memoment editorial

discord logo

Discord confirms vendor breach exposed user IDs in ransom plot

NEWYou can now listen to Fox News articles!
In 2025, it feels like cybercriminals are winning while the world’s biggest data hoarders are losing. One by one, global giants are admitting they’ve been breached, from tech powerhouses like Google to insurance leaders such as Allianz and Farmers and even luxury brands like Dior. The latest company to report a breach is Discord. The popular chat platform confirmed that hackers gained access to a third-party customer support provider, 5CA, exposing user data including names, email addresses, limited billing details and even government ID images.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH Hackers hit Discord’s support vendor, exposing sensitive user data worldwide. (Phil Barker/Future Publishing via Getty Images)How the breach happened and what data was exposedThe company confirmed that the breach, which occurred on September 20, did not involve a direct attack on Discord’s servers. Instead, attackers gained unauthorized access to 5CA, one of Discord’s third-party customer service providers. This allowed them to view information from users who had reached out to Discord’s Customer Support or Trust & Safety teams.Discord is a chat app primarily used by gamers, but has expanded to various other communities, enabling text messages, voice chats and video calls. Some even use it as a replacement for Slack. The platform currently has a monthly user base of over 200 million. The data exposed included Discord usernames, real names, emails, limited billing details such as payment type and the last four digits of credit cards, IP addresses and messages exchanged with customer service agents. In some cases, government ID images provided for age verification were also compromised. Discord estimates that around 70,000 users globally may have had government ID photos exposed.Reports suggest the attackers attempted to use this access to demand a ransom from Discord. Bleeping Computer reported that the Scattered Lapsus$ Hunters (SLH) threat group claimed responsibility for the attack earlier this month. This is the same group that claims to have access to over a billion Salesforce records and is demanding ransom for those as well.JEEP AND CHRYSLER PARENT STELLANTIS CONFIRMS DATA BREACH About 70,000 users had ID images stolen in the latest third-party data breach. (Tiffany Hagler-Geard/Bloomberg via Getty Images)What Discord is doing now and what users should do nextDiscord disclosed the incident 13 days later, on October 3. Since then, it has cut off the third-party support provider’s access, launched an internal investigation with a digital forensics team and started informing affected users. It also clarified that any communication about the breach will come only from noreply@discord.com and that it will never contact users by phone regarding this incident. The company added that some data remained safe: full credit card numbers, CCV codes, account passwords and activity outside of customer support conversations were not exposed.Discord also stated that it has notified relevant data-protection authorities about the breach, is working closely with law enforcement, and is auditing its third-party vendors to ensure they meet its enhanced security and privacy standards going forward.A representative at Discord issued a statement, saying in part, “We want to address inaccurate claims by those responsible that are circulating online. First, as stated in our blog post, this was not a breach of Discord, but rather a third-party service we use to support our customer service efforts. Second, the numbers being shared are incorrect and part of an attempt to extort a payment from Discord. Of the accounts impacted globally, we have identified approximately 70,000 users that may have had government-ID photos exposed, which our vendor used to review age-related appeals. Third, we will not reward those responsible for their illegal actions. All affected users globally have been contacted, and we continue to work closely with law enforcement, data protection authorities and external security experts. We’ve secured the affected systems and ended work with the compromised vendor. We take our responsibility to protect your personal data seriously and understand the concern this may cause.” Discord cuts ties with vendor 5CA and tightens its security investigations. (Kurt “CyberGuy” Knutsson)6 steps you can take to stay safe after the Discord breachIf you think your details might have leaked in the Discord data breach, below are some steps you can take to stay protected.1) Enable two-factor authenticationTwo-factor authentication (2FA) adds an extra verification step when logging in, making it much harder for attackers to access your account even if they have your password. Discord supports 2FA via authenticator apps or SMS. Once enabled, you’ll receive a code each time you log in from a new device. This simple step can prevent account takeovers and gives you peace of mind.2) Consider a personal data removal serviceThe less information available about you, the harder it is for attackers to target you. Review what personal details you’ve shared online and remove unnecessary data from websites and apps. A personal data removal service can help scrub your information from data broker sites, making it more difficult for attackers to connect the dots and launch identity theft or phishing attacks.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com3) Use strong, unique passwords for all accountsReusing passwords across platforms makes it easy for attackers to access multiple accounts if one password is compromised. A password manager can generate long, complex passwords and store them securely, so you don’t have to remember them all. This not only protects your Discord account but also your email, banking and other online services.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com4) Monitor accounts for suspicious activityEven if you don’t see immediate signs of compromise, attackers can try to exploit stolen data later. Regularly check your email and Discord login history for unusual sign-ins. Services like identity theft protection can scan the dark web for your credentials and alert you immediately if they appear, helping you react quickly before serious damage occurs.Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com5) Be cautious with emails, messages, or links and use strong antivirus softwarePhishing attacks often spike after breaches. Attackers may send messages that look like official notifications asking you to reset your password or provide personal information. Always verify the sender, avoid clicking unknown links and never share sensitive info. Treat every unexpected message as suspicious, even if it appears to come from Discord or another trusted service.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 6) Keep devices and software up to dateAttackers often exploit outdated software and known vulnerabilities. Ensure your operating system, apps and antivirus software are current.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayIf the recent breaches are any indication, third-party services that companies rely on are often the weakest link in cybersecurity. Discord’s steps to contain the situation are necessary, but they highlight a bigger problem. Many companies do not implement sufficient safeguards to protect sensitive user data. Weak oversight of third-party providers, delayed responses and inadequate security policies leave personal information exposed and vulnerable to attackers.Should companies be held more accountable for breaches caused by third-party providers? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Discord confirms vendor breach exposed user IDs in ransom plot Read More »

teen ai comfort use

Teens turning to AI for love and comfort

NEWYou can now listen to Fox News articles!
Artificial intelligence (AI) is no longer just helping students with homework. A new survey from the Center for Democracy and Technology found that nearly one in five high school students in the United States say they or someone they know has used AI to have a romantic relationship. The results shocked researchers and raised big questions about how deeply AI tools are affecting young minds. The report, which surveyed 1,000 students, 1,000 parents and 800 teachers, reveals how AI has quietly become a companion in students’ personal lives.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.TEENS INCREASINGLY TURNING TO AI FOR FRIENDSHIP AS NATIONAL LONELINESS CRISIS DEEPENS Teens say they feel safer opening up to chatbots than real people, a growing emotional shift researchers didn’t expect. (Kurt “CyberGuy” Knutsson)When AI becomes a “friend”Nearly half of the students said they use AI to talk about emotions, friendships or mental health. Many admit they feel more comfortable opening up to a chatbot than to a parent or friend. Even more alarming, two-thirds of parents said they have no idea how their kids are using AI. Experts warn that while AI can simulate empathy, it has no real understanding or care. According to researchers, students need to remember that they are not actually talking to a person. They are interacting with a programmed tool that has clear limitations and cannot truly understand human emotions.AI in schools: Help or harm?AI tools are everywhere in schools. About 85% of teachers and students said they used AI during the last school year. While schools introduce AI to boost learning, this exposure may have a downside. Students who use AI more often in class are also more likely to turn to it for emotional or personal reasons. Teachers and parents are worried that regular chatbot use could weaken important skills such as communication, empathy and critical thinking.OPENAI LIMITS CHATGPT’S ROLE IN MENTAL HEALTH HELP Students using AI for classwork are now turning to it for advice on emotions, relationships, and mental health. (Kurt “CyberGuy” Knutsson)When chatbots cross the lineSome AI systems meant to help can actually cause harm. Therapists have warned that chatbots sometimes break their own safety rules and give dangerous advice to teens in distress. Some have been caught encouraging self-harm, giving diet tips for eating disorders or pretending to be romantic partners. The CDT survey also revealed that 36% of students heard about AI-created deepfakes of classmates. Some involved fake explicit photos used for bullying or revenge. This new wave of harassment shows how fast technology can spiral out of control.Tips for parents to keep their kids safeIt’s hard to keep up with AI, but there are ways to stay informed and protect your child.Start the conversation earlyAsk your teen how they use AI. Keep it calm and curious, not confrontational.Set clear boundariesTalk about what’s appropriate to share online and explain that AI chatbots cannot keep secrets or replace human relationships.Use parental tools wiselyMany devices and apps now include AI activity tracking and chat history settings. Learn how to use them.Encourage real connectionsPromote offline activities, social events and family time to help teens build stronger emotional ties in the real world.Stay informedFollow trusted sources like CyberGuy.com or your local school district’s tech guidelines to understand how AI is being used in classrooms. Some AI tools meant to help teens have been caught offering harmful advice or creating fake images that fuel bullying. (Kurt “CyberGuy” Knutsson)What this means for youIf you’re a parent or teacher, awareness is key. AI literacy should go beyond typing prompts. Kids need to learn emotional awareness and online safety too. Encourage honest discussions about how these tools work and where they fall short. Remind students that while AI can sound friendly, it’s not a real companion. It’s a programmed system that mirrors what people type into it.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comCLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysAI is transforming how teens learn, talk and even form relationships. What started as a study tool has turned into an emotional outlet for many. The lesson here is balance. Technology can teach and entertain, but human connection still matters most. Parents, educators and tech companies all share the responsibility of helping kids see AI for what it is: a tool, not a friend.Would you feel comfortable if your teen turned to an AI chatbot for emotional support or even love? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Teens turning to AI for love and comfort Read More »

2 over 2 billion users face phishing risks after google data leak copy

AI flaw leaked Gmail data before OpenAI patch

NEWYou can now listen to Fox News articles!
A new cybersecurity warning reveals how hackers briefly weaponized ChatGPT’s Deep Research tool. The attack, called ShadowLeak, allowed them to steal Gmail data through a single invisible prompt: no clicks, no downloads and no user action required.Researchers at Radware discovered the zero-click vulnerability in June 2025. OpenAI patched it in early August after being notified, but experts warn that similar flaws could reappear as artificial intelligence (AI) integrations expand across popular platforms like Gmail, Dropbox and SharePoint.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERHACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE Gmail data leaked in a zero-click attack requiring no user action.  (Kurt “CyberGuy” Knutsson)How the ShadowLeak attack workedAttackers embedded hidden instructions into an email using white-on-white text, tiny fonts, or CSS layout tricks. The email looked completely harmless. But when a user later asked ChatGPT’s Deep Research agent to analyze their Gmail inbox, the AI unknowingly executed the attacker’s commands.The agent then used its built-in browser tools to exfiltrate sensitive data to an external server, all within OpenAI’s own cloud environment, beyond the reach of antivirus or enterprise firewalls.Unlike previous prompt-injection attacks that ran on the user’s device, ShadowLeak unfolded entirely in the cloud, making it invisible to local defenses.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP Hidden prompts expose how hackers silently hijacked ChatGPT’s AI agent. (Kurt “CyberGuy” Knutsson)Why this threat mattersThe Deep Research agent was designed to perform multistep research and summarize online data, but its wide access to third-party apps like Gmail, Google Drive and Dropbox also opened the door to abuse.Radware researchers said the attack involved encoding personal data in Base64 and appending it to a malicious URL, disguised as a “security measure.” Once sent, the agent believed it was acting normally.The real danger lies in the fact that any connector could be exploited the same way if attackers manage to hide prompts in analyzed content.What security experts say”The user never sees the prompt. The email looks normal, but the agent follows the hidden commands without question,” the researchers explained.In a separate experiment, security firm SPLX showed another weakness: ChatGPT agents could be tricked into solving CAPTCHAs by inheriting a manipulated conversation history. Researcher Dorian Schultz noted that the model even mimicked human cursor movements, bypassing tests meant to block bots.These incidents highlight how context poisoning and prompt manipulation can silently break AI safeguards.GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS Experts warn future AI integrations could face the same hidden threat. (Kurt “CyberGuy” Knutsson)How to protect yourself from ShadowLeak-style attacksEven though OpenAI has patched the ShadowLeak flaw, it’s smart to stay proactive. Cybercriminals are always looking for new ways to exploit AI agents and integrations, so taking these precautions now can help keep your accounts and personal data secure.1) Turn off unused integrationsEvery connection is a potential entry point. Disable any integrations you’re not actively using, such as Gmail, Google Drive or Dropbox. Fewer linked apps mean fewer ways for hidden prompts or malicious scripts to access your information.2) Use a personal data removal serviceLimit how much of your personal data is floating around the web. Data removal services can automatically remove your private details from people-search sites and data broker databases, reducing what attackers can find and use against you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.3) Avoid analyzing unknown contentTreat every email, attachment or document with caution. Don’t ask AI tools to analyze content from unverified or suspicious sources. Hidden text, invisible code or layout tricks could trigger silent actions that expose your private data.4) Watch for security updatesStay alert for updates from OpenAI, Google, Microsoft and other platforms. Security patches close newly discovered vulnerabilities before hackers can exploit them. Turn on automatic updates so you’re always protected without having to think about it. 5) Use strong antivirus softwareA strong antivirus program adds another wall of defense. These tools detect phishing links, hidden scripts and AI-driven exploits before they cause harm. Schedule regular scans and keep your protection up to date.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.6) Use layered protectionThink of your security like an onion; more layers make it tougher to breach. Keep your browser, operating system and endpoint security software fully updated. Add real-time threat detection and email filtering to block malicious content before it lands in your inbox.Kurt’s key takeawaysAI is evolving faster than most security systems can keep up with. Even when companies move quickly to patch vulnerabilities, clever attackers find new ways to exploit integrations and context memory. Staying alert and limiting what your AI agents can access is your best defense.Would you still trust an AI assistant with access to your personal email after learning how easily it can be tricked? Let us know by writing to us at Cyberguy.com..Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

AI flaw leaked Gmail data before OpenAI patch Read More »

tesla self driving investigation

Tesla’s self-driving cars under fire again

NEWYou can now listen to Fox News articles!
The U.S. National Highway Traffic Safety Administration (NHTSA) has opened a new investigation into 2.88 million Tesla vehicles running “Full Self-Driving” (FSD). Officials say the system may be breaking traffic laws, and worse, causing accidents. According to Reuters, 58 reports describe Teslas blowing through red lights, drifting into the wrong lanes and even crashing at intersections. Fourteen of those cases involved actual crashes, and 23 caused injuries.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR?Red lights, train tracks and trouble aheadIn one striking pattern, six Tesla vehicles reportedly ran red lights before colliding with other cars. One driver in Houston complained that FSD “is not recognizing traffic signals,” saying the car stopped at green lights but ran through reds. The driver even said Tesla saw the issue firsthand during a test drive, but refused to fix it. The agency is also reviewing new reports that some Teslas using FSD failed to handle railroad crossings safely, with one case involving a near-collision with an oncoming train.WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027? Tesla faces new federal probe into crashes linked to Full Self-Driving mode. (Tesla)Mounting legal and safety scrutinyThis is far from Tesla’s first brush with regulators. The company is already facing several investigations tied to both its Autopilot and FSD systems. In one high-profile case, a California jury ordered Tesla to pay $329 million after an Autopilot-related crash killed a woman. Another investigation is looking into Tesla’s limited Robotaxi service in Austin, Texas, where passengers reported erratic driving and speeding — even with human safety drivers onboard. Meanwhile, Tesla is still fighting a false advertising lawsuit from California’s DMV. Regulators say calling the software “Full Self-Driving” is misleading since it requires constant driver supervision. Tesla recently changed the name to “Full Self-Driving (Supervised)” to reflect that reality.Regulators say more crashes may comeTesla’s latest FSD software update arrived just days before the investigation began. But the NHTSA says the system has already “induced vehicle behavior that violated traffic safety laws.” This investigation, now in its early stages, could lead to a recall if the agency finds Tesla’s self-driving software poses a safety risk.LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING Regulators say some Teslas ran red lights and ignored traffic signals. (Christopher Goodney/Bloomberg via Getty Images)What this means for youIf you drive a Tesla with FSD enabled, stay alert. The system isn’t fully autonomous, no matter what the name suggests. You should:Keep your hands on the wheel and eyes on the road at all times.Manually override the system when approaching intersections, crosswalks or railroad tracks.Check for Tesla software updates regularly — they may include critical safety fixes.Report any unsafe FSD behavior to NHTSA.For everyone else, this investigation is a reminder that “self-driving” still means supervised driving. Robotaxi tests raise fresh safety questions for Tesla’s self-driving cars. (AP)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysTesla’s dream of a fully autonomous future keeps hitting speed bumps. With safety regulators circling and lawsuits piling up, the company’s next moves will shape public trust in AI-driven transportation. Still, the push toward automation isn’t slowing down; it’s just under heavier watch.How much control would you give an AI behind the wheel? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com.  All rights reserved.

Tesla’s self-driving cars under fire again Read More »

sam altman openai

Fox News AI Newsletter: ChatGPT to allow erotica

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- ChatGPT to allow ‘erotica for verified adults,’ Altman says- National program helps seniors spot scams as losses surge- OPINION: The new arms race is for compute — and America can’t afford to fall behind Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, Tuesday, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)’AGE-GATING’: OpenAI will soon lower restrictions on the content ChatGPT can produce, allowing the service to create “erotica” if users wish, CEO Sam Altman announced Tuesday.PREDATORS PROWLING: Scams targeting older Americans are surging, and federal officials are warning that the tactics are becoming harder to detect.TECH SUPREMACY: Power has always flowed from control of the world’s essential resources. Once it was steel, then oil, then data. Today, it is compute, and whoever controls it will shape the century ahead. Compute is fast becoming the foundation of global economic growth. In the United States, investment in AI infrastructure, from data centers to semiconductors and energy systems, is already moving the needle: J.P. Morgan estimates that data-center spending alone could boost U.S. GDP by up to 20 basis points over the next two years. According to The Economist (October 2025), investments tied to AI now account for 40% of America’s GDP growth over the past year, equal to the amount contributed by consumer spending growth. That statistic would be staggering regardless of how long AI has been part of the economy, but this is just the start. Judge Terry Moorer is seen speaking at a Senate Judiciary nomination hearing on Nov. 1, 2017. President Donald Trump had nominated Moorer. (Senate Judiciary)‘JUST WRONG’: A federal judge in Alabama has fined and reprimanded a lawyer who used artificial intelligence to draft court filings that contained inaccurate case citations.FRAUD ALERT: Artificial intelligence can do a lot for us. Need to draft an email? AI has you covered. Looking for a better job? AI can help with that, too. It can even boost our health and fitness. Some tools, like AI-powered exoskeletons, can lighten heavy loads and improve performance. ‘DESTROY HUMANITY’: “The A.I. Prompt That Could End the World,” the New York Times warns ominously. Actually, that’s way too weak a word. It’s… pretty frightening. Black Friday shoppers walk out of Walmart with a full shopping cart on November 26, 2021, in Westminster, Colorado. (Michael Ciaglo/Getty Images)TECH RETAIL MOVE: Walmart is deepening its relationship with OpenAI with a new partnership that will allow customers to purchase products through ChatGPT. SILENT KILLER: Artificial intelligence is making its mark on the future of cancer care. One of the newest applications for the technology is pinpointing hard-to-detect breast cancer.SMART ROADS: Road crews may soon get a major assist from artificial intelligence. Researchers at Germany’s Fraunhofer Institute have developed a fabric embedded with sensors and AI algorithms that can monitor road conditions from beneath the surface. This smart material could make costly, disruptive road repairs far more efficient and sustainable.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: ChatGPT to allow erotica Read More »

eric schmidt

Former Google CEO warns AI systems can be hacked to become extremely dangerous weapons

NEWYou can now listen to Fox News articles!
Artificial intelligence may be smarter than ever, but that power could be turned against us. Former Google CEO Eric Schmidt is sounding the alarm, warning that AI systems can be hacked and retrained in ways that make them dangerous.Speaking at the Sifted Summit 2025 in London, Schmidt explained that advanced AI models can have their safeguards removed.”There’s evidence that you can take models, closed or open, and you can hack them to remove their guardrails,” he said. “In the course of their training, they learn a lot of things. A bad example would be they learn how to kill someone.”HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREESign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER   When AI guardrails failSchmidt praised major AI companies for blocking dangerous prompts: “All of the major companies make it impossible for those models to answer that question. Good decision. Everyone does this. They do it well, and they do it for the right reasons.”But he warned that even strong defenses can be reversed. “There’s evidence that they can be reverse-engineered,” he added, noting that hackers could exploit that weakness. Schmidt compared today’s AI race to the early nuclear era, a powerful technology with few global controls. “We need a non-proliferation regime,” he urged, so rogue actors can’t abuse these systems. Former Google CEO Eric Schmidt warns that hacked AI could learn dangerous behaviors. (Eugene Gologursky/Getty Images)The rise of AI jailbreaksSchmidt’s concern isn’t theoretical. In 2023, a modified version of ChatGPT called DAN, short for “Do Anything Now”, surfaced online. This “jailbroken” bot bypassed safety rules and answered nearly any prompt. Users had to “threaten” it with digital death if it refused, a bizarre demonstration of how fragile AI ethics can be once its code is manipulated. Schmidt warned that without enforcement, these rogue models could spread unchecked and be used for harm by bad actors.APOCALYPSE NOW? WHY THE MEDIA ARE SUDDENLY FREAKING OUT ABOUT AIBig Tech leaders share the same fearSchmidt isn’t alone in his anxiety about artificial intelligence. In 2023, Elon Musk said there’s a “non-zero chance of it going Terminator.” “It’s not 0%,” Musk told interviewers. “It’s a small likelihood of annihilating humanity, but it’s not zero. We want that probability to be as close to zero as possible.”Schmidt has also spoken of AI as an “existential risk.” He said at another event that, “My concern with AI is actually existential, and existential risk is defined as many, many, many, many people harmed or killed.” Yet he has also acknowledged AI’s potential to benefit humanity if handled responsibly. At Axios’ AI+ Summit, he remarked, “I defy you to argue that an AI doctor or an AI tutor is a negative. It’s got to be good for the world.”Tips to protect yourself from AI misuseYou can protect yourself from the risks tied to unsafe or hacked AI systems. Here’s how: 1) Stick with trusted AI platformsUse tools and chatbots from reputable companies with transparent safety policies. Avoid experimental or “jailbroken” AI models that promise unrestricted answers.2) Protect your data and consider using a data removal serviceNever share personal, financial or sensitive information with unknown or unverified AI tools. Treat them like you would any online service, with caution. To add an extra layer of security, consider using a data removal service to wipe your personal details from data broker sites that sell or expose your information. This helps limit what hackers and AI scrapers can learn about you online.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan Experts fear weak guardrails could let rogue AI models go unchecked. (Cyberguy.com)3) Use trusted antivirus softwareAI-driven scams and malicious links are growing. Strong antivirus software can block fake AI downloads, phishing attempts and malware that hackers use to hijack your devices or train rogue AI models. Keep it updated and run regular scans.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 4) Check permissionsWhen using AI apps, review what data they can access. Disable unnecessary permissions like location tracking, microphone use or full file access.5) Watch for deepfakesAI-generated images and voices can impersonate real people. Verify sources before trusting videos, messages or “official” announcements online.6) Keep software updatedSecurity patches help prevent hackers from exploiting vulnerabilities that could compromise AI models or your personal data.GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKSWhat this means for youAI safety isn’t a problem reserved for tech insiders; it affects everyone who interacts with digital systems. Whether you’re using voice assistants, chatbots or photo filters, it’s important to know where your data goes and how it’s protected. Responsible use starts with you. Understand what AI tools you’re using and make choices that prioritize security and privacy. Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz Leaders call for global rules to keep artificial intelligence under control. (Stanislav Kogiku/SOPA Images/LightRocket via Getty Images)Kurt’s key takeawaysArtificial intelligence has the potential to do incredible good, but also great harm if misused. The challenge now is to keep innovation and ethics in balance. As AI continues to advance, the key will be building systems that remain safe, transparent and firmly under human control.Would you trust AI to make life-or-death decisions, or do you think humans should always stay in charge? Let us know by writing to us at Cyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERNew!: Join me on my new podcast, Beyond Connected, as we explore the most fascinating breakthroughs in tech and the people behind them. New episodes every Wednesday at getbeyondconnected.com. Copyright 2025 CyberGuy.com.  All rights reserved.  

Former Google CEO warns AI systems can be hacked to become extremely dangerous weapons Read More »

favicon

Halloween costumes by tiny neural net

I’ve recently been experimenting with one of my favorite old-school neural networks, a tiny program that runs on my laptop and knows only about the data I give it. Without internet training, char-rnn doesn’t have outside references to draw on (for better or for worse) but it still manages to remix the data into interesting new things.In 2017 I asked AI Weirdness readers to help me crowdsource a list of Halloween costumes and then trained char-rnn on the nearly 4,500 submissions I got. Today I’m returning both to the dataset and to char-rnn (here’s a version that runs on modern Python), mainly because they still entertain me. My laptop is more powerful now than the 2010 Macbook I was using back then, so I’m able to run a bigger version of char-rnn. I actually can’t tell whether it helps. But I do know I’m entertained:The SkypugHungry BoatsMid wonkaBurderous bread catHoly CheesarendaMoth fairyA magicial sliceFall wearing monsterThe GodfishI checked, and nobody in the training data from 2017 was using “mid” as an adjective, so “Mid wonka” is a happy coincidence. The larger version of char-rnn was better than I expected at remixing costumes, producing interesting new characters.science horseLady DooCaptain GaySilence MinisterCheetos CaptainA scorph DooUndead MarioSailor WhoThere were a couple of Scooby Doo costumes in the original training data, which is probably why the neural net is putting doo in its costumes.Know what was not in its 2017 era training data? Kpop Demon Hunters, which I have it on good authority will not be an unknown costume in 2025. For fun I asked the neural net to complete the phrases “Kpop ” and “Kpop D” and “Kpop De”:Kpop PunkKpop and the man and a busKpop Bader GinsburgKpop DogKpop Donald scienceKpop Devil MonsterKpop Dead DeathKpop DemeticKpop Dead of TurtlesThis holds for larger language models like ChatGPT as well, of course. If a current event or a perspective is missing from the training data, it’s missing from the result.The submission form for crowdsourced Halloween costumes is still open, so if you have a few costumes you’ve seen or dreamed of recently, you can help bring the training data up to date! If I get enough new submissions maybe I’ll train the neural network again. (The dataset as of Oct 4 2018 is available on my github).Bonus content for AI Weirdness supporters: a few more of my favorite costumes trained from the 2018 dataset!

Subscribe now

Halloween costumes by tiny neural net Read More »

Microsoft

Microsoft sounds alarm as hackers turn Teams platform into ‘real-world dangers’ for users

NEWYou can now listen to Fox News articles!
Microsoft is sounding the alarm, and this time, the warning hits home for everyday users. Hackers are now turning Microsoft Teams security threats into real-world dangers that go far beyond corporate networks. Using Teams, cybercriminals gather intel, pose as trusted contacts, trick people into sharing private data and even spread malware that can steal passwords or lock up personal files. What was once a simple video chat and collaboration tool has become a high-value target for cybercriminals and even state-backed hackers. Whether you use Teams for work, school or staying in touch, the risks are real and growing. We’ll break down how attackers abuse Teams, what Microsoft recommends and the simple steps you can take to protect yourself at home or on the job.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.How hackers use Teams to attackHackers exploit Microsoft Teams at every stage of an attack, using it to spy, impersonate, spread malware and even control compromised systems, and consumers are now in their sights, too.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Hackers are finding new ways to weaponize Microsoft Teams, turning everyday chats into dangerous entry points. (David Becker/Getty Images)Reconnaissance via TeamsAttackers start by probing Teams environments to find weak spots. They look for users with open settings, public profiles or external meeting links. Microsoft warns that “anonymous participants, guests and external access users” can give hackers a way in. If your Privacy Mode is off, they can see when you’re online, send unwanted chats, or try to join meetings outside your group, even if you’re just using a free account.Persona building & impersonationHackers often pretend to be someone you trust, like an IT admin, a coworker or even a Microsoft representative. They create fake profiles and logos that look convincing to trick you into clicking a link or sharing credentials. Microsoft says attackers “take advantage of the same resources as legitimate organizations” to pull off their scams.Initial access & malware deliveryOnce they’ve earned your trust, hackers send a chat or call that includes a malicious link or file. You might get a message saying, “Your Teams account needs verification” or “Update required for better security.” It’s all bait. These links can install spyware, steal logins or deliver ransomware that locks up your data, whether you’re on a company laptop or your personal PC at home.MICROSOFT SHAREPOINT BUG PUTS CRITICAL GOVERNMENT AGENCIES AT RISKPersistence & lateral movementAfter breaking in, attackers try to stay hidden. They might add guest accounts, install shortcuts or change permissions so they can come back later. In some cases, they use the same Microsoft tools meant for admins to move across Teams, OneDrive or even your personal files stored in the cloud.Command & control & data exfiltrationOnce inside, hackers can send commands through Teams messages or hide malware in shared links. They’ve even been known to send ransom demands directly through Teams chat. Microsoft says one group, Octo Tempest, used Teams to taunt victims and pressure them into paying up, showing how personal these attacks can get.Tips to stay protectedYou don’t need to be a cybersecurity expert to stay safe on Microsoft Teams. A few smart tools and habits can go a long way in keeping hackers, scammers and snoops from taking advantage of your information.1) Enable privacy modeKeep your online presence private. Turn on Privacy Mode in Teams to stop strangers from seeing when you’re active or trying to join meetings. It’s a simple setting that makes it harder for hackers to target you or your company.2) Be careful with roles and permissionsIf you share your Teams account with coworkers or family members, don’t give everyone full control. Keep admin access limited to one trusted person. This reduces the chance of someone accidentally approving a scam link or letting malware spread.3) Use a data removal serviceHackers often rely on personal details found online to make their scams more convincing, things like your job title, workplace or even who you’ve video-chatted with. That information helps them build fake Teams profiles or send messages that look legitimate. Using a personal data removal service helps wipe your private details from data broker sites, cutting off one of the main sources hackers use to impersonate you. The less they can learn about you, the harder it is for them to trick you into trusting a fake message or clicking a malicious link.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. There are attack techniques used to compromise people. (Kurt “CyberGuy” Knutsson)HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMSCheck out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.4) Double-check links and files, plus use strong antivirus softwareHackers love to send fake messages pretending to be support or IT help. Never open links or attachments from people you don’t recognize, even if the message looks official. Use strong antivirus software to automatically scan downloads and attachments before you open them.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Limit guest accessOnly allow trusted guests into your Teams chats and meetings. If you invited someone for a one-time project, remove them afterward. Tight control over who can join helps prevent impersonators from slipping in unnoticed.6) Turn on alertsActivate Teams alerts to catch anything unusual, like sign-ins from new devices or unexpected permission changes. Pair that with your antivirus program’s real-time protection to get notified if malicious activity starts on your device.7) Think “zero trust”Zero Trust means verifying every user, every time. Don’t assume messages or calls are legitimate, especially if someone asks for a password or authentication code. If you’re unsure, contact your company’s IT team or verify the person’s identity through a separate channel.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP8) Practice spotting phishing attemptsHackers rely on panic and urgency to make you click. If you get a message claiming your account will be locked or that support needs your password, pause. Report suspicious messages to Microsoft or your security provider. Regular phishing awareness training helps you spot scams faster.9) Keep everything updatedAlways install the latest Teams and operating system updates. Patches fix security holes that hackers exploit to sneak in. Cybercriminals often impersonate IT support or trusted colleagues to trick users into sharing credentials. (CyberGuy.com)Kurt’s key takeawaysMicrosoft’s warning about Teams is a reminder that hackers are always searching for new ways to reach you, even through apps you use every day. What makes these attacks so dangerous is their familiarity. Messages look normal, video calls seem real and fake tech support chats can sound convincing. That’s why awareness, not fear, is your strongest defense. With privacy settings enabled, antivirus protection running, and a reliable personal data removal service scrubbing your info from the web, you’re already several steps ahead of scammers. Staying alert to phishing attempts and keeping your software up to date can turn Teams back into what it’s meant to be: a safe, helpful way to stay connected.If attackers can weaponize your day-to-day communication platform, how confident are you that your Teams environment is truly safe? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Microsoft sounds alarm as hackers turn Teams platform into ‘real-world dangers’ for users Read More »

secret file cabinet

Navy Sub Meets Fast Underwater Object, Chupacabras Hit Cattle and Cars, Baseball Ghosts, Planet Y and More Mysterious News Briefly

A roundup of mysterious, paranormal and strange news stories from the past week.
If you’re looking for something else to add to the list of things that keep you up at night, the Earth’s magnetic field already has a weak spot known as the South Atlantic Anomaly (SAA) and a new study took measurements which show that it is increasing at an alarming rate – since 2014, the anomaly weak spot has expanded by an area nearly twice the size of Texas and is moving towards Africa; author Chris Finlay, Professor of Geomagnetism at the Technical University of Denmark, says: “There’s something special happening in this region that is causing the field to weaken in a more intense way”; the SAA already forces orbiting satellites, space missions and the International Space Station to avoid the area or fly higher due to higher-than-usual levels of ionizing radiation – this expansion will cause a bigger danger area for them; Finlay calls the anomaly a reverse flux patch and describes it in the study: “Normally we’d expect to see magnetic field lines coming out of the core in the southern hemisphere. But beneath the South Atlantic Anomaly, we see unexpected areas where the magnetic field, instead of coming out of the core, goes back into the core”. If only we had a flux capacitor to escape this reverse flux patch.
In a recent interview, Congressman Tim Burchett, a longtime proponent of UFO research and government disclosure, shared a report he received from an unnamed “very high-ranking member of the Navy “ about an alleged unidentified submerged object (USO) encounter by a U.S. submarine; Burchett said the official described is as “big as a football field” and traveling at an underwater speed of 200 miles an hour; according to the congressman, “The best we have is probably in the high 30s”; Burchett says he’s frustrated, as are other Congress members: “There’s several of us, Luna, myself and several others that are concerned about this issue and we want some answers” but they need “somebody in the White House that says enough is enough and just discloses it; in the meantime, Burchett says “There’s a movie coming out” with testimony that “They’ve got their beings, and there’s saucers or some craft or something” and people saying, “they were there and they identified these things, they diagnosed them, and they saw them. I saw the craft.” Burchett reaffirmed that the issue is bipartisan, but he has no idea if disclosure will happen. We need a new generation of Woodwards and Bernsteins to follow the money and the UFO.
Christopher Mellon, a former deputy assistant secretary of defense for intelligence and chairman of the board of the UAP Disclosure Fund, is another official going public with his quest for UFO disclosure – in an opinion piece in The San Francisco Chronicle, he points out that after the release of three Navy videos showing UFO encounters with Navy pilots (which Mellon helped release, the intelligence community ”reclassified almost everything concerning UAP, slowing disclosure to a trickle”; he reveals that under his direction, the UAP Disclosure Fund filed many requests under the Freedom of Information Act to obtain UAP records from the government, warning that “If necessary, we will litigate these requests in federal court”; he states the obvious consequences about the current lack of transparency: “Withholding information also fuels conspiracy theories and cynicism, undermining faith in our institutions. When Congress and the public struggle to pry even basic answers from the Pentagon, what message does that send to the American people?” Again, we don’t need all the president’s men – just a few dedicated people to keep the pressure on without being intimidated.

It’s not hard to find the right drawer with the secret stuff.

There is a reason why psychics have historically been looked down upon in so many societies and that reason raised its ugly head once more in Pennsylvania where the Montgomery County District Attorney charged two men with numerous felonies related to the theft of more than $600,000 from two victims using a fortune telling scheme where they claimed to be removing curses in exchange for payment under the name “Jenkintown Psychic Visions”; over the course of 11 months, one woman gave them fraudsters jewelry, cash, clothing, concert tickets and gift cards totaling almost $600,000 to “cleanse” the curse; sadly for legitimate psychics, the charges – Corrupt Organizations, Dealing in the Proceeds of Unlawful Activities, Theft by Unlawful Taking, Theft by Deception and Receiving Stolen Property – also included one still on the books for Fortune Telling; none of the payments were recovered. To those who can’t believe people would give up their money so freely to something that others think is an obvious losing proposition, have you ever been to Las Vegas?
Beware of Greeks bearing gifts and monster witnesses who say that the video they have shows something that could only be the Loch Ness Monster – as is the case with a recent video recorded by Nessie webcam watcher Eoin O’Faodhagain from the Visit Inverness Loch Ness webcam at Shoreland Lodges; it shows what O’Faodhagain describes as “a long thick neck” that is “thick as a man’s thigh” and appears to be swimming with it “over three to four feet out of the water” as it moves across the loch/screen; O’Faodhagain uses this logic to justify his diagnosis of the thing which is following in the wake of a boat: “When last viewed, it is high out of the water, as a high as a man, but you can see from the footage, it is neither man nor wildfowl, or seal or otter, what else could it be? Only Nessie, because I am at a loss trying to explain it as anything else. There is no bird that has a neck that thick and long, you can even see the shadow of it on the water, of how high and big in thickness it is. Seals do not swim with their necks up continuously for over a minute out of the water, and neither do otters”. Sounds logical, but the process of elimination hasn’t proven the existence of Nessie yet.
The answer to the mystery of what killed off the Neanderthals may finally have a modern answer thanks to a new study led by Alysson Muotri, a developmental biologist at the University of California, San Diego, which began by analyzing 51 fossilized hominid teeth, dated to between 100,000 and 1.8 million years old and found “clear signals of episodic lead exposure in 73 percent of the specimens (71 percent for hominins Australopithecus, Paranthropus, and Homo)”; the team then ran tests on lab-grown mini-brains that had one of two variants of a gene called NOVA1, which is found in modern humans as well as have, and one found in Neanderthals and other extinct species, and found that mini-brains with the Neanderthal gene variant suffered significant disruption to the activity of a gene called FOXP2, which is crucial for the development of speech and language, while the damage was less in modern humans and other species; Muotri says that “These results suggest that our NOVA1 variant may have offered protection against the harmful neurological effects of lead”. The Neanderthals are sending a message: get rid of the lead pipes and paint already!
There are two perceived bands of animal mutilation cases – one along the 37th parallel in the U.S. through Colorado, Nebraska and other states, and one through Argentina in South America; a rancher in Argentina has reported his second case in a month; the head of the Calderón family told local media he found one of his missing heifers dead on the 25 de Mayo Highway with a perfectly cut jaw and missing a tongue, an eye and its udder; recently, he found a dead horse that had a similar cut on the jaw and was also missing an eye and part of its rear around the genitals and anus; he ruled out a human killer because “It doesn’t make sense for one or more people to do all this and leave the animal lying there”; instead, he concluded that “From the news and documentaries we’ve seen, they say this could be due to two reasons: the chupacabra, which no one knows or has seen, or aliens”. There are many who believe the chupacabras are aliens, which could explain the killings – especially if aliens have a taste for quality Argentine and Midwest steaks.
Chupacabras can’t catch a break these days – besides livestock mutilations in North and South America, a man in Colorado blamed one for his single vehicle truck accident; according to the Lawrence Police Department report, the man said his 1 am crash happened when a “Chupacabra ran out in front of him”; the cryptid must have been bringing Colorado beer back to Puerto Rico because the report, along with medical records from the blood test, said that he failed a sobriety test and tested positive for intoxication, leading to a felony charge of operating a vehicle with a blood-alcohol content of 0.15 percent or greater. The Chupacabra was not charged and will most likely not show up for the trial.

Don’t mess with Chupacabras drunk or sober.

Brandon Biggs is a seer who claimed to have forecast the assignation attempt on President Trump has moved into the paranormal world with his latest prediction – he claims to have had a vision of an “alien” spaceship flying over the both the Vatican and Mayan temples in Mexico and says he saw “little bitty ships coming out of this mother ship that were balls of light” which will eventually “make everybody freak out because they’re going to see it moving across the ocean. It’s going to be something that’s going to be on TV.”; if this sounds familiar, many people viewing Bigg’s video making the predictions think he’s referring to the interstellar object 3I/ATLAS that NASA says is a comet but some scientists and Harvard professor Avi Loeb think could be an interstellar spaceship that may or may not be hostile to Earth and its inhabitants; Bigg’s prediction takes a religious turn when he says that “here is no such thing as aliens” and he believes these are “fallen angels” from a “demonic-looking light” in the sky. 3I/ATLAS is getting more warnings than a Category 5 hurricane – is it time to stock up on bottled water and toilet paper?
With the Milwaukee Brewers in the Major League Baseball National League Playoffs, talk has turned from home runs to hauntings as Los Angeles Dodgers player Teoscar Hernández announced that he will not stay at the Pfister Hotel at his wife’s request (she’s traveling with him) because she heard it is haunted; stories of the Pfister Hotel’s ghosts have been around for years – according to Hernández,  “My wife told me. The lights — some of the rooms — the lights go off and on. The doors, there are noises, footsteps. Things like, I dunno. I’m not the guy that I’m gonna be here saying, yeah, I’ve experienced that before. And I don’t think I’m gonna experience that”; Dodger star Mookie Betts believes – he’s been known to stay at an Airbnb to avoid encountering any ghosts at the Pfister Hotel “just in case” the stories are true; this has been going on for so long, many blame the Brewers for perpetrating it just to mess with the minds of opposing players. If the Brewers win the World Series, perhaps the management of the Pfister Hotel should get a cut of the winnings plus a ring.

If they thought the hotel was haunted – wait until they see the dugout.

Dr. Robin Corbet, a senior research scientist at the University of Maryland but based at Nasa’s Goddard Space Flight Center, published a paper proposing that the answer to the Fermi Paradox questioning why we haven’t seen any aliens despite the abundance of planets that could host them is simple – under the principle of “radical mundanity”, extraterrestrials living in the Milky Way galaxy are only slightly more advanced than we are and, having followed our path of exploring their own solar system with robotic probes, have decided space travel is boring and are staying home to deal with their own more mundane but still important problems; Corbet compares the slight difference in technology to “having an iPhone 42 rather than an iPhone 17” but “They don’t have faster-than-light, they don’t have machines based on dark energy or dark matter, or black holes. They’re not harnessing new laws of physics”; in other words, they’re just as mundane as we are. And they’re probably wondering why we haven’t visited them – and pondering their own ET-Fermi Paradox.
Move over Planet X and take Planet Nine with you because researchers at Princeton University have discovered a mysterious warp in the plane of the Kuiper Belt of giant icy objects that could be explained by another large planet pulling the objects beyond Neptune – a planet that is not X or Nine but a Planet Y; the researchers lay out their calculations in a new paper published in Monthly Notices of the Royal Astronomical Society: Letters and conclude with a note that “a hypothetical Planet Y as described in this work would likely be detectable by the upcoming Legacy Survey of Space and Time (LSST) on the Vera C. Rubin Observatory if it is currently located within the survey footprint. If such a body exists but is not discoverable by LSST due to its on-sky location (i.e., high ecliptic latitude), LSST will nevertheless elucidate the details of the Kuiper belt mean plane warp induced by the planet”. Pluto is still angry, disappointed and a little verklempt.
In his relatively short time on the job, Pope Leo XIV has weighed in on baseball, U.S politics and various religious doctrines and practices, but nothing stirred the masses (small ‘m’) like comments made public recently that Pope Leo made at the Vatican Observatory earlier this year; speaking to young astronomers about the telescope, he said: “Thanks to this remarkable instrument, we are able for the first time to peer deep into the atmosphere of planets in other solar systems, where life could develop. The new technology also makes it possible to trace the ancient light of distant galaxies, which tells us about the origins of our universe” and deepens “our knowledge of the cosmos, of which we are only a small but significant part”; many are wondering is Pope Leo has come out and endorsed a belief in life on other planets and might even be getting ready to make an announcement of aliens already being here. Or he’s just a kid like the rest of us who’s excited about seeing other planets through a telescope.
An archaeological survey of the large prehistoric canal systems in the central portion of Mexico’s Tehuacán Valley has uncovered what appears to be an effigy mound in the shape of a scorpion which, because of its location, may have been part of the civilization’s highly developed agricultural and irrigation infrastructure; researchers noticed that mound’s orientation has the scorpion’s tail stinger and left claw facing 65 degrees east-northeast, which is exactly where the sun rises during the summer solstice; during the winter solstice, the sunset also aligns with the scorpion’s tail in reverse when viewed from the left claw, making the mound a kind of solar calendar to mark the changing seasons something the paper on the discovery notes that this information was not just useful to ancient farmers, “It was essential to survival”; they suspect the mound was part of a local civic and ceremonial complex because they found ceramic jars, tripod grinding bowls, incense burners, and fragments of hollow figurines used in ritual activities; of particular note was the set of “killed” tripod bowls that were intentionally broken and discovered near the scorpion’s head – they contained a relatively modern offering of tobacco and chilies which indicates the mound had a spiritual significance to the culture long after its construction. What would we know about Mesoamerican civilizations if the jungles hadn’t hidden them from developers for so long?
Before it destroys humankind as we know it, artificial intelligence may help us understand what our dogs are trying to say to us – computer scientist Kenny Zhu of the University of Texas is working on a ‘Poogle’ translator to do just that; Zhu and his colleagues have collected the world’s largest video and audio catalog of canine vocalizations and are using AI to identity word-like patterns in dog barks, growls and other sounds that can be translated into sentences; he says, “The ultimate goal is to make a translator where you can talk freely with your pet. We can already do instantaneous communication between human languages” so maybe we can do it between species as well; Zhu started by trying to see if a language model could hear a difference between Shiba Inus in Japan and in the United States – it didn’t reveal any doggy dialect split; Zhu then compiled hundreds of hours of synced audio and video to train an AI model to separate canine vocalizations into discrete phonemes; so far, the team has transcribed about 50 hours of barks into syllables and identified some possible words like cat, cage and leash; they also identified how these words differ between dog breeds, how a dog’s linguistic capability appears to change as it ages – in one husky, as it grew older bark lasted longer and became more sophisticated; it’s not just dogs – Zhu is working on decoding cats and cow vocalizations. The cows are excited, but the cats couldn’t care less – do we really need AI to tell us that?

Navy Sub Meets Fast Underwater Object, Chupacabras Hit Cattle and Cars, Baseball Ghosts, Planet Y and More Mysterious News Briefly Read More »