memoment editorial

1 multiple us cancer centers hit in coordinated phishing breach intro

Multiple US cancer centers hit in coordinated phishing breach

Key Takeaways: A coordinated phishing attack has breached sensitive patient data at multiple cancer care providers in the U.S. The breach exposed personal health information, including names, addresses, diagnoses, and financial data. More than 130,000 individuals have been impacted, and steps are being taken to protect affected individuals. A phishing campaign has compromised the data […]

Multiple US cancer centers hit in coordinated phishing breach Read More »

Declassified DoD Interviews Reveal Soviet Cold War Fears and Nuclear Realities

A released Department of Defense document, obtained through the Freedom of Information Act,provides a rare and candid look inside the Soviet leadership’s strategic mindset during the Cold War.The 152-page file compiles firsthand interviews with senior Soviet military officials, policymakers, and Western counterparts, exposing a mix of overestimation, fear, and internal debate that shaped the era’sarms race and nuclear brinkmanship.
Conducted primarily in the early 1990s, the interviews were part of a formal study by the Office of Net Assessment, drawing on the testimony of Soviet officers such as Marshal Sergei Akhromeev, General Andriian Danilevich, and Western figures including former U.S. Secretary of Defense Harold Brown.The collection offers new insight into how both sides viewed nuclear deterrence,the potential for war, and the logic behind massive arms buildups.
Soviet Doubts About Nuclear WarfightingContinue scrolling for more…

The document reveals that, by the 1970s, leading Soviet military thinkers had concluded that nuclear weapons were not true warfighting tools, but rather political instruments of deterrence. “At no time did the USSR ever intend to make first use of nuclear weapons,” Marshal Akhromeev told U.S. researchers, explaining that although a preemptive attack would offer an advantage in theory, neither side would actually win if nuclear war began. He described nuclear arms as “political tools,” and noted that both superpowers’ command and control systems for nuclear forces reached full reliability only in themid-1970s, greatly reducing the risk of unauthorized or accidental use.
General Danilevich described how the results of secret Soviet computer models, shown to Brezhnevand other Politburo members in the early 1970s, predicted catastrophic devastation after a nuclear exchange. According to the unpublished findings, the Soviet armed forces would be “reduced to 1/1000 of their previous strength,” with 80 million Soviet citizens killed and 85% of industrial capacity destroyed. Danilevich recalled that Brezhnev was “visibly terrified” by the exercise and had to be reassured that it was not a real launch. The summary of this study was never published, as its message was judged “too psychologically detrimental to morale and resolve.” Instead, later models artificially reduced predicted destruction to make nuclear war appear less suicidal, a practice that continued into the 1980s.
Strategic Misperceptions and Internal Rivalries
The interviews point to a persistent pattern of misreading the other side’s intentions. Akhromeev, who was initially distrustful of the U.S., said that face-to-face meetings with American generals in the late 1980s changed his views, revealing that both sides had long misunderstood each other’s actual policies and motivations. “Each side made a tremendous misreading of the other side’s intentions, which led to a greater possibility of accidental strikes,” he said, but added that there was never an imminent danger of war in the 1970–87 period.
The document also details internal disputes within the Soviet leadership, especially between the General Staff, political authorities, and the powerful industrial sector. General Batenin recalled deep tensions between military planners and party leaders over decisions such as force structure and the production of new weapons, with disagreement over whether quantity or quality should be prioritized. The interviews highlight that subjective factors, political alliances, and personal relationships often overrode technical analysis in weapons procurement and strategy.
Economic Pressure and Arms Buildup
A recurring theme in the interviews is the immense economic burden of the Soviet arms race. Sergei Blagovolin, who worked on assessing the U.S. industrial mobilization potential, recalled that Soviet planners estimated the U.S. could produce “50 nuclear submarines and 50,000 tanks per year” in a mobilization scenario. These threat assessments were used for decades to justify vast increases in Soviet military spending and production, which ultimately contributed to the economic strains that weakened the USSR in the 1980s.
Chemical and New Weapons
On chemical weapons, both Soviet and U.S. interviewees agreed that the USSR maintained large stockpiles as a “secondary means” of warfare, to be used only if nuclear escalation could be avoided or in retaliation. Soviet planners consistently matched U.S. capabilities, but chemical weapons were viewed as fundamentally less decisive than nuclear arms.
There is also acknowledgment that both superpowers tracked and attempted to match technological innovations—such as cruise missiles, precision-guided munitions, and laser-based weapons—but economic and political realities limited their actual impact on the nuclear balance.
Political Leadership and Decision-Making
The interviews note the sometimes limited military experience of Soviet political leaders, with Brezhnev described as “very weak in the area of military decision making,” often leaving key decisions to the Minister of Defense and the General Staff. Final choices on weapons development and arms control frequently reflected a compromise between military advice, party priorities, and the interests of the defense industry.
Lasting Lessons
The released record offers a rare, unfiltered view of the late Cold War from the perspective of both Soviet and Western insiders. The testimony shows that, beneath the rhetoric and buildup, both sides recognized the catastrophic potential of nuclear war and relied on deterrence—not victory—as the true goal. The collection reveals how misperceptions, internal politics, and economic exhaustion shaped the course of the Cold War, and how close both superpowers came to the brink while ultimately avoiding direct conflict.
###
Document Archive
The Crowded Path to Unlimited Soviet Arsenals: What Soviet Party Leaders, General Staff, and Industrialists Thought They Were Doing in the Cold War [153 Pages, 6.5MB]

Follow The Black Vault on Social Media:

Declassified DoD Interviews Reveal Soviet Cold War Fears and Nuclear Realities Read More »

1 would you date your pet 1 in 3 say yes to ai version

Would you date your pet? 1 in 3 say yes to AI version

NEWYou can now listen to Fox News articles!
What if your dog had a dating profile? Or your cat showed up to brunch with your friends? Thanks to a viral TikTok trend, thousands of pet lovers are asking AI to reimagine their pets as people, and the results are surprisingly romantic.A recent survey asked 1,000 Americans just how deeply they connect with their pets. Some of the answers are sweet. Others? A little wild. But together, they paint a picture of a bond that goes beyond belly rubs and toys.Let’s look at what happens when imagination meets emotional attachment and why 1 in 3 pet owners say they’d actually date the human version of their furry friend.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER   A dog puts its paws up to greet a woman’s hands. (Kurt “CyberGuy” Knutsson)

Would you date your pet? 1 in 3 say yes to AI version Read More »

1 microsoft sharepoint bug puts critical government agencies at risk intro

Microsoft SharePoint bug puts critical government agencies at risk

NEWYou can now listen to Fox News articles!
Hackers are actively exploiting a new zero-day bug in Microsoft’s SharePoint Server software. The same software is used by key U.S. government agencies, including those tied to national security. The vulnerability affects on-premise versions of SharePoint, allowing attackers to break into systems, steal data and quietly move through connected services. While the cloud version is unaffected, the on-premise version is widely used by major U.S. agencies, universities and private companies. That puts far more than just internal systems at risk.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERNATIONAL SECURITY EXPERTS RAISE CONCERNS AFTER MICROSOFT PROGRAM EXPOSED AS POSSIBLE AVENUE FOR CHINESE SPYING Microsoft apps on the homescreen of a smartphone   (Kurt “CyberGuy” Knutsson)SharePoint zero-day: What you need to know about the exploitThe exploit was first identified by cybersecurity firm Eye Security July 18. Researchers say it stems from a previously unknown vulnerability chain that can give attackers full control of vulnerable SharePoint servers without needing any credentials. The flaw lets them steal machine keys used to sign authentication tokens, meaning attackers can impersonate legitimate users or services even after a system is patched or rebooted.According to Eye Security, the vulnerability appears to be based on two bugs demonstrated at the Pwn2Own security conference earlier this year. While those exploits were initially shared as proof-of-concept research, attackers have now weaponized the technique to target real-world organizations. The exploit chain has been dubbed “ToolShell.”WHAT IS ARTIFICIAL INTELLIGENCE (AI)?How the SharePoint vulnerability lets hackers access Microsoft servicesOnce inside a compromised SharePoint server, hackers can access connected Microsoft services. These include Outlook, Teams and OneDrive. This puts a wide range of corporate data at risk. The attack also allows hackers to maintain long-term access. They can do this by stealing cryptographic material that signs authentication tokens. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations to act. It recommends checking systems for signs of compromise and isolating vulnerable servers from the internet.Early reports confirmed about 100 victims. Now, researchers believe attackers have compromised more than 400 SharePoint servers worldwide. However, this number refers to servers, not necessarily organizations. According to reports, the number of affected groups is growing rapidly. One of the highest-profile targets is the National Nuclear Security Administration (NNSA). Microsoft confirmed it was targeted but has not confirmed a successful breach.Other affected agencies include the Department of Education, Florida’s Department of Revenue and the Rhode Island General Assembly. Microsoft’s name and logo on a building (Kurt “CyberGuy” Knutsson)Microsoft confirms SharePoint exploit and releases patchesMicrosoft confirmed the issue, disclosing that it was aware of “active attacks” exploiting the vulnerability. The company has released patches for SharePoint Server 2016, SharePoint Server 2019 and SharePoint Subscription Edition. Patches for all supported on-prem versions were issued as of July 21.GET FOX BUSINESS ON THE GO BY CLICKING HEREWhat you should do about the SharePoint security riskIf you’re part of a business or organization that runs its own SharePoint servers, especially older on-premise versions, your IT or security team should take this seriously. Even if a system is patched, it could still be at risk if machine keys were stolen. Administrators should also rotate cryptographic keys and audit authentication tokens. For the general public, there’s no action needed right now since this issue doesn’t affect cloud-based Microsoft accounts like Outlook.com, OneDrive or Microsoft 365. But it’s a good reminder to stay cautious online. Microsoft’s name and logo on a building (Kurt “CyberGuy” Knutsson)What you should do about the SharePoint security riskIf your organization uses on-premise SharePoint servers, take the following steps right away to reduce risk and limit potential damage:1. Disconnect vulnerable servers: Take unpatched SharePoint servers offline immediately to prevent active exploitation.2. Install available updates: Apply Microsoft’s emergency patches for SharePoint Server 2016, 2019 and Subscription Edition without delay.3. Rotate authentication keys: Replace all machine keys used to sign authentication tokens. These may have been stolen and can allow ongoing access even after patching.4. Scan for compromise: Check systems for signs of unauthorized access. Look for abnormal login behavior, token misuse or lateral movement within the network.5. Enable security logging: Turn on detailed logging and monitoring tools to help detect suspicious activity going forward.6. Review connected services: Audit access to Outlook, Teams and OneDrive for signs of suspicious behavior linked to the SharePoint breach.7. Subscribe to threat alerts: Sign up for advisories from CISA and Microsoft to stay updated on patches and future exploits.8. Consider migration to the cloud: If possible, transition to SharePoint Online, which offers built-in security protection and automatic patching.9. Strengthen passwords and use two-factor authentication: Encourage employees to stay vigilant. Even though this exploit targets organizations, it’s a good reminder to enable two-factor authentication (2FA) and use strong passwords. Create strong passwords for all your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/PasswordsCLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayThis SharePoint zero-day shows how fast research can turn into real attacks. What started as a proof-of-concept is now hitting hundreds of real systems, including major government agencies. The scariest part isn’t just the access it gives but how it lets hackers stay hidden even after you patch. Should there be stricter rules around using secure software in government? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Microsoft SharePoint bug puts critical government agencies at risk Read More »

1 meta deletes 10 million facebook accounts this year but why intro

Meta deletes 10 million Facebook accounts this year, but why?

NEWYou can now listen to Fox News articles!
Facebook, being a platform used by billions, is flooded with all kinds of accounts. However, not all of them are genuine. Many are bots that often hijack comment sections, posting the same messages repeatedly. There are also accounts that have built their entire follower base by sharing content originally created by others. Meta seems to have realized the platform needs some cleaning, and it has announced that a staggering 10 million accounts were deleted in the first half of 2025 alone. The purge, it seems, is far from over.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERMETA ADDS TEEN SAFETY FEATURES TO INSTAGRAM, FACEBOOK Facebook app on the home screen of a smartphone    (Kurt “CyberGuy” Knutsson)What you need to know about Facebook’s recent account removalsMeta says it deleted around 10 million accounts in the first half of 2025, mostly for impersonation, spam behavior and fake engagement. This is part of a broader effort to promote original content and clean up the platform and prioritize original content. The accounts were taken down for impersonating large content producers, according to the company, which shared the update in a blog post aimed at creators. WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The crackdown is part of a broader initiative “to make Feed more relevant and help authentic creators break through,” with Meta starting by “cracking down on spammy content.” In addition to the 10 million impersonator accounts, the company says it took action on around 500,000 accounts engaged in spammy behavior or fake engagement. The company is also enforcing stricter policies to cut down on what it calls unoriginal content. It defines this as posts that repeatedly reuse or repurpose another creator’s work without giving credit. Facebook login on a smartphone    (Kurt “CyberGuy” Knutsson)Meta is pushing for uniquenessMeta says it’s not targeting creators who participate in trends or remix existing content. What matters is whether they add something original to the mix. The company encourages reaction videos, commentary and other transformative uses of content. But accounts that repeatedly repost others’ work without permission or meaningful changes will face consequences. These actions include reducing how widely Meta shows their content and temporarily disabling access to monetization features. If Meta’s systems detect duplicate videos, the platform will prioritize the original version and limit the reach of the copies. The company is also experimenting with ways to credit original creators more clearly, such as adding links back to the source video. To help creators maintain visibility and reach, Meta recommends focusing on original content, avoiding third-party watermarks and making substantial edits when using material from other sources. Basic stitching or watermarking, the company notes, doesn’t count as a meaningful transformation.GET FOX BUSINESS ON THE GO BY CLICKING HEREWhy Meta’s crackdown matters to creatorsMeta’s crackdown isn’t just about removing spam. It directly affects how content is ranked, shown and monetized. For creators, especially smaller ones trying to expand an audience, originality now plays a bigger role than ever. If your content is flagged as unoriginal or spammy, Facebook may stop showing it in people’s feeds. That can tank your reach and, in some cases, cut off access to monetization tools like in-stream ads or bonus programs.On the flip side, creators who focus on making unique content or thoughtfully transforming existing media have a better shot at standing out. Meta says it’s adjusting its algorithms to boost authentic voices. That could help original creators gain more traction if they play by the new rules. Facebook app on a smartphone  (Kurt “CyberGuy” Knutsson)How to avoid penalties under Meta’s new content rulesTo prevent Meta from flagging or removing your Facebook account under its new policies, especially if you’re a creator or post content regularly, follow these key steps:1. Post original content. Share content you created yourself, whether it’s photos, videos, text or anything else. Meta is more likely to penalize accounts that mostly rely on reposted or recycled material.2. Transform content if you reuse it. If you’re sharing someone else’s content (with permission or under fair use), add real value. Think reaction videos, voiceover, commentary or edits that change the context or experience. Simply stitching clips together or slapping on a watermark won’t cut it.3. Avoid impersonation and spam tactics. Don’t pretend to be another creator or brand, and don’t rely on engagement bait (like spamming comment sections or repetitive hashtags). Meta is actively removing accounts that engage in fake interactions.4. Avoid using visible third-party watermarks. If your video shows clear signs of being recycled from another app, such as a TikTok watermark, Meta may flag it. Upload clean versions without logos or branding from other platforms.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayMeta cracking down on spam and fake accounts is a step in the right direction, especially for creators who’ve been struggling to get noticed. Facebook has been messy for a while now, with the same videos and memes popping up from different pages and bots flooding comment sections.Have you noticed more recycled content on your Facebook Feed lately? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Meta deletes 10 million Facebook accounts this year, but why? Read More »

1 tsa warns of phishing scam targeting precheck travelers

TSA warns of phishing scam targeting PreCheck travelers

NEWYou can now listen to Fox News articles!
If you’re planning to breeze through airport security using TSA PreCheck, you should first check the URL. The TSA just posted an urgent warning on Facebook reminding travelers to use only the official government site when signing up for PreCheck.The post says, “Signing up for TSA PreCheck? Make sure you’re using a safe and trusted .gov website” and includes this official link, tsa.gov/precheck.Why the warning? Because scammers are out in full force, hoping to trick busy travelers into handing over personal information, and even money, by posing as TSA PreCheck.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERSOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES A TSA agent at an airport screening  (TSA)The scam that’s catching travelers off guardScammers have created fake emails and websites that look exactly like TSA PreCheck. They send these phishing emails to people who are eager to skip airport security lines. The messages urge you to click a link, enroll fast and pay the fee.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?But here’s the problem. You’re not signing up for anything legitimate. You’re giving your data, and possibly your credit card, to a scammer. Even worse, you may not find out until you’re standing at the airport, expecting a smoother journey that never comes. Illustration of TSA PreCheck and TSA PreCheck Touchless ID  (TSA)How to protect yourself from the TSA PreCheck scamThe Federal Trade Commission (FTC) also issued a warning to help travelers spot the scam before it’s too late. Here are the key steps and our recommendations to stay safe. 1. Use the official site onlyAlways start your application at tsa.gov/precheck. Type the URL directly into your browser. Never trust a link from an unexpected email or text.2. Don’t click unexpected links, even if they look real and use strong antivirus software Avoid clicking on links in emails or texts you weren’t expecting, even if they look polished and professional. Scammers are getting better at impersonating trusted sources. A strong antivirus can flag phishing emails and block malicious websites before you click. It’s an essential line of defense, especially when scammers are spoofing trusted organizations like the TSA.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech3. Do not pay online if it’s your first timeIf this is your first time applying, you pay the fee in person at a TSA enrollment center. Anyone asking you to pay online during first-time enrollment is a scammer. Note: TSA will not reimburse applicants who attempt to enroll in TSA PreCheck through a fraudulent website.4. Slow down and thinkScammers often rush you. If someone pressures you to pay quickly or click now, walk away.5. Use a personal data removal servicePersonal data removal services can help remove your personal information from data broker sites. That reduces the chance of scammers targeting you in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.GET FOX BUSINESS ON THE GO BY CLICKING HERECheck out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan6. Enable multi-factor authentication (MFA)Use MFA for any accounts tied to your travel plans, like your email, airline apps or identity verification services. If scammers do get access, MFA adds an extra layer of protection.7. Check for HTTPS and a .gov domainBefore entering any personal details, make sure the site starts with “https://” and ends with “.gov”-not “.com” or “.org.” Secure and official sites matter.8. Report suspicious activity immediatelyIf something feels off, report it to ReportFraud.ftc.gov. Even if you’re unsure, your report could help stop the next scam. Illustration of the TSA PreCheck website  (TSA)What this means for youGetting TSA PreCheck should make travel easier, but only if you do it the right way. The real process is simple, but scammers are exploiting people’s urgency. That’s why it’s essential to slow down, double-check links and start at the official government site. Remember:First-time applicants never pay online.Renewal is possible online, but always begin at tsa.gov.Any site that ends in “.com” or looks unofficial is a red flag.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysNo one enjoys long TSA lines. PreCheck is a valuable tool, but only if you protect yourself from scammers posing as the TSA. The official government site is your safest bet. Stay alert. Bookmark tsa.gov/precheck. Share this with a friend who’s traveling soon.Have you ever second-guessed a link that seemed just a little too convenient? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

TSA warns of phishing scam targeting PreCheck travelers Read More »

1 update your iphone now ios 18.6 fixes 29 security flaws

Update your iPhone now: iOS 18.6 fixes 29 security flaws

NEWYou can now listen to Fox News articles!
If you haven’t updated your iPhone yet, now’s the time. Apple has officially rolled out iOS 18.6, and while the update may seem small, it packs a powerful punch. With 29 security vulnerabilities addressed, many involving Safari and WebKit, experts say updating now is your best defense against future threats.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERGOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED IOS 18.6 update on iPhone (Kurt “CyberGuy” Knutsson)Why iOS 18.6 matters right nowIOS 18.6 closes multiple security holes, including one that could expose sensitive data just by visiting a malicious site. Apple typically keeps details vague at first, but what we do know is serious. Several of the flaws involve WebKit, the browser engine behind Safari, which is a common target for attackers. Other fixes involve CoreMedia, CoreAudio and CFNetwork, all key iOS frameworks. One major concern was a vulnerability that allowed your passcode to be read aloud by VoiceOver. Another bug could have enabled address bar spoofing, tricking users into thinking they were visiting a safe website. These are the kinds of tricks hackers love, and you don’t want to be caught off guard.What iOS 18.6 fixesApple patched:A flaw in WebKit (CVE-2025-4322) that could expose your data through malicious web contentThree memory corruption issues tied to dangerous website contentA CFNetwork bug (CVE-2025-43223) that allowed changes to restricted network settingsCoreMedia and CoreAudio issues that affect how apps handle your dataA Photos bug that prevented memory movies from being sharedWhile none of the flaws have been exploited in the wild yet, experts say that’s no reason to wait.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Steps to update your iPhone to iOS 18.6Updating only takes a few minutes and can prevent a major headache later. Here’s how:Plug your iPhone into power and connect to Wi-FiOpen the Settings appTap GeneralSelect Software UpdateTap Download and Install or Update Now under iOS 18.6Follow the prompts and restart your device when promptedPro tip: If your iCloud storage is full, your update may fail. Free up some space before you begin. Steps to update your iPhone’s software to iOS 18.6  (Kurt “CyberGuy” Knutsson)Other Apple devices got updates tooIPhones weren’t the only devices getting attention this time around. Apple also released:iPadOS 17.7.9 for older iPadsmacOS Sequoia 15.6, Sonoma 14.7.7, and Ventura 13.7.7watchOS 11.6 for Apple WatchtvOS 18.6 and visionOS updatesHow to check for updates on other Apple devices:iPad: Go to Settings > General > Software UpdateMac: Open System Settings > General > Software UpdateApple Watch: Open the Watch app on your iPhone, then go to General > Software UpdateApple TV: Go to Settings > System > Software Updates, then select Update SoftwareApple Vision Pro: Go to Settings > General > Software UpdateMake sure each device is connected to Wi-Fi and has enough battery life or is plugged into power.GET FOX BUSINESS ON THE GO BY CLICKING HEREThe real trick? Protect yourself beyond updatesNot all of us remember to check our devices for new updates right away, which is why adding a layer of antivirus protection is so important. Good antivirus software will stop you from clicking on malicious links that could install malware on your device. It can also scan for hidden threats and alert you if something suspicious is found. This gives you an extra line of defense, even between iOS updates.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech What this means for youSecurity updates like iOS 18.6 are a key part of keeping your personal data safe. Even if your phone is working fine, skipping updates can leave you open to remote attacks. And with iOS 26 and the iPhone 17 just around the corner, this could be the last update before a major shift. If you don’t plan to jump to iOS 26 immediately, applying 18.6 now helps lock in maximum protection. IPhone updated to iOS 18.6  (Kurt “CyberGuy” Knutsson)Kurt’s key takeawaysWhile it may not bring flashy new features, iOS 18.6 plays a crucial role in keeping your iPhone secure. With bugs patched across WebKit, CoreMedia and more, this update shores up vulnerabilities before they’re exploited. It’s fast, free and highly recommended. And remember, automatic updates aren’t instant. If you wait, you could stay vulnerable longer than you think.CLICK HERE TO GET THE FOX NEWS APPWhat would make you trust Apple more or less when it comes to your personal data? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Update your iPhone now: iOS 18.6 fixes 29 security flaws Read More »

FBI Files: Journalists and their Periodicals

 Anderson, Jack – [1,518 Pages, 130 MB] – FBI’s “The Vault” Release Anderson, Jack – [1,131 Pages, 86.7 MB] – FBI Release #2 resulting from FOIA Request 1356764-000. Anderson, Jack – [1,323 Pages, 87.6 MB] – FBI Release #3  resulting from FOIA Request 1356764-001.This case was a bit confusing. The page count from the release on the FBI’s “Vault” differs by hundreds of pages against the file they sent me on CD-ROM.   Why the discrepancy? On 12/23/16, I filed a FOIA for additional records, to see where the confusion might be at and now I received  an estimate that there are an additional 1,598 pages that I can buy for $55.To add to the confusion, on December 1, 2017, I received another response CD-ROM with 1,323 pages on it. I was under the impression the case was closed since I did not pay for the 1,598 pages they quoted me for above.  So what was this release?Jack Northman Anderson (October 19, 1922 – December 17, 2005) was an American newspaper columnist, syndicated by United Features Syndicate, considered one of the fathers of modern investigative journalism. Anderson won the 1972 Pulitzer Prize for National Reporting for his investigation on secret American policy decision-making between the United States and Pakistan during the Indo-Pakistani War of 1971. In addition to his newspaper career, Anderson also had a national radio show on the Mutual Broadcasting System, acted as Washington bureau chief of Parade magazine, and was a commentator on ABC-TV’s Good Morning America for nine years.

 Austin, Louis – FBI Release #1 – [96 Pages, 12.8MB] – Austin, Louis – FBI Release #2 – [17 Pages, 8.5MB] –  Louis Austin (1898-1971) was an African American journalist, leader and social activist. Austin purchased The Carolina Times in 1927 and transformed it into an institution that aided African Americans in their fight for freedom and equality in North Carolina. He used a new approach to Civil Rights issues in Durham, incorporating lower and middle class blacks, unlike the moderate, accommodationist approach of the black elite in Durham during this time. Austin’s unusual strategy of advocating for the majority of blacks to have a voice in society succeeded in galvanizing a broader segment of the African American community in Durham to act for social change. Austin’s approach to black activism helped lay the groundwork for the modern Civil Rights Movement in Durham in the late 1950s and 1960s, which also encouraged lower-income blacks to become politically active. His strategies—which were once considered too radical by his peers—allowed Austin to maintain his influence in Durham well into the 1950s and 1960s. In doing so, Austin created a lasting impact for Durham.

 Baldwin, Hanson – FBI Release #1 – [847 Pages, 65.7MB] Baldwin, Hanson – FBI Release #2 – [69 Pages, 51MB] – Hanson Weightman Baldwin (March 22, 1903 – November 13, 1991) was the long-time military editor of The New York Times. He won a Pulitzer Prize “for his coverage of the early days of World War II”. He wrote or edited numerous books on military topics.

 Barrett, Wayne – [5 Pages, 1.0MB] –  Wayne Barrett (July 11, 1945 – January 19, 2017) was an American journalist. He was an investigative reporter and senior editor for The Village Voice for 37 years. Barrett was a Fellow with The Nation Institute and contributor to Newsweek. He held degrees from Saint Joseph’s University and the Columbia University Graduate School of Journalism, where he served on the adjunct faculty for over thirty years. Barrett authored many articles and books about politicians, especially New York City figures such as Ed Koch, Donald Trump, and Rudy Giuliani. He was a major interviewee in Kevin Keating’s 2006 documentary Giuliani Time.

 Brennan, Raymond Ruddy – [17 Pages, 5.4MB] – Raymond Ruddy “Ray” Brennan (1907-1972) was a prominent reporter for the Chicago Sun-Times, known for his fast-thinking and dynamic reporting style. He began his career in journalism with the Associated Press in Chicago, where he made a name for himself by obtaining an exclusive on the escape of gangster John Dillinger from the Crown Point jail. Brennan’s most notable work came during his time at the Sun-Times, where he was instrumental in covering high-profile criminal trials across the United States. His writing style and ability to immerse himself in the world of crime reporting made him a legend in the field. Brennan’s career also included ghostwriting Roger Touhy’s autobiography, “The Stolen Years,” which played a role in Touhy’s parole from prison. Known for his likable personality, despite living a life surrounded by gangsters and crime, Brennan passed away in 1972 due to cancer, a condition likely exacerbated by his constant smoking​​​​.

 Breslin, James – [57 Pages, 13MB] – James Earle Breslin (October 17, 1928 – March 19, 2017) was an American journalist and author. Until the time of his death, he wrote a column for the New York Daily News Sunday edition. He wrote numerous novels, and columns of his appeared regularly in various newspapers in his hometown of New York City. He served as a regular columnist for the Long Island newspaper Newsday until his retirement on November 2, 2004, though he still published occasional pieces for the paper. He was known for his newspaper columns which offered a sympathetic viewpoint of the working-class people of New York City, and was awarded the 1986 Pulitzer Prize for Commentary “for columns which consistently champion ordinary citizens”.

 Considine, Bob – [54 Pages, 33MB] –  Robert Bernard Considine, known as Bob Considine (November 4, 1906 – September 25, 1975), was an American journalist, author, and commentator. He is best known as the co-author of Thirty Seconds Over Tokyo and The Babe Ruth Story.  Additional records may exist – which have been requested. This page will be updated, should any new documents be released.

 Crile, George – FBI Release #1 – [18 Pages, 4.6MB] Crile, George – FBI Release #2 – [8 Pages, 1.8MB] (Cross References) Crile, George – NARA Release #1 – [14 Pages, 0.9MB]George Crile III (March 5, 1945 – May 15, 2006) was an American journalist most closely associated with his three decades of work at CBS News. Crile was both a producer and reporter for CBS. His career with the company spanned three decades until his death in 2006. Before joining CBS at the age of 31, Crile was Washington Editor of Harper’s Magazine. In addition to Harper’s, his articles were published in The Washington Monthly, New Times, The Washington Post Outlook Section and The New York Times.

 Cronkite, Walter – [72 Pages, 3.85 MB] –  Walter Leland Cronkite Walter Leland Cronkite (1916-2009), famous newscaster and journalist, worked for CBS News for five decades. Although the FBI did not investigate Cronkite, his name does appear in its files, usually in passing reference to his contact with an individual under FBI investigation or due to his professional contacts with the Bureau. These excerpts range from 1956 to 2000.

 Gold, Victor – [8 Pages, 4.5MB] – Victor “Vic” Gold (September 25, 1928 – June 5, 2017) was an American journalist, author, and Republican political consultant. Gold began his career as a lawyer and advisor to the Democratic Party in Alabama before switching to the Republican Party. He worked as deputy press secretary for Senator Barry Goldwater during the 1964 presidential election and press secretary for Vice President Spiro T. Agnew from 1970 to 1973. Gold left politics for a time to work as a writer and political commentator, returning in 1979 as a speechwriter to the presidential campaign of George H. W. Bush and was an advisor to Bush’s 1988 and 1992 campaigns. Later in life, Gold split with the Republicans over issues including the 2003 invasion of Iraq and formally left the party in 2016.

 Graham, Philip Leslie – [27 Pages, 15.4 MB] –  Philip Leslie “Phil” Graham (July 18, 1915 – August 3, 1963) was an American newspaper publisher. He was the publisher (from 1946 until his death) and co-owner (from 1948) of The Washington Post.Continue scrolling for more…

He was married to Katharine Graham, the daughter of Eugene Meyer, the previous owner of The Washington Post.

 Griffith, Sanford – [HQ-1 File 21.08MB | NYC-1 File 35.14M ] – [ 520 Total Pages ] –  Sanford Griffith was born in 1893. He studied at Heidelberg University but on the outbreak of the First World War he fled to France and joined the French Army. In 1918 he transferred to the US Army. Griffith reached the rank of major and was involved in interrogating German prisoners. In 1940 Griffith was recruited by William Stephenson, the head of British Security Coordination (BSC). He now established his company Market Analysts Incorporated and was commissioned to carry out polls for the Committee to Defend America by Aiding the Allies. The organisation was headed by William Allen White who gave an interview to the Chicago Daily News about his intentions: “Here is a life and death struggle for every principle we cherish in America: For freedom of speech, of religion, of the ballot and of every freedom that upholds the dignity of the human spirit… Here all the rights that common man has fought for during a thousand years are menaced… The time has come when we must throw into the scales the entire moral and economic weight of the United States on the side of the free peoples of Western Europe who are fighting the battle for a civilized way of life.” It was not long before White’s organization had 300 chapters nationwide.

 Halle, Kay – [77 Pages, 50.7MB] Halle, Kay – [28 Pages, 13.5MB] – Kay Halle, born in 1903 in Cleveland, Ohio, was a notable American journalist, author, and broadcaster renowned for her multifaceted career and social influence. Her journalism career blossomed in the 1930s, where she worked as a radio commentator and columnist, gaining prominence for her incisive reporting and interviews with significant figures of the era. Halle was also a literary figure, authoring several books, including biographies and collections of humor. Beyond her professional achievements, she was a celebrated hostess in Washington, D.C., known for her salons that gathered politicians, journalists, and celebrities. Her social circle included Presidents, diplomats, and notable figures like Winston Churchill. Halle’s life reflected a blend of journalistic integrity, literary talent, and a unique knack for connecting influential personalities, making her a significant figure in mid-20th-century American media and society.

 Hastings, Michael – [21 Pages, 1.5 MB] – Michael M. Hastings (1980-2013), was a journalist and author. This release of a 6/11/2012 FBI document and its attachments (21 pages total) consists of the only material found in FBI records mentioning Hastings. No FBI records indicate an investigative interest in Hastings.The National Security Agency will neither confirm nor deny records related to Hastings — NSA Denial Letter

 Hillman Periodicals – [77 Pages, 50.7MB] –  Hillman Periodicals, Inc. was an American magazine and comic book publishing company founded in 1938 by Alex L. Hillman, a former New York City book publisher. It is best known for its true confession and true crime magazines; for the long-running general-interest magazine Pageant; and for comic books including Air Fighters Comics and its successor Airboy Comics, which launched the popular characters Airboy and The Heap.

 Inside Story Magazine – [ 23 Pages, 55 MB ] –  Take a look back in time when the public would assist the FBI with news tips and leads. Throughout the 1950s and 1960s, there was a periodical known as “Inside Story”. In it, were news articles, some of which, concerning the FBI. This file (obtained from the National Archives), offers the articles and corresponding letters the FBI received, clipped from this magazine.

 Jennings, Peter – [61 Pages, 28.4MB] –  Peter Charles Archibald Ewart Jennings, CM (July 29, 1938 – August 7, 2005) was a Canadian-American journalist and news anchor. He was the sole anchor of ABC World News Tonight from 1983 until his death in 2005 of complications from lung cancer. A high-school dropout, he transformed himself into one of American television’s most prominent journalists.

 Kaplow, Herbert – [17 Pages, 2.91 MB] –  Herbert Elias “Herb” Kaplow (February 2, 1927 – July 27, 2013) was an American television news correspondent. His main focus was reporting out of Washington, D.C., covering presidential campaigns and those who were elected.

 Krassner, Paul – FBI Release #1 – [362 Pages, 161MB] Krassner, Paul – FBI Release #2 – [193 Pages, 129MB] – Paul Krassner (1932-2019) was an influential American satirist, journalist, and activist, best known as the founder and editor of The Realist, a groundbreaking satirical magazine that played a pivotal role in the countercultural movements of the 1960s. Blending humor with pointed social critique, Krassner tackled controversial topics, challenging political norms and censorship. He was also a key figure in the Yippie movement and co-founded the Youth International Party, using satire and activism to oppose war and support civil liberties. His irreverent writing style and fearless approach to taboo subjects solidified his legacy as a provocateur who shaped alternative journalism.

 Morley, Felix – [5 Pages, 1.5MB] – Felix Muskett Morley (1894-1982) was a distinguished American journalist, editor, and educator known for his contributions to political commentary and journalism. He served as the editor of the Washington Post from 1933 to 1940, during which the newspaper earned its first Pulitzer Prize for Public Service in 1936. A staunch advocate for individual liberties and limited government, Morley was also a prominent voice in the American conservative movement. He authored several influential books and essays, often emphasizing the importance of federalism and constitutionalism. In addition to his editorial work, Morley was an accomplished academic, teaching at Haverford College and later becoming the president of the institution. His legacy continues to be honored for his commitment to journalistic integrity and principled political thought.

 Pearl, Daniel – [21 Pages, 8.2MB] –  Daniel Pearl (October 10, 1963 – February 1, 2002) was a journalist for the Wall Street Journal with American and Israeli citizenship. He was kidnapped by Pakistani terrorists and later murdered in Pakistan.  Pearl was kidnapped while working as the South Asia Bureau Chief of The Wall Street Journal, based in Mumbai, India. He had gone to Pakistan as part of an investigation into the alleged links between British citizen Richard Reid (known as the “shoe bomber”) and Al-Qaeda. Pearl was killed by his captors.  In July 2002, Ahmed Omar Saeed Sheikh, a British national of Pakistani origin, was sentenced to death by hanging for Pearl’s abduction and murder.  In March 2007, at a closed military hearing in Guantánamo Bay, Khalid Sheikh Mohammed, a member of Al-Qaeda, claimed that he had personally beheaded Pearl.  Researchers have also connected Al-Qaeda member Saif al-Adel with the kidnapping.

 Reston, James B. “Scotty” – FBI Release #1 – [25 Pages, 17.7 MB] Reston, James B. “Scotty” – FBI Release #2 – [79 Pages, 45.8 MB] Reston, James B. “Scotty” – FBI Release #3 – [29 Pages, 16.7 MB] Reston, James B. “Scotty” – FBI Release #4 – [26 Pages, 18.5 MB] – James Reston, born in Clydebank, Scotland, on November 3, 1909, was a prominent American journalist and editor. Known for his extensive career at The New York Times, Reston served as both a correspondent and a columnist, eventually becoming the paper’s executive editor. He was a key figure in political journalism, covering significant events such as World War II, the Korean War, and the Vietnam War. Reston was awarded two Pulitzer Prizes for his insightful reporting and influential commentary. His work earned him a reputation as a trusted voice in American journalism until his retirement in 1989. Reston passed away on December 6, 1995, leaving behind a legacy of journalistic excellence.

 Safer, Morley – [14 Pages, 7.9 MB] –  Morley Safer (November 8, 1931 – May 19, 2016) was a Canadian-American broadcast journalist, reporter, and correspondent for CBS News. He was best known for his long tenure on the news magazine 60 Minutes, whose cast he joined in 1970 after its second year on television. He was the longest-serving reporter on 60 Minutes, the most watched and most profitable program in television history.

 Sokolsky, George – [50 Pages, 3.62 MB] –  George Ephraim Sokolsky (1893–1962) was a weekly radio broadcaster for the National Association of Manufacturers and a columnist for The New York Herald Tribune, who later switched to The New York Sun and other Hearst newspapers.

 Smith, Robert – [89 Pages, 17.2MB] – Robert Ellis Smith (September 6, 1940 – July 25, 2018) was an American attorney, author, and a publisher/journalist whose focus is mainly privacy rights.

 Snell, David – [5 Pages, 1MB] –  David Snell (March 28, 1921 – July 1987) was a reporter and cartoonist for Life Magazine, a major 20th-century magazine, and several other publications during his career as a journalist.

 Strong, Anna – FBI Release #1 – [37 Pages, 2.8MB] Strong, Anna – FBI Release #2 – [104 Pages, 9.65MB] – Anna Louise Strong (November 24, 1885 – March 29, 1970) was an American journalist and activist, best known for her reporting on and support for communist movements in the Soviet Union and the People’s Republic of China. She wrote over 30 books and varied articles.

 Thomas, Helen – [7 Pages, 0.5 MB] –  Helen Amelia Thomas (August 4, 1920 – July 20, 2013) was an American author and news service reporter, member of the White House press corps and opinion columnist. She worked for the United Press and post-1958 successor United Press International (UPI) for 57 years, first as a correspondent, and later as White House bureau manager. She was a columnist for Hearst Newspapers from 2000 to 2010, writing on national affairs and the White House. She covered the administrations of eleven U.S. presidents—from the final years of the Eisenhower administration to the second year of the Obama administration.

 Voice of America – [827 Pages, 47.5MB] –  The Voice of America, which first went on the air in 1942, is an international multimedia broadcasting service funded by the U.S. government through the Broadcasting Board of Governors. VOA broadcasts approximately 1,500 hours of news, information, educational, and cultural programming every week to an estimated worldwide audience of 125 million people.
There are an additional, approximately,  8,750 pages of material on Voice of America. To obtain this material, it would be $265.  If anyone is interested in sponsoring this file, let me know, and I will obtain it and put it all online.

  Wallace, Myron Leon “Mike” – [50 Pages, 3.62 MB] –  Myron Leon “Mike” Wallace (1918-2012) was a well-known American journalist. This release consists of two parts. The first concerns a foreign counterintelligence file opened about Wallace’s 1970 trip to Cuba (pp.1-5) and the second an investigation into a threatening letter sent to Wallace (pp.6-50).

 Walters, Barbara – [12 Pages, 3.5MB] –  Barbara Jill Walters, born on September 25, 1929, and passing away on December 30, 2022, was a renowned American broadcast journalist and television personality. Her career in journalism spanned from 1951 until her retirement in 2015. Walters became a household name due to her exceptional interviewing skills and her popularity with television viewers. She hosted numerous significant television programs, including “Today,” “ABC Evening News,” “20/20,” and “The View.” Her contributions to the field of journalism were widely recognized, earning her induction into the Television Hall of Fame in 1989, a Lifetime Achievement Award from the National Academy of Television Arts and Sciences (NATAS) in 2000, and a star on the Hollywood Walk of Fame in 2007​​.

  Whitehead, Don – [118 Pages, 13.40MB] –  Don Whitehead (April 8, 1908 in Inman, Virginia – January 12, 1981) was an American journalist. He was awarded the Medal of Freedom. He won the 1950 George Polk Award for wire service reporting.
Mr. Whitehead wrote The FBI Story A Report to the People, in which the FBI admits there are 3,843 pages, and it would be $115 to retrieve this file on CD. If you are interested in sponsoring this file, write to contact@theblackvault.com

FBI Files: Journalists and their Periodicals Read More »

1 woman uses neuralink to write name with her mind

Woman uses Neuralink to write name with her mind

NEWYou can now listen to Fox News articles!
Audrey Crews hasn’t written her name in over 20 years, that is, until now. Thanks to a brain chip from Elon Musk’s Neuralink, Crews used only her thoughts to scribble “Audrey” on a laptop screen. She shared the photo on X, stunning millions across the internet and earning a shoutout from Musk himself.NONINVASIVE BRAIN TECH AND AI MOVES ROBOTIC HAND WITH THOUGHT Brain-computer interface. (Neuralink)Audrey Crews becomes the first woman to receive a Neuralink implantAt age 16, Crews lost all motor function. Now, at 39, she’s part of Neuralink’s PRIME Study, which tests brain-computer interface (BCI) technology in humans. Her chip, implanted into her motor cortex, reads brain signals and sends them to a computer. It allows her to move a cursor and type, using only her thoughts.In her own words, “They drilled a hole in my skull and placed 128 threads into my motor cortex. The chip is about the size of a quarter.”While the chip doesn’t restore movement, it gives her something powerful: digital autonomy. She shared a picture of her signature on X and wrote, “I tried writing my name for the first time in 20 years. I’m working on it. Lol #Neuralink.”She expressed her gratitude toward the medical team at the University of Miami Health Center. “They treated me like a VIP and are some of the sweetest people I’ve ever met,” she added. Audrey Crews shared a picture of her signature on X. (@NeuraNova9/X))Audrey Crews controls a computer with her mind using a brain chipMusk confirmed her achievement online, writing: “Most people don’t realize this is possible.”That single quote shook the internet. The post showcasing her scribbled signature quickly went viral, with over 2 million views. Crews clarified that the chip is for “telepathy only,” not mobility. But even that level of control can transform the lives of people with paralysis.Neuralink, founded by Musk in 2016, aims to help people with neurological conditions connect with the digital world in powerful new ways. The company is developing BCIs that allow users to control devices using only their thoughts. While still in its early stages, this technology is already showing life-changing potential. Looking ahead, Neuralink envisions a future where thought-controlled computing becomes an everyday part of human life.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Neuralink trial expands: P8 Nick Wray shares his brain chip experienceCrews isn’t alone in this journey. Another participant, Nick Wray (P8), shared his progress just days after his own implant activation.”I haven’t had this level of digital autonomy in years,” he wrote.Diagnosed with ALS, Wray called the implant a life-changing opportunity. He views this moment as both personal and historical, writing, “It’s not lost on me that without ALS, I would never have been a candidate for this study. I sincerely believe that if ALS is the price of admission to an opportunity of this magnitude, you pay it; gladly, willingly, and without hesitation.” BCI Neuralink participant Nick Wray. (@Telepath_8/X)What this means for youThis isn’t just about writing a name. It’s about what’s coming next. Neuralink’s brain chip is working in real people. If you’re wondering whether brain-computer interfaces could one day let you control your phone, write an email or play a game without touching a screen, that future is inching closer. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile still experimental, these breakthroughs are a glimpse into a new kind of human-machine connection. Neuralink is now accepting participants from around the globe. If you’re curious about brain-computer interfaces, this could be your chance to help shape the future. You can check it out at https://neuralink.com/trials Brain-computer interface. (Neuralink)Kurt’s key takeawaysAudrey Crews rewrote more than her name. She rewrote the limits of what’s possible. With a chip the size of a quarter, she became the first woman to control a computer using pure thought. Her story isn’t just inspiring, it’s a warning to the tech world: the age of mind-powered machines is arriving faster than expected.CLICK HERE TO GET THE FOX NEWS APPWould you volunteer to be part of a brain-computer trial like Audrey and Nick? Or do you think it is too early to trust this technology?  Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com.  All rights reserved.  

Woman uses Neuralink to write name with her mind Read More »

mark zuckerberg meta superintelligence

Fox News AI Newsletter: Your own personal ‘superintelligence’

CEO of Meta Mark Zuckerberg arrives for a Senate Judiciary Committee hearing with representatives of social media companies at the Dirksen Senate Office Building on Jan. 31, 2024, in Washington, D.C. (Matt McClain/The Washington Post via Getty Images)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Zuckerberg wants to give everyone their own personal superintelligence through Meta’s new vision- Nvidia denies ‘backdoors’ in chips after China raises security concerns- Microsoft joins exclusive $4T market cap club after AI surge, joining only one other company Screenshot from a video showing a Unitree H1 humanoid robot flailing violently during a test (CIX/X)AI FOR ALL: Meta CEO Mark Zuckerberg on Wednesday announced the tech giant will focus on developing a personal superintelligence for everyone, which will further enable creative and leisurely pursuits.PUSHING BACK: Tech giant Nvidia said on Thursday that its chips do not contain any “backdoors” that would allow others to remotely access or control them, following concerns from China over the security of the company’s H20 artificial intelligence chip.EXCLUSIVE CLUB : Microsoft touched $4 trillion in market cap Thursday, joining Nvidia as the only two companies to reach this level. REGULATORY RECALL: The Trump administration’s DOGE developed a new tool that leverages artificial intelligence (AI) to review federal regulations for potential elimination, according a new report.ROBOT RAMPAGE: A jaw-dropping video showing a Unitree H1 humanoid robot flailing violently during a test has captured the internet’s attention and sparked a new wave of concern about the safety of advanced robotics. Illustration of a man using AI for health advice  (Kurt “CyberGuy” Knutsson)DIGITAL DOCTOR BOOM: A growing number of Americans are now using artificial intelligence to manage their health and wellness.DIGITAL DECEPTION: Two U.S. judges in separate federal courts scrapped their rulings last week after lawyers alerted them to filings that contained inaccurate case details or seemingly “hallucinated” quotes that misquoted cited cases — the latest in a string of errors that suggest the growing use of artificial intelligence in legal research and submissions.DIGITAL TAKEOVER: OpenAI just took a big leap forward with artificial intelligence. ChatGPT agent acts as more than just a chatbot; it serves as a real assistant that takes action on your behalf. We’re talking about planning trips, managing your email, making dinner reservations, summarizing long reports, and even running code, all with your permission.TECH POWER PLAY: Artificial intelligence is no longer a niche tool for tech labs or science-fiction thrillers. It’s now the battleground where the future of American power, prosperity, and freedom will be decided. With the release of “Winning the AI Race: America’s AI Action Plan,” the Trump administration is rightfully treating this moment as the 21st-century equivalent of the space race or the nuclear age.ROBOT ON WHEELS: Walking up to your car and seeing it recognize you, light up with a digital smile and respond to your voice used to be something only seen in TV shows and movies.DIGITAL POWER DRAIN: If your electricity bill seems shockingly high, you’re not imagining it. A big part of the spike is being driven by rising artificial intelligence electricity demand. AI data centers are expected to strain the U.S. electrical grid. (Kurt “CyberGuy” Knutsson)Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Your own personal ‘superintelligence’ Read More »