memoment editorial

dark web photo 1

What really happens on the dark web, and how to stay safe

NEWYou can now listen to Fox News articles!
The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access. Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems, to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Photo by Phil Barker/Future Publishing via Getty Images)Inside the hidden layers of the internetThe Internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.The criminal economy and how scams are bornEvery major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than twenty dollars.Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.What you can do to stay ahead of dark web-driven threatsFor ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)1) Invest in personal data removal servicesA growing number of companies specialize in removing your personal data from online databases and people-search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use unique passwords and a password managerOne of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.3) Install strong antivirus protectionAntivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.4) Keep your software updatedOutdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.5) Enable two-factor authenticationEven if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.6) Consider identity theft protection servicesIdentity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as social security numbers, bank details, or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)Kurt’s key takeawayThe dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand about how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

What really happens on the dark web, and how to stay safe Read More »

data center photo 2

A supercomputer chip going to space could change life on Earth

NEWYou can now listen to Fox News articles!
A computer chip so powerful that it fuels today’s artificial intelligence is about to leave Earth. NVIDIA’s H100 GPU, used to train advanced AI models, will soon travel aboard a Starcloud satellite.Starcloud, a startup based in Redmond, Washington, wants to see if the world can move data centers into orbit. These centers power nearly everything online, from streaming to AI tools. Shifting them into space could help reduce pollution, save resources and speed up computing for everyone.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.LIVING IN GIANT MOON GLASS SPHERES COULD BE OUR FUTURE Starcloud aims to build the first orbital data centers, cutting emissions and speeding up global computing. (Dean Mouhtaropoulos/Getty Images)Why space data centers matter for the futureEvery time you send a message, store a file in the cloud or use AI, large computers on Earth handle the work. These data centers use massive amounts of electricity and water to stay cool. They also release heat, noise and greenhouse gases that affect local communities.Space offers a different environment. Solar energy is abundant, and cooling happens naturally in the cold vacuum. “The only environmental cost is the launch,” said Starcloud CEO Philip Johnston. “After that, we could save ten times the carbon emissions compared with running data centers on Earth.”For a world searching for greener technology, that goal matters.How the NVIDIA GPU will work in orbitThe Starcloud-1 satellite, about the size of a small refrigerator, will carry NVIDIA’s H100 GPU. It is nearly one hundred times more powerful than any chip ever sent into orbit.Once in space, the GPU will process huge amounts of satellite data. It will study images of Earth to identify wildfires, track crops and monitor weather. Normally, satellites send this data back to Earth for processing, which can cause long delays. Doing the analysis in orbit allows faster results and better decisions on the ground.The mission will also test Google’s Gemma language model in orbit. It will be the first time a large AI model operates in space.THE NEW ARMS RACE IS FOR COMPUTE — AND AMERICA CAN’T AFFORD TO FALL BEHIND By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient. (Dean Mouhtaropoulos/Getty Images)Starcloud plans to build space data centersStarcloud hopes this is only the beginning. The company plans to build larger data centers in space powered by sunlight and cooled by the natural chill of orbit. Future systems will include the next generation of NVIDIA GPUs called Blackwell, which promise even higher performance.Starcloud’s long-term goal is to create a five-gigawatt orbital data center about 2.5 miles wide (around 13,000 feet across). It could handle massive AI workloads while cutting costs and carbon emissions. As launch prices continue to fall, building data centers beyond Earth could soon become practical.Johnston believes that by the 2030s, many new data centers will operate in orbit instead of on land.What this space mission means for youIf this works, the technology that powers your apps, games and AI tools might soon be running in space. This change could make cloud services faster, more efficient and less harmful to the planet.Space-based data centers could also speed up disaster response, improve weather forecasts and save millions of gallons of water every year. The idea shows that innovation and sustainability can grow together.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.RAPID RISE OF AI PUTS NEW URGENCY ON CONGRESS TO UNLEASH AMERICAN ENERGY NVIDIA’s powerful H100 GPU is heading to space aboard Starcloud-1 to test AI data processing in orbit. (Kent Nishimura/Bloomberg via Getty Images)Kurt’s key takeawaysSending an NVIDIA GPU into orbit shows how quickly technology is changing. The mission combines curiosity, innovation and a genuine push to make computing cleaner and faster. As space becomes more reachable, the idea of data centers floating above Earth feels less like fiction and more like something that could actually happen. Each of these missions could teach us a little more about how to build a sustainable digital future.How do you feel about the idea of data centers operating in space? Is it exciting, risky or both?  Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Copyright 2025 CyberGuy.com.  All rights reserved.

A supercomputer chip going to space could change life on Earth Read More »

amazon warehouse deliveries

Fox News AI Newsletter: AI job losses hit hard

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Amazon to cut around 14K corporate jobs- Senate Republican demands Google shut down AI model over false rape allegation- Leading AI company to ban kids from chatbots after lawsuit blames app for child’s deathCORPORATE CUTBACKS: Amazon is planning to cut 14,000 roles from its corporate workforce as part of an internal restructuring, according to a message shared with employees on Tuesday. FILE PHOTO: Workers move products during Cyber Monday at the Amazon’s fulfillment center in Robbinsville, New Jersey, Nov. 27, 2023.  (REUTERS/Mike Segar/File Photo)AI LIES EXPOSED: A Senate Republican accused Google and its AI of targeting conservatives with false allegations and fake news stories, including allegations of a sexual assault that never happened.CHATBOT CRACKDOWN: Popular artificial intelligence (AI) chatbot platform Character.ai, widely used for role-playing and creative storytelling with virtual characters, announced Wednesday that users under 18 will no longer be able to engage in open-ended conversations with its virtual companions starting Nov. 24.AI PROOF: There is growing concern among today’s workforce that they will be swiftly replaced by artificial intelligence as the technology, which has touched nearly every corner of the economy, continues to advance. But experts argue that the adoption of the technology won’t be the same across all industries, meaning not every job will be impacted the same way, according to the World Economic Forum. To better characterize the situation, the organization likened AI to a college student who had access to all the old exams and study guides.REAL WORLD ROADS: A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100. Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)DIGITAL DANGER: Heartbroken parents are demanding justice after artificial intelligence (AI) “companion” chatbots allegedly groomed, manipulated and encouraged their children to take their own lives — prompting bipartisan outrage in Congress and a new bill that could potentially hold big tech accountable for minors’ safety on their platforms.EXPANDING REACH: Chip giant Nvidia on Tuesday announced new partnerships with tech and telecommunications companies in efforts to advance artificial intelligence (AI)infrastructure and operationalize AI capabilities.RACE TO WIN: PayPal on Tuesday became the first payments platform to embed its digital wallet into OpenAI’s ChatGPT. Shares of the San Jose, California-based company climbed in Tuesday morning trading after the company announced that it is going to adopt the Agentic Commerce Protocol (ACP) to expand payments and commerce in ChatGPT, allowing ChatGPT users to be able to check out instantly using PayPal. DEFAMATION SUIT: Conservative activist Robby Starbuck is suing Google after the tech giant’s AI tools allegedly linked him to false accusations of sexual assault, child rape and financial exploitation, among others.DIGITAL DECEPTION: Artificial intelligence is helping workers create fake expense receipts, according to a recent report. A slew of AI-generated receipts have been submitted to employers thanks to new image generation models from companies like Google and OpenAI, the Financial Times reported.TECH SHAKE-UP: Chegg Inc., a Santa Clara-based online learning platform, said Monday it will cut about 45% of its workforce – roughly 388 employees – as it confronts what it calls “the new realities of AI and reduced traffic from Google to content publishers.”GONE GROK: Elon Musk’s artificial intelligence company, xAI, launched its early version of Grokipedia Monday, which is said to be an AI-generated encyclopedia to compete with Wikipedia. The billionaire Tesla founder, who has long criticized Wikipedia for what he calls “editorial bias,” previously described Grokipedia as a more “truthful and independent alternative.”  lon Musk attends the Viva Technology conference dedicated to innovation and startups at the Porte de Versailles exhibition center on June 16, 2023, in Paris. (Chesnot/Getty Images)PROGRAMMING HOPE: Artificial intelligence is stepping into the fight against cancer — and, according to Fox News senior medical analyst Dr. Marc Siegel, it could be a game-changer. On the Monday episode of “Fox & Friends,” Siegel said AI is already transforming the way doctors detect and treat cancer, and could lead to real cures within the next decade.EYES ON YOU: Your phone is full of photos you’ve never posted, moments you meant to share but never got around to. That’s exactly what Facebook wants to change. It now uses Meta AI to spot hidden gems in your camera roll, polish them, and create simple collages you can share. You take the pictures, and Facebook helps turn them into easy, ready-to-share memories. No design skills required.DIGITAL DOMINANCE: The United States must win the global race for AI domination against China. Our success depends on thriving innovation and robust investment – two integral pieces of our national battle plan. But the third component of victory can’t be overlooked: The U.S. urgently needs even better internet infrastructure. If we don’t extend our advantage in 21st-century connectivity, we will lose the fight for global AI leadership.SECURITY SLIP: Police officers swarmed a 16-year-old high school student last week after an artificial intelligence (AI) gun detection system mistakenly flagged his bag of chips as a firearm, leaving officials and students shaken. Student Taki Allen was waiting for his ride at Kenwood High School in Essex, Maryland, last Monday when he placed an empty bag of chips in his pocket, according to WMAR-2 News. Moments later, police officers suddenly surrounded him, ordering him to the ground and handcuffing him, the local station reported. FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: AI job losses hit hard Read More »

2 MICROSOFT LAPTOP

Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

NEWYou can now listen to Fox News articles!
Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWAREWhy are unsupported systems dangerousUnsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.The “just one more year” trapMany people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading. Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERSThe hidden costs of waiting to upgrade to Windows 11It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files, or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.How to stay safe from unsupported Windows 10 security risksYou can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes, but make a major difference in your security.1) Upgrade your system to Windows 11HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELYStart by checking if your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.2) Watch out for phishing scams and install strong antivirus softwareBe cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.3) Use a data removal serviceHOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICESUse a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com4) Secure your loginsStrong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELYNext, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)Check out the best expert-reviewed password managers of 2025 at Cyberguy.com5) Back up your data regularlyThink of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.6) Stay informed and proactiveCyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysUnsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide Read More »

nike project amplify 1

Nike partners with robotics company to create world’s first motor-powered footwear system

NEWYou can now listen to Fox News articles!
Nike has taken a bold step into the future with Project Amplify, the world’s first motor-powered footwear system made for people who love to move. Created with robotics partner Dephy, the design combines a carbon-plated running shoe with a motorized cuff and drive belt that add a gentle push to every stride.Unlike performance tech built for pros, Project Amplify is designed for everyday movers such as runners, walkers and commuters. It helps anyone who wants to go a little faster and a little farther with less effort. Think of it like the running world’s version of an e-bike. It makes movement simpler, smoother and more fun for everyone.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.SKECHERS’ AIRTAG SHOES LET YOU TRACK YOUR KIDS’ STEPSHow Project Amplify worksAt the center of Project Amplify is a small but powerful motor. It connects to a rechargeable cuff that wraps comfortably around your calf. The cuff links to a carbon plate inside the shoe. Together, they provide natural assistance with each step. Nike’s Project Amplify pairs sleek design with advanced robotics to help every step feel lighter and smoother. (Nike)Testing in the Nike Sport Research Lab has been extensive. More than 400 athletes have taken over 2.4 million steps during trials. According to testers, the system makes uphill running feel like flat ground. Some even said it helped them go from a 12-minute mile to a 10-minute mile with less effort.NIKE IS NOW ON AMAZON: SHOP WALKING SHOES, JOGGERS, SOCKS AND SHORTS TODAYBecause of this, Nike says Project Amplify isn’t about competition. The company’s focus is on making movement easier and more approachable for a wider range of people. Whether someone is new to running or wants to fit more walking into daily life, the technology is designed to offer gentle support without taking over the effort.Innovation made accessibleNike’s VP of Emerging Sport and Innovation Michael Donaghu described the idea behind Project Amplify as this, “What if we could help athletes move faster and farther with less energy and a lot more fun?”HUMANOID ROBOT TURNS HEADS AT NYC SNEAKER STOREThat question inspired years of research and collaboration between Nike and Dephy. Together, they combined robotics, biomechanics and motion algorithms to create a powered shoe that feels natural to wear.Like e-bikes transformed cycling, Project Amplify could do the same for running and walking. It aims to help people stay active more often and enjoy movement in new ways. Through this approach, Nike is showing how innovation can make fitness more accessible to everyone. Early testing shows the powered cuff and drive system give runners steady support on every stride. (Nike)What this means for youAFFORDABLE 3D-PRINTED BIONIC ARM USES MUSCLE SIGNALS TO MOVEImagine finishing a run with energy to spare. Picture walking an extra mile without feeling tired. Project Amplify makes that possible. Its gentle mechanical assist feels like an extra set of calf muscles that supports your natural stride.For casual runners, this means more miles with less strain. For commuters, it could make daily travel faster and more efficient. Overall, it gives you the power to enjoy movement again. The goal is not to do less. The goal is to get more from every step.Take my quiz: How safe is your online security?NEW EXOSKELETON BUILT TO BOOST ENDURANCE AND CUT FATIGUEThink your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysWith Project Amplify, Nike is blending art, science and sport to change how movement feels. This new technology aims to enhance natural motion rather than replace it. As testing moves forward, one thing is clear: Project Amplify could completely change how we think about running, walking and human performance. As Nike refines Project Amplify, the focus remains on making movement easier, more natural, and more enjoyable for everyone. (iStock)CLICK HERE TO DOWNLOAD THE FOX NEWS APPIf powered shoes could make running and walking easier, would you try them or stick with pure muscle power? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Nike partners with robotics company to create world’s first motor-powered footwear system Read More »

70702

Congressman Himes on Venezuela, Latin America & a Disordered World

As ranking member of the House Permanent Select Committee on Intelligence, Rep. Jim Himes of Connecticut has deep insights into national security. And he is concerned. He joined Ryan to share his thoughts on strikes on drug boats, the Trump administration’s foreign policy in Latin America, the way the administration fails to work with Congress on matters of national security, and strategy in other parts of the world, including Europe, the Middle East, and East Asia. 

Congressman Himes on Venezuela, Latin America & a Disordered World Read More »

1 employee screening data breach exposes 3.3 million records

183 million email passwords leaked: Check yours now

NEWYou can now listen to Fox News articles!
A massive online leak has exposed more than 183 million stolen email passwords gathered from years of malware infections, phishing campaigns and older data breaches. Cybersecurity experts say it is one of the largest compilations of stolen credentials ever discovered.Security researcher Troy Hunt, who runs the website Have I Been Pwned, found the 3.5-terabyte dataset online. The credentials came from infostealer malware and credential stuffing lists. This malware secretly collects usernames, passwords and website logins from infected devices.Researchers say the data contains both old and newly discovered credentials. Hunt confirmed that 91% of the data had appeared in previous breaches, but about 16.4 million email addresses were completely new to any known dataset.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT Cyber experts uncovered a 3.5-terabyte data dump containing millions of stolen logins. (Kurt “CyberGuy” Knutsson)The real risk behind the password leakThe leak puts millions of users at risk. Hackers often collect stolen logins from multiple sources and combine them into large databases that circulate on dark web forums, Telegram channels and Discord servers.If you have reused passwords across multiple sites, attackers can use this data to break into your accounts through credential stuffing. This method tests stolen username and password pairs on many different platforms.The risk remains real for anyone using old or repeated credentials. One compromised password can unlock social media, banking and cloud accounts.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices.   (Jens Büttner/picture alliance via Getty Images)Google responds to the reportsGoogle confirmed there was no Gmail data breach. In a post on X, the company stated “reports of a Gmail security breach impacting millions of users are false. Gmail’s defenses are strong, and users remain protected.”Google clarified that the leak came from infostealer databases that compile years of stolen credentials from across the web. These databases are often mistaken for new breaches when, in fact, they represent ongoing theft activity. Troy Hunt also confirmed the dataset originated from Synthient’s collection of infostealer logs, not from a single platform or recent attack. While no new breach occurred, experts warn that leaked credentials remain dangerous because cybercriminals reuse them for future attacks.How to check if you were exposedTo see if your email was affected, visit Have I Been Pwned. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the Synthient leak.Many password managers also include built-in breach scanners that use the same data sources. However, they may not yet include this new collection until their databases update.If your address shows up, treat it as compromised. Change your passwords immediately and turn on stronger security features to protect your accounts.COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE The 183 million exposed credentials came from malware, phishing and old data breaches. (Kurt “CyberGuy” Knutsson)9 steps to protect yourself nowProtecting your online life starts with consistent action. Each step below adds another layer of defense against hackers, malware and credential theft.1) Change your passwords immediatelyStart with your most important accounts, such as email and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. Never reuse passwords. One stolen password can unlock multiple accounts. Each login should be unique to protect your data.A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed.Next, check whether your email has been caught in a recent credential leak. Our No. 1 password manager pick includes a built-in Breach Scanner that searches trusted databases, including the newly added Synthient data from Have I Been Pwned. It helps you find out if your email or passwords have appeared in any known leaks. If you see a match, change any reused passwords right away and secure those accounts with strong, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.2) Enable two-factor authentication (2FA)Turn on 2FA wherever possible. It adds a powerful second layer of defense that blocks intruders even if they have your password. You will receive a code by text, app or security key. That code ensures only you can log in to your accounts.3) Use an identity theft service for continuous monitoringIdentity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. It’s a smart way to stay one step ahead of hackers.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.4) Protect your devices with strong antivirus software Infostealer malware hides inside fake downloads and phishing attachments. A strong antivirus software scans your devices to stop threats before they spread. Keep your antivirus updated and run frequent scans. Even one unprotected device can put your whole digital life at risk.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Avoid saving logins in your web browserBrowsers are convenient but risky. Infostealer malware often targets saved passwords in your web browser. 6) Keep software updatedUpdates fix security flaws that hackers exploit. Turn on automatic updates for your operating system, antivirus and apps. Staying current keeps threats out. 7) Download only from trusted sourcesAvoid unknown websites that offer free downloads. Fake apps and files often contain hidden malware. Use official app stores or verified company websites. 8) Review your account activity oftenCheck your accounts regularly for unusual logins or device connections. Many platforms show a login history. If something looks off, change your password and enable 2FA immediately.9) Consider a personal data removal serviceThe massive leak of 183 million credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites.While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThis leak highlights the ongoing danger of malware and password reuse. Prevention remains the best defense. Use unique passwords, enable 2FA and stay alert to keep your data safe. Visit Have I Been Pwned today to check your email and take action. The faster you respond, the better you protect your identity.Have you ever discovered your data in a breach? What did you do next? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   Copyright 2025 CyberGuy.com.  All rights reserved.

183 million email passwords leaked: Check yours now Read More »

2 What to do and not do when it comes to charging your phone iphone charger

5 hidden battery drainers you can fix right now

NEWYou can now listen to Fox News articles!
You plug in your phone overnight, but by lunchtime, it’s already gasping for charge. Sound familiar? Hidden background features, sneaky settings and apps you forgot existed can quietly drain your battery faster than you think. The good news is a few quick tweaks can help your device stay powered all day, without sacrificing performance or convenience.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.1) Turn off background app refreshStop apps from sipping power when you’re not using them. Even when you’re not actively scrolling or tapping, many apps continue running in the background, fetching updates, refreshing data and sending notifications. It’s convenient, but it drains your battery faster than you realize.For iPhone Go to Settings.Tap General.Click Background App Refresh.Tap Background App Refresh again.Select Off, or choose Wi-Fi to limit data use and battery drain.You can also toggle off refresh for individual apps if you still want certain ones to run.WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE Stop background apps from quietly draining your battery. (Kurt “CyberGuy” Knutsson)For Android Settings may vary depending on your Android phone’s manufacturer. Open Settings.Tap Battery (or Battery & device care, Power management, or similar).Select Background usage limits, App battery management, or Battery optimization, wording depends on your device.Choose the apps you rarely use, then set them to Restricted, Optimized, or Put unused apps to sleep.To let Android manage this automatically, turn on Adaptive Battery (found under Settings › Battery › Adaptive Battery).Pro tip: Keep essential apps, such as messaging, navigation, or weather, active so they can update in real time. Restricting background activity for apps you don’t open often can extend battery life by several hours a day.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE Turn off background refresh to stop unused apps from quietly draining your battery. (Kurt Knutsson)2) Disable Always-in DisplayThat sleek clock on your screen might look cool, but it’s constantly using power. Always-On Display keeps your screen partially lit, even when you’re not touching it, to show time, notifications or widgets. Over time, that adds up, especially overnight.For iPhone (14 Pro and later)Go to Settings.Tap Display & Brightness.Click Always On Display.Toggle Off next to Always On Display to stop your phone from lighting up when locked.For AndroidSettings may vary depending on your Android phone’s manufacturer. Open Settings.Tap Lock screen (sometimes labeled “Lock screen & security”, “Lock screen & AOD”, “Display & lock screen”, etc.).Look for Always On Display (AOD) (or similar, such as “Always show time & info”, “Ambient display”, “Screen always on when locked”).Toggle Off to disable the AOD entirely, or choose an alternative mode (for example: “Tap to show” / “Show on tap” so the AOD only appears when you tap the screen) if available.(Optional) Some devices allow scheduling of AOD or limiting it to when notifications are present. If you want more control, explore the sub-options under the AOD setting.Turning off Always-On Display can extend standby battery life by up to 10-15%.YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT Turn off Always-On Display to save more power each day.  (SeongJoon Cho/Bloomberg via Getty Images)3) Limit location accessGPS is one of the biggest hidden battery drains. Apps that track your location in the background, from ride-sharing to retail, can quietly sap your phone’s power even when you’re not using them. Adjusting permissions keeps your phone secure and efficient.For iPhone Go to Settings.Tap Privacy & Security.Click Location Services.Tap each app individually and change Always to While Using the App or Never.Now, scroll to the bottom and tap System Services.Tap Significant Locations, then toggle it Off to stop your iPhone from storing detailed location and travel history. (You can also tap “Clear History” here to erase past entries.)For Android Settings may vary depending on your Android phone’s manufacturer.Open Settings.Tap Location (or sometimes Privacy & Security → Location).Tap App permissions (or App location permissions, Location permissions for apps).Select an app, then choose the appropriate permission, such as “Allow only while using the app” (or “Allow only when in use”) or “Don’t allow” (or “Deny”).On the same screen (for that app), you may see a toggle for “Use precise location”. If the app doesn’t need GPS accuracy, toggle Off to let it use only an approximate location.Apps like Maps and Weather need access, but most don’t. Tightening this setting not only boosts battery life, but it also improves your privacy by limiting background tracking.Pro tip: Leaving essential features like Find My iPhone or Emergency Calls & SOS enabled under System Services ensures your phone can still help locate or protect you if it’s lost, even with other location options turned off.CLICK HERE TO GET THE FOX NEWS APP Limit location tracking to protect privacy and extend battery life. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)4) Turn off Raise to Wake and Tap to WakeEver notice your screen lighting up when you simply pick up your phone? Those quick flashes add up. Every time your display activates — even for a second, it consumes battery power. Turning off these motion-activated features can reduce unnecessary screen wake-ups.For iPhoneGo to Settings.Tap Display & Brightness.Turn off Raise to Wake.For Android Settings may vary depending on your Android phone’s manufacturer.Open Settings.Tap Display (or Lock screen & security, or Advanced features, depending on your device).Look for Lift/ Raise to wake, Tap to wake, or Double tap to wake (sometimes found under Gestures or Motion settings).Turn off “Lift/Raise to wake” and “Tap/Double tap to wake” (or choose to disable whichever is active).If you want a simpler way to wake your phone only when you intend to, rely on the power-button wake (which is the default on nearly all phones).5) Review battery usage and spot the culpritsIf your phone is dying faster than usual, the Battery Usage tool can reveal the exact cause. You’ll see which apps are using the most power, both on screen and in the background, so you can take action.For iPhoneGo to Settings.Tap Battery.Scroll to view the battery usage graph and list of apps and system processes that are using power.Look for any highlighted items (indicating unusually high usage).Tap an app or process to view more details about its usage and background activity.If you notice an app draining power in the background on an ongoing basis, consider limiting its background activity or uninstalling it if it’s not needed.For Android Settings may vary depending on your Android phone’s manufacturer.Open Settings.Tap Battery (or Battery & device care, Power & battery, depending on your device).Tap Battery usage or Battery usage by app (or similar).Look through the list of apps and sort or filter by App usage or Screen time, if available, to identify top battery consumers.Tap a high-drain app, then choose something like Restrict background usage, Optimize, or Disallow background activity (depending on the options your phone offers).Common battery-draining culprits include social media apps, streaming apps, location-based apps and apps with heavy background update behavior. Reviewing this every few weeks can help catch new drains early. Bonus: Check your battery healthIf your phone still drains quickly after these fixes, your battery might be aging. Both iPhones and Android devices offer built-in diagnostics to check battery health and capacity.For iPhoneGo to Settings.Tap Battery.Tap Battery Health & Charging (on some older versions, it may simply be “Battery Health”).On the Battery Health screen, look at the Maximum Capacity percentage. This tells you how the battery’s current capacity compares to when it was new.If the percentage is well below ~80%, it may be a good time to replace the battery to restore performance and capacity. (Apple notes that batteries are designed to retain around 80 % of their original capacity at 500 full charge cycles under ideal conditions.)For AndroidSettings may vary depending on your Android phone’s manufacturer.Go to Settings.Tap Battery (or “Battery & device care”, “Power & battery”, depending on your phone).Look for an option called Battery health, Battery capacity, Battery status or Battery Information. Note: this may not appear on all phones.If the built-in health indicator isn’t available, you can open the hidden test menu by dialing *#*#4636#*#* in the Phone app. If “Battery information” appears, you may see stats such as health, capacity, or cycle count.If your battery health or capacity is shown as “Reduced” or significantly lower than expected, consider replacing the battery for better performance and longevity.Replacing an aging battery can dramatically improve performance and lifespan, often more than any software tweak.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysWith a few quick tweaks, your phone can finally keep up with you all day. Adjusting settings, limiting background activity and checking battery health really do make a difference. You’ll spend less time stressing about a low battery and more time actually using your phone. Stay proactive, and your device will stay powered when you need it most.Got a tip you’d like to share, and/or what other everyday tech challenges would you like help solving? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

5 hidden battery drainers you can fix right now Read More »

cropped header 01 32x32 1

Part 2: Hall of Mirrors with A Quicksand Floor

“The brightest, whitest light I’ve ever seen. How can it fly like that?What is it? Oh, I’m scared. How can they be doing that —killing that cow? It’s not even dead! It’s alive!”

– Female abductee at cattle mutilation site, Cimarron, NM, May 1980

Click here to subscribe and get instant access to read this report.
Click here to check your existing subscription status.
Existing members, login below:

© 1998 – 2025 by Linda Moulton Howe.All Rights Reserved.

Part 2: Hall of Mirrors with A Quicksand Floor Read More »

kodiak autonomous truck safety

AI truck system matches top human drivers in massive safety showdown with perfect scores

NEWYou can now listen to Fox News articles!
A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100.The Kodiak Driver earned a remarkable score of 98. That result placed it beside the safest human fleets in Nauto’s global network. The findings sparked discussion across the trucking industry and raised new questions about the role of automation in freight transport.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027? The Kodiak Driver, an autonomous trucking system powered by AI, earned a top VERA Score of 98 in a new safety evaluation. (Kodiak)Kodiak Driver’s autonomous truck safety evaluation resultsKodiak’s VERA Score of 98 matched the highest rating among all fleets evaluated. Fleets with Nauto’s safety technology average a score of 78, while those without the technology average only 63.The Kodiak Driver achieved perfect scores of 100 in inattentive driving, high-risk driving and traffic violations. Its lowest score, 95, came in aggressive driving. The VERA Score combines over 20 vision-based AI variables into one clear safety rating.Nauto found that every ten-point increase in VERA Score cuts collision risk by about 21 percent. A near-perfect score like Kodiak’s represents a strong improvement over typical human performance on the road.The strong results didn’t come as a surprise to Kodiak’s leadership. Don Burnette, founder and CEO of Kodiak, told CyberGuy: “Achieving the top safety score among more than 1,000 commercial fleets in Nauto’s Visually Enhanced Risk Assessment (VERA Score®) proprietary safety benchmark is a testament to the Kodiak’s focus on safety. Safety is at the foundation of everything Kodiak builds. Our core value is ‘safety first and always.’ We believe independent safety evaluations like Nauto’s help to validate what we already know: the Kodiak Driver is already among the safest drivers on American highways. They also help to establish and build public awareness around how safe our technology truly is.”FOX NEWS AI NEWSLETTER: TRUMP, MUSK AIM FOR DOMINANCEThe growing impact of AI on truck driving safetyNauto equipped the trucks with advanced monitoring and hazard detection systems. These tools track both the driving environment and vehicle behavior in real time. Removing human factors such as distraction, fatigue and delayed reaction directly improves safety.Burnette said in a company statement that the system “is never drowsy, never drunk, and always paying attention.” That constant awareness allows the Kodiak Driver to operate defensively and predictably, two traits linked to safe driving.The VERA Score also gives fleets a consistent way to measure safety. Companies can now shift from reacting to crashes to preventing them.Federal Motor Carrier Safety Administration data support the trend. U.S. commercial truck crashes dropped from more than 124,000 in 2024 to roughly 104,000 this year. Fewer crashes mean fewer fatalities and safer highways overall. Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKINGConcerns about autonomous truck safetyNot everyone is ready to hand over the wheel to artificial intelligence. Some industry experts point out that while systems like the Kodiak Driver perform well in controlled evaluations, real-world roads can still pose unpredictable challenges. Weather, human drivers and mechanical issues remain complex variables for autonomous systems to manage.Others worry about the impact on jobs. As AI takes on more driving responsibilities, professional drivers wonder what the shift will mean for employment and pay across the trucking industry.Safety advocates also call for clearer regulations and public transparency.Even supporters of the technology agree that continued oversight, testing and gradual rollout are essential. Progress is promising, but trust takes time.AI DRONE FINDS MISSING HIKER’S REMAINS IN MOUNTAINS AFTER 10 MONTHSWhat this means for youIf you work in logistics, fleet management or transportation tech, this news hits close to home. The Kodiak Driver’s near-perfect score proves that autonomous systems aren’t just catching up to human drivers; they’re starting to edge ahead in safety.Businesses could see big gains. AI-powered safety tools help cut liability, lower costs and keep fleets running smoothly. The technology doesn’t need rest breaks or reminders to stay focused, which makes every mile more efficient.Regulators are also paying attention. Verified data like this builds trust and clears the way for safer, wider use of autonomous trucks. It’s proof that technology can deliver real-world safety, not just promise it.Drivers on everyday roads benefit too. Fewer crashes mean safer highways and more reliable deliveries. When trucks drive smarter, everyone shares the reward. Human drivers aren’t going anywhere soon, but AI is quickly becoming their most reliable partner. It helps prevent fatigue, distraction and those risky split-second decisions that lead to trouble. AI-driven fleets are proving that technology and human expertise can work together to make highways safer for everyone. (PlusAI)TESLA’S SELF-DRIVING CARS UNDER FIRE AGAINTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: Cyberguy.comKurt’s key takeawaysThis study marks a major step in redefining what safe driving means. An autonomous system equaling the best human fleets signals that automation is moving from theory to reality. Still, the shift raises questions. How soon will public trust catch up with technology? Can regulations evolve fast enough to support widespread adoption? Will drivers adapt to sharing the road with machines that never tire or lose focus? What remains certain is that safety innovation is transforming transportation. Autonomous systems like the Kodiak Driver are proving that technology and safety can move forward together.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSo here’s something to think about: If AI-driven trucks already match the safest human fleets, are we ready to let them take the wheel on our highways? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

AI truck system matches top human drivers in massive safety showdown with perfect scores Read More »