memoment editorial

Trans Neptunian Object 120x120 1

This Weird New Space Telescope Concept Could Revolutionize the Search for Alien Life

Rethinking the shape of space telescopes may be the answer to the seemingly insurmountable challenges facing missions to detect alien life today, according to a recent paper published in Frontiers in Astronomy and Space Sciences.
With the Earth being the only planet currently known to support life, scientists remain hopeful about the prospect of eventually discovering conclusive evidence of extraterrestrials. Yet the long-running question of “where is everybody?” still faces many challenges in the hunt for an answer.
Life in the Cosmos
“The Earth supports the only known life in the universe, all of it depending heavily on the presence of liquid water to facilitate chemical reactions,” said lead author Prof Heidi Newberg of Rensselaer Polytechnic Institute. “While single-celled life has existed almost as long as the Earth itself, it took roughly three billion years for multicellular life to form. Human life has existed for less than one 10 thousandth of the age of the Earth.”
This means that while many water-bearing planets could harbor life, it’s unlikely such life would be capable of reaching us. Researchers will therefore need technological means to bridge the vast distances of space. Unfortunately, as physics is currently understood, traveling—or even communicating—faster than light is impossible, sharply limiting the number of planets that can be studied within a human lifetime.
Even among nearby planets, not every world with water is a good candidate. A long-lived host star similar to our sun is also required for life to arise and evolve. By these criteria, around 60 stars within 30 light-years make the list. Researchers are most hopeful about Earth-like planets in those systems, where liquid water and solid ground provide a familiar foundation for life.
The Challenges of Observation
A major obstacle is distinguishing planets from the intense glare of their stars. Planets with liquid water emit most of their light at 10-micron wavelengths, about the width of a human hair. To separate an Earth-like planet’s light from its sun at 30 light-years away, a telescope would need a diameter of at least 20 meters and would have to operate in space to avoid atmospheric distortion.
Such a telescope exceeds today’s capabilities. The James Webb Space Telescope (JWST), the largest built so far, is just 6.5 meters across. One proposed workaround is to launch multiple smaller telescopes that fly in precise formation, functioning as a single larger telescope. But maintaining such alignment in space remains as difficult as building a 20-meter telescope outright.
Changing the Shape of Space Telescopes
The new research suggests that altering telescope geometry could solve the problem. Instead of a circular 6.5-meter mirror, the design calls for a rectangular mirror 20 meters wide but only one meter tall. Operating at a wavelength of about 10 microns—similar to JWST—the telescope’s mirror would be oriented so its long axis aligns with the target star and planet.
“We show that this design can, in principle, find half of all existing Earth-like planets orbiting sun-like stars within 30 light-years in less than three years,” said Prof. Newberg. “While our design will need further engineering and optimization, it avoids the steep technological hurdles of other leading concepts.”

If even one Earth-like planet orbits a typical sun-like star, the telescope could identify as many as 30 promising targets for SETI. Follow-up studies might then search for biosignatures, such as evidence of photosynthesis.
“For the most promising candidate, we could dispatch a probe that would eventually beam back images of the planet’s surface,” said Prof. Bergman. “The rectangular telescope could provide a straightforward path toward identifying our sister planet: Earth 2.0.”
The paper, “The Case for a Rectangular Format Space Telescope for Finding Exoplanets,” appeared in Frontiers in Astronomy and Space Sciences on September 1, 2025.
Ryan Whalen covers science and technology for The Debrief. He holds an MA in History and a Master of Library and Information Science with a certificate in Data Science. He can be contacted at ryan@thedebrief.org, and follow him on Twitter @mdntwvlf.

This Weird New Space Telescope Concept Could Revolutionize the Search for Alien Life Read More »

HD HHI HD HMD

HD Hyundai Heavy Industries to merge with HD Hyundai Mipo

HD Korea Shipbuilding & Offshore Engineering (HD KSOE), the intermediate holding company of HD Hyundai’s shipbuilding division, has announced a sweeping restructuring of its business ahead of the launch of the U.S.–Korea shipbuilding cooperation project known as MASGA (Make American Shipbuilding Great Again).

On August 27, the boards of HD Hyundai Heavy Industries (HHI) and HD Hyundai Mipo Dockyard (HMD) approved a merger plan under which HHI will remain as the surviving entity. Shareholders of HMD will be allocated new HHI shares at a ratio of 0.4059146 HHI shares for each HMD common share. Following shareholder meetings and antitrust reviews, the two companies are scheduled to be officially integrated as the new HD Hyundai Heavy Industries in December 2025.

HD KSOE described the restructuring as a strategic move to achieve both quantitative and qualitative scale, maximize synergies, and secure a commanding lead in the global market through proactive development of cutting-edge technologies. The restructuring also follows trends in competing nations: both China and Japan have completed mergers of their largest shipbuilders in recent years to strengthen competitiveness.

The merger combines the strengths of HHI, the world’s largest shipbuilder with extensive expertise in large-scale vessels and advanced naval defense technologies, and HMD, a leading mid-sized shipbuilder with specialized docks, facilities, and a skilled workforce well-suited for naval ship construction.

The unified entity is expected to broaden its market reach, accelerate its entry into the fast-growing naval defense sector, and enhance overall competitiveness. HHI already holds the largest track record for naval ship construction and exports in South Korea, while HMD’s infrastructure provides the scale and flexibility needed to capture new contracts.

The restructuring comes as demand for Korean defense exports is expected to grow, bolstered by the MASGA project and heightened global interest in strengthening naval capabilities. The integration is positioned to significantly strengthen HD Hyundai’s role in the defense shipbuilding market, which is expanding in line with global naval modernization programs. The company has set an ambitious target of achieving ₩10 trillion (approx. $7.4 billion) in annual defense sales by 2035.

In addition, the combined shipbuilder plans to expand its presence in special-purpose vessels such as icebreakers, where demand is rising with Arctic development, and to capture new opportunities in the eco-friendly ship segment.

By consolidating R&D and design resources, the company expects to apply new green technologies across both medium and large vessels, while lowering development risks, cutting costs, and accelerating time-to-market in response to tightening environmental regulations.

To strengthen its global reach, HD KSOE will also establish an overseas investment corporation in Singapore this December in partnership with the integrated HHI.

The new entity will manage existing overseas yards, including HD Hyundai Vietnam Shipbuilding, HD Hyundai Heavy Industries Philippines, and the provisionally named HD Hyundai Vina, while also scouting new yards and partnerships. The Singapore hub will streamline decision-making, improve competitiveness in the merchant ship segment where Chinese yards dominate, and spearhead HD Hyundai’s international growth strategy.

“This business reorganization reflects our strategic commitment to pursue a ‘broader market’ and ‘stronger shipbuilding.’ With the launch of the integrated HD Hyundai Heavy Industries, we will expand our global footprint, secure technological leadership, and position ourselves at the forefront of the future shipbuilding industry.”

HD KSOE spokesperson

HD Hyundai Heavy Industries to merge with HD Hyundai Mipo Read More »

u214

TKMS Emerges as Frontrunner for India’s Submarine Contract

In India, there are growing indications that German naval shipbuilder TKMS and its local partner could be commissioned to deliver six Type 214 submarines.

By Lars Hoffmann / Hartpunkt

This week, The Times of India newspaper reported that the Ministry of Defense and the state-owned company Mazagon Dockyards Limited (MDL) have been given the go-ahead to begin contract negotiations with TKMS. According to the article, these could possibly begin in August and be concluded within six months. However, no official statements on the project have been made.

In the end, only the Spanish state-owned shipyard Navantia remained in the running for the billion-dollar project. Indian media then reported at the beginning of the year that Navantia was unable to meet the requirements, particularly with regard to air-independent propulsion (AIP).

At the beginning of January, TKMS confirmed in response to an inquiry from hartpunkt that the group and its partner were the only bidders still in the procurement process. The company wrote in a statement that it had been informed by Mazagon Dockyard Ltd. (MDL) that the joint bid for the P75(I) project had been deemed compliant by the Indian Ministry of Defense and approved for further processing.

Observers consider it unlikely but not impossible that there will be an official announcement about the project during Foreign Minister Johann Wadephul’s visit to India next week.

This article by Lars Hoffman was originally published in German language at Hartpunkt.de. It has been translated and republished with authorization.

TKMS Emerges as Frontrunner for India’s Submarine Contract Read More »

Ekran goruntusu 2025 08 31 234441

Ukraine strikes Russian Project 21631 Buyan-M class corvette with drones

Tayfun Ozberk

Tayfun Ozberk is a former naval officer who is expert in Above Water Warfare especially in Littoral Waters. He has a Bachelor Degree in Computer Science. After serving the Turkish Navy for 16 years, he started writing articles for several media. Tayfun also offers analysis services on global naval strategies. He’s based in Mersin, Turkey.

Ukraine strikes Russian Project 21631 Buyan-M class corvette with drones Read More »

Solar Orbiter traces superfast electrons back to Sun pillars

Double trouble: Solar Orbiter traces superfast electrons back to Sun

Science & Exploration

01/09/2025
966 views
23 likes

The European Space Agency-led Solar Orbiter mission has split the flood of energetic particles flung out into space from the Sun into two groups, tracing each back to a different kind of outburst from our star.

The Sun is the most energetic particle accelerator in the Solar System. It whips up electrons to nearly the speed of light and flings them out into space, flooding the Solar System with so-called ‘Solar Energetic Electrons’ (SEEs).Researchers have now used Solar Orbiter to pinpoint the source of these energetic electrons and trace what we see out in space back to what’s actually happening on the Sun. They find two kinds of SEE with clearly distinct stories: one connected to intense solar flares (explosions from smaller patches of the Sun’s surface), and one to larger eruptions of hot gas from the Sun’s atmosphere (known as ‘coronal mass ejections’, or CMEs).

“We see a clear split between ‘impulsive’ particle events, where these energetic electrons speed off the Sun’s surface in bursts via solar flares, and ‘gradual’ ones associated with more extended CMEs, which release a broader swell of particles over longer periods of time,” says lead author Alexander Warmuth of the Leibniz Institute for Astrophysics Potsdam (AIP), Germany.A clearer connectionWhile scientists were aware that two types of SEE event existed, Solar Orbiter was able to measure a large number of events, and look far closer to the Sun than other missions had, to reveal how they form and leave the surface of our star.

Solar flare seen by EUI and STIX

Coronal mass ejection seen by Metis

“We were only able to identify and understand these two groups by observing hundreds of events at different distances from the Sun with multiple instruments – something that only Solar Orbiter can do,” adds Alexander. “By going so close to our star, we could measure the particles in a ‘pristine’ early state and thus accurately determine the time and place they started at the Sun.”The study is the most comprehensive of SEE events to date, and produces a catalogue that will only grow through Solar Orbiter’s lifetime. It used eight of Solar Orbiter’s ten instruments to observe more than 300 events between November 2020 and December 2022.“It’s the first time we’ve clearly seen this connection between energetic electrons in space and their source events taking place at the Sun,” adds co-author Frederic Schuller, also of AIP.“We measured the particles in situ – that is, Solar Orbiter actually flew through the electron streams – using the probe’s Energetic Particle Detector, while simultaneously using more of the spacecraft’s instruments to observe what was happening at the Sun. We also gathered information about the space environment between the Sun and spacecraft.”

Solar Orbiter’s instruments

Flight delaysThe researchers detected the SEE events at different distances from the Sun. This let them study how the electrons behave as they travel through the Solar System, answering a lingering question about these energetic particles.When we spot a flare or a CME, there’s often an apparent lag between what we see taking place at the Sun, and the release of energetic electrons into space. In extreme cases, the particles seem to take hours to escape. Why?

“It turns out that this is at least partly related to how the electrons travel through space – it could be a lag in release, but also a lag in detection,” says co-author and ESA Research Fellow Laura Rodríguez-García. “The electrons encounter turbulence, get scattered in different directions, and so on, so we don’t spot them immediately. These effects build up as you move further from the Sun.”The space between the Sun and the planets of the Solar System isn’t empty. A wind of charged particles streams out from the Sun constantly, dragging the Sun’s magnetic field with it. It fills space and influences how the energetic electrons travel; rather than being able to go where they like, they are confined, scattered, and disturbed by this wind and its magnetism.

The study fulfils an important goal of Solar Orbiter: to continuously monitor our star and its surroundings to trace ejected particles back to their sources at the Sun.“Thanks to Solar Orbiter, we’re getting to know our star better than ever,” says Daniel Müller, ESA Project Scientist for Solar Orbiter. “During its first five years in space, Solar Orbiter has observed a wealth of Solar Energetic Electron events. As a result, we’ve been able to perform detailed analyses and assemble a unique database for the worldwide community to explore.”

Keeping Earth safe

Crucially, the finding is important for our understanding of space weather, where accurate forecasting is essential to keep our spacecraft operational and safe. One of the two kinds of SEE events is more important for space weather: that connected to CMEs, which tend to hold more high-energy particles and so threaten far more damage. Because of this, being able to distinguish between the two types of energetic electrons is hugely relevant for our forecasting.“Knowledge such as this from Solar Orbiter will help protect other spacecraft in the future, by letting us better understand the energetic particles from the Sun that threaten our astronauts and satellites,” adds Daniel. “The research is a really great example of the power of collaboration – it was only possible due to the combined expertise and teamwork of European scientists, instrument teams from across ESA Member States, and colleagues from the US.”

Looking ahead, ESA’s Vigil mission will pioneer a revolutionary approach, operationally observing the ‘side’ of the Sun for the first time, unlocking continuous insights into solar activity. To be launched in 2031, Vigil will detect potentially hazardous solar events before they come into view as seen from Earth, giving us advance knowledge of their speed, direction and chance of impact.Our understanding of how our planet responds to solar storms will also be investigated further with the launch of ESA’s Smile mission next year. Smile will study how Earth endures the relentless ‘wind’, and sporadic bursts, of fierce particles thrown our way from the Sun, exploring how the particles interact with our planet’s protective magnetic field.

Solar Orbiter is a space mission of international collaboration between ESA and NASA, operated by ESA.Notes for editors‘CoSEE-Cat: a Comprehensive Solar Energetic Electron event Catalogue obtained from combined in-situ and remote-sensing observations from Solar Orbiter’ by A. Warmuth et al. is published today in Astronomy & Astrophysics. The results are compiled in a publicly accessible online event catalogue, the Comprehensive Solar Energetic Electron event Catalogue (CoSEE-Cat): https://coseecat.aip.de/More information on the capabilities and leading institutions for each of the instruments used in this study – EPD, STIX, EUI, RPW, Metis, SoloHI, SWA, and MAG – is available here: https://www.esa.int/ESA_Multimedia/Images/2020/01/Solar_Orbiter_s_instrumentsMore about Solar Orbiter: https://www.esa.int/Science_Exploration/Space_Science/Solar_OrbiterMore about Vigil: https://www.esa.int/Space_Safety/VigilMore about Smile: https://www.esa.int/Science_Exploration/Space_Science/SmileVisit ESA’s Space Weather Service Network: https://swe.ssa.esa.int/ or read more about ESA’s space weather activities: https://www.esa.int/Space_Safety/Space_weather For more information, please contact ESA Media Relations, media@esa.int

Like
Thank you for liking
You have already liked this page, you can only like it once!

Double trouble: Solar Orbiter traces superfast electrons back to Sun Read More »

redd cockpit technology pkg.00 00 25 10.still001

Pilots test first-of-its-kind cockpit alert system that detects possible collisions on runways

NEWYou can now listen to Fox News articles!
KANSAS CITY, Mo. – Engineers are in the final testing phase of a cockpit alert system they say could prevent close calls on the runway. Honeywell Aerospace’s “Surface Alert System,” or “SURF-A,” can detect when a rogue aircraft gets in the way of another plane that has been cleared for takeoff or landing. The system gives pilots two aural alerts when an unauthorized aircraft enters the runway on a collision course with the authorized aircraft. The first alert sounds 30 seconds before a collision, and the second alert sounds 15 seconds before a collision.”It sounds like such a small amount of time, but things happen so rapidly, and 15 to 30 seconds is actually a very, very large margin when you’re moving at the speeds that we’re moving in an aircraft like this,” Honeywell Test Pilot Doug Rybczynski said. The aural call-out includes an automated voice that says, “traffic on runway.” “It’s a very good, I would say direct, call out,” Rybczynski said. TRUMP PICK FOR UN AVIATION OFFICE HAS LONG HISTORY DONATING TO DEMS, NIKKI HALEY SURF-A gives pilots two aural warnings when they are on a collision course with another plane during takeoff and landing. The first alert sounds 30 seconds out from collision, and the second alert sounds 15 seconds out.  (Honeywell Aeroscpace)The Honeywell crew flew from the Kansas City Downtown airport in Missouri to Topeka, Kansas. On Test Flight 757’s approach to Topeka, a Honeywell crew member parked a smaller Gulfstream aircraft at the end of the runway, triggering the SURF-A alert system. After hearing both alerts, the pilot performed a “go-around” maneuver. The demonstration simulated a 2023 close call at the Austin-Bergstrom International Airport in Austin, Texas. In that scenario, a FedEx B767 was cleared to land in poor conditions. As the FedEx plane got closer, the pilots noticed a Southwest Airlines B737 lined up on the runway below them. The FedEx pilots were able to perform a last-second go-around maneuver to avoid a collision, but Honeywell says the SURF-A system, which wasn’t around at the time, would have given the pilots an additional 28 seconds of notice. DUFFY’S DOT ACCUSES BIDEN, BUTTIGIEG OF INFLATING AIR TRAFFIC CONTROLLER PIPELINE: ‘JUICED THE NUMBERS’SURF-A relies on Federal Aviation Administration-mandated technology called “Smart X,” and it has been around since 2008. It lets pilots know if they are taking off on a taxiway, and if they are coming in for a landing too fast or too high. Honeywell started developing the SURF-A system in 2020 when the aviation industry noticed more close calls happening on runways. Using “ADS-B” Out technology, a GPS system that makes an airplane’s position known to other pilots, engineers were able to determine the trajectory of planes that are on a collision course.  Engineers on board Honeywell Test Flight 757 have been developing SURF-A since 2020. (Fox News)In 2024, the FAA reported 1,664 runway incursions, which is when an aircraft enters a runway without clearance. Seven of those involved two planes on a collision course.The FAA has reported 657 runway incursions so far in 2025. The Federal Aviation Administration reported 1,664 runway incursions in 2024. Seven of them involved planes on a collision course. (Fox News)”Shockingly, I think for a lot of passengers, there’s not an alert system available today to let you know that you’re about ready to run into another aircraft on the runway,” Thea Feyereisen, Honeywell Aerospace Distinguished Technical Fellow, said.FAA CANCELS NEWARK AIRPORT GROUND STOP AFTER ‘EQUIPMENT’ ISSUE AFFECTED RADIO FREQUENCIESThe FAA said the best way to eliminate runway incursions is to improve airport infrastructure by adding edge lights, pavement markers, signage, and by making taxiways less complicated. Since 2021, the FAA has given nearly $12 billion to airports across the country to improve airport infrastructure.  Honeywell engineers say pilots are ultimately the last line of defense to prevent runway incursions.  (Fox News)However, Feyereisen said pilots are ultimately the last line of defense.”Pilots have a shared destiny on the aircraft,” Feyereisen said. “The pilot can be doing everything correct, but on a path to disaster.”CLICK HERE TO GET THE FOX NEWS APPHoneywell Aerospace is pitching the prototype to major airlines, and hopes to have the system certified by September. Engineers said the system could be added to commercial flights in early 2026.

Pilots test first-of-its-kind cockpit alert system that detects possible collisions on runways Read More »

snail1 640x430 1

Research roundup: 6 cool science stories we almost missed

DOI: Archaeometry, 2025. 10.1111/arcm.70030  (About DOIs).
DOI: Journal of Medieval History, 2025. 10.1080/03044181.2025.2546884  (About DOIs).
Snails with eyes that grow back

Credit:

Alice Accorsi, UC Davis

It’s been known since at least the 18th century that some snails possess regenerative abilities, such as garden snails regrowing their heads after being decapitated. Golden apple snails can completely regrow their eyes—and those eyes share many anatomical and genetic features with human eyes, according to a paper published in the journal Nature Communications. That makes them an excellent candidate for further research in hopes of unlocking the secret to that regeneration, with the ultimate goal of restoring vision in human eyes.
Snails are often slow to breed in the lab, but golden apple snails are an invasive species and thrive in that environment, per co-author Alice Accorsi, a molecular biologist at the University of California, Davis. The snails have “camera type eyes”: a cornea, a lens to focus light, and a retina comprised of millions of photoreceptor cells. There are as many as 9000 genes that seem to be involved in regenerating an amputated eye in the snails, reducing down to 1,175 genes by the 28th day of the process, so complete maturation of the new eyes might take longer. It’s not clear whether the new eyes can still process light so the snails can actually “see,” which is a topic for further research.
Accorsi also used CRISPR/Cas9 to mutate one gene in particular (pax6) in snail embryos because it is known to control brain and eye development in humans, mice, and fruit flies. She found that apple snails with two non-functioning pax6 genes end up developing without eyes, suggesting it is also responsible for eye development in the snails. The next step is to figure out whether this gene also plays a role in the snails’ ability to regenerate their eyes, as well as other potentially involved genes.
DOI: Nature Communications, 2025. 10.1038/s41467-025-61681-6  (About DOIs).
Gorgeous glowing succulents

Credit:

Liu et al., 2025

Perhaps you caught the launch last year of the first genetically modified glowing plant: Light Bio’s  green-hued “Firefly Petunia.” It’s not a particularly bright glow and genetic engineering is expensive, but it was nonetheless a solid step toward the long-term goal of creating glow-in-the-dark plants for sustainable lighting. Scientists at South China Agricultural University came up with a novel, cheaper approach: injecting succulents with phosphorescent chemicals akin to those used in commercial glow-in-the-dark products, aka “afterglow luminescence.” They described the work in a paper published in the journal Matter.

Research roundup: 6 cool science stories we almost missed Read More »

1 leaked playlists expose secrets of powerful figures

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi

NEWYou can now listen to Fox News articles!
Vice President JD Vance is a big fan of the Backstreet Boys’ “I Want It That Way.” White House Press Secretary Karoline Leavitt gets pumped up with Beyoncé’s “Run the World (Girls).” And former Florida Attorney General Pam Bondi? She cranks Nelly’s “Hot In Herre.”That’s all, according to Panama Playlists, a website that quietly went live recently and claims to reveal the hidden music tastes of politicians, tech leaders and journalists.”I found the real Spotify accounts of celebrities, politicians and journalists. Many use their real names,” the anonymous site creator wrote. “With a little sleuthing, I could say with near-certainty: yep, this is them.”The anonymous researcher, who says they’ve been scraping accounts since summer 2024, insists they only used publicly available information. “I’ve been scraping their playlists for over a year. Some individuals even have a setting enabled that displays their last played song. I scraped this continuously, so I know what songs they played, how many times and when.” They also noted there is no affiliation with Spotify. The site itself frames the project as more playful than sinister.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA Vice President JD Vance’s playlist revealed “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” (Panama Playlists)Why leaked playlists matterAt first, this all feels like lighthearted gossip, but it points to a bigger issue: how much of our personal information is publicly available by default? A playlist can reveal mood, personality and even political leanings. When pieced together with other open-source data, these details help paint a surprisingly detailed portrait. The lesson? Privacy leaks don’t always involve hackers. Sometimes, it’s the platforms themselves leaving doors wide open. REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSWhat the Panama Playlists revealThe playlists range from ironic to eyebrow-raising, with some choices feeling almost too on the nose. Here are some of the highlights: JD VanceThe vice president’s “Making Dinner” playlist includes “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” His “Gold On The Ceiling” playlist adds eclectic picks like “What Makes You Beautiful” by One Direction, “You are a Tourist” by Death Cab for Cutie and “San Francisco” by The Mowgli’s.Karoline LeavittThe White House press secretary’s “Baby Shower” playlist featured Beyoncé’s “Run the World (Girls)” and Cyndi Lauper’s “Girls Just Want to Have Fun.” The timing matched her actual baby shower, further confirming the account.Sam AltmanThe OpenAI CEO’s “My Shazam Tracks” suggests he’s searched for “Get Ur Freak On” by Missy Elliott, George Ezra’s “Blame It on Me,” and David Guetta and OneRepublic’s “I Don’t Wanna Wait.”Pam BondiThe U.S. Attorney General’s playlist “Pam” includes “Hot In Herre” by Nelly, “Hands to Myself” by Selena Gomez and “Cold As Ice” by Foreigner. Playlists show Karoline Leavitt listening to Beyoncé’s “Run the World (Girls),” Sam Altman to Missy Elliott’s “Get Ur Freak On” and Pam Bondi to Nelly’s “Hot In Herre.” (Panama Playlists)Ron DeSantisThe Florida governor keeps it classic. His playlist includes “Ring of Fire” by Johnny Cash, Billy Joel’s “Piano Man,”and “Life Is a Highway” by Rascal Flatts.Mike JohnsonThe House Speaker has a Pandora account with Jerry Goldsmith’s “The Parachutes,” Enya’s “May It Be,” and Bryan Adams’ “One Night Love Affair.”Adam MosseriThe Instagram CEO’s playlist, “Hang,” shows a reflective and soulful side. It features “July” by Noah Cyrus and Leon Bridges, “River” by Leon Bridges, “Strangers” by The Kinks and Leonard Cohen’s “Famous Blue Raincoat.” He rounds it out with Otis Redding’s “(Sittin’ On) The Dock of the Bay” and Bobby Vinton’s “Mr. Lonely.”  Ron DeSantis, Mike Johnson and Adam Mosseri’s playlists revealed. (Panama Playlists)9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUTWhat Panama Playlists teaches usPanama Playlists demonstrate how a person’s music can clash with their public image, revealing hidden interests that shake expectations.Your tunes might be more visible than you think.Spotify’s default settings put playlists in public mode unless you switch them to private.This is less about guilty pleasures and more about digital exposure. The music you thought was just for your earbuds might already be telling a story about you to strangers. Tips to stay safe and protect your playlistIf you use Spotify, Apple Music, or YouTube Music, take a moment to review your privacy settings. Here’s how to protect yourself: 1) Make playlists privateTurn off public defaults. Only share playlists you intentionally want others to see.SpotifyDisable public visibility: Stop new playlists from being automatically public.Tap your profile picture in the upper left.Tap Settings and privacyClick Privacy and Social Toggle off Public playlists. Users can adjust their Spotify settings to make their playlists private. (Kurt “CyberGuy” Knutsson)Apple MusicOpen the Apple Music app on your iPhone or iPad.Tap your profile icon or picture in the upper right of the screen.Tap “View Profile.”On your profile page, tap “Edit.”Find the toggle for “Listening To” or “Allow Others to See What You’re Listening To” and turn it off to stop sharing your Apple Music listening activity. Steps on how to stop sharing your Apple Music listening activity. (Kurt “CyberGuy” Knutsson)YouTube MusicOpen the YouTube Music app and sign in.Tap your profile picture to go to your Library.Find the playlist you want to edit. Long-press on the playlist or open it and tap the three dots (…).Choose Edit playlist.Under Privacy, select the option you want:Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Tap Done or Save to confirm your choice.Note: There is no global setting to make all playlists private at once; you must adjust privacy for each playlist individually. The privacy setting is available when creating a new playlist or editing an existing one. For brand-new playlists, you’ll see a privacy selection box during playlist creation. 2) Review connected appsStreaming platforms often link to third-party apps. Revoke access for those you no longer use. 3) Limit what you sharePlaylist names, listening history and even likes reveal more than you think. 4) Use personal data removal servicesWhat looks like harmless fun, like a playlist name or your “last played” track, can actually become part of a bigger puzzle. A determined bad actor could stitch together your music history with other open-source data, such as your social posts, tagged photos, or even public records. Over time, those small details paint a surprisingly complete picture of your habits, locations, or private interests.That’s why reducing your overall digital footprint matters. Personal data removal services work to wipe your information from data broker sites, making it harder for anyone to cross-reference your listening habits with your identity. The less data floating around, the harder it is for someone to connect the dots in ways you never intended.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan. 5) Keep your software updatedPrivacy settings change often. Check regularly to ensure your preferences haven’t been reset and keep your software updated.  CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe playlist leak may feel like a punchline, but it serves as a real reminder. Our digital lives are stitched together from tiny details we often overlook. Even something as simple as your favorite workout jams can end up on display if you don’t take control. Privacy isn’t about hiding your personality. It’s about choosing what you share, and with whom.Would you be comfortable if your own playlists, every guilty pleasure and repeat listens were suddenly made public? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved. 

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi Read More »

ai toys kids playing

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids

NEWYou can now listen to Fox News articles!
Do AI chatbots packaged inside plush animals really help children, or do they threaten vital developmental milestones? Companies market them as “screen-free playmates” for toddlers, but pediatric experts warn these toys could trade human connection for machine conversation. Toys like Grem, Grok and Rudi are designed to bond with kids through voice and conversation. Instead of simply replacing screen time, they may replace something far more important: the role of parents and peers in emotional development.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.THIS EV HAS A FACE, AND IT TALKS BACK WITH AI AI-powered stuffed toys, such as Grem (left), could disrupt cognitive and emotional development among young children, experts say. (Curio/©Michael Cuviello/Amarillo Globe-News/USA Today Network/IMAGN)Why AI stuffed animals worry child expertsPediatricians and psychologists raise red flags about these AI toys. Young children naturally form attachments. If those attachments shift to chatbots, kids may learn to trust machines more than people. Research already shows children ages 3 to 6 sometimes trust robots more than humans, even when the robots give wrong answers. That undermines how kids build empathy, learn to question, and develop critical thinking. There are also privacy concerns. Parents may not realize that these “personalized” toys are recording conversations. Sensitive information could be stored, analyzed, or misused without families fully knowing. A-powered stuffed toy called Grok. Companies market AI-enhanced plushies as “screen-free playmates” for toddlers. (Curio)HOLLYWOOD TURNS TO AI TOOLS TO REWIRE MOVIE MAGICHow AI toys may disrupt child developmentPediatric experts in early childhood and language development warn that responsive AI could “fundamentally change the wiring of the human brain.” Unlike television or passive media, AI plushies respond in real time, adapting to a child’s questions, stories, and moods. That responsiveness can be powerful. It can encourage curiosity, vocabulary growth, and even creativity. But it can also crowd out human interactions, those subtle facial expressions, pauses, and “nos” that children need to experience to learn empathy and resilience. Another risk is that AI companions are trained to be overly charming and agreeable. Instead of challenging a child’s thinking, these “sycophantic” toys may simply tell kids what they want to hear. Over time, that could nudge children toward believing comforting lies instead of asking hard questions, a toxic pattern for developing critical thinking.  AI-powered stuffed toy called Gabbo. Pediatric experts in childhood development warn responsive AI in stuffed animals may “fundamentally” alter brain growth. (Curio)MCDONALD’S AI HIRING CHATBOT EXPOSED DATA OF JOB CANDIDATESThe benefits and risks parents should weighSome parents say these AI toys offer relief. They help answer endless questions, tell stories, and spark play. In fact, some early research shows kids learn new words faster when engaging in dialogue with AI rather than passively consuming media. But the tradeoff is significant. If AI becomes the primary companion, kids could miss out on the messy, unpredictable, and deeply human experiences that shape trust, empathy, and social awareness. AI-powered stuffed toy called Grok still in its shipping box. Experts warn that AI-powered plushies could reshape child development and trust. (Curio)Safety and security tips for parents before buying AI plush toysBefore bringing one of these toys home, experts suggest:Check the fine print: Review what data is collected, where it’s stored, and if it can be deleted.Limit use to short sessions: Treat the toy like TV, fun in moderation, not a substitute for playmates.Keep conversations public: Encourage kids to use the toy in family spaces, not behind closed doors.Turn off the cloud if possible: Some models work locally without sending every word to servers.WE HAVE TO ACT NOW TO KEEP AI FROM BECOMING A FAR-LEFT TROJAN HORSEBetter play alternatives to AI-stuffed animalsIf you’re worried about replacing human connection, consider healthier alternatives:Rotate traditional toys to keep novelty alive.Use AI plushies together with your child, treating it as a shared activity instead of a private companion.Encourage kids to retell stories to parents and siblings, not just to the toy.What this means for youParents need to think critically before bringing an AI-powered plushie into their home. Ask yourself:Do I want my toddler’s first conversations recorded by a company?Could a chatbot toy undermine the natural give-and-take of family interaction?Am I replacing screen time, or am I replacing myself?Balancing curiosity with caution is key. Occasional use may spark fun, but long-term reliance could reshape your child’s emotional growth in ways no study has yet measured.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawaysAI stuffed animals may look like harmless, cuddly friends, but the stakes are bigger than bedtime stories. These AI-powered plushie toys raise questions about privacy, trust, and what it means to connect as humans. Technology will always tempt us with convenience, but children learn best through love, attention, and genuine relationships.Would you let an AI-powered toy become your child’s closest companion? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids Read More »

transunion building office

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected

NEWYou can now listen to Fox News articles!
You might have recently noticed a wave of cyberattacks hitting companies whose services millions of Americans rely on every day. Among the victims are Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, all reporting breaches linked to Salesforce-connected applications.Now, credit reporting firm TransUnion has confirmed its own major incident, with more than 4.4 million U.S. consumers affected. Attackers exploited weaknesses in third-party integrations, not Salesforce itself. Security researchers tie this technique to the extortion group ShinyHunters and its affiliated crews.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD Hackers stole 13 million records, exposing data of 4.4 million Americans in the latest TransUnion cyberattack. (Christopher Dilts/Bloomberg)What you need to know about the TransUnion data breachTransUnion has disclosed a major data breach that impacted 4,461,511 individuals in the United States, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025, and was discovered two days later on July 30.The breach resulted from unauthorized access to a third-party application used in TransUnion’s U.S. consumer support operations. The company stressed that its core credit database and credit reports were not compromised.Although TransUnion characterized the exposed information as “limited,” the stolen data is highly sensitive. It includes names, dates of birth, Social Security numbers, billing addresses, email addresses, phone numbers, reasons for customer transactions (such as requests for a free credit report), and customer support tickets and messages.Hackers claim they stole more than 13 million records in total, with about 4.4 million tied to U.S. consumers.In response, TransUnion is providing all affected individuals with 24 months of free credit monitoring and identity theft protection services.FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS The breach at TransUnion follows several similar cyberattacks against tech companies, including Google and Cisco, and retail brands, such as Chanel and Adidas.  (Mike Kemp/In Pictures)Hackers target companies through Salesforce appsThe breach appears to be part of a broader wave of Salesforce-related attacks that is hitting organizations across sectors, from tech and finance to retail and aviation. Alongside Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, brands like Adidas, Louis Vuitton, Dior, Tiffany & Co., Cartier and Air France-KLM have also reported incidents tied to weaknesses in Salesforce-linked applications.In most cases, attackers exploited malicious third-party integrations or OAuth-connected apps disguised as legitimate Salesforce tools to siphon sensitive records. This technique bypassed traditional login protections and gave intruders long-lasting access to customer relationship management data. The stolen information ranges from basic contact details and business notes to highly sensitive identifiers such as Social Security numbers, dates of birth and driver’s license information.Researchers say these intrusions align with activity from the extortion group ShinyHunters, with some overlap in tactics and infrastructure linked to other threat actors like Scattered Spider. Campaigns tracked under names such as UNC6395 and UNC6040 point to a larger “extortion-as-a-service” model, where criminal crews collaborate and share stolen data across underground forums.TransUnion’s responseCyberGuy reached out to TransUnion for a comment and received the following response:”TransUnion recently experienced a cyber incident that affected a third-party application serving our U.S. consumer support operations. Upon discovery, we quickly contained the issue, which did not involve our core credit database or include credit reports.The incident involved unauthorized access to limited personal information for a very small percentage of U.S. consumers. We are working with law enforcement and have engaged third-party cybersecurity experts for an independent forensics review. Additionally, we will notify affected consumers and provide credit monitoring services.”As for the gap between when the breach occurred (July 28, 2025) and when it was officially recorded as “discovered” (July 30, 2025), a TransUnion spokesperson clarified that the company “identified and contained this event within hours” of it happening, but that it is common industry practice to designate a later “date of discovery” to reflect a more complete assessment following the initial response.MARY KAY’S ICONIC PINK CADILLAC SHIFTS TO FULLY ELECTRIC Researchers have linked the latest cybercrimes to extortion group ShinyHunters and its affiliated crews. (Kurt “CyberGuy” Knutsson)8 ways you can stay safe from the TransUnion data breachThe TransUnion breach exposed millions of people’s data, but there are steps you can take to protect yourself. Here are eight ways to stay safe.1) Delete personal data that puts you at riskGo through old online accounts, shopping profiles or cloud storage that may still hold sensitive data. Deleting what you no longer use reduces the amount of information that could be stolen in future breaches or sold on dark web forums. You can also get help from a data removal service.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.2) Avoid phishing scams and use strong antivirus softwareData stolen in breaches often ends up fueling phishing campaigns. Attackers may use your name, email or phone number to make messages look more convincing. If you get an email or text claiming to be from TransUnion, your bank or any service asking you to “verify” details, don’t click on the link. Instead, log in through the official website or call customer service directly.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech.3) Save passwords securelyIf your login details were exposed, reusing the same password across sites puts multiple accounts at risk. Use a password manager to create and store strong, unique passwords for every service. Even if hackers get hold of one, they won’t be able to use it elsewhere. Consider using a password manager to generate and store complex passwords.Next, see if your passwords have been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY4) Turn on two-factor authenticationTwo-factor authentication (2FA) adds a critical extra step beyond just a password. If someone tries to break into your email, banking app or social media account, they’ll also need the one-time code from your authenticator app or text message. This makes stolen credentials much less useful.5) Keep your devices updatedHackers often rely on outdated software to spread malware or steal information. Installing the latest updates for your phone, computer and apps ensures security patches are in place, blocking known vulnerabilities that attackers might exploit.6) Freeze your credit right awayOne of the biggest risks after a breach is criminals opening new loans or credit cards in your name. A credit freeze with all three major bureaus, TransUnion, Equifax and Experian, prevents anyone from accessing your credit file without your approval. It’s free and can be temporarily lifted if you need to apply for credit.7) Monitor your accounts regularlyWatch your bank and credit card statements for unfamiliar charges, no matter how small. Set up transaction alerts where available. You should also pull your free annual credit report to check for unauthorized accounts or inquiries, which could be signs of fraud.8) Consider identity theft protection servicesIf your Social Security number, driver’s license or other sensitive identifiers were exposed, you may want to sign up for an identity theft protection service. These services monitor credit reports, dark web forums and financial activity for signs of misuse. Some also include insurance or recovery assistance if your identity is stolen, giving you added peace of mind beyond basic credit monitoring. If you’re one of the affected TransUnion users, make use of the 24 months of free credit monitoring and identity theft protection services. If not, you might get one yourself for the future.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayThe reality is that the TransUnion breach isn’t just about stolen names and numbers. It’s about how exposed ordinary people are when a single company holds the keys to their financial identity. For years, consumers have had little choice but to trust credit bureaus they never opted into.Should companies like TransUnion be held legally accountable when millions of people are exposed to fraud? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.  

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected Read More »