memoment editorial

Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide

NEWYou can now listen to Fox News articles!
If you’re over 50 and maxing out your 401(k), there’s a big change coming in 2026 that could affect how much tax you pay on your “catch-up contributions.” While it’s mostly about taxes and retirement planning, there’s an unexpected side effect: scammers are circling. Every time your financial habits or personal data become public, it’s a chance for fraudsters to try to exploit you. Here’s what’s changing, why it matters, and how to protect yourself before the scammers come knocking.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterWhat’s changing with 401(k) catch-up contributionsREMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSRight now, if you’re over 50, you can make extra contributions to your 401(k) on top of the standard annual limit ($23,500 in 2025). These “catch-up” contributions are typically tax-deferred, meaning the money comes out of your paycheck before tax and grows tax-free until retirement.But starting in 2026, for anyone earning more than $145,000 in the previous year, these catch-up contributions will no longer be tax-deferred. Instead, they’ll become like the Roth 401(k), meaning you pay taxes on the money now, but it grows tax-free and can be withdrawn tax-free in retirement.That sounds simple, but it creates a ripple effect:High earners will see less take-home pay now.Tax planning gets trickier, and some people may consider restructuring their accounts or investment strategies.And, most importantly for CyberGuy readers: these changes create new opportunities for scammers. Big 401(k) changes in 2026 could leave retirees exposed to new scam risks. (Cyberguy.com)Why the new rules could attract scammersFBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING ITScammers constantly look for financially active retirees. When rules like this change, fraudsters send out emails, calls, or letters pretending to be financial advisors, IRS agents, or plan administrators. Their goal? To trick you into giving away account numbers, Social Security details, or direct-deposit information.Some common scam tactics to watch for:Fake “plan update” emails claiming you need to verify your 401(k) contributions due to the law change.Roth conversion scam calls claiming you can “avoid extra taxes” by transferring your account through a third-party “advisor.”Urgency and fear tactics, such as “Act now, or lose your retirement benefits!”Even savvy retirees can be caught off guard, especially when the message sounds official and references real tax law changes.How to protect yourself from 401(k) scams and data theftNATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGEWith new 401(k) rule changes taking effect, scammers are using the confusion to trick retirees and workers alike. Follow these steps to stay alert, safeguard your savings, and protect your personal data from being stolen or misused.1) Know the legitimate changesStart by understanding Secure 2.0 and how catch-up contributions will be taxed. Reliable sources include your plan administrator, the IRS website, or a licensed tax advisor. Staying informed helps you spot fake claims before they cause harm.2) Use a personal data removal serviceFor retirees, this extra layer of protection keeps sensitive information out of reach from scammers who exploit tax changes, Roth conversions, and retirement updates. While you can manually opt out of data brokers and track your information, that process takes time and effort. A personal data removal service automates the task by contacting over 420 data brokers on your behalf. It also reissues removal requests if your data reappears and shows you a dashboard of confirmed removals.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com Scammers are already targeting retirees with fake “account update” alerts. (Kurt “CyberGuy” Knutsson)HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUDGet a free scan to find out if your personal information is already out on the web: Cyberguy.com3) Verify every call and email, plus use antivirus softwareIf you get a call or email about your 401(k), don’t assume it’s real. Hang up or delete it, then contact your plan administrator directly using official contact details. Avoid clicking links or downloading attachments from unknown messages.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com4) Monitor your credit and accountsCybercriminals often use personal information from earlier data leaks or data brokers. Watch your credit reports and account activity closely. Early detection can stop suspicious transactions before they escalate.HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS5) Set up alerts and freezes if necessaryAsk your bank and retirement plan to enable transaction alerts. You can also temporarily freeze your credit to prevent anyone from opening new accounts in your name. This is especially useful during times of financial change.6) Educate friends and familyScammers often target retirees and their relatives who help manage finances. Remind your loved ones never to share account details over the phone or email. Protecting everyone in your household keeps scammers from finding weak links. Stay safe by confirming any 401(k) changes directly with your plan provider. (uchar/Getty Images)Kurt’s key takeawaysAs 2026 approaches, the new 401(k) rule changes will reshape how millions of Americans manage their retirement savings. Staying informed, cautious, and proactive can protect your financial future. Scammers thrive on confusion, but by verifying information, monitoring your accounts, and removing your personal data from risky sites, you can stay one step ahead. Remember, the more control you take over your privacy, the harder it becomes for criminals to exploit it.CLICK HERE TO DOWNLOAD THE FOX NEWS APPHave you taken steps to see where your personal data is exposed, and what did you find most surprising when you checked? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com. All rights reserved.

Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide Read More »

1 5 social media safety tips to protect your privacy online

5 social media safety tips to protect your privacy online

NEWYou can now listen to Fox News articles!
Let’s face it: Social media can feel like a minefield. Between oversharing personal details, friend requests from strangers and sneaky scams sliding into your DMs, it’s easy to put yourself at risk without realizing it. But staying safe online doesn’t have to be complicated. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to.Settings and menus on social media platforms can change over time and may vary by device (iOS vs. Android vs. Web) or region. The steps below were accurate at the time of publishing, but you may see slightly different wording or paths depending on updates, app version or mobile device manufacturer.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletterHOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES1) Turn off Location SharingMany apps automatically tag your posts with your location. That can let strangers know your routines or even your home address. Scammers have a harder time learning about your life the less you share online.    (Kurt “CyberGuy” Knutsson)How to turn off Location SharingOn iPhoneGo to Settings.Click Privacy & Security.Tap Location Services.Then pick the app.Set it to “Never” or “While Using the App.”On Android(Settings may vary depending on your Android phone’s manufacturer.)Go to Settings.Tap Location.Click App permissions.Then select the app and toggle location off or select Don’t allow.Note: Some apps may still have permission for “While using the app” or “Only this time.” So, you should check each app individually, especially camera and social-media apps, for location permissions.Pro tip: Even turning off location for just your camera app helps keep photos from carrying hidden location data.META TO ALLOW TEENS’ PARENTS TO DISABLE PRIVATE CHATS WITH AI AFTER BACKLASH OVER FLIRTY CHATBOTS Parents — and even some teens — are growing increasingly concerned about the effects of social media use on young people. (AP Photo/Kiichiro Sato, File)2) Use a private accountA private account means only people you approve can see your posts and photos. Think of it like putting a lock on your front door.How to set private accountsFacebookGo to Settings & Privacy.Tap Settings.Scroll to the Audience & Visibility (or Your Activity) section.Click Posts.Find “Who can see your future posts?” and set it to Friends.InstagramTap your profile.Tap the menu (☰).Tap Account Privacy.Toggle on Private account.TikTokGo to your Profile.Tap the menu (☰).Select Settings and privacy.Tap Privacy.Toggle on Private account.X (formerly Twitter)Click on your profile icon in the top left of the screen.Open Settings and privacy.Select Privacy and safety.Tap Audience and tagging.Toggle Protect your posts (or Protect your Tweets).Once enabled, only approved followers can see your posts.SnapchatOpen Settings (gear icon).Scroll to Privacy Controls.Under “Who Can,” adjust options like Contact Me, View My Story and See Me in Quick Add to Friends only.YouTubeGo to your YouTube Studio (desktop or mobile app).When uploading, set visibility to Private or Unlisted.For existing videos, open the video’s settings and change visibility as needed.Note: Entire channels cannot be made private, only individual videos.LinkedInTap your profile photoSettings.Go to Visibility.Under Profile viewing options, select Private mode.You can also control who sees your connections and activity under “Visibility of your LinkedIn activity.” Identity theft has become so commonplace that it no longer shocks you to hear about the latest scam. (Cyberguy.com)3) Report suspicious accountsFake profiles are everywhere. Scammers may pose as friends, celebrities or even customer service reps. Reporting them helps keep you (and others) safe.How to report an accountFacebookGo to the fake or impersonating profile.Tap the three-dot menu (Options).Select Find support or report profile.Choose a reason, such as pretending to be someone else.Follow the on-screen prompts to submit the report.InstagramGo to the profile.Tap the three-dot menu.Select Report.Choose a reason.Follow the on-screen instructions to complete the report.TikTokOpen the profile.Tap the three-dot menu (or sometimes the Share icon).Select Report.Choose Report account.Select the reason.Submit the report.X (formerly Twitter)Go to the account profile.Tap the three-dot or overflow icon.Select Report.Choose the type of issue.If you’re reporting an entire profile rather than a single post, select Report @username from the profile page.YouTubeGo to the channel page.Tap the About tab (on desktop) or the three-dot menu (on mobile).Select Report.Choose the reason.Submit the report.SnapchatGo to the user’s profile.Tap the three-dot menu or gear icon.Select Report.Choose the reason.Submit the report.LinkedInVisit the fake or suspicious profile.Tap the More button (or three dots).Select Report abuse.Select a reason and follow the prompts.Pro tip: Don’t just block. Report alerts to the platform so they can remove the account for everyone. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to. (Thai Liang Lim/Getty Images)4) Enable two-factor authentication (2FA)Even if someone steals your password, 2FA makes it harder for them to break in. It adds an extra step, like a code texted to your phone.How to enable two-factor authentication (2FA)FacebookGo to the menu and select Settings & Privacy, then Settings.Tap Accounts Center.Then click Password and Security.Tap Two-factor authentication.It may ask you to choose an account to set up two-factor authentication. Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.InstagramGo to your profile and open Settings.Click Accounts Center. Select Password and Security.Then Two-Factor Authentication.It may ask you to choose an account to set up two-factor authentication. Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.TikTokGo to your Profile.Then open the Menu.Select Settings and privacy.Then, Security and permissions.Tap 2-step verification.Choose one or more verification methods, such as text message, email or an authentication app.Click Turn On. Follow the prompts to finish setup.X (formerly Twitter)Click on your profile on the upper left of the screen.Open Settings and privacy.Select Security and account access, then Security.Tap Two-factor authentication.Choose your preferred method, such as text message, authentication app or security key.Follow the steps to turn it on.Note: Text message (SMS) verification on X may only be available for paid (Premium) users or in certain regions. If SMS isn’t available, you can still use an authentication app or a physical security key for two-factor authentication.Pro tip: Use an authenticator app (like Google Authenticator or Authy) instead of text messages for stronger protection.5) Check your photos before postingYour photos may reveal more than you think — house numbers, car license plates or even vacation details that signal you’re away from home.Quick fixes before postingCrop or blur backgrounds that show personal details.Avoid posting in real time while traveling. Wait until you’re back.Review old posts to make sure you’re not unintentionally sharing private info.SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATEBonus tip: Keep personal info under wrapsEvery time you post, share or comment online, you’re leaving small clues about your life, and scammers are great at putting those pieces together. The less information fraudsters can find about you, the weaker their scams become.Many impersonators use public details like your hometown, workplace or family connections to build fake profiles that seem trustworthy. Even information like your email address or phone number can be exploited if it’s floating around the internet.A personal data removal service can help reduce that risk by scrubbing your personal details from people search sites and data brokers. While no solution is perfect, minimizing your digital footprint makes you a much harder target for impersonation and social-engineering scams. These services actively monitor and systematically remove your information from hundreds of sites, saving you time and giving you peace of mind.Protecting your privacy online isn’t just about what you share on social media; it’s also about controlling what’s out there already. Limiting that data means scammers can’t easily cross-reference your information with data from breaches or the dark web.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.Kurt’s key takeawaysStaying safe on social media isn’t about deleting your accounts; it’s about taking control of your information. Turning off location sharing keeps your whereabouts private. Switching to a private account gives you more say over who sees your posts. Being cautious with friend requests and DMs helps you avoid scams. And double-checking your photos before posting prevents oversharing. With just a few quick settings and habits, you can enjoy social media with peace of mind.Have you ever spotted a scam or fake account online? Tell us what happened by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.CLICK HERE TO DOWNLOAD THE FOX NEWS APPCopyright 2025 CyberGuy.com.  All rights reserved.  

5 social media safety tips to protect your privacy online Read More »

1 how a tiny retinal implant is helping people regain their sight

How a tiny retinal implant is helping people regain their sight

NEWYou can now listen to Fox News articles!
A new study in The New England Journal of Medicine revealed that the PRIMA brain computer interface (BCI) retinal implant helped people with advanced age-related macular degeneration regain some central vision. The device uses a tiny 2 millimeter by 2 millimeter photovoltaic implant that is only 30 micrometers thick, and thinner than a strand of hair. It sits beneath the retina and works with a special pair of smart glasses. The glasses capture images and send them as near-infrared light to the implant. The implant converts that light into small electrical signals that stimulate the optic nerve. This process mimics how healthy retinal cells normally send visual information to the brain.The study followed thirty-eight participants, thirty-two of whom completed one year of follow-up. Twenty-six patients experienced measurable improvement in vision, which equals about eighty percent of the group. Many participants could read letters, numbers, and even full pages of text again. Although the restored vision is black and white and slightly blurry, the results are remarkable for people who once believed they would never see clearly again.WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANTSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Why this matters for AMD treatmentAge-related macular degeneration, often called AMD, is one of the leading causes of irreversible blindness in older adults. Until now, available treatments could only slow down vision loss. None of them could restore what had already been lost. The PRIMA implant works with smart glasses to bring central vision back to life. (PRIMA by Science)The PRIMA implant takes a different approach. It directly replaces the missing function of the retina by turning light into electrical signals. Patients can still use their natural peripheral vision while the implant restores some central vision. This combination creates a more complete visual experience.The trial showed that the surgery is generally safe. Most side effects occurred within the first two months and resolved soon after. Importantly, the implant did not reduce the patients’ remaining natural peripheral vision. Researchers call this a major step toward restoring sight rather than only slowing its decline.The PRIMA implant was developed by Science Corporation, a brain-computer interface company founded by Max Hodak, who previously cofounded Neuralink. Science Corporation acquired the PRIMA technology from the French firm Pixium Vision, continuing its development toward clinical use.EYE DROPS MAY REPLACE READING GLASSES FOR THOSE STRUGGLING WITH AGE-RELATED VISION LOSS The tiny chip sits under the retina and turns light into visual signals. (PRIMA by Science)What this means for youIf you or someone you love lives with late-stage AMD, this breakthrough may offer real hope. For the first time, there is a device that can restore some sight instead of only preserving what remains. You may want to talk with your ophthalmologist about upcoming trials or future approval of the PRIMA system in your area. The company behind the technology has already applied for European approval, and a process with the U.S. Food and Drug Administration is underway.Regaining even partial central vision can make a big difference. Reading text, recognizing faces, or simply moving independently becomes possible again. This progress also shows how fast medical innovation is moving. Patients who were once told that nothing could help may soon have a chance to see again.It is also a reminder to stay informed. Treatments that were once experimental are becoming available sooner than expected. Discussing new technologies with your doctor helps you understand timing, eligibility, and what kind of results you can realistically expect. This breakthrough offers new hope for people living with advanced macular degeneration. (PeopleImages/Getty Images)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThe PRIMA retinal implant represents a shift in how scientists and doctors think about blindness caused by AMD. For decades, the focus was on slowing down the disease. Now, researchers are proving that restoration is possible. While this generation of the implant provides limited black and white vision, it gives real, functional sight to people who had none. That alone changes lives. More work remains to improve image clarity, color perception, and comfort. Still, this is only the beginning. Future versions of the device and smart glasses may make vision restoration even more effective and accessible.If you could regain even part of your sight through new technology, would you take the opportunity and experience the world in a whole new way?  Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

How a tiny retinal implant is helping people regain their sight Read More »

favicon

Tiny neural net Halloween costumes are the best

I’ve been experimenting with getting a tiny circa-2015 recurrent neural network to generate Halloween costumes. Running on a single cat hair-covered laptop, char-rnn has no internet training, but learns from scratch to imitate the data I give it.A little while ago I revisited a dataset from 2018, over 7100 user-submitted Halloween costumes (3173 with exact duplicates removed). Char-rnn generated some pretty intriguing costumes. But because its training data was old, it was missing out on more recent pop culture. I asked AI Weirdness readers to help submitting more data to bring the neural net up to date, and you delivered! The costume dataset now contains 8362 entries (about 5730 with exact duplicates removed). I trained char-rnn on the updated 2025 dataset and now it … still doesn’t know to complete the phrase “Kpop ” with something topical like “Kpop demon hunters”.Kpop dumpsterKpop and the American cheeseKpop AssassinKpop of WoodKpop of ShopKpop grocerieKpop EggKpop of Halloween workerIt’s not the neural network’s fault. People submitted individual characters from Kpop Demon Hunters, and even one reference to “K-Pop Demon Hunters” but without internet training to draw from, it doesn’t know that any of this is related. It also doesn’t know that lowercase and uppercase p are basically the same. To it, “Kpop” and “K-Pop” are as different as “That” and “Treat”.Still, char-rnn is able to build new costumes by moving individual words around from one costume to another, resulting in interesting new characters that you will probably not be able to explain to anyone.Steve skeletonStrange Stuff ThorRoman ScientistGreen ElizabethHealth LauraPrincess Grandma ChickenGus PantherGlamrock BatmanSpider FredPots’s Hair AngelJamm the HedgehogGrandma MarshmallowCaptain DaggyRobot Van OstrichI picture Jamm the Hedgehog as some kind of early 90s mascot with a surfboard and neon shorts, meant to convince kids that the regional sewer district is cool actually.I’m not sure how to picture some of these, but these are definitely costumes you could dress as.A ShunsuitInflatable ShadowVampire of LibertyThe ChillSanta ManFiner PantsSexy Swan MageHuntress horseShower ScientistGirl GirlThe Grumpy RevelerPool UnicornWerepants costume(There were more inflatable costumes submitted this time around, including specifically “Portland Inflatable Frog”.)Quite often char-rnn’s costumes made basically no sense at all. I have no idea how you would do most of these.A potato skeletonBride of grocerieWild of DragonDragonatorFrog WigSexy 209King of ThorGhost of the HumbunBear of NinjaFire-browghost conceptTwo batteryHot Shape DevilArmy on the full bunOne thing that didn’t go away since 2018 is all the Ruth Bader Ginsburg costumes. For the original dataset someone submitted over 60 unique Ruth Bader Ginsburg costumes (my favorites include Rutabaga Ginsburg, Rock Paper Ginsburg, and Ruth Bader Jarlsberg). As a result, a LOT of the generated costumes were “Ruth Bader Ginsburg” or variations.Glinda the American GinsburgHoly Bear GinsburgSmurfy GinsburgRuth Bader PantsWith these handy costume ideas supplied by the power of ridiculously tiny AI, you can attend that party secure in the knowledge that you’ll be the only “Ghost of the Humbun” there.Bonus content for AI Weirdness supporters: Some more extra-secret and best quality Halloween costume ideas.

Subscribe now

Tiny neural net Halloween costumes are the best Read More »

1 this feature can save your pc from getting hacked how to set it up intro

How to use passkeys to keep your computer safe

NEWYou can now listen to Fox News articles!
Keeping your computer secure is more important than ever. Cyberattacks target computers, accounts and sensitive data daily. Traditional passwords have long been the cornerstone of security, but they come with real challenges. Many of us reuse passwords across sites, and even strong passwords can be compromised in data breaches.Passkeys offer a safer and more convenient way to authenticate. However, they’re still relatively new, and many of us are still trying to figure out how they work. For example, Peter recently reached out asking, “How do I get a passkey from a PC desktop that doesn’t have a camera or fingerprint device?”That’s a great question, Peter, and you’re not alone in wondering about this. The good news is that passkeys are designed to work on virtually any device, whether or not it has biometric hardware like a fingerprint reader or camera. Let’s explore what passkeys are, why they’re worth using and how to set them up on both Windows and Mac, regardless of your hardware setup.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE Passkeys make signing in faster and safer by replacing traditional passwords with encrypted keys. (Kurt “CyberGuy” Knutsson)What are passkeys?Passkeys use cryptography to prove who you are. When you create a passkey, your device makes two keys, one public and one private. The public key goes to the website, and your private key stays on your device. During login, your device confirms your identity with the private key. The website never sees or stores it.This process blocks phishing and password theft. It also makes sign-in faster. You don’t need to remember or type long passwords anymore.While passkeys simplify authentication, they don’t eliminate the need for a secure password manager. Password managers can safely store and sync your passkeys, just as they do with passwords, allowing you to access your credentials across devices and browsers — even if those devices don’t natively sync passkeys, such as between Windows and Apple systems. Using a password manager alongside passkeys creates a bridge between platforms and provides an additional layer of security and convenience.Can you use passkeys without biometrics?Yes, you can. A PC or Mac without a camera or fingerprint reader can still use passkeys. On Windows, you unlock them with your Windows Hello PIN. On Apple devices, you can use Touch ID, Face ID or your passcode. The key is having an updated operating system and browser that support passkeys.If you manage multiple accounts or devices, a password manager that supports passkeys can act as your central vault. This lets you use passkeys even on systems that don’t directly support syncing through iCloud or Google Password Manager. It’s an easy way to ensure you always have access to your credentials, no matter what kind of device you use.Why you still need passwordsNot every website supports passkeys yet. Some services still rely on passwords. Keep strong, unique passwords for those accounts. Passwords also serve as backup if you lose a device or can’t use your passkey. Over time, more sites will support password-free logins.This is where password managers continue to play an important role. They bridge the gap between old and new authentication methods, allowing you to store both traditional passwords and passkeys in one secure place. Until the web is fully passkey-ready, combining the two provides both convenience and resilience, giving you a seamless experience across multiple devices and services. Passkeys also prevent phishing because your private key never leaves your device during sign-in. (Kurt “CyberGuy” Knutsson)Passkey support by platform WindowsWorks on Windows 10 and 11.Windows 11 version 22H2 (KB5030310+) includes passkey management.Unlock with Windows Hello PIN, face, or fingerprint.If your browser or operating system doesn’t yet sync passkeys automatically, a third-party password manager with passkey support can store them for cross-platform access.macOS and iOSWorks on macOS 13 Ventura or later and iOS/iPadOS 16 or later.Passkeys sync through iCloud Keychain with end-to-end encryption.Two-factor authentication must be turned on.Use Touch ID, Face ID or your device passcode to confirm logins.While Apple’s iCloud Keychain handles passkeys securely within its ecosystem, using a password manager that supports passkeys provides extra flexibility, letting you securely access the same credentials on non-Apple devices or browsers outside Safari.AndroidAvailable on Android 9 and later.Android 14 adds third-party passkey manager support.Passkeys sync through Google Password Manager by default.Alternatively, password managers now integrate passkey syncing, letting you use your passkeys seamlessly on both desktop and mobile devices.BrowsersChrome, Edge, Safari and Firefox all support passkeys.Keep your browser updated for the best compatibility.Browser-based password managers can also sync passkeys, adding flexibility if you switch between devices or operating systems.Major services that support passkeysAs of publishing, these major services offer passkey sign-in:GoogleMicrosoftAppleAmazonPayPalGitHubUbereBayWhatsAppFacebookSupport continues to expand every month. Most new accounts on these platforms can now use passkeys.How to set up passkeys on WindowsOpen Settings → Accounts → Sign-in options.Set up Windows Hello PIN or biometrics.Visit a site that supports passkeys.Choose Create a passkey and confirm with your PIN or biometric.Manage passkeys later under Settings → Accounts → Passkeys on Windows 11.If your PC lacks biometrics, you can still approve sign-ins using your phone nearby or a synced password manager that supports passkeys. (Kurt “CyberGuy” Knutsson)How to set up passkeys on MacApple devices also provide a simple and secure way to use passkeys through iCloud Keychain. There’s no separate setup for passkeys if you have iCloud Keychain enabled. Once it’s on, an eligible app or service will ask you to create a passkey at the time of login, and you’ll be able to do so by following the instructions on the screen. Below is how you can enable iCloud Keychain.Go to Apple menu → System Settings → your name → iCloud.Click Passwords and turn on Passwords & Keychain and enable syncing.Visit a site that supports passkeys.Select Create a passkey and confirm with Touch ID or your passcode.Passkeys will sync to your other Apple devices through iCloud Keychain.You can also approve logins on a non-Apple device using your iPhone nearby, or access them through a password manager that stores both your passkeys and passwords in one place. On Windows, you can use passkeys with a simple Hello PIN, even without a camera or fingerprint reader. (Kurt “CyberGuy” Knutsson)Common questions about passkeysCan I move passkeys between devices?Yes. iCloud and Google Password Manager sync passkeys securely. For more flexibility, password managers now support passkey portability across different ecosystems, perfect if you use both Mac and Windows, or Android and iPhone.What if I lose my device?You can recover passkeys from iCloud, Google or your password manager. Always keep a backup login method and 2FA enabled. Storing your passkeys in a secure password manager ensures recovery even if you lose access to one platform’s ecosystem.Are passkeys fully replacing passwords?Not yet. Many major platforms support them, but full adoption will take time. Until then, password managers remain an essential bridge technology, providing secure storage, synchronization and transition support as passkeys continue to expand.MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS5 additional steps you can take to keep your computer safeEven with passkeys and strong passwords, there are other steps you can take to enhance the security of your computer.1) Use a password managerPassword managers help generate and store strong, unique passwords for every account. This reduces the risk of password reuse and ensures that your backup passwords are secure. Now that many password managers support passkeys, they also act as your universal credential vault, letting you log in with either method depending on what a website supports.Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.2) Install strong antivirus softwareStrong antivirus software protects against malware, ransomware and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APP3) Keep your system updatedRegular updates fix security vulnerabilities in your operating system and software. Enable automatic updates whenever possible to stay protected.4) Enable two-factor authenticationTwo-factor authentication (2FA) adds a second verification step, usually through a code sent to your phone or email, or through an authentication app. This makes it harder for attackers to access your accounts even if your password or passkey is compromised.5) Backup your dataRegularly backing up your Mac or PC to a secure cloud service or external drive ensures that you can recover important data in case of hardware failure, malware attack, or accidental deletion.Kurt’s key takeawayPasskeys are a major upgrade over traditional passwords, but we’re not living in an all-passkey world just yet. Many sites still rely on passwords, and you’ll need backups if something happens to your device. Supplementing passkeys with a password manager is the best move right now; it lets you store, sync and protect both passkeys and passwords under one roof. The good news is that setting up passkeys takes just a few minutes, and once they’re enabled, logging in becomes faster and more secure.Have you tried using passkeys yet? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

How to use passkeys to keep your computer safe Read More »

70702

How the Army Wants to Counter Drones

Army Chief Technology Officer Alex Miller joined Ryan at a live event to talk about what countering improvised explosive devices taught him about defeating drones, what the Army is learning from the southern border about emerging threats, and what he wants to see from industry. He makes the case for deeper collaboration between companies, sharper focus, and the courage to shut down what no longer works. 

How the Army Wants to Counter Drones Read More »

1 tesla revives ‘mad max mode in full self driving

Tesla revives ‘Mad Max’ mode in Full Self-Driving

NEWYou can now listen to Fox News articles!
Tesla is making headlines again with the return of its Mad Max mode in Full Self-Driving (Supervised). This feature, designed to make the car drive more aggressively, has arrived just as the automaker faces new scrutiny from regulators and ongoing lawsuits from customers. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.Mad Max Mode returns in Tesla’s latest FSD updateTesla recently launched its FSD v14.1.2 update. The update follows last year’s major FSD v14 release, which introduced “Sloth Mode” for slower, more cautious driving. The latest update moves to the opposite end of the spectrum with Mad Max mode.According to Tesla’s release notes, this profile allows higher speeds and more frequent lane changes than Hurry mode. The update has sparked mixed reactions. Some Tesla fans praise it for making driving feel more natural. Critics argue that it invites risky behavior at a time when regulators like the NHTSA and California DMV are already investigating Tesla’s advanced driver-assist systems.TESLA’S SELF-DRIVING CARS UNDER FIRE AGAIN A new Mad Max speed profile is now included in Tesla’s Full Self-Driving interface. (Tesla)History of Tesla’s Mad Max mode since 2018The Mad Max setting isn’t new. Tesla first introduced it in 2018 for the original Autopilot system. At the time, Elon Musk described it as ideal for handling aggressive city traffic. The name, borrowed from the post-apocalyptic movie series, immediately drew attention for its bold tone.Now, the feature is back in Tesla’s latest FSD version. Within hours of release, drivers reported seeing cars equipped with Mad Max mode rolling stop signs and driving over the speed limit. These early reports highlight how the mode may behave more assertively than before.Why Tesla brought back its Mad Max modeBringing back Mad Max mode may serve several purposes for Tesla. It helps demonstrate the company’s continuous development of FSD software while appealing to drivers who prefer faster, more decisive movement in traffic. It also acts as a signal that Tesla is still chasing the goal of Level 4 autonomy, even though its system remains classified as Level 2, requiring constant driver supervision. Tesla owners can access Mad Max mode through the car’s settings under Speed Profiles.  (Chesnot/Getty Images)For Tesla, this feature shows confidence in its progress. For observers, it raises concerns about timing. With multiple investigations and lawsuits in progress, many expected Tesla to focus on safety rather than on more aggressive driving profiles.What this means for youIf you own a Tesla with Full Self-Driving (Supervised), you can access Mad Max mode through the car’s settings under Speed Profiles. This mode provides a more assertive driving experience that includes quicker acceleration, more lane changes, and less hesitation.However, remember that Tesla’s Full Self-Driving system still requires active driver attention. You must keep your hands on the wheel and remain ready to take control at any moment. While the name suggests thrill and speed, safety and awareness should remain your top priority. Tesla’s speed-profile menu includes the toggle options of Chill, Standard, Hurry, and Mad Max profiles to customize how aggressively their car responds in traffic.  (REUTERS/Mike Blake)If you share the road with Teslas, it’s smart to stay alert. Vehicles using Mad Max mode may accelerate or change lanes more quickly than expected. Giving Teslas a little extra space can help reduce surprises and keep everyone safer on the road.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?Kurt’s key takeawaysTesla’s decision to reintroduce Mad Max mode is both strategic and provocative. It revives a feature from its early Autopilot days while reigniting debate over the balance between innovation and responsibility. The mode’s return reminds everyone that Tesla continues to test the limits of driver-assist technology and public tolerance for it.Will Tesla’s revived Mad Max mode mark a bold step toward autonomy or a dangerous gamble in the race for self-driving dominance? Let us know by writing to us at CyberGuy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.CLICK HERE TO DOWNLOAD THE FOX NEWS APPCopyright 2025 CyberGuy.com.  All rights reserved.  

Tesla revives ‘Mad Max’ mode in Full Self-Driving Read More »

1 beware of these fake credit card account restriction scams

Beware fake credit card account restriction scams

NEWYou can now listen to Fox News articles!
It started with an urgent subject line: “Resolve Unusual Activity on Your American Express Account Now.” That is how one scam email tried to trick me into clicking a fake link that claimed to “verify account activity.” It looked official with logos, customer support tone and even a partial account number. But it was a phishing attempt, a common tactic used to steal personal and financial information.Let’s look at what made this message suspicious and how you can protect yourself.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.HOW TO SPOT AND STOP AI PHISHING SCAMSHow the phishing email scam worksPhishing emails copy trusted companies to create panic and urgency. The goal is simple: get you to click. In this case, the email claimed my American Express account was “temporarily restricted” until I verified my identity. A fake American Express email tried to steal personal data using urgent, fear-based language. (Kurt “CyberGuy” Knutsson)A closer look revealed several red flags:The sender’s email was not from an official American Express domain.The “Click Here” button linked to a strange website.The message used fear-based language about account suspension.Each of these clues points to a fake email designed to steal login details or credit card numbers.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Learn to spot red flags like strange email addresses and fake “verify account” requests. (Kurt “CyberGuy” Knutsson)What to do if you receive a phishing emailIf an email looks suspicious:Do not click any links.Check the sender’s address. Real companies use verified domains, not random ones.Go directly to the company website by typing the URL into your browser.Report the email. American Express asks customers to forward phishing messages to spoof@americanexpress.com.Delete the email right away.These steps can protect you from identity theft and financial fraud.PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS Strong passwords, 2FA and data removal services help defend against digital scams. (Neil Godwin/Future via Getty Images)10 tips to protect yourself from phishing emailsPhishing scams that mimic real companies like American Express can slip into your inbox looking almost legitimate. The best way to stay safe is to create strong digital habits that protect your information and your peace of mind. Here are the top ways to defend yourself against phishing threats and financial fraud.1) Turn on two-factor authentication for financial accountsAdding two-factor authentication (2FA) creates an extra layer of protection. Even if a scammer gets your password through a fake American Express email, they cannot access your account without your verification code. Most banks and credit card companies offer this free feature in their security settings. Enable it today and make your login stronger.2) Consider using a data removal serviceData removal services help clean up your personal information from data broker websites that collect and sell your details to advertisers, marketers and even scammers. Reducing your digital footprint limits the amount of information that phishing attackers can use to make fake emails look convincing. In the case of fake American Express messages, less personal data online means fewer details criminals can use to target you directly.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.3) Keep your browser and security software updatedOutdated browsers and antivirus programs leave gaps that scammers can exploit. Regular updates close those gaps and strengthen your defense against phishing links and malicious downloads. Set your software to update automatically so you are always protected when opening emails or clicking links.4) Review account statements and transactions regularlyMake it a habit to log into your credit card accounts directly from the official website, not from email links. Scan your statements for unfamiliar transactions. Early detection helps you report fraud fast and recover funds before more damage is done.5) Pause and verify before you click anythingPhishing emails thrive on urgency. Before clicking, take a deep breath and ask yourself: Does this message feel pressured or suspicious? Instead of clicking “verify now,” open a new browser tab and visit the official credit card website to check your account. This one simple pause can stop a scam in its tracks.6) Use strong antivirus softwareGood antivirus software not only blocks viruses but also warns you when a site or email is unsafe. Choose a program that includes phishing detection, real-time web protection and email scanning. These tools can automatically block fraudulent look-alike emails before you even open them.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.7) Use an identity monitoring serviceIdentity monitoring services keep watch over the dark web and alert you if your personal information, such as your email address, password, or credit card number, appears in stolen data. If scammers gain access to this information, they often use it to create realistic phishing attempts, like the fake American Express “account restricted” email. Early detection through identity monitoring allows you to take action, such as changing passwords, freezing credit, or alerting your bank before real damage occurs.Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.8) Learn to recognize official communicationsLegitimate companies like American Express will never ask for full account numbers, passwords, or security codes by email. Familiarize yourself with how real messages from your bank look and sound. If something feels off, forward the message to the company’s official fraud department and delete it immediately.9) Back up your important data securelyIf a phishing attack installs malware on your computer, it can lock or delete files. Keep secure backups on an external drive or a trusted cloud service. That way, even if scammers target your system, you will not lose access to your information.10) Trust your instinctsIf an email feels wrong, it probably is. Your intuition is one of your strongest defenses against scams. Combine it with these habits to stay ahead of cybercriminals and keep your personal and financial information safe. Kurt’s key takeawaysPhishing scams are becoming more advanced, but your awareness is your best defense. When you know how to spot fake emails and stay calm under pressure, you protect both your money and your peace of mind. So next time you get an “urgent” message about your account, ask yourself: Would your bank really contact you this way?Have you ever received a suspicious email like this? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Beware fake credit card account restriction scams Read More »

1 meta ai edits your camera roll for better facebook posts

Meta AI edits your camera roll for better Facebook posts

NEWYou can now listen to Fox News articles!
Your phone is full of photos you’ve never posted, moments you meant to share but never got around to. That’s exactly what Facebook wants to change. It now uses Meta AI to spot hidden gems in your camera roll, polish them, and create simple collages you can share. You take the pictures, and Facebook helps turn them into easy, ready-to-share memories. No design skills required.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Why Meta created this AI photo featureMany people take photos but then don’t share them because they feel the image isn’t “post-worthy,” or they simply don’t have time to make it look good.  Meta’s logic: if those moments are sitting unseen in your phone, screenshots, receipts, random snaps, they might still matter to you. So the tool helps you rediscover and share them. From Meta’s perspective, this also fits its bigger push into artificial intelligence-driven features across its apps.LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION New AI tool scans your camera roll to find and polish images for quick sharing. (Kurt “CyberGuy” Knutsson)Behind the scenes, Meta AI analyzes photo details, like lighting, people and events, to group similar moments and create polished collage layouts automatically. It can suggest captions or filters, but users can edit or reject any suggestion before posting.How to enable the Facebook AI featureHere’s how to turn this feature on in Facebook (and how to disable it if you prefer).Open the Facebook app on your phone (iOS or Android).Tap your profile picture or the menu icon.Go to Settings & Privacy.Click Settings.META STRENGTHENS TEEN SAFETY WITH EXPANDED ACCOUNTS Meta aims to revive old memories with Facebook’s AI-powered collage creator. (Kurt “CyberGuy” Knutsson)Scroll to Preferences (or something similar) and find Camera Roll Sharing Suggestions and tap on it.Toggle on ‘Get creative ideas made for you by allowing camera roll cloud processing’ (or similar wording). You may be prompted to allow “cloud processing,” whereby Facebook uploads photos from your device to its servers so Meta AI can analyze them.INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS Users can now let Facebook’s AI curate camera roll highlights automatically. (Kurt “CyberGuy” Knutsson)Confirm the opt-in and accept any permission prompts. Once enabled, Meta claims that only you see suggestions, and you decide if you save or share them.META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY? Facebook rolls out AI photo suggestions to make sharing easier than ever. (Kurt “CyberGuy” Knutsson)You’ll also receive optional notifications when new collage suggestions are ready, giving you the chance to preview and edit them before sharing.Steps to disable or opt outFollow the same path: Facebook app → Settings & Privacy → Settings → Preferences → Camera Roll Sharing Suggestions.Toggle the feature off or disable “cloud processing.”For extra privacy, you can also revoke Facebook’s access to your camera roll in your phone’s OS settings.If you’ve already uploaded photos for analysis, Meta says you can delete that data by turning off the feature and clearing saved files under “Your Facebook Information” in Settings.What this means for youHere’s how Facebook’s new AI photo feature could change the way you share, save and see your favorite moments online.More sharing without the effort. You capture the moment, Facebook helps polish it. The barrier of “this photo isn’t good enough” gets lowered.Greater visibility for memories. That vacation scrapbook photo or family snap buried in your camera roll might now get a second life.Full control remains. You decide whether to share the suggested edit or keep it private. Meta emphasizes that the suggestions are shown only to you unless you choose to share.Privacy considerations. Even though Meta says your photos won’t be used to train AI unless you edit or share them, they do get uploaded to Meta’s cloud when you opt in and may be stored for some time. Meta confirms that the uploaded photos aren’t used for ad targeting or facial recognition, but they may be stored temporarily for processing before being deleted.Limited rollout. At present, U.S. and Canada only; international users may need to wait.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis move by Facebook addresses a common pain point (photos that don’t get shared) and leverages AI to make sharing more effortless. If you’re an active Facebook user who takes many photos and wants to share more of them, this feature could be a welcome boost. But if you’re cautious about how your private media may be handled, the opt-out path is important and worth using. Either way, it reflects how AI is quietly reshaping everyday apps.Will you turn on Facebook’s AI-powered photo suggestion feature or keep your camera roll private just the way it is?  Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Meta AI edits your camera roll for better Facebook posts Read More »