memoment editorial

1 leaked playlists expose secrets of powerful figures

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi

NEWYou can now listen to Fox News articles!
Vice President JD Vance is a big fan of the Backstreet Boys’ “I Want It That Way.” White House Press Secretary Karoline Leavitt gets pumped up with Beyoncé’s “Run the World (Girls).” And former Florida Attorney General Pam Bondi? She cranks Nelly’s “Hot In Herre.”That’s all, according to Panama Playlists, a website that quietly went live recently and claims to reveal the hidden music tastes of politicians, tech leaders and journalists.”I found the real Spotify accounts of celebrities, politicians and journalists. Many use their real names,” the anonymous site creator wrote. “With a little sleuthing, I could say with near-certainty: yep, this is them.”The anonymous researcher, who says they’ve been scraping accounts since summer 2024, insists they only used publicly available information. “I’ve been scraping their playlists for over a year. Some individuals even have a setting enabled that displays their last played song. I scraped this continuously, so I know what songs they played, how many times and when.” They also noted there is no affiliation with Spotify. The site itself frames the project as more playful than sinister.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA Vice President JD Vance’s playlist revealed “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” (Panama Playlists)Why leaked playlists matterAt first, this all feels like lighthearted gossip, but it points to a bigger issue: how much of our personal information is publicly available by default? A playlist can reveal mood, personality and even political leanings. When pieced together with other open-source data, these details help paint a surprisingly detailed portrait. The lesson? Privacy leaks don’t always involve hackers. Sometimes, it’s the platforms themselves leaving doors wide open. REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSWhat the Panama Playlists revealThe playlists range from ironic to eyebrow-raising, with some choices feeling almost too on the nose. Here are some of the highlights: JD VanceThe vice president’s “Making Dinner” playlist includes “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” His “Gold On The Ceiling” playlist adds eclectic picks like “What Makes You Beautiful” by One Direction, “You are a Tourist” by Death Cab for Cutie and “San Francisco” by The Mowgli’s.Karoline LeavittThe White House press secretary’s “Baby Shower” playlist featured Beyoncé’s “Run the World (Girls)” and Cyndi Lauper’s “Girls Just Want to Have Fun.” The timing matched her actual baby shower, further confirming the account.Sam AltmanThe OpenAI CEO’s “My Shazam Tracks” suggests he’s searched for “Get Ur Freak On” by Missy Elliott, George Ezra’s “Blame It on Me,” and David Guetta and OneRepublic’s “I Don’t Wanna Wait.”Pam BondiThe U.S. Attorney General’s playlist “Pam” includes “Hot In Herre” by Nelly, “Hands to Myself” by Selena Gomez and “Cold As Ice” by Foreigner. Playlists show Karoline Leavitt listening to Beyoncé’s “Run the World (Girls),” Sam Altman to Missy Elliott’s “Get Ur Freak On” and Pam Bondi to Nelly’s “Hot In Herre.” (Panama Playlists)Ron DeSantisThe Florida governor keeps it classic. His playlist includes “Ring of Fire” by Johnny Cash, Billy Joel’s “Piano Man,”and “Life Is a Highway” by Rascal Flatts.Mike JohnsonThe House Speaker has a Pandora account with Jerry Goldsmith’s “The Parachutes,” Enya’s “May It Be,” and Bryan Adams’ “One Night Love Affair.”Adam MosseriThe Instagram CEO’s playlist, “Hang,” shows a reflective and soulful side. It features “July” by Noah Cyrus and Leon Bridges, “River” by Leon Bridges, “Strangers” by The Kinks and Leonard Cohen’s “Famous Blue Raincoat.” He rounds it out with Otis Redding’s “(Sittin’ On) The Dock of the Bay” and Bobby Vinton’s “Mr. Lonely.”  Ron DeSantis, Mike Johnson and Adam Mosseri’s playlists revealed. (Panama Playlists)9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUTWhat Panama Playlists teaches usPanama Playlists demonstrate how a person’s music can clash with their public image, revealing hidden interests that shake expectations.Your tunes might be more visible than you think.Spotify’s default settings put playlists in public mode unless you switch them to private.This is less about guilty pleasures and more about digital exposure. The music you thought was just for your earbuds might already be telling a story about you to strangers. Tips to stay safe and protect your playlistIf you use Spotify, Apple Music, or YouTube Music, take a moment to review your privacy settings. Here’s how to protect yourself: 1) Make playlists privateTurn off public defaults. Only share playlists you intentionally want others to see.SpotifyDisable public visibility: Stop new playlists from being automatically public.Tap your profile picture in the upper left.Tap Settings and privacyClick Privacy and Social Toggle off Public playlists. Users can adjust their Spotify settings to make their playlists private. (Kurt “CyberGuy” Knutsson)Apple MusicOpen the Apple Music app on your iPhone or iPad.Tap your profile icon or picture in the upper right of the screen.Tap “View Profile.”On your profile page, tap “Edit.”Find the toggle for “Listening To” or “Allow Others to See What You’re Listening To” and turn it off to stop sharing your Apple Music listening activity. Steps on how to stop sharing your Apple Music listening activity. (Kurt “CyberGuy” Knutsson)YouTube MusicOpen the YouTube Music app and sign in.Tap your profile picture to go to your Library.Find the playlist you want to edit. Long-press on the playlist or open it and tap the three dots (…).Choose Edit playlist.Under Privacy, select the option you want:Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Tap Done or Save to confirm your choice.Note: There is no global setting to make all playlists private at once; you must adjust privacy for each playlist individually. The privacy setting is available when creating a new playlist or editing an existing one. For brand-new playlists, you’ll see a privacy selection box during playlist creation. 2) Review connected appsStreaming platforms often link to third-party apps. Revoke access for those you no longer use. 3) Limit what you sharePlaylist names, listening history and even likes reveal more than you think. 4) Use personal data removal servicesWhat looks like harmless fun, like a playlist name or your “last played” track, can actually become part of a bigger puzzle. A determined bad actor could stitch together your music history with other open-source data, such as your social posts, tagged photos, or even public records. Over time, those small details paint a surprisingly complete picture of your habits, locations, or private interests.That’s why reducing your overall digital footprint matters. Personal data removal services work to wipe your information from data broker sites, making it harder for anyone to cross-reference your listening habits with your identity. The less data floating around, the harder it is for someone to connect the dots in ways you never intended.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan. 5) Keep your software updatedPrivacy settings change often. Check regularly to ensure your preferences haven’t been reset and keep your software updated.  CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe playlist leak may feel like a punchline, but it serves as a real reminder. Our digital lives are stitched together from tiny details we often overlook. Even something as simple as your favorite workout jams can end up on display if you don’t take control. Privacy isn’t about hiding your personality. It’s about choosing what you share, and with whom.Would you be comfortable if your own playlists, every guilty pleasure and repeat listens were suddenly made public? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved. 

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi Read More »

ai toys kids playing

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids

NEWYou can now listen to Fox News articles!
Do AI chatbots packaged inside plush animals really help children, or do they threaten vital developmental milestones? Companies market them as “screen-free playmates” for toddlers, but pediatric experts warn these toys could trade human connection for machine conversation. Toys like Grem, Grok and Rudi are designed to bond with kids through voice and conversation. Instead of simply replacing screen time, they may replace something far more important: the role of parents and peers in emotional development.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.THIS EV HAS A FACE, AND IT TALKS BACK WITH AI AI-powered stuffed toys, such as Grem (left), could disrupt cognitive and emotional development among young children, experts say. (Curio/©Michael Cuviello/Amarillo Globe-News/USA Today Network/IMAGN)Why AI stuffed animals worry child expertsPediatricians and psychologists raise red flags about these AI toys. Young children naturally form attachments. If those attachments shift to chatbots, kids may learn to trust machines more than people. Research already shows children ages 3 to 6 sometimes trust robots more than humans, even when the robots give wrong answers. That undermines how kids build empathy, learn to question, and develop critical thinking. There are also privacy concerns. Parents may not realize that these “personalized” toys are recording conversations. Sensitive information could be stored, analyzed, or misused without families fully knowing. A-powered stuffed toy called Grok. Companies market AI-enhanced plushies as “screen-free playmates” for toddlers. (Curio)HOLLYWOOD TURNS TO AI TOOLS TO REWIRE MOVIE MAGICHow AI toys may disrupt child developmentPediatric experts in early childhood and language development warn that responsive AI could “fundamentally change the wiring of the human brain.” Unlike television or passive media, AI plushies respond in real time, adapting to a child’s questions, stories, and moods. That responsiveness can be powerful. It can encourage curiosity, vocabulary growth, and even creativity. But it can also crowd out human interactions, those subtle facial expressions, pauses, and “nos” that children need to experience to learn empathy and resilience. Another risk is that AI companions are trained to be overly charming and agreeable. Instead of challenging a child’s thinking, these “sycophantic” toys may simply tell kids what they want to hear. Over time, that could nudge children toward believing comforting lies instead of asking hard questions, a toxic pattern for developing critical thinking.  AI-powered stuffed toy called Gabbo. Pediatric experts in childhood development warn responsive AI in stuffed animals may “fundamentally” alter brain growth. (Curio)MCDONALD’S AI HIRING CHATBOT EXPOSED DATA OF JOB CANDIDATESThe benefits and risks parents should weighSome parents say these AI toys offer relief. They help answer endless questions, tell stories, and spark play. In fact, some early research shows kids learn new words faster when engaging in dialogue with AI rather than passively consuming media. But the tradeoff is significant. If AI becomes the primary companion, kids could miss out on the messy, unpredictable, and deeply human experiences that shape trust, empathy, and social awareness. AI-powered stuffed toy called Grok still in its shipping box. Experts warn that AI-powered plushies could reshape child development and trust. (Curio)Safety and security tips for parents before buying AI plush toysBefore bringing one of these toys home, experts suggest:Check the fine print: Review what data is collected, where it’s stored, and if it can be deleted.Limit use to short sessions: Treat the toy like TV, fun in moderation, not a substitute for playmates.Keep conversations public: Encourage kids to use the toy in family spaces, not behind closed doors.Turn off the cloud if possible: Some models work locally without sending every word to servers.WE HAVE TO ACT NOW TO KEEP AI FROM BECOMING A FAR-LEFT TROJAN HORSEBetter play alternatives to AI-stuffed animalsIf you’re worried about replacing human connection, consider healthier alternatives:Rotate traditional toys to keep novelty alive.Use AI plushies together with your child, treating it as a shared activity instead of a private companion.Encourage kids to retell stories to parents and siblings, not just to the toy.What this means for youParents need to think critically before bringing an AI-powered plushie into their home. Ask yourself:Do I want my toddler’s first conversations recorded by a company?Could a chatbot toy undermine the natural give-and-take of family interaction?Am I replacing screen time, or am I replacing myself?Balancing curiosity with caution is key. Occasional use may spark fun, but long-term reliance could reshape your child’s emotional growth in ways no study has yet measured.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawaysAI stuffed animals may look like harmless, cuddly friends, but the stakes are bigger than bedtime stories. These AI-powered plushie toys raise questions about privacy, trust, and what it means to connect as humans. Technology will always tempt us with convenience, but children learn best through love, attention, and genuine relationships.Would you let an AI-powered toy become your child’s closest companion? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids Read More »

transunion building office

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected

NEWYou can now listen to Fox News articles!
You might have recently noticed a wave of cyberattacks hitting companies whose services millions of Americans rely on every day. Among the victims are Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, all reporting breaches linked to Salesforce-connected applications.Now, credit reporting firm TransUnion has confirmed its own major incident, with more than 4.4 million U.S. consumers affected. Attackers exploited weaknesses in third-party integrations, not Salesforce itself. Security researchers tie this technique to the extortion group ShinyHunters and its affiliated crews.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD Hackers stole 13 million records, exposing data of 4.4 million Americans in the latest TransUnion cyberattack. (Christopher Dilts/Bloomberg)What you need to know about the TransUnion data breachTransUnion has disclosed a major data breach that impacted 4,461,511 individuals in the United States, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025, and was discovered two days later on July 30.The breach resulted from unauthorized access to a third-party application used in TransUnion’s U.S. consumer support operations. The company stressed that its core credit database and credit reports were not compromised.Although TransUnion characterized the exposed information as “limited,” the stolen data is highly sensitive. It includes names, dates of birth, Social Security numbers, billing addresses, email addresses, phone numbers, reasons for customer transactions (such as requests for a free credit report), and customer support tickets and messages.Hackers claim they stole more than 13 million records in total, with about 4.4 million tied to U.S. consumers.In response, TransUnion is providing all affected individuals with 24 months of free credit monitoring and identity theft protection services.FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS The breach at TransUnion follows several similar cyberattacks against tech companies, including Google and Cisco, and retail brands, such as Chanel and Adidas.  (Mike Kemp/In Pictures)Hackers target companies through Salesforce appsThe breach appears to be part of a broader wave of Salesforce-related attacks that is hitting organizations across sectors, from tech and finance to retail and aviation. Alongside Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, brands like Adidas, Louis Vuitton, Dior, Tiffany & Co., Cartier and Air France-KLM have also reported incidents tied to weaknesses in Salesforce-linked applications.In most cases, attackers exploited malicious third-party integrations or OAuth-connected apps disguised as legitimate Salesforce tools to siphon sensitive records. This technique bypassed traditional login protections and gave intruders long-lasting access to customer relationship management data. The stolen information ranges from basic contact details and business notes to highly sensitive identifiers such as Social Security numbers, dates of birth and driver’s license information.Researchers say these intrusions align with activity from the extortion group ShinyHunters, with some overlap in tactics and infrastructure linked to other threat actors like Scattered Spider. Campaigns tracked under names such as UNC6395 and UNC6040 point to a larger “extortion-as-a-service” model, where criminal crews collaborate and share stolen data across underground forums.TransUnion’s responseCyberGuy reached out to TransUnion for a comment and received the following response:”TransUnion recently experienced a cyber incident that affected a third-party application serving our U.S. consumer support operations. Upon discovery, we quickly contained the issue, which did not involve our core credit database or include credit reports.The incident involved unauthorized access to limited personal information for a very small percentage of U.S. consumers. We are working with law enforcement and have engaged third-party cybersecurity experts for an independent forensics review. Additionally, we will notify affected consumers and provide credit monitoring services.”As for the gap between when the breach occurred (July 28, 2025) and when it was officially recorded as “discovered” (July 30, 2025), a TransUnion spokesperson clarified that the company “identified and contained this event within hours” of it happening, but that it is common industry practice to designate a later “date of discovery” to reflect a more complete assessment following the initial response.MARY KAY’S ICONIC PINK CADILLAC SHIFTS TO FULLY ELECTRIC Researchers have linked the latest cybercrimes to extortion group ShinyHunters and its affiliated crews. (Kurt “CyberGuy” Knutsson)8 ways you can stay safe from the TransUnion data breachThe TransUnion breach exposed millions of people’s data, but there are steps you can take to protect yourself. Here are eight ways to stay safe.1) Delete personal data that puts you at riskGo through old online accounts, shopping profiles or cloud storage that may still hold sensitive data. Deleting what you no longer use reduces the amount of information that could be stolen in future breaches or sold on dark web forums. You can also get help from a data removal service.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.2) Avoid phishing scams and use strong antivirus softwareData stolen in breaches often ends up fueling phishing campaigns. Attackers may use your name, email or phone number to make messages look more convincing. If you get an email or text claiming to be from TransUnion, your bank or any service asking you to “verify” details, don’t click on the link. Instead, log in through the official website or call customer service directly.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech.3) Save passwords securelyIf your login details were exposed, reusing the same password across sites puts multiple accounts at risk. Use a password manager to create and store strong, unique passwords for every service. Even if hackers get hold of one, they won’t be able to use it elsewhere. Consider using a password manager to generate and store complex passwords.Next, see if your passwords have been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY4) Turn on two-factor authenticationTwo-factor authentication (2FA) adds a critical extra step beyond just a password. If someone tries to break into your email, banking app or social media account, they’ll also need the one-time code from your authenticator app or text message. This makes stolen credentials much less useful.5) Keep your devices updatedHackers often rely on outdated software to spread malware or steal information. Installing the latest updates for your phone, computer and apps ensures security patches are in place, blocking known vulnerabilities that attackers might exploit.6) Freeze your credit right awayOne of the biggest risks after a breach is criminals opening new loans or credit cards in your name. A credit freeze with all three major bureaus, TransUnion, Equifax and Experian, prevents anyone from accessing your credit file without your approval. It’s free and can be temporarily lifted if you need to apply for credit.7) Monitor your accounts regularlyWatch your bank and credit card statements for unfamiliar charges, no matter how small. Set up transaction alerts where available. You should also pull your free annual credit report to check for unauthorized accounts or inquiries, which could be signs of fraud.8) Consider identity theft protection servicesIf your Social Security number, driver’s license or other sensitive identifiers were exposed, you may want to sign up for an identity theft protection service. These services monitor credit reports, dark web forums and financial activity for signs of misuse. Some also include insurance or recovery assistance if your identity is stolen, giving you added peace of mind beyond basic credit monitoring. If you’re one of the affected TransUnion users, make use of the 24 months of free credit monitoring and identity theft protection services. If not, you might get one yourself for the future.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayThe reality is that the TransUnion breach isn’t just about stolen names and numbers. It’s about how exposed ordinary people are when a single company holds the keys to their financial identity. For years, consumers have had little choice but to trust credit bureaus they never opted into.Should companies like TransUnion be held legally accountable when millions of people are exposed to fraud? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.  

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected Read More »

GettyImages 1334810601 2560x1440 1

Earth models can predict the planet’s future but not their own

Meanwhile, experts say that funding cuts could mean modeling abilities migrate overseas, some science may never be realized, and expertise could be lost.
With that toss-off of talent, said Andrew Dessler, a professor of atmospheric sciences at Texas A&M University, countries like China may catch up to the US “It would have been very hard for them to have a more respected scientific organization or scientific system than the US did,” Dessler said. “Our research universities are really the envy of the world, and our government labs are the envy of the world.”

But they won’t be, he said, if the country loses the expertise of those who work in them.
E3SM scientists want to understand how Earth changes over time and how much conditions vary within long-term projections—like, say, how average temperature may creep up over time, but extremely low temperatures blast Colorado nevertheless. Eventually, these scientists hope to incorporate enough chemistry, physics, and biology to create a “digital twin” of the planet—modeling Earth in a way true to its real form.
That’s a lofty goal, especially since reaching even the current, less twin-like stage took scientists more than 10 years of software development and tweaking. “The models are very big in terms of how much code there is,” said Lawrence, the earth system scientist at NCAR. (Through a spokesperson, Lawrence Livermore National Laboratory, whose scientists lead the model’s development, declined to comment for this story. “We aren’t able to offer interviews about E3SM at this time,” lab spokesperson Jeremy Thomas wrote in an email; he did not respond to an emailed question about why.)
Lawrence, though, knows this, as head of a similar project, called the Community Earth System Model, an early version of which served as a basis for E3SM.

Earth models can predict the planet’s future but not their own Read More »

docusign apple fraud photo 1

Scammers are using DocuSign emails to push Apple Pay fraud

NEWYou can now listen to Fox News articles!
Phishing scams are getting smarter, and one of the latest tricks involves fake DocuSign emails that appear to show charges from major companies like Apple. At first glance, these fraud messages look convincing, often including a receipt, order ID and even a support number. But instead of connecting you to Apple or another legitimate service, that number links you directly to scammers.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T FALL FOR THIS BANK PHISHING SCAM TRICKAll about the DocuSign & Apple Pay fraudThese phishing emails pretend to be billing receipts for recent Apple Pay purchases. They typically claim that a subscription has been charged to your account and prompt you to call a phone number if you do not recognize the charge. Scammers spoof Apple, Netflix, and other brands to push fake subscription charges posing as DocuSign. (Kurt “CyberGuy” Knutsson)The emails often use well-known brands such as Apple, Netflix, Expedia, or even lawn service companies to make them seem credible. Some also include a “DocuSign” link with a security code, creating the illusion that you need to access a file to confirm the transaction.In reality, neither Apple nor these other companies sends billing receipts through DocuSign. That detail alone is a red flag. Another telltale sign is the sender’s address. It may contain odd characters, such as a Cyrillic “B” replacing the “B” in “Billing,” which helps scammers bypass spam filters.AMAZON ALERTS CUSTOMERS ABOUT IMPERSONATION SCAMSHow the DocuSign scam worksThe scam aims to catch you off guard and pressure you into acting fast. The email claims your Apple Pay account has been charged for a subscription or purchase. It includes an order ID, a charge amount, and a DocuSign link that supposedly holds a receipt or confirmation file. To make it look even more convincing, some versions add a security code to “unlock” the document.The message also lists a phone number and urges you to call if the charge was not authorized. That number is the core of the scam. Instead of reaching Apple, Netflix or whichever company the email pretends to represent, you end up speaking with a scammer posing as a support agent.Once you’re on the call, the scammer tries to convince you that your account has been compromised or that the payment must be reversed right away. From there, the tactics vary. They might ask for your Apple ID, banking details, or card numbers. They may pressure you to download remote access software so they can “fix” the issue on your device. In some cases, they demand payment for fake account protection or reversal fees. DocuSign scam uses fake receipts and urgent language to steal personal information from users. (Kurt “Cyberguy” Knutsson)The end goal is always the same: gain enough access to lock you out of your accounts, steal sensitive data, or initiate fraudulent transactions. What makes these scams dangerous is how they combine multiple red flags in one message: a realistic-looking receipt, official logos, a DocuSign link, urgent language, and a phone number that appears to be the quickest way to resolve the issue.HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM5 ways to stay safe from the DocuSign scamScammers rely on people reacting quickly without questioning the details. The good news is that there are simple steps you can take to protect yourself. Here are five practical ways to stay safe.1) Inspect the sender address carefullyScammers often use email addresses that look close to official ones but contain subtle differences, such as extra letters or swapped characters. If the email does not come from an official domain like @apple.com, it is not legitimate. Fraudulent billing emails claim Apple Pay charges and link victims to fake support lines using DocuSign. (Kurt “CyberGuy” Knutsson) 2) Know how companies send receiptsApple, Netflix, and other major services do not send billing statements through DocuSign. If a receipt shows up in this format, you can safely assume it is a scam. Real receipts always come directly from the service provider itself.3) Watch out for phishing links and use strong antivirus softwareBe cautious with any links in suspicious emails. Scammers often mask harmful links behind text that looks legitimate, such as “View Document” or “Review Payment.” Hover over the link without clicking to see the real web address. If it does not match the official company domain, do not click.The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.4) Double-check your transaction historyInstead of trusting the email, confirm whether a charge actually exists. Apple users can review purchases directly from the Settings app under their Apple ID. If nothing shows up, the receipt is fake. Other services have similar ways to check history.5) Delete personal data from the internetThe less information scammers can find about you online, the harder it is for them to craft convincing attacks. Consider removing old accounts you no longer use, limit the personal details you share publicly on social media, and use data removal services when possible. This reduces the risk of your name, email, or phone number being targeted in scams like this.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayPhishing scams are constantly evolving, and the DocuSign Apple Pay ruse is just one of many. The best defense is a healthy dose of skepticism. If something feels off, stop, double-check, and confirm directly through official channels. Scammers rely on panic and quick reactions. By slowing down and verifying details, you can protect yourself from falling into their trap.Should email providers step up their filters so fewer of these messages slip through? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM.Copyright 2025 CyberGuy.com.  All rights reserved. 

Scammers are using DocuSign emails to push Apple Pay fraud Read More »

raft 2

Fox News AI Newsletter: Fighter pilots take directions from AI

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Fighter pilots take directions from AI in Pentagon’s groundbreaking test- Google Pixel 10 event brings new phones, smartwatch, earbuds and AI- Elon Musk’s xAI sues Apple, OpenAI over AI competition and App Store rankings Image of Starsage’s battle manager system  (Raft AI )MACHINE WINGMAN: For the first time, U.S. fighter pilots took direction from an AI “air battle manager” in a Pentagon test that could change how wars are fought in the skies.STAR-POWERED TECH: Google kicked off its Made by Google event last week with blockbuster energy. Jimmy Fallon played host, bringing humor and star presence. Steph Curry highlighted how the Pixel 10 empowers creators and athletes to capture and share their stories. Lando Norris, fresh from the F1 circuit, showed off how Pixel’s speed and AI enhancements fit into fast-paced lives. And the Jonas Brothers premiered a music video filmed entirely on the new Pixel 10 Pro, proving the phone’s camera is ready for professional-grade production.TECH THROWDOWN: Billionaire entrepreneur Elon Musk’s artificial intelligence startup xAI sued Apple and ChatGPT maker OpenAI in U.S. federal court in Texas on Monday, accusing them of illegally conspiring to thwart competition for artificial intelligence. Visitors walk in front of the Meta (Facebook) sign at its headquarters in Menlo Park, California, United States on December 29, 2022.  ((Photo by Tayfun Coskun/Anadolu Agency via Getty Images))BIG MONEY MOVE: Meta Platforms, Inc., the parent company of Facebook and Instagram, is launching a new political action committee to back candidates in California who support pro-artificial intelligence policies and oppose strict regulation.RISING CONCERNS: Artificial intelligence is developing rapidly. While some are embracing it, others are warning of the potential threats. But both sides agree the technology is changing how the world operates.TECH SPOTTER: A missing hiker’s dead body was finally found in July in Italy’s rugged Piedmont region after 10 months. The recovery team credited the breakthrough to an AI-powered drone that spotted a critical clue within hours. The same process would have taken weeks or even months if done by the human eye. Will Smith performs onstage during a concert at Cardiff Castle on Aug. 25, 2025, in Cardiff, Wales. (Maxine Howell)FAKE CROWD FRENZY: Will Smith is facing accusations of using artificial intelligence to create a crowd in a video shared online.TECH DEAL: Nvidia CEO Jensen Huang told FOX Business on Thursday that he is in talks with the Trump administration about selling its powerful Blackwell chip to China, saying how the global adoption of American tech could help the U.S. win the AI race.EVOLVING ROLES: Right now, many people are worried that artificial intelligence is coming for their jobs. If you’re one of them, then the recent study by Microsoft will shed some light on how AI’s generative capabilities will impact your field of work. In short, some occupations are more susceptible to its influence than others.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Fighter pilots take directions from AI Read More »

wall street 1152x648 1

Texas suit alleging anti-coal “cartel” of top Wall Street firms could reshape ESG

This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers climate, energy, and the environment. Sign up for their newsletter here.
Since 2022, Republican lawmakers in Congress and state attorneys general have sent letters to major banks, pension funds, asset managers, accounting firms, companies, nonprofits, and business alliances, putting them on notice for potential antitrust violations and seeking information as part of the Republican pushback against “environmental, social and governance” efforts such as corporate climate commitments.
“This caused a lot of turmoil and stress obviously across the whole ecosystem,” said Denise Hearn, a senior fellow at the Columbia Center on Sustainable Investment. “But everyone wondered, ‘OK, when are they actually going to drop a lawsuit?’”
That came in November, filed by Texas Attorney General Ken Paxton and 10 other Republican AGs, accusing three of the biggest asset managers on Wall Street—BlackRock, Vanguard and State Street—of running “an investment cartel” to depress the output of coal and boosting their revenues while pushing up energy costs for Americans. The Trump administration’s Department of Justice and Federal Trade Commission filed a supporting brief in May.
The overall pressure campaign aimed at what’s known as “ESG” is having an impact.
“Over the past several months, through this [lawsuit] and other things, letters from elected officials, state and federal, there has been a chilling effect of what investors are saying,” said Steven Maze Rothstein, chief program officer of Ceres, a nonprofit that advocates for more sustainable business practices and was among the earliest letter recipients. Still, “investors understand that Mother Nature doesn’t know who’s elected governor, attorney general, president.”
Earlier this month, a US District Court judge in Tyler, Texas, declined to dismiss the lawsuit against the three asset managers, though he did dismiss three of the 21 counts. The judge was not making a final decision in the case, only that there was enough evidence to go to trial.

Texas suit alleging anti-coal “cartel” of top Wall Street firms could reshape ESG Read More »

american man at computer

Farmers Insurance data breach exposes 1.1M Americans

NEWYou can now listen to Fox News articles!
Data breaches are no longer just a problem for the tech industry. They’ve become a constant across every sector, from airlines to banks to fashion brands, exposing personal data and leaving customers worried about where their information might end up. Insurance companies, sitting on mountains of sensitive details, are no exception. The latest to join the list is Farmers Insurance. The U.S. insurer confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year, stealing customer databases and fueling a growing wave of extortion attempts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATIONWhat you need to know about the Farmers Insurance breachFarmers Insurance has confirmed a data breach impacting more than 1.1 million customers. The incident is tied to the ongoing wave of Salesforce-related cyberattacks that have hit major companies this year.In a notice published on its website, the U.S. insurance giant said the breach occurred on May 29, 2025, through one of its third-party vendors. Farmers serves over 10 million households nationwide. It offers auto, home, life, and business insurance through a vast network of agents and subsidiaries.”On May 30, 2025, one of Farmers’ third-party vendors alerted Farmers to suspicious activity involving an unauthorized actor accessing one of the vendor’s databases containing Farmers’ customer information,” the company wrote in its advisory. Farmers Insurance confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year. (Kindamorphic/Getty Images)According to the company, the vendor’s monitoring tools detected the intrusion quickly, allowing containment measures to be taken. Farmers said it immediately launched an investigation, notified law enforcement, and worked to determine the scope of the breach.The investigation revealed that the stolen data included customer names, addresses, dates of birth, and driver’s license numbers. In some cases, the last four digits of Social Security numbers. Farmers began notifying affected individuals on Aug. 22, with a filing to the Maine Attorney General’s Office confirming that 1,111,386 customers were impacted.While Farmers did not publicly name the vendor involved, reports indicate that the breach is part of the larger Salesforce data theft campaign carried out by threat actors this year.ALLIANZ LIFE INSURANCE DATA BREACH EXPOSES 1.4 MILLION AMERICANSThe Salesforce data theft campaignThe Salesforce attacks have been ongoing since early 2025. Researchers attributed them to a threat actor cluster tracked as UNC6040/UNC6240. The intrusions typically begin with voice phishing (vishing) calls, where employees are tricked into approving a malicious OAuth application linked to their company’s Salesforce instance.Once connected, attackers siphon customer relationship management (CRM) databases and use the stolen data in extortion attempts. The cybercrime group ShinyHunters has claimed responsibility, according to BleepingComputer. The group claims that the attacks involve overlapping threat groups, including members of the notorious Scattered Spider gang. Hackers exploited a third-party vendor tied to Salesforce systems to steal 1.1 million Farmers Insurance customer data. (Kurt “CyberGuy” Knutsson)”Like we have said repeatedly already, ShinyHunters and Scattered Spider are one and the same,” a representative told the publication. “They provide us with initial access, and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”The Salesforce campaign has affected a growing list of high-profile companies, including Google, Cisco, Workday, Adidas, Qantas, Allianz Life and luxury brands under LVMH such as Louis Vuitton, Dior, and Tiffany & Co.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUPFarmers Insurance responseIn response to CyberGuy’s inquiry, a Farmers Insurance spokesperson shared the following statement:”At Farmers, protecting our customers’ information is our top priority. We recently discovered that an unauthorized third party briefly accessed a vendor’s system that contained some Farmers’ customer information. The incident involved only limited information from certain customers. An investigation-conducted with both internal and external security experts-found no evidence that the exposed data has been misused, nor any indication that Farmers’ own systems were compromised. We are contacting affected individuals directly and are providing support resources, including complimentary credit monitoring.”8 ways you can stay safe after a data breachIf your personal information has been exposed in the Farmers data breach, take the steps below immediately to limit the damage, protect your identity, and prevent future fraud. Farmers Insurance said it began notifying more than 1 million affected policyholders after detecting unauthorized access to customer records in a data breach. (Kurt “CyberGuy” Knutsson)1) Invest in a data removal serviceYou can’t undo the damage once hackers have accessed your data. However, you can limit the fallout by investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use identity theft protection servicesYour Social Security number or other sensitive data may have been exposed in the data breach. Identity Theft companies can monitor personal information, such as your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.3) Enable two-factor authentication (2FA)Turn on 2FA for your email, banking, and insurance logins. Even if a hacker has your password, 2FA requires a second verification step, like a code sent to your phone, making unauthorized access much harder.4) Be wary of phishing and follow-up scamsAfter a data breach, attackers often follow up with phishing emails or phone calls. They pretend to be from your insurance company or a support service. Don’t click on links in unsolicited messages, and verify any claims through official channels before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.5) Freeze your credit right awayPut a credit freeze on your files with Equifax, Experian and TransUnion. This stops criminals from opening new accounts in your name. It’s free, easy to set up, and you can lift the freeze temporarily when needed.6) Update your passwords nowChange your passwords for all important accounts. Start with email, financial, and health-related logins. Use strong, unique passwords for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.7) Check your accounts for strange activityLook for any signs of identity misuse, like:Unknown chargesLogins from unfamiliar devicesNew accounts or lines of credit you didn’t openEarly detection makes a big difference.8) Report identity theft fastIf someone is misusing your identity, go to IdentityTheft.gov. This government site provides step-by-step help and generates the letters and reports you’ll need to stop the fraud.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayData breaches keep hitting companies we trust, and Farmers Insurance is the latest reminder. Even when the stolen data hasn’t been misused yet, the risk lingers long after the headlines fade. That’s why it’s so important to stay alert, protect your identity, and take simple steps now. By acting today, you put yourself in control, not the hackers.Do incidents like this make you reconsider which companies you do business with? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Farmers Insurance data breach exposes 1.1M Americans Read More »

megan mcarthur iss

NASA Astronaut Megan McArthur Retires

NASA astronaut Megan McArthur has retired, concluding a career spanning more than two decades. A veteran of two spaceflights, McArthur logged 213 days in space, including being the first woman to pilot a SpaceX Dragon spacecraft and the last person to “touch” the Hubble Space Telescope with the space shuttle’s robotic arm.
McArthur launched as pilot of NASA’s SpaceX Crew-2 mission in April 2021, marking her second spaceflight and her first long-duration stay aboard the International Space Station. During the 200-day mission, she served as a flight engineer for Expeditions 65/66, conducting a wide array of scientific experiments in human health, materials sciences, and robotics to advance exploration of the Moon under Artemis and prepare to send American astronauts to Mars.
Her first spaceflight was STS-125 in 2009, aboard the space shuttle Atlantis, the fifth and final servicing mission to Hubble. As a mission specialist, she was responsible for capturing the telescope with the robotic arm, as well as supporting five spacewalks to update and repair Hubble after its first 19 years in space. She also played a key role in supporting shuttle operations during launch, rendezvous with the telescope, and landing.
“Megan’s thoughtful leadership, operational excellence, and deep commitment to science and exploration have made a lasting impact,” said Steve Koerner, acting director of NASA’s Johnson Space Center in Houston. “Her contributions have helped shape the future of human space exploration, and we are incredibly grateful for her service.”
In addition to her flight experience, McArthur has served in various technical and leadership roles within NASA. In 2019, she became the deputy division chief of the Astronaut Office, supporting astronaut training, development, and ongoing spaceflight operations. She also served as the assistant director of flight operations for the International Space Station Program starting in 2017.
Since 2022, McArthur has served as the chief science officer at Space Center Houston, NASA Johnson’s official visitor center. Continuing in this role, she actively promotes public engagement with space exploration themes, aiming to increase understanding of the benefits to humanity and enhance science literacy.
“Megan brought a unique combination of technical skill and compassion to everything she did,” said Joe Acaba, chief of the Astronaut Office at NASA Johnson. “Whether in space or on the ground, she embodied the best of what it means to be an astronaut and a teammate. Her contributions will be felt by the next generation of explorers she helped train.”
McArthur was born in Honolulu and raised as a “Navy kid” in many different locations worldwide. She earned a Bachelor of Science in aerospace engineering from the University of California, Los Angeles, and a doctorate in oceanography from the Scripps Institution of Oceanography at the University of California, San Diego. Before being selected as an astronaut in 2000, she conducted oceanographic research focusing on underwater acoustics, which involved shipboard work and extensive scuba diving.
McArthur is married to former NASA astronaut Robert Behnken, who also flew aboard the Dragon Endeavour spacecraft during the agency’s SpaceX Demo-2 mission in 2020.
“It was an incredible privilege to serve as a NASA astronaut, working with scientists from around the world on cutting-edge research that continues to have a lasting impact here on Earth and prepares humanity for future exploration at the Moon and Mars,” said McArthur. “From NASA’s Hubble Space Telescope to the International Space Station, our research lab in low Earth orbit, humanity has developed incredible tools that help us answer important scientific questions, solve complex engineering challenges, and gain a deeper understanding of our place in the universe. Seeing our beautiful planet from space makes it so clear how fragile and precious our home is, and how vital it is that we protect it. I am grateful I had the opportunity to contribute to this work, and I’m excited to watch our brilliant engineers and scientists at NASA conquer new challenges and pursue further scientific discoveries for the benefit of all.”
To learn more about NASA’s astronauts and their contributions to space exploration, visit:
https://www.nasa.gov/astronauts
-end-
Shaneequa VereenJohnson Space Center, Houston281-483-5111shaneequa.y.vereen@nasa.gov

NASA Astronaut Megan McArthur Retires Read More »

1 mary kays iconic pink cadillac shifts to full electric

Mary Kay’s iconic pink Cadillac shifts to fully electric

NEWYou can now listen to Fox News articles!
Nearly 60 years ago, Mary Kay Ash was turned away by a car salesman who refused to sell her a car without a man’s signature. That moment became the catalyst for a legacy, one powered by determination, lipstick, and eventually, horsepower. Now, the iconic Mary Kay pink Cadillac is entering a bold new chapter: electric mobility. Mary Kay is offering its top-performing sales reps a fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish. It’s the first time the company’s legendary incentive vehicle is going fully electric, and it’s turning heads while staying true to its roots.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. A fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish is parked in front of Mary Kay. (Mary Kay)A statement in pink (and green)In a press release, CEO Ryan Rogers, grandson of founder Mary Kay Ash, called the move a tribute to the company’s past and a leap into the future:”With the introduction of the all-electric OPTIQ, we’re honoring that iconic legacy while driving into a transformative future-one grounded in our commitment to sustainability and dedication to inspiring and celebrating the achievements of our independent sales force for generations to come.”THIS EV HAS A FACE, AND IT TALKS BACK WITH AIIt’s not just a change in drivetrain. It’s a shift in mindset and a signal that luxury, reward, and eco-consciousness can coexist without compromise. The Cadillac Optiq grille and logo are seen up close. (Mary Kay)Why the pink Cadillac still mattersMary Kay pink Cadillacs are more than just a flashy ride. They represent achievement, empowerment, and recognition. Only the top 1% of the company’s sales force qualify. Even then, it’s not handed out lightly; recipients can choose a $900 monthly bonus instead. But 90% take the car. What makes these cars even more exclusive is that they’re leased for just two years. When the lease ends, they’re returned and repainted to the original factory color. That makes a true pink Cadillac a rare sight outside of Mary Kay circles. And yes, they’re beautiful. That pink pearl paint is exclusive, and few people outside the company ever get to drive one.VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION The fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish drives down a road. (Mary Kay)What this means for youWhether or not you’re building an empire through lipstick sales, this shift tells a bigger story. The auto industry is changing. EVs are no longer just for tech-savvy early adopters or Silicon Valley commuters. Now, they’re reaching industries built on tradition and glamour. The Mary Kay electric Cadillac shows how companies can preserve their legacy while embracing innovation. If you’re considering switching to an electric vehicle, this proves that style and sustainability don’t have to be at odds.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis move isn’t just a flex. It’s a smart pivot that aligns Mary Kay with modern values while still honoring its founder’s bold spirit. And frankly, it’s refreshing to see a legacy brand walk the talk when it comes to sustainability and do it in such an eye-catching shade of pink.How do you see the integration of electric vehicles by legacy brands like Mary Kay impacting attitudes towards sustainability in industries rooted in tradition? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Mary Kay’s iconic pink Cadillac shifts to fully electric Read More »