memoment editorial

og fox news

ONLINE GAMING SAFETY FOR KIDS & PARENTS

NEWYou can now listen to Fox News articles!
As kids pick up a controller and headset to play their favorite video games, companies across the gaming industry are working to make sure all their players are safe on their consoles.  Sean Whitcomb, Program Director for Child Safety and Education at Sony Interactive Entertainment says Sony and other major gaming brands are adding more safety measures, “We offer some family management tools that will help them create an experience that is really about uh shared boundaries and conversations that aren’t really controlling, but more about connecting.”Young players and their parents can set up the safety tools together to ensure a fun and safe gaming environment. As these features are meant to give families full control over what is, and isn’t shared online, while also letting young gamers enjoy their favorite titles.  “We’re making it easier for this to be a safe experience that everyone is comfortable with,” says Whitcomb.Beyond just setting up parental controls, Whitcomb encourages parents to actively participate in their kids’ gaming lives. He suggests that one of the best ways to understand what your child is playing is to join them.  He suggests, “Maybe pick up the controller and play with them too. That’s probably one of the easiest ways to understand what your child is experiencing.”And when it comes to who your kids are playing with, Whitcomb says parents should treat the digital world like a playground, “It’s more like, well, who is this person? How old are they? Where do they live? And why do you wanna spend more time playing with them? …. So, it’s just a conversation that I really recommend parents have with their children.” According to Whitcomb you can also score points with your children by using Sony’s parental control features to encourage better habits away from the screen, including more game time as a reward for doing chores around the house. 

ONLINE GAMING SAFETY FOR KIDS & PARENTS Read More »

more travel 1

Your discarded luggage tags are worth money to scammers

NEWYou can now listen to Fox News articles!
Bad actors can use almost anything to scam you. You’ve already heard about them using personal information such as phone numbers, email addresses and government IDs to commit identity theft. But they don’t stop there. There have been reports of hackers using your home’s location on maps to blackmail you or impersonating your boss to demand money.These are still very believable tactics, but did you know that even the luggage tags you barely notice can be misused? That’s correct. Well, now bad actors are targeting luggage tags to file for reimbursement.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.AIRLINES SECRETLY SOLD US TRAVELERS’ DATA TO HOMELAND SECURITYLuggage tag scam explained and how to avoid itAn alleged baggage claims manager at Delta Air Lines has warned travelers about a growing scam that uses discarded luggage tags to commit fraud.In a Reddit post that has since drawn thousands of comments, the worker claimed scammers are watching passengers remove their tags at baggage claim and retrieving them to submit fake claims for lost luggage. The tags often contain enough personal and travel information to file for reimbursement. A baggage claim manager alleges that scammers are stealing travelers’ information from old bag tags. (iStock)”There’s been an influx of fraudulent claims using tossed luggage tags,” the worker wrote. “It’s creating issues for people with legitimate claims.”The post advises waiting until you are away from the airport before removing tags from checked bags and avoiding leaving them in hotel trash cans. Former hotel staff commenting on the post said they had seen similar fraud schemes involving tags found in guest rooms.Travelers responding to the warning also noted that printed boarding passes can be exploited in the same way, and shared examples of airports, such as in Japan, that provide secure disposal bins for tags.FBI WARNS OF QR CODE SCAM DISGUISED IN MYSTERY PACKAGES An airport attendant attaches a label on a suitcase at an airline check-in desk. (iStock)How serious is the luggage tag scam threat?The luggage tag scam is a documented and growing problem in 2025, with airport workers, especially baggage claims staff at major airlines, reporting a surge in fraudulent lost luggage claims tied to discarded tags.Multiple firsthand accounts confirm that processing legitimate compensation is being complicated by false claims using details found on bag tags. However, travel security experts and industry observers note that, while cases are increasing, the scam may not be extremely widespread or high-volume at this time.Most tags only contain limited information, such as name, flight number and baggage IDs, and airlines’ tracking systems can sometimes detect if a claim is fake by reviewing baggage scan logs and RFID tagging. There are also no official warnings or statistics from major airlines, government authorities or law enforcement indicating this technique has reached epidemic levels or led to confirmed prosecutions.CLICK HERE TO GET THE FOX NEWS APP Stay safe with luggage locks, door locks and anti-theft bags. (REUTERS/Vincent Alban)7 ways to stay safe from the luggage tag scamThe luggage tag scam might not sound like the most dangerous travel threat, but ignoring it can still leave you exposed to fraud. Here are simple, effective steps to protect yourself. 1) Remove tags only after leaving the airportWait until you’re at home, in your car or in another private location before taking tags off your checked bags. This prevents scammers from grabbing them in public areas. 2) Shred or destroy old tagsNever toss tags in the trash intact. Tear them up or cut through barcodes and printed details so they can’t be reused for fake claims.3) Avoid leaving tags in hotel roomsDispose of tags yourself instead of leaving them in a hotel wastebasket. Cleaning staff or other guests could find and misuse them. 4) Secure boarding passes tooTreat printed boarding passes the same way as luggage tags. Keep them until you can destroy them securely. 5) Be alert in baggage claim areasWatch for anyone loitering near the carousel and observing passengers closely. Stay aware of your surroundings while handling travel documents. 6) Use digital boarding passes when possibleOpt for mobile boarding passes instead of printed ones. This removes the risk of discarded paper passes falling into the wrong hands.7) Limit personal details on luggage tagsAvoid printing your full home address or primary phone number. Instead, use your name, a travel-only email and either a P.O. box or work address. You can even create a simple alias email just for travel, which forwards to your main inbox but keeps your real address private. This way, airlines and honest finders can still reach you without exposing sensitive personal details to scammers.For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.8) Track Your Bags with AirTagsAnother way to protect yourself is by putting a small tracker inside your luggage, such as an Apple AirTag or a similar Bluetooth tracker. These devices connect to your phone and let you see where your bag is in near real-time. If your suitcase goes missing or ends up in the wrong place, you’ll know faster than waiting for the airline to track it down.Place the tracker inside your bag rather than on the handle so it can’t be easily removed. Check its location through your phone before leaving the airport, and keep an eye on it during layovers. While AirTags can’t prevent someone from misusing an old luggage tag, they give you proof of where your bag actually is if you ever need to dispute a lost luggage claim or theft. Kurt’s key takeawayWhile the luggage tag scam may not be widespread yet, it exploits a simple oversight that most travelers rarely consider. Until airlines and airports put better safeguards in place, the burden falls on passengers to protect their own information. That means treating something as ordinary as a bag tag like sensitive data.What do you do with your luggage tags after your trip? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Your discarded luggage tags are worth money to scammers Read More »

tensor self driving robocar 2

Would you buy the world’s first personal robocar?

NEWYou can now listen to Fox News articles!
Silicon Valley startup Tensor is taking a bold step into the future of driving. Unlike rivals chasing robotaxi fleets, Tensor wants consumers to own the first true self-driving car. The company calls it the world’s first personal robocar.This luxury EV promises Level 4 autonomy, meaning you can ride with your eyes off the road while the steering wheel folds away into the dash. In its place, a wide screen transforms the driver’s seat into a lounge or mobile office.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027? Tensor aims to have its autonomous vehicles, a prototype of which is seen in this undated photo, available for purchase by 2026. (Tensor )Tensor robocar loaded with sensors and AI powerTensor built this machine from the ground up. It is covered in technology: 37 cameras, five custom lidars, 11 radars, plus microphones, ultrasonics and water detectors. Each sensor includes cleaning systems to keep its view clear in any condition.The car runs on Tensor’s own Foundation Model, a transformer-based AI designed to mimic human driving decisions. Unlike many competitors, the system works without constant cloud support. That means better privacy and no dependency on remote servers.LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING Unlike rivals chasing robotaxi fleets, Tensor wants consumers to own the first true self-driving car. (Tensor)How Tensor’s robocar differs from robotaxisMost autonomous startups, including Tensor’s earlier brand AutoX, started with robotaxi fleets. Those are easier to control since they operate in one city and return to a depot every night.Tensor is taking a tougher path with consumer cars. That means the robocar must adapt to highways, urban roads and real-world conditions without a safety net. While it won’t travel on every road from day one, owners can take control whenever needed.VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION Tensor’s robocars must adapt to more real-world conditions without a safety net. (Tensor)Tensor’s robocar is designed for safety and luxury drivingTensor promises full redundancy with steering, braking and computing. If one system fails, backups take over instantly. The interior design adds another layer of appeal. With retractable pedals and foldable steering, the cabin feels more like a living space than a driver’s seat.The company partnered with VinFast, the Vietnamese automaker, to manufacture the vehicle. Pricing remains under wraps, but executives admit it will exceed luxury electric vehicles like the Lucid Air.CLICK HERE TO GET THE FOX NEWS APP Tensor says that its self-driving cars will be comparable to other luxury vehicles on the market. (Tensor)What this means for youTensor’s approach signals a turning point. Instead of waiting for ride-hailing services to roll out self-driving fleets, consumers may soon buy autonomy outright. If successful, this could reshape not just commuting, but how we think about owning cars at all.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysTensor has history on its side. Its AutoX roots gave it years of testing, including permits for driverless operation in California since 2020. Now rebranded, it’s racing to sell the first consumer-ready robocar by 2026. The gamble is big. Luxury buyers may welcome the futuristic design and privacy protections, but mass adoption will depend on trust, safety and real-world performance.Would you hand control of your daily drive to a car that promises to drive itself? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Would you buy the world’s first personal robocar? Read More »

indiana medicare advantage health insurance

Stop Medicare scams before they stop you

NEWYou can now listen to Fox News articles!
Medicare is a tempting prize for scammers. Because it’s a public program funded by taxpayers, it has a huge budget to distribute and that’s what attracts scammers. In 2024, improper payments added up to $54 billion. Some scams involve setting up fake companies to file bogus claims, while others target beneficiaries directly, stealing their personal information and denying them their right to treatment.If you fall victim to such a scam, the consequences can range from small financial losses to actual health risks. Scammers may trick you into paying fake fees, premiums or “copays” over the phone or online. They may also go after your personal information or Medicare number to bill for services or equipment you never requested, which could leave you with less coverage when you actually need treatment.It’s better to know what you’re up against so you don’t accidentally lose your Medicare benefits.FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING ITSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter  A patient is examined on Dec. 5, 2022, at the Indiana University Health Cancer Center. (Kelly Wilkinson/USA Today Network via Imagn Images)What to look out for to recognize a Medicare scamScammers are getting more and more professional these days. With Medicare scams, fraudsters may use spoofed phone numbers, emails and websites to make their schemes seem more believable. Luckily, there are still some telltale signs to look out for.Regardless of the communication method, phone, email, mail or in person, scammers will try to:Create fear or urgencyPressure you to act quicklyThreaten you with consequences Scam artists often try to create time pressure in order to compel their victims to act quickly, before they have time to think. (Kurt “CyberGuy” Knutsson)Scammers calling you in Medicare’s name to demand paymentsSome scammers use spoofed phone numbers to impersonate Medicare representatives. They may try to trick you into paying fake fees or buying unnecessary products.These often include:Fake health insurance upgrades”Low-cost” medical equipmentFake tests or genetic kitsDiscounted medicationRemember: Medicare will never call you unless you ask them to, and they will never ask for money.If you ever owe Medicare fees, you will be contacted by mail, not by phone. Furthermore, Medicare insurance itself is free, and you will never be asked to pay fees just to keep it active.You may only be required to pay in certain circumstances, such as a portion of the cost for a treatment or prescription drugs, but these bills will always be sent to you by mail, never via phone calls or online forms.Scammers try to mimic these payments to steal your moneyScammers may try calling you in Medicare’s name to ask for your Medicare number or card details.Money isn’t the only thing scammers are after; your Medicare number can be just as valuable, if not more so.This scam follows a similar scheme: fraudsters call you pretending to be Medicare employees and ask you to provide your Medicare number for fake reasons, such as:Upgrading your planUpdating your account detailsOffering “free” drugsIssuing a new Medicare card… and moreLet me be clear: Medicare will never call you, whether it’s about paying fees, updating your account or anything else.Scammers want your Medicare information so they can impersonate you and obtain medical supplies, prescription drugs or treatments in your name.REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSScammers calling you in Medicare’s name to extort your personal dataYour Social Security number (SSN) can be the final piece scammers need to impersonate you. During these calls, fraudsters may ask not only for your Medicare details but also for other personal information, such as your SSN, date of birth or similar data.They often use the same excuses as when trying to obtain Medicare information, such as:Upgrading your planIssuing new cardsOther account-related reasons.Let me emphasize this again: Medicare will never call you for these reasons.Even if the phone number looks legitimate and the caller sounds professional, the moment you’re asked for personal details or payments, you know it’s a scam.What to do if you suspect a Medicare scamIf it’s a phone call, just hang up.You don’t need to explain yourself or engage in a conversation with scammers. If they threaten you with consequences, do not believe them; scammers use fear to pressure you into making poor decisions.Remember: If Medicare or its service providers had important information to communicate, they would do so by mail, not by phone.Apart from not letting scammers take advantage of you, you can also help others by:Reporting the fraud to Medicare at 1‑800‑MEDICARE (1‑800‑633‑4227)Reporting the fraud to the US Department of Health and Human Services at oig.hhs.gov/fraud/report-fraud/Reporting the fraud to the Federal Trade Commission (FTC) at reportfraud.ftc.gov/ A woman checks her Medicare account on her laptop. (Kurt “CyberGuy” Knutsson)How to make yourself less of a target of Medicare scamsYou don’t have to sit tight and hope that scammers won’t target you. Instead, you can take some active measures to make such attempts less likely.1) Lower your online exposureTo target you, scammers first need to gather some basic information about you, like your phone number. That information and much more can be easily looked up on people search sites, platforms operated by data brokers that let people search for others. The good news is that you can opt out of these platforms. You can do it manually by visiting each website and filling out the opt-out forms or you can automate the process.2) Use a data removal service to help youData removal services work on your behalf to erase personal details like your phone number, address and email from people-search sites and data broker databases. By reducing the amount of information available online, these services make it harder for scammers to find and target you. Many of them also monitor whether your data reappears, so you stay protected over time without having to constantly check dozens of sites yourself.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to come after you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.3) Monitor your Medicare statements regularlyAlways review your Medicare Summary Notices (MSNs) or Explanation of Benefits (EOBs). These statements show what services have been billed in your name. If you see charges for services, equipment or prescriptions you never received, report it right away. Quick action can stop fraud before it impacts your care.4) Use identity theft protection servicesIdentity theft protection tools can alert you if your Social Security number, Medicare number or other sensitive details show up on the dark web or are used to open new accounts. These services can also guide you through recovery if scammers misuse your information.See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysMedicare scams are designed to exploit fear, urgency and confusion. By recognizing the warning signs and knowing what Medicare will and will not do, you can stay one step ahead of fraudsters. Protecting your personal information and reducing your online exposure are key to keeping your coverage safe. With a few smart habits, you can make yourself a less appealing target and help others by reporting scams when you see them.Have you or someone you know ever been targeted by a Medicare scam, and how did you handle it? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Stop Medicare scams before they stop you Read More »

iss073e0548846orig

Space Station Science

NASA astronaut Zena Cardman processes bone cell samples inside the Kibo laboratory module’s Life Science Glovebox on Aug. 28, 2025, as part of an experiment that tests how microgravity affects bone-forming and bone-degrading cells and explore potential ways to prevent bone loss. This research could help protect astronauts on future long-duration missions to the Moon and Mars, while also advancing treatments for millions of people on Earth who suffer from osteoporosis.
Image credit: NASA/Jonny Kim

Space Station Science Read More »

1 fake evite emails trigger phishing warning

New Evite phishing scam uses emotional event invitations to target victims

NEWYou can now listen to Fox News articles!
I recently got an email from a friend with the subject “Special Celebration of Life.” It looked like a genuine Evite invitation. But when I clicked the “View Invitation” button, my antivirus software blocked the site, flagging it as a phishing attempt.It was one of the most convincing scam emails I’ve seen lately, complete with Evite branding, realistic design, and a personal touch. If I didn’t have strong antivirus protection, I might have walked right into it.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER DON’T FALL FOR THIS BANK PHISHING SCAM TRICK Phishing email appears to be a legitimate Evite invitation titled “Special Celebration Of Life.” (Kurt “CyberGuy” Knutsson)How this Evite phishing scam worksScammers send fake Evite messages with emotionally charged subjects, such as a “Special Celebration of Life,” to lure you into clicking. These emails mimic Evite’s design so they appear to come from someone you know, lowering your guard. Scammers are sending fake Evite invitations that look personal and trustworthy. One click can expose a user’s personal data or install malware. (Kurt “CyberGuy” Knutsson)Clicking the malicious link can:Steal your personal informationCapture your login credentialsInstall malware on your deviceBecause these invitations feel personal and urgent, they can bypass skepticism. Always verify sender details before opening event links, especially for sensitive occasions.  Always hover over links and check sender details before clicking, especially on invitations or urgent messages from unfamiliar sources. (Kurt “CyberGuy” Knutsson)Steps to protect yourself from fake Evite phishing scamsEven the most convincing invitation can be a trap, as the fake Evite email I received proved. By following these steps, you can lower your chances of falling for similar scams and keep your personal information safe.HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS1) Use strong antivirus software for real-time protectionStrong antivirus software can stop you from landing on dangerous sites. In my case, the antivirus software blocked the fake Evite link and flagged it as phishing before any damage was done. Choose strong antivirus software with phishing detection and automatic blocking to protect against threats you might not spot yourself.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 2) Check the sender’s email address carefullyScammers often use email addresses that look almost identical to legitimate ones, but with tiny changes, like an extra letter, a missing character, or a different domain extension. In my fake Evite example, the branding looked perfect, but the sender’s address didn’t match Evite’s official domain. Always double-check before trusting an email.HOW I ALMOST FELL FOR A MICROSOFT 365 CALENDAR INVITE SCAM3) Hover over links before clickingBefore you click “You’re Invited!”, “View Invitation” or “RSVP Now,” hover your mouse over the link. Your email client will usually display the destination URL. In the phishing email I received, the link pointed to a suspicious domain, not Evite.com. In the phishing email I received, the link pointed to a suspicious domain, not Evite.com. If you look closely, you’ll see it was misspelled as “envtte.” If the address looks odd or unfamiliar, don’t click.  A closer look reveals the fake link in this email that leads to a suspicious domain, not Evite.com. (Kurt “CyberGuy” Knutsson)4) Use a personal data removal service to limit your exposureThe less personal information scammers can find about you online, the harder it is for them to target you. A personal data removal service can scrub your personal details, such as your phone number, home address, and email, from public databases. This reduces the risk of scammers crafting convincing, personalized phishing attempts like the fake Evite email I received.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScanSOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES 5) Verify with the sender directly before clickingIf an invitation appears to come from a friend, don’t assume it’s real. Scammers often spoof the names of people you know. Send a quick text or make a phone call to confirm they actually sent the invite. In many cases, they’ll be just as surprised as you are to hear about it.What this means for youPhishing scams are evolving to look more authentic than ever. Even if the message seems to come from someone you trust, one careless click can put your personal data at risk. Having strong cybersecurity tools in place and knowing how to spot a scam is your best defense.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysI was lucky my antivirus software blocked this attack before any damage was done. But not everyone has that safety net. The next time an unexpected invitation or urgent message lands in your inbox, take a few extra seconds to verify before you click.Have you ever almost fallen for a fake event invite? What happened? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com. All rights reserved.  

New Evite phishing scam uses emotional event invitations to target victims Read More »

1 apple watch gets fda approved hypertension alerts

Apple Watch Series 11 gets FDA-cleared alert for ‘silent killer’ condition

NEWYou can now listen to Fox News articles!
The World Health Organization estimates that nearly 1.3 billion adults live with hypertension worldwide. Many don’t even know they have it. That’s why Apple’s latest announcement could change lives.Apple Watch Series 11 now includes FDA-cleared hypertension notifications. Starting next week, the feature will roll out in more than 150 countries, including the U.S., EU, Hong Kong, and New Zealand. It will also come to Apple Watch Series 9 and later, plus Apple Watch Ultra 2 and later, via watchOS 26.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER APPLE WINS BLOOD OXYGEN BATTLE FOR WATCH OWNERS Apple Watch Series 11 now includes FDA-cleared hypertension notification. (Apple)Apple Watch hypertension alerts explainedHypertension is often called the “silent killer” because it can strike without symptoms. Left unchecked, it increases the risk of heart attack, stroke, and kidney disease. By adding passive blood pressure monitoring, Apple Watch aims to help millions detect early warning signs.Using its optical heart sensor, the watch reviews how your blood vessels respond to heartbeats over 30-day periods. If it detects consistent patterns of hypertension, you’ll get a notification. Apple expects the feature could alert more than 1 million people with undiagnosed hypertension in its first year alone. Apple Watch sends users a “Possible Hypertension” alert when heart data shows consistent signs of elevated blood pressure. Paired with the iPhone, users can log blood pressure and follow up with doctors. (Apple)Clinical validation of Apple Watch hypertension featureApple built the new hypertension notification feature on a foundation of years of health research. Since the launch of Apple Watch, heart health tools like ECG, AFib History, and irregular rhythm notifications have helped users catch issues early. The hypertension notification now extends that mission by addressing one of the most common and dangerous silent conditions.The feature works in the background during waking hours, analyzing photoplethysmography (PPG) signals, changes in blood volume under the skin, to detect patterns that suggest chronic high blood pressure. You do not need to calibrate the feature or take direct blood pressure readings with the watch. Instead, the device tracks signals over 30 days and sends a notification if consistent signs of hypertension appear.CAN YOUR APPLE WATCH DETECT PREGNANCY?Study results confirm accuracy of hypertension alertsApple developed the algorithm using data from more than 100,000 study participants across diverse ages, races, body types, and health statuses. The company then validated its accuracy through a pivotal clinical study with over 2,000 participants, who wore Apple Watch alongside an at-home cuff to compare results.The validation study showed the feature achieved a specificity rate above 92%, meaning it minimized false positives. Sensitivity rates were especially strong for Stage 2 hypertension, the more severe form of the condition, where the feature identified more than half of users at risk. That accuracy could help prevent strokes, heart attacks, and kidney disease in those who may not otherwise know they have hypertension.Importantly, the study confirmed that the feature performed consistently across age groups, genders, races, and skin tones, making it reliable for Apple’s global user base. Apple also ran usability testing to fine-tune onboarding and notification language, so people understand the alerts and what actions to take next.By passively monitoring and flagging possible signs of hypertension, Apple Watch helps fill a dangerous gap in diagnosis. Hypertension often goes unnoticed for years, but now, you can be alerted within just one month of wearing the watch.  Apple CEO Tim Cook holds up the new Apple Watch Series 11 during a launch event at Apple Park in Cupertino, California, on Sept. 9, 2025. (David Paul Morris/Bloomberg)Expert cardiologist weighs in on Apple Watch hypertension alertsCardiologist and scientist Dr. Harlan Krumholz of Yale University and Yale New Haven Hospital told CyberGuy,”I’m glad to see Apple turning attention toward hypertension—the number one preventable cause of heart attack and stroke. Their approach automatically flags signals that suggest you may have high blood pressure and encourages you to check it out. That’s especially important because so many people remain undiagnosed. The feature also provides a way to archive blood pressures, so if people are measuring at home, they can bring that information to their doctor. This isn’t a one-stop solution, but it has the potential to help consumers take charge of their health and identify hypertension earlier. The caveat is that people shouldn’t rely on it exclusively—regular care remains essential.”EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES By using optical sensors, Apple Watch monitors blood volume changes under the skin to passively detect hypertension trends in the background. (Apple)How to respond to Apple Watch hypertension alertsIf you receive a hypertension alert, Apple recommends:Log blood pressure daily for seven days with a third-party blood pressure cuffShare your results with your doctor at your next appointment.Follow American Heart Association guidelines for further evaluation. Apple Watch Series 11 and Ultra 3 are built for both fitness and health—now including FDA-cleared hypertension alerts for active users worldwide. (Apple)How to update your Apple Watch to watchOS 26The new hypertension notifications aren’t limited to Apple Watch Series 11. If you own an Apple Watch Series 9 or later, or an Apple Watch Ultra 2 or later, you’ll also get access once you update to watchOS 26.Updating is simple:Keep your Apple Watch on its charger and connected to Wi-Fi.Open the Watch app on your iPhone.Tap General, then Software Update.Follow the on-screen steps to install watchOS 26.After the update, you can enable hypertension notifications in the Health app, allowing your watch to start passively monitoring for signs of chronic high blood pressure. The Apple Watch Series 11 features a sleek design and cutting-edge health tools, including passive blood pressure monitoring designed to detect hypertension early. (Apple)Apple Watch Series 11 release date and preorder details Apple Watch Series 11 is available for preorder starting today, with in-store availability beginning Friday, Sept. 19.  (Apple)You can preorder Apple Watch Series 11 today, with in-store availability starting Friday, September 19. Prices start at $399.The lineup includes:Apple Watch Series 11: The flagship model comes in aluminum or titanium finishes, with FDA-cleared hypertension notifications and all the latest health and fitness tools. It’s the best choice for most people who want the newest design and features.Apple Watch Ultra 3: Built for outdoor adventures, the Ultra 3 offers extra durability, a larger display, and longer battery life. It’s designed for athletes, hikers, and anyone who needs a tougher smartwatch. It also comes with FDA-cleared hypertension notifications.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysApple Watch is stepping up in a big way. With hypertension notifications now cleared by the FDA, it’s no longer just about tracking workouts or closing rings. It’s about giving you a heads-up on one of the biggest silent health risks out there. For millions who rarely visit a doctor, this could be a life-saving tool. Hypertension often goes unnoticed, but now, your watch can help flag risks before they become emergencies. While Apple Watch isn’t a substitute for medical care, it adds another safety net to your daily routine.Would you trust your smartwatch to be the first to alert you to a serious health risk, such as hypertension? Let us know your thoughts in the comments below. Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com. All rights reserved. 

Apple Watch Series 11 gets FDA-cleared alert for ‘silent killer’ condition Read More »

northrop grumman crs 23 launch

NASA Science, Cargo Launches Aboard Northrop Grumman CRS-23

NASA is sending more science, technology demonstrations, and crew supplies to the International Space Station following the successful launch of the agency’s Northrop Grumman Commercial Resupply Services 23 mission, or Northrop Grumman CRS-23.
The company’s Cygnus XL spacecraft, carrying more than 11,000 pounds of cargo to the orbiting laboratory, lifted off at 6:11 p.m. EDT Sunday on a SpaceX Falcon 9 rocket from Space Launch Complex 40 at Cape Canaveral Space Force Station in Florida. This mission is the first flight of the larger, more cargo-capable version of the solar-powered spacecraft. 
Cygnus XL is scheduled to be captured at 6:35 a.m. on Wednesday, Sept. 17, by the Canadarm2 robotic arm, which NASA astronaut Jonny Kim will operate with assistance from NASA astronaut Zena Cardman. Following capture, the spacecraft will be installed to the Unity module’s Earth-facing port for cargo unloading.
The resupply mission is carrying dozens of research experiments that will be conducted during Expedition 73, including materials to produce semiconductor crystals in space and equipment to develop improvements for cryogenic fuel tanks. The spacecraft also will deliver a specialized UV light system to prevent the growth of microbe communities that form in water systems and supplies to produce pharmaceutical crystals that could treat cancer and other diseases.
These are just a sample of the hundreds of scientific investigations conducted aboard the station in the areas of biology and biotechnology, Earth and space science, physical sciences, as well as technology development and demonstrations. For nearly 25 years, NASA has supported a continuous U.S. human presence aboard the orbiting laboratory, where astronauts have learned to live and work in space for extended periods of time. The space station is a springboard for developing a low Earth economy and NASA’s next great leaps in exploration, including Artemis missions to the Moon and American astronaut missions to Mars.
NASA’s arrival, capture, and installation coverage are as follows (all times Eastern and subject to change based on real-time operations):
Wednesday, Sept. 17
5 a.m. – Arrival coverage begins on NASA+, Amazon Prime, and more.
6:35 a.m. – Capture of Cygnus XL with the space station’s robotic arm.
8 a.m. – Installation coverage begins on NASA+, Amazon Prime, and more.
All coverage times are estimates and could be adjusted based on operations after launch. Follow the space station blog for the most up-to-date information.
Cygnus XL is scheduled to remain at the orbiting laboratory until March 2026, before it departs and disposes of several thousand pounds of trash through its re-entry into Earth’s atmosphere, where it will harmlessly burn up. The spacecraft is named the S.S. William “Willie” C. McCool, in honor of the NASA astronaut who perished in 2003 during the space shuttle Columbia accident.
Learn more about this NASA commercial resupply mission at:
https://www.nasa.gov/mission/nasas-northrop-grumman-crs-23/
-end-
Josh Finch / Jimi RussellHeadquarters, Washington202-358-1100joshua.a.finch@nasa.gov / james.j.russell@nasa.gov
Steven SiceloffKennedy Space Center, Fla.321-876-2468steven.p.siceloff@nasa.gov
Sandra Jones / Joseph ZakrzewskiJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov / joseph.a.zakrzewski@nasa.gov

NASA Science, Cargo Launches Aboard Northrop Grumman CRS-23 Read More »

2 google releases emergency chrome patch after cyber espionage attacks on users body

This Chrome VPN extension secretly spies on you

NEWYou can now listen to Fox News articles!
Browser extensions promise convenience, but some take far more than they give. A new report from Koi Security says that FreeVPN.One, a Chrome extension with more than 100,000 installs and even a “Featured” badge, has been secretly taking screenshots of users’ browsing sessions.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERHOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS Google Chrome extension FreeVPN.One has allegedly taken screenshots of users’ sensitive information. (Kurt “CyberGuy” Knutsson)How FreeVPN.One secretly captured your browsingOnce installed, FreeVPN.One didn’t just handle VPN traffic. It silently captured screenshots of every website you visited, bank logins, private photos, sensitive documents, and sent them to servers controlled by the developer.Even worse, the extension added permissions step by step, disguising its activity as “AI Threat Detection.” What looked like a useful feature became a tool for constant background surveillance.Why this Chrome extension threat is so dangerousPeople install VPNs to protect their privacy. Instead, this extension flipped that expectation on its head. By using Chrome’s and scripting permissions, FreeVPN.One gained access to every page you opened.Koi Security researchers tested the extension and confirmed it captured screenshots even on trusted sites like Google Photos and Google Sheets. The developer claimed these images were not stored, but offered no proof.MALICIOUS BROWSER EXTENSIONS CAUGHT SPYING ON 2 MILLION USERS The screenshots were allegedly sent to the extension’s developer. (Kurt “CyberGuy” Knutsson)Warning signs of unsafe free VPN extensionsThere were red flags all along:Awkward grammar and poorly written descriptions.A generic Wix page as the only developer “contact.”A promise of unlimited, free VPN service with no clear business model.While some free VPNs may work responsibly, most need a way to profit. If it isn’t by charging you, it may be by selling your data.FreeVPN.One developer’s response and Google’s removalWhen Koi Security published its findings, the developer behind FreeVPN.One offered a partial explanation. He claimed the automatic screenshot captures were part of a “Background Scanning” feature, intended only for suspicious domains. He also said the images weren’t stored, only briefly analyzed for threats.But researchers observed screenshots taken on trusted sites like Google Photos and Google Sheets, which don’t fit that explanation. When asked to provide proof of legitimacy, such as a company profile, GitHub repository, or professional contact, the developer stopped responding. The only public link tied to the extension led to a basic Wix starter page.FreeVPN.One has been removed from the Chrome Web Store. Attempts to visit its page now return the message: “This item is not available.”While the removal reduces the risk of new downloads, it also highlights a troubling gap. The extension spent months with spyware behavior while still carrying a verified label, raising questions about how thoroughly Chrome reviews updates to featured extensions.GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED FreeVPN.one is not available in the Microsoft Edge store (Koi Security)Steps to protect yourself from VPN extension spywareIf you’ve installed FreeVPN.One or any suspicious Chrome VPN extension, take these steps if you are concerned for your cybersecurity:1) Uninstall immediatelyGo to Chrome > Window > Extensions and click remove.2) Use a trusted VPNStick to reliable VPN providers that have proven track records, audited policies, and transparent operations. By choosing a legitimate VPN, you take control of your privacy instead of handing it over to an anonymous developer. A reliable VPN is also essential for protecting your online privacy and ensuring a secure, high-speed connection.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN 3) Scan your device with strong antivirus softwareRun a trusted antivirus tool to check for hidden malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 4) Change your passwordsAssume anything typed or viewed could have been logged. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Next, see if your passwords have been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords5) Use a personal data removal serviceExtensions like FreeVPN.One show how easily your private details can be collected and exploited. Even after uninstalling spyware, your personal information may already be circulating on data broker sites that sell your identity to marketers, scammers, and even cybercriminals. A personal data removal service can scan for your information across hundreds of broker sites and automatically request its removal. This limits how much of your data can be weaponized if it’s ever exposed through an extension like this.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan6) Check permissionsBefore adding any extension, review what it requests. If a VPN wants access to “all websites,” that’s a red flag.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysFreeVPN.One is a reminder that “free” often comes at a hidden cost; your data. Don’t assume an extension is safe just because it looks popular or carries a badge. Be critical, vet carefully, and use privacy tools backed by real companies.Would you trade your browsing privacy for a free tool, or is it time to rethink the cost of “free”?  Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

This Chrome VPN extension secretly spies on you Read More »

electronic waste

Scientists extract silver from e-waste using cooking oil

NEWYou can now listen to Fox News articles!
What if your old bottle of cooking oil could help save the planet and your smartphone? That’s the big idea behind a groundbreaking discovery by researchers in Finland. Scientists from the University of Helsinki and the University of Jyväskylä have found that you can recover silver from electronic waste using common kitchen ingredients like vegetable oil and hydrogen peroxide. This sustainable, scalable method published in the Chemical Engineering Journal could change how we mine precious metals from our growing piles of electronic junk.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER OLD SMARTPHONES ARE BEING TURNED INTO TINY DATA CENTERS Scientists have discovered a new method of silver extraction from electronics by using cooking oil. (uni Takahashi/Bloomberg via Getty Images)How cooking oil recovers silver from electronic wasteHere’s how it works. Fatty acids found in oils like sunflower or olive oil are mixed with hydrogen peroxide. When heated slightly, this combo safely dissolves silver from old circuit boards, wires or keyboard connectors. Then, using ethyl acetate, a far less toxic alternative to industrial solvents, researchers pull out the silver in a solid form. Unlike traditional methods that rely on harsh acids or cyanide-based solutions, this technique avoids toxic runoff and air pollution. Think of it as salad dressing meets science lab, without the environmental mess.Why recycling silver from e-waste is urgently neededSilver powers the devices you use every day, such as phones, solar panels, electric vehicles and even medical tech. But less than 20% of it gets recycled. As demand rises and natural resources shrink, finding clean ways to reclaim silver isn’t just smart, it’s necessary. Silver prices have surged sixfold in the last 25 years. At the same time, supply has lagged. That makes e-waste a goldmine, literally, for anyone who can unlock its hidden metals without poisoning the environment.NEW TECH RECOVERS 92% OF EV BATTERY METALS Fatty acids found in cooking oil can stabilize silver ions for easier extraction. (Smith Collection/Gado/Getty Images)How scientists extract silver using fatty acids and lightTo figure out exactly how this all works, researchers used advanced computer models to study how fatty acids interact with silver ions. The process not only stabilizes the silver but also allows for easy recovery using light and simple solvents. Better still, the ingredients can be reused and there’s no chemical waste or massive cost. And it’s highly selective. The method targets silver while leaving other metals behind, a major step forward in urban mining. In testing, even silver-coated keyboard connectors were cleanly processed into pure elemental silver powder using this system. Indian labourers sift through a heap of pre-owned mobile phones in an electronic waste workshop on December 5, 2023 in New Delhi, India.  (Yawar Nazir/Getty Images)What this means for youThis research brings us closer to safe, at-home or small-scale recycling kits that could recover silver from old gadgets. Recyclers and manufacturers could adopt this method to reduce chemical waste and operating costs, while protecting workers and the environment. This method supports a future where nothing goes to waste. It keeps valuable materials in use, cutting down the need for mining and pollution. Silver is vital for making many of the tech items we use every day. Reusing it responsibly means cleaner energy at a lower cost and less reliance on mined resources.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/QuizKurt’s key takeawaysWe’ve long known that waste is a problem. Now, it might also be the solution. By turning everyday ingredients into powerful recycling tools, scientists are showing us what’s possible when chemistry and sustainability meet. The process is still being refined, but the promise is clear: a greener future where reclaiming valuable metals doesn’t cost the earth, or our health.CLICK HERE TO GET THE FOX NEWS APPIf you could extract silver from your old gadgets with tools in your kitchen, would you do it? Or should this be left to the pros? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER Copyright 2025 CyberGuy.com.  All rights reserved. 

Scientists extract silver from e-waste using cooking oil Read More »