, and not all refurbishers replace them.Some sellers disclose battery replacement while others do not. It is critical to confirm whether the battery is new, tested or original. Otherwise, expect performance issues such as rapid discharge or failure to hold a charge. A device with a worn-out battery is rarely worth the lower upfront cost, as you’ll likely need to replace the battery soon after purchase.SAVE UP TO 64% ON DYSON, DEWALT, ANKER, ADIDAS AND MORE DURING EBAY’S 30TH ANNIVERSARY SALE A good warranty and return policy are essential safeguards for choosing refurbished devices. (Dhiraj Singh/Bloomberg via Getty Images)6) Software updates and compatibilityYou should only use electronic items like phones, laptops, tablets and smartwatches as long as they’re receiving software updates. Many might disagree with this, but the truth is that once software support ends, your device becomes vulnerable to all kinds of unpatchable security flaws. Some good brands known for reliable software support are Apple, Samsung, Google, MSI and Lenovo.Before purchasing, always verify that the device is still supported with regular updates. This information is often available on the manufacturer’s website or through trusted tech resources.7) Test the device thoroughly after purchaseTesting a refurbished device thoroughly upon arrival is a best practice I’ve recommended repeatedly in my writing. Even trusted sellers can occasionally miss a defect. I always advise checking every essential function, such as the screen, charging port, Wi-Fi, sound and camera, within the seller’s return period. Many problems won’t be obvious from photos or descriptions alone.Immediate testing ensures you catch issues early enough to return or replace the product without hassle. It’s a small investment of time that prevents far bigger frustrations later.And don’t forget to perform your own factory reset on iPhone, Android, PC or Mac to ensure no old accounts, locks or data are lingering on the device. For Apple devices, make sure “Find My iPhone” has been disabled before purchase, or it may be unusable.8) Install strong antivirus softwareRefurbished devices can sometimes carry hidden risks, especially if the previous owner didn’t wipe the device properly or if the seller missed deep software issues. Installing  strong antivirus software is essential to protect your device from malware, spyware or other security threats that may be lurking.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.9) Use a password managerSecurity doesn’t end with antivirus protection. Many refurbished devices come with pre-installed software or misconfigured settings that could expose you to risk. One of the smartest moves you can make is using a reliable password manager to generate and store strong, unique passwords for all your accounts.Next, see if your email has been exposed in past breaches. Our #1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.10) Know the real value of your savingsRefurbished doesn’t always mean a bargain. As a rule of thumb, expect to save 20-40% compared to new, depending on the brand, age and condition. If you’re only saving 10-15%, the trade-off on warranty, lifespan or battery may not be worth it. Calculate the long-term cost, especially if you’ll need to buy a new battery or accessories soon after.6 KITCHEN ITEMS THAT EXPERTS ‘WOULD NEVER RECOMMEND’ BUYING AT SECONDHAND SHOPS Refurbished products often arrive without original packaging or accessories, leaving buyers unprepared. (Jakub Porzycki/NurPhoto via Getty Images)Bonus: The eco-friendly upsideEvery refurbished device purchased keeps one more gadget out of the landfill and reduces carbon emissions from manufacturing. Studies show buying refurbished can cut a product’s carbon footprint nearly in half. That means you’re not only saving money but also helping the planet.Kurt’s key takeawayBuying refurbished electronics can be a great way to save money and reduce e-waste. But it pays to be careful. By sticking with certified sellers, knowing what “refurbished” really means and insisting on warranties and clear return policies, you can protect both your wallet and your data.CLICK HERE TO GET THE FOX NEWS APP Have you ever bought a refurbished electronic device? How was your experience? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

10 things I wish I knew before buying refurbished electronics Read More »

philadelphia woman works on computer

How to save any file as a PDF

NEWYou can now listen to Fox News articles!
Portable Document Format (PDF) is one of the most widely used file formats for storing and sharing documents. It makes sense since PDFs are a universal file format that maintains layout, fonts, colors and images regardless of the device used to read them. Many people use PDFs to send resumes, receipts, tickets, contracts and school papers because they ensure the documents will look the same regardless of who opens them.Furthermore, unlike proprietary formats, such as docx, xlsx and pptx, they are less likely to disappear. They’re also one of the easiest files to secure and encrypt in case you’re sending sensitive information.The best part? You can turn just about any text document or image into a PDF. Let’s look at some popular ways of doing this.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter. Kurt Knutsson explains how to save any file as a PDF. (REUTERS/Hannah Beier)Save files as PDF on desktopIf you’re using a Windows or Mac, there is a built-in option that allows you to save a file as a PDF with a few clicks. This method usually works on files like text documents, images and emails.GET UP TO 83% OFF LIFETIME LICENSES FOR ACROBAT CLASSIC AND MICROSOFT OFFICE PROFESSIONALWindowsYou can use the print function in many Windows apps to save a file as a PDF.Open the file in its default app.Click File > Print, click the printer icon or press Ctrl + P.In the print dialog window, select Microsoft Print to PDF in the Printer dropdown menu.Click Print. Windows offers a built-in way to save a file as a PDF. (Kurt “CyberGuy” Knutsson)MacLike Windows, many macOS apps allow you to save files as PDF when printing them.Open the file in its default app.Click File > Print, click the printer icon or press Command + P.In the print dialog window, click PDF in the bottom left corner and choose where to save it.Click Save.ChromebookWhether you are viewing a document, image or webpage (even in an Android app), as long as the app you’ve opened it in supports printing, you can save it as a PDF.Open the file.Click File > Print, click the printer icon or press Ctrl + P.In the print dialog window, select Save as PDF in the Destination dropdown menu for selecting printers.Click Save.Save files as PDF on mobileOn Android and iPhones, you can exploit the share function to save files as PDFs. It also only takes a few taps.AndroidThere are several ways to export a file as a PDF on Android, with the easiest option being the print function when sharing it.Settings may vary depending on your Android phone’s manufacturer. Open the file in the default app.Tap the Share icon.Tap Print.Tap the PDF button to download it.iPhoneOn iPhone, you can save a file as a PDF in apps like Photos, Files and Notes. Here are the general steps:Open the file.Tap the Share icon.Tap Print to see a PDF preview of the file.Tap the Share icon.Tap Save to Files.Then, tap “Save” in the upper-right corner of the screen. You can save a file as a PDF on your iPhone or Android. (Kurt “CyberGuy” Knutsson)Save a file as a PDF on apps and cloud servicesMany apps and online services offer built-in tools to convert files to PDF format, whether you’re using popular office suites or cloud-based services. Let’s look at the options available on various platforms.If you’re using Microsoft Office apps, such as Word, Excel and PowerPoint, you can just save the file as a PDF.Open the file.Click File > Save As.Under the location where the PDF will be saved, set the file type dropdown to PDF.Click Save. Follow these steps to save a document as PDF in Microsoft Word. (Kurt “CyberGuy” Knutsson)For Google Workspace apps, such as Docs, Sheets and Slides, you can download them as a PDF:Open the file.Click File Then tap Download,Next, click the PDF Document.If you want to save a webpage in browsers like Chrome, Edge and Firefox, follow the steps below:Open the web page.Click the three-dot icon or three-line icon in the top-right corner.Click Print. Even a webpage can be saved and exported as a PDF file. (Kurt “CyberGuy” Knutsson)Set Printer or Destination to Save as PDF.Click Save. Follow these steps to save a document as PDF in the Edge internet browser. (Kurt “CyberGuy” Knutsson)In Adobe Acrobat Reader, follow the steps below (keep in mind that you need a premium subscription to use this feature):Open the file in Adobe Acrobat Reader. It will automatically be converted to a PDF.Press Ctrl + S on Windows or Command + S on Mac to save the PDF.Notetakers like Evernote, OneNote and Notion also allow you to export files as a PDF. For instance, in Notion, you have to do it this way:Click the three-dot icon in the top-right corner.Click Export.Select PDF in the Export format dropdown.Click Export.WINDOWS 11 FLAW LETS HACKERS BYPASS SECURE BOOT PROTECTIONSConvert a file to a PDF onlineYou can convert files to PDF using online conversion tools. To convert a file into a PDF using CloudConvert, follow the steps below:Go to https://cloudconvert.com/Click Select File.Select the file you want to convert on your computer or phone.Select PDF in the Convert to dropdown. You can upload more than one file.Click Convert.Click Download.While these sites provide a convenient means of converting files to PDFs, it’s best to avoid uploading sensitive documents like tax returns, medical records, financial statements, legal contracts or personal identification documents. That’s because they may store copies of those files on their servers, which means they can become vulnerable to security breaches or unauthorized access. For these, use built-in tools or trusted apps (any of the ones mentioned above will do).Save physical documents as PDF filesYou will find many apps for scanning documents and saving them as a PDF on Android and iPhone. The best one often mentioned is Adobe Scan, which you can download on the App Store or Google Play.Here’s how to use it.Open the Adobe Scan.If it’s your first time opening it, you will need to sign in with your Apple (iPhone only), Google or Facebook account.Tap the white circle in the bottom center of the screen to scan the document.Tap Save PDF in the bottom right corner.Working with PDFsOnce you’ve saved your file as a PDF, you may want to perform various actions to make it more useful or secure. Here’s how to work with your PDF files effectively.Merging PDFsYou can use online tools to merge PDFs for free.On your computer, go to https://acrobat.adobe.com/link/acrobat/combine-pdf.Drag and drop the PDFs you want to merge into the browser window. Adobe’s website offers a free method to combine PDF files. (Kurt “CyberGuy” Knutsson)You can rearrange the PDFs by dragging them to the position you want them to be in.Click Combine in the top-right corner. The Adobe website makes it possible to combine PDFs and arrange them in any order. (Kurt “CyberGuy” Knutsson)Shrinking PDFsAdobe also has an online tool you can freely use to compress PDFs.On your computer, go to https://www.adobe.com/acrobat/online/compress-pdf.html.Drag and drop the PDF you want to compress into the browser window.Click Compress in the bottom-right corner.Protecting your PDFs with a passwordYou can also password-protect your PDFs for free on the Adobe website using the steps below.On your computer, go to https://acrobat.adobe.com/link/acrobat/protect-pdf.Drag and drop the PDF you want to compress into the browser window.Enter the password under Set password. Enter the same password under Confirm password.Click Set password in the bottom-right corner. You can protect a PDF with a password on the Adobe website. (Kurt “CyberGuy” Knutsson)Sign PDFsThere are plenty of ways to sign a document, and the easiest one is to use Adobe Acrobat Reader.Open the PDF in Adobe Acrobat Reader on your computer.Select the E-sign tab.Click Add signature or Add initials in the FILL AND SIGN YOURSELF section in the menu on the left.Type your signature or initials in the dialog window. You can also draw it if you have a graphics tablet or add an image of it. Just switch to the Draw or Image tab.Click Apply.In the toolbar on the left side of the document area, click the pen icon.Select your signature or initials in the menu that appears on the right.Place your cursor, which will now look like your signature or initials, where you want to sign and click to insert the signature.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysAs you can see, saving any file as a PDF is easy regardless of your device or platform. It takes just a few clicks or taps. Use PDFs when you want to share documents without losing their formatting elements. Remember to follow best practices when sharing them, especially if they contain sensitive information. You can always add an extra layer of security by password-protecting or encrypting your PDFs.What other format do you like converting files to for storing and sharing? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

How to save any file as a PDF Read More »

sams club email scam

Sam’s Club customers targeted by phishing scam using fake $100 reward offers

NEWYou can now listen to Fox News articles!
Dennis and Carole recently reached out to us with a warning about a suspicious email claiming to offer a $100 Sam’s Club reward. “We received this yesterday, and my wife fell for the scam and initiated the free gift offer. No credit card other than email transferred,” Dennis said.The email looked professional, with the official Sam’s Club logo at the top. It read, “YOUR OPINION IS IMPORTANT. Exclusive. YOU CAN GET A $100 REWARD.” It then invited the recipient to “Take a short survey to claim your $100 reward. Click the button below to get started,” with a bold black button labeled “GET STARTED NOW!”Despite no credit card being entered, the couple wanted to know:Will scammers be able to charge their credit card?Do they already have credit card info?What steps should they take?Let’s break this all down.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX A couple warns about a new email scam disguised as a Sam’s Club survey. (Kurt “CyberGuy” Knutsson)Why this Sam’s Club email is a scamAt first glance, the email looked like it came straight from Sam’s Club, complete with the logo, blue color scheme and a tempting promise of a $100 reward for filling out a short survey. That’s exactly what scammers want you to think.This is a classic phishing scam. Cybercriminals copy a trusted brand’s style to trick you into clicking their links or entering personal information. Once you engage, they can:Collect your email address for spam listsSend more realistic-looking phishing attemptsTry to lure you into giving up payment or account details in future messagesDirect you to malware-infected websitesIn this case, only an email address was entered. That means there’s no direct credit card risk, yet. However, scammers now know the address is active and that someone at it will click through, making it more valuable for targeted scams later. The next step is protecting yourself quickly, because stopping them now is far easier than dealing with identity theft later.DON’T FALL FOR THIS BANK PHISHING SCAM TRICK Experts warn consumers not to click suspicious looking links. (Peter Dazeley)How to protect yourself after clicking a link in a scam emailIf you entered your email in a scam form, take these steps right away to reduce the risk of further attacks:1) Use strong antivirus softwareRun a scan with a trusted antivirus program. Many modern security tools also include phishing protection, blocking dangerous links before they can load. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.2) Mark the email as phishingUse your email provider’s spam or phishing report tool to flag the message. This helps block future attempts and trains filters to catch similar scams. 3) Consider a data removal serviceData removal services can contact data brokers to remove your personal information from their lists. This makes it harder for scammers to target you with more personalized attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Scammers are claiming to offer a $100 Sam’s Club reward. (REUTERS/Rick Wilking)Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.4) Watch for follow-up scamsScammers often follow up with urgent-sounding emails to “confirm” your account or claim you won a prize. Delete these immediately without clicking links or opening attachments. 5) Change your passwords and strengthen securityNever reuse the same password across multiple accounts. If scammers target your email address, they may try it with common password guesses. Create unique, strong passwords for each account and store them in a reputable password manager.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.6) Report the scamForward the email to:Sam’s Club: phishing@samsclub.comFTC: reportphishing@apwg.orgReporting helps both the brand and law enforcement track scam activity.CLICK HERE TO GET THE FOX NEWS APP Consumers are advised to report phishing emails to the company or the FTC. (CyberGuy.com)Kurt’s key takeawaysEven if you avoid entering payment details, your personal information still has value to scammers. An email address can open the door to phishing attacks designed to steal passwords, install malware, or gather more sensitive data. Scammers know how to make an email look convincing, especially when they dangle a gift card as bait. By staying alert, reporting suspicious emails and protecting your personal data, you can reduce your risk.Have you ever received a fake reward email from a brand you trust? How did you handle it? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Sam’s Club customers targeted by phishing scam using fake $100 reward offers Read More »

xsquare robot

The new robot that could make chores a thing of the past

NEWYou can now listen to Fox News articles!
What if a robot could handle cleaning, serving and even complex tasks around your home or workplace? That’s exactly what X Square Robot hopes to deliver with its latest launch. The company just introduced Quanta X2, a highly advanced robotic butler designed for dexterity and versatility. Alongside the robot, it unveiled Wall-OSS, an open-source artificial intelligence (AI) model meant to power robots that can adapt to unpredictable real-world tasks.These big reveals come with a major funding boost of around $100 million in Series A+ backing led by Alibaba Cloud, with participation from HongShan, INCE Capital, Meituan, Legend Star and Legend Capital.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.HUMANOID ROBOTS HANDLE QUALITY CHECKS AND ASSEMBLY AT AUTO PLANT X Square Robot announces its newest Quanta X2 model that functions as a robot butler. (X Square Robot)Quanta X2: Built for daily life and beyondQuanta X2 isn’t your typical robot. Standing at about 5 feet 8 inches tall and weighing around 210 pounds, it features 62 degrees of freedom for smooth, lifelike motion. Its seven-degree-of-freedom robotic arm is paired with dexterous hands that can sense pressure changes and perform delicate movements.The robot can grip, clean or even express emotions through gestures. A modular clamp system lets it attach brushes or mop heads for 360-degree cleaning. With an arm reach of 30 inches, a payload capacity of about 13 pounds and fine precision down to 0.001 inches, Quanta X2 is designed to work in both home and industrial settings.AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING X Square Robot also unveiled its Wall-OSS AI model to train the advanced humanoid robots. (X Square Robot)Wall-OSS: Smarter AI for unpredictable tasksAlongside Quanta X2, X Square Robot introduced Wall-OSS, a new open-source embodied AI model. Trained on vision-language-action data, it helps robots “think” and act more like humans when faced with unpredictable tasks.Unlike task-specific systems that fail outside narrow scenarios, Wall-OSS generalizes across multiple robot types. It also solves key challenges such as catastrophic forgetting and syncing vision, language and action. By reasoning, planning and executing seamlessly, robots powered by Wall-OSS can move from the lab into the messy real world.Developers will be able to access Wall-OSS on GitHub and Hugging Face, building community-driven datasets to accelerate adoption.CLICK HERE TO GET THE FOX NEWS APP X Square Robot is bringing humanity closer to having robot butlers. (X Square Robot)What this means for youThe dream of a robot that vacuums, delivers food or helps with complex tasks is moving closer to reality. Quanta X2 shows how robots can evolve beyond factories and into homes, hotels and offices. By open-sourcing Wall-OSS, X Square Robot is inviting developers everywhere to help build the next generation of robots. That collaboration could accelerate the day when robotic assistants become as commonplace as smartphones.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysX Square Robot is betting that embodied AI and open-source collaboration will finally push robots past flashy demos and into everyday life. With Quanta X2 and Wall-OSS, it is laying the groundwork for robots that don’t just perform one task, but adapt to whatever you need. The big question is whether these robots can prove reliable, affordable and safe enough for widespread use.If a robot like Quanta X2 could do your chores, would you trust it in your home? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

The new robot that could make chores a thing of the past Read More »

iss073e0516005orig

Milky Way Views

The Milky Way appears above Earth’s bright atmospheric glow in this Aug. 23, 2025, photograph from the International Space Station as it soared 261 miles above southern Iran at approximately 12:54 a.m. local time. The camera was configured for low light and long duration settings.
Our home galaxy has hundreds of billions of stars, enough gas and dust to make billions more stars, and at least ten times as much dark matter as all the stars and gas put together. NASA’s Nancy Grace Roman Space Telescope – slated to launch no later than May 2027 – will help scientists better understand the gas and dust strewn between stars in our galaxy, known as the interstellar medium.
Image credit: NASA; JAXA

Milky Way Views Read More »

og fox news

ONLINE GAMING SAFETY FOR KIDS & PARENTS

NEWYou can now listen to Fox News articles!
As kids pick up a controller and headset to play their favorite video games, companies across the gaming industry are working to make sure all their players are safe on their consoles.  Sean Whitcomb, Program Director for Child Safety and Education at Sony Interactive Entertainment says Sony and other major gaming brands are adding more safety measures, “We offer some family management tools that will help them create an experience that is really about uh shared boundaries and conversations that aren’t really controlling, but more about connecting.”Young players and their parents can set up the safety tools together to ensure a fun and safe gaming environment. As these features are meant to give families full control over what is, and isn’t shared online, while also letting young gamers enjoy their favorite titles.  “We’re making it easier for this to be a safe experience that everyone is comfortable with,” says Whitcomb.Beyond just setting up parental controls, Whitcomb encourages parents to actively participate in their kids’ gaming lives. He suggests that one of the best ways to understand what your child is playing is to join them.  He suggests, “Maybe pick up the controller and play with them too. That’s probably one of the easiest ways to understand what your child is experiencing.”And when it comes to who your kids are playing with, Whitcomb says parents should treat the digital world like a playground, “It’s more like, well, who is this person? How old are they? Where do they live? And why do you wanna spend more time playing with them? …. So, it’s just a conversation that I really recommend parents have with their children.” According to Whitcomb you can also score points with your children by using Sony’s parental control features to encourage better habits away from the screen, including more game time as a reward for doing chores around the house. 

ONLINE GAMING SAFETY FOR KIDS & PARENTS Read More »