memoment editorial

1 court clerk imposters target people with fake jury duty phone scam intro

Jury duty phone scams on the rise as fraudsters impersonate local officials, threaten arrest

NEWYou can now listen to Fox News articles!
Scammers are constantly finding new ways to trick people. While older tactics like phishing emails and impersonating government agencies to steal credentials are becoming easier to spot, bad actors are now turning to more alarming methods. One of the latest involves impersonating local authorities. People have reported receiving phone calls claiming they missed jury duty and now face a warrant for their arrest. This kind of impersonation scam is harder to spot because it’s highly personalized, but that doesn’t mean you’re defenseless. Let’s break it down.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T FALL FOR THIS BANK PHISHING SCAM TRICK Scammers impersonating local authorities are on the rise, telling victims they missed jury duty and must pay to avoid legal trouble. (Kurt “CyberGuy” Knutsson)What jury duty scam victims need to knowScammers posing as court officials are targeting individuals with false claims about missed jury duty, prompting warnings from law enforcement. The fraud typically begins with a call from a blocked or unknown number, alleging that the recipient has missed jury duty and is facing an arrest warrant. The scammers then demand payment, usually through wire transfers or gift cards.A key warning sign is being asked to pay money to avoid arrest or legal trouble. It is important never to give money or personal information to unknown callers.These scams often target older or more vulnerable individuals, although younger people have also reported close calls. In one example, a person received repeated calls from an unidentified number before answering. The caller, claiming to be from a local sheriff’s department and equipped with the individual’s full name and address, insisted they had failed to appear for jury duty and faced multiple citations.HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS Victims can spot jury duty impersonation scams by verifying suspicious calls before taking action and reducing their digital footprint. (Kurt “CyberGuy” Knutsson)How to spot jury duty impersonation scamsNo jury duty arrest warrants: Missing jury duty doesn’t lead to criminal citations or warrants.Blocked or spoofed numbers: Real law enforcement won’t hide their identity.Unusual payment methods: No government agency will ask for gift cards or crypto.Aggressive threats: Threats of arrest or contempt of court are a scare tactic.Legitimate jury summonses are delivered by mail, not through threatening phone calls.6 ways to protect yourself from jury duty scam callsIf you get a suspicious call about missed jury duty, don’t panic. Follow these steps to stay safe and protect your personal information.1) Don’t trust calls from unknown numbersThis might sound obvious, but don’t trust any unknown caller, especially if they demand money. Legitimate authorities will never ask for payment over the phone, especially not through gift cards, wire transfers, or cryptocurrency. If someone threatens you with arrest or legal action unless you pay immediately, it’s almost certainly a scam. Hang up and call your local court or police department using an official number.HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE 2) Verify suspicious calls before taking actionIf you receive a suspicious call, take a breath and fact-check. Court summonses are always delivered by mail, not over the phone. Even if the caller has personal information like your name or address, that doesn’t make them credible. Scammers often use leaked or publicly available data to appear convincing.Be extra cautious, even if the scam comes through text messages or email. Do not click on any suspicious links, as they can install malware on your device and steal your personal data.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.GET FOX BUSINESS ON THE GO BY CLICKING HERE 3) Reduce your digital footprint to stop scammersThe truth is, your data is already out there, from old social media profiles to past breaches. That’s often how scammers get enough personal details to sound legitimate. Investing in a data removal service can help reduce your digital footprint by scrubbing your information from people-search sites and data brokers.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Victims of jury duty phone scams can block and report suspicious numbers to local law enforcement or fraud reporting agencies. (Kurt “CyberGuy” Knutsson)4) Block and report scam numbersIf you receive a scam call, report it to local law enforcement or your country’s fraud reporting agency. After hanging up, block the number on your phone and report it to:FTC (USA): reportfraud.ftc.govLocal police or sheriff’s officeYour phone carrier’s scam call reporting optionMany carriers allow you to forward scam texts to 7726 (SPAM).5) Use call screening or spam protection appsApps like Truecaller, Hiya, and built-in features like Google Call Screen or Silence Unknown Callers on iPhones can detect and block fake calls automatically.Pro Tip: Enable your phone’s “silence unknown callers” feature for extra protection. 6) Talk to vulnerable family membersOlder adults are frequent targets. Sit down with your parents, grandparents, or neighbors to explain how these scams work and what to watch for. A simple heads-up could stop a costly mistake.What this means for youScammers are getting bolder and more convincing, but you can stay a step ahead. Knowing the signs of a jury duty phone scam, using smart tools like antivirus and call blockers and limiting your digital footprint can dramatically reduce your risk. Empower yourself and your loved ones with this knowledge.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayInstead of relying on faceless phishing emails, scammers are now using hyper-personalized and emotionally charged phone calls. By impersonating local authorities and referencing civic duties like jury duty, they exploit both fear and a sense of responsibility. What makes this especially dangerous is how plausible it sounds, drawing on real processes that many people don’t fully understand.Do you think law enforcement and government agencies are doing enough to educate the public about these scams? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved. 

Jury duty phone scams on the rise as fraudsters impersonate local officials, threaten arrest Read More »

Solar Orbiter traces superfast electrons back to Sun pillars

Double trouble: Solar Orbiter traces superfast electrons back to Sun

Science & Exploration

01/09/2025
966 views
23 likes

The European Space Agency-led Solar Orbiter mission has split the flood of energetic particles flung out into space from the Sun into two groups, tracing each back to a different kind of outburst from our star.

The Sun is the most energetic particle accelerator in the Solar System. It whips up electrons to nearly the speed of light and flings them out into space, flooding the Solar System with so-called ‘Solar Energetic Electrons’ (SEEs).Researchers have now used Solar Orbiter to pinpoint the source of these energetic electrons and trace what we see out in space back to what’s actually happening on the Sun. They find two kinds of SEE with clearly distinct stories: one connected to intense solar flares (explosions from smaller patches of the Sun’s surface), and one to larger eruptions of hot gas from the Sun’s atmosphere (known as ‘coronal mass ejections’, or CMEs).

“We see a clear split between ‘impulsive’ particle events, where these energetic electrons speed off the Sun’s surface in bursts via solar flares, and ‘gradual’ ones associated with more extended CMEs, which release a broader swell of particles over longer periods of time,” says lead author Alexander Warmuth of the Leibniz Institute for Astrophysics Potsdam (AIP), Germany.A clearer connectionWhile scientists were aware that two types of SEE event existed, Solar Orbiter was able to measure a large number of events, and look far closer to the Sun than other missions had, to reveal how they form and leave the surface of our star.

Solar flare seen by EUI and STIX

Coronal mass ejection seen by Metis

“We were only able to identify and understand these two groups by observing hundreds of events at different distances from the Sun with multiple instruments – something that only Solar Orbiter can do,” adds Alexander. “By going so close to our star, we could measure the particles in a ‘pristine’ early state and thus accurately determine the time and place they started at the Sun.”The study is the most comprehensive of SEE events to date, and produces a catalogue that will only grow through Solar Orbiter’s lifetime. It used eight of Solar Orbiter’s ten instruments to observe more than 300 events between November 2020 and December 2022.“It’s the first time we’ve clearly seen this connection between energetic electrons in space and their source events taking place at the Sun,” adds co-author Frederic Schuller, also of AIP.“We measured the particles in situ – that is, Solar Orbiter actually flew through the electron streams – using the probe’s Energetic Particle Detector, while simultaneously using more of the spacecraft’s instruments to observe what was happening at the Sun. We also gathered information about the space environment between the Sun and spacecraft.”

Solar Orbiter’s instruments

Flight delaysThe researchers detected the SEE events at different distances from the Sun. This let them study how the electrons behave as they travel through the Solar System, answering a lingering question about these energetic particles.When we spot a flare or a CME, there’s often an apparent lag between what we see taking place at the Sun, and the release of energetic electrons into space. In extreme cases, the particles seem to take hours to escape. Why?

“It turns out that this is at least partly related to how the electrons travel through space – it could be a lag in release, but also a lag in detection,” says co-author and ESA Research Fellow Laura Rodríguez-García. “The electrons encounter turbulence, get scattered in different directions, and so on, so we don’t spot them immediately. These effects build up as you move further from the Sun.”The space between the Sun and the planets of the Solar System isn’t empty. A wind of charged particles streams out from the Sun constantly, dragging the Sun’s magnetic field with it. It fills space and influences how the energetic electrons travel; rather than being able to go where they like, they are confined, scattered, and disturbed by this wind and its magnetism.

The study fulfils an important goal of Solar Orbiter: to continuously monitor our star and its surroundings to trace ejected particles back to their sources at the Sun.“Thanks to Solar Orbiter, we’re getting to know our star better than ever,” says Daniel Müller, ESA Project Scientist for Solar Orbiter. “During its first five years in space, Solar Orbiter has observed a wealth of Solar Energetic Electron events. As a result, we’ve been able to perform detailed analyses and assemble a unique database for the worldwide community to explore.”

Keeping Earth safe

Crucially, the finding is important for our understanding of space weather, where accurate forecasting is essential to keep our spacecraft operational and safe. One of the two kinds of SEE events is more important for space weather: that connected to CMEs, which tend to hold more high-energy particles and so threaten far more damage. Because of this, being able to distinguish between the two types of energetic electrons is hugely relevant for our forecasting.“Knowledge such as this from Solar Orbiter will help protect other spacecraft in the future, by letting us better understand the energetic particles from the Sun that threaten our astronauts and satellites,” adds Daniel. “The research is a really great example of the power of collaboration – it was only possible due to the combined expertise and teamwork of European scientists, instrument teams from across ESA Member States, and colleagues from the US.”

Looking ahead, ESA’s Vigil mission will pioneer a revolutionary approach, operationally observing the ‘side’ of the Sun for the first time, unlocking continuous insights into solar activity. To be launched in 2031, Vigil will detect potentially hazardous solar events before they come into view as seen from Earth, giving us advance knowledge of their speed, direction and chance of impact.Our understanding of how our planet responds to solar storms will also be investigated further with the launch of ESA’s Smile mission next year. Smile will study how Earth endures the relentless ‘wind’, and sporadic bursts, of fierce particles thrown our way from the Sun, exploring how the particles interact with our planet’s protective magnetic field.

Solar Orbiter is a space mission of international collaboration between ESA and NASA, operated by ESA.Notes for editors‘CoSEE-Cat: a Comprehensive Solar Energetic Electron event Catalogue obtained from combined in-situ and remote-sensing observations from Solar Orbiter’ by A. Warmuth et al. is published today in Astronomy & Astrophysics. The results are compiled in a publicly accessible online event catalogue, the Comprehensive Solar Energetic Electron event Catalogue (CoSEE-Cat): https://coseecat.aip.de/More information on the capabilities and leading institutions for each of the instruments used in this study – EPD, STIX, EUI, RPW, Metis, SoloHI, SWA, and MAG – is available here: https://www.esa.int/ESA_Multimedia/Images/2020/01/Solar_Orbiter_s_instrumentsMore about Solar Orbiter: https://www.esa.int/Science_Exploration/Space_Science/Solar_OrbiterMore about Vigil: https://www.esa.int/Space_Safety/VigilMore about Smile: https://www.esa.int/Science_Exploration/Space_Science/SmileVisit ESA’s Space Weather Service Network: https://swe.ssa.esa.int/ or read more about ESA’s space weather activities: https://www.esa.int/Space_Safety/Space_weather For more information, please contact ESA Media Relations, media@esa.int

Like
Thank you for liking
You have already liked this page, you can only like it once!

Double trouble: Solar Orbiter traces superfast electrons back to Sun Read More »

redd cockpit technology pkg.00 00 25 10.still001

Pilots test first-of-its-kind cockpit alert system that detects possible collisions on runways

NEWYou can now listen to Fox News articles!
KANSAS CITY, Mo. – Engineers are in the final testing phase of a cockpit alert system they say could prevent close calls on the runway. Honeywell Aerospace’s “Surface Alert System,” or “SURF-A,” can detect when a rogue aircraft gets in the way of another plane that has been cleared for takeoff or landing. The system gives pilots two aural alerts when an unauthorized aircraft enters the runway on a collision course with the authorized aircraft. The first alert sounds 30 seconds before a collision, and the second alert sounds 15 seconds before a collision.”It sounds like such a small amount of time, but things happen so rapidly, and 15 to 30 seconds is actually a very, very large margin when you’re moving at the speeds that we’re moving in an aircraft like this,” Honeywell Test Pilot Doug Rybczynski said. The aural call-out includes an automated voice that says, “traffic on runway.” “It’s a very good, I would say direct, call out,” Rybczynski said. TRUMP PICK FOR UN AVIATION OFFICE HAS LONG HISTORY DONATING TO DEMS, NIKKI HALEY SURF-A gives pilots two aural warnings when they are on a collision course with another plane during takeoff and landing. The first alert sounds 30 seconds out from collision, and the second alert sounds 15 seconds out.  (Honeywell Aeroscpace)The Honeywell crew flew from the Kansas City Downtown airport in Missouri to Topeka, Kansas. On Test Flight 757’s approach to Topeka, a Honeywell crew member parked a smaller Gulfstream aircraft at the end of the runway, triggering the SURF-A alert system. After hearing both alerts, the pilot performed a “go-around” maneuver. The demonstration simulated a 2023 close call at the Austin-Bergstrom International Airport in Austin, Texas. In that scenario, a FedEx B767 was cleared to land in poor conditions. As the FedEx plane got closer, the pilots noticed a Southwest Airlines B737 lined up on the runway below them. The FedEx pilots were able to perform a last-second go-around maneuver to avoid a collision, but Honeywell says the SURF-A system, which wasn’t around at the time, would have given the pilots an additional 28 seconds of notice. DUFFY’S DOT ACCUSES BIDEN, BUTTIGIEG OF INFLATING AIR TRAFFIC CONTROLLER PIPELINE: ‘JUICED THE NUMBERS’SURF-A relies on Federal Aviation Administration-mandated technology called “Smart X,” and it has been around since 2008. It lets pilots know if they are taking off on a taxiway, and if they are coming in for a landing too fast or too high. Honeywell started developing the SURF-A system in 2020 when the aviation industry noticed more close calls happening on runways. Using “ADS-B” Out technology, a GPS system that makes an airplane’s position known to other pilots, engineers were able to determine the trajectory of planes that are on a collision course.  Engineers on board Honeywell Test Flight 757 have been developing SURF-A since 2020. (Fox News)In 2024, the FAA reported 1,664 runway incursions, which is when an aircraft enters a runway without clearance. Seven of those involved two planes on a collision course.The FAA has reported 657 runway incursions so far in 2025. The Federal Aviation Administration reported 1,664 runway incursions in 2024. Seven of them involved planes on a collision course. (Fox News)”Shockingly, I think for a lot of passengers, there’s not an alert system available today to let you know that you’re about ready to run into another aircraft on the runway,” Thea Feyereisen, Honeywell Aerospace Distinguished Technical Fellow, said.FAA CANCELS NEWARK AIRPORT GROUND STOP AFTER ‘EQUIPMENT’ ISSUE AFFECTED RADIO FREQUENCIESThe FAA said the best way to eliminate runway incursions is to improve airport infrastructure by adding edge lights, pavement markers, signage, and by making taxiways less complicated. Since 2021, the FAA has given nearly $12 billion to airports across the country to improve airport infrastructure.  Honeywell engineers say pilots are ultimately the last line of defense to prevent runway incursions.  (Fox News)However, Feyereisen said pilots are ultimately the last line of defense.”Pilots have a shared destiny on the aircraft,” Feyereisen said. “The pilot can be doing everything correct, but on a path to disaster.”CLICK HERE TO GET THE FOX NEWS APPHoneywell Aerospace is pitching the prototype to major airlines, and hopes to have the system certified by September. Engineers said the system could be added to commercial flights in early 2026.

Pilots test first-of-its-kind cockpit alert system that detects possible collisions on runways Read More »

1 leaked playlists expose secrets of powerful figures

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi

NEWYou can now listen to Fox News articles!
Vice President JD Vance is a big fan of the Backstreet Boys’ “I Want It That Way.” White House Press Secretary Karoline Leavitt gets pumped up with Beyoncé’s “Run the World (Girls).” And former Florida Attorney General Pam Bondi? She cranks Nelly’s “Hot In Herre.”That’s all, according to Panama Playlists, a website that quietly went live recently and claims to reveal the hidden music tastes of politicians, tech leaders and journalists.”I found the real Spotify accounts of celebrities, politicians and journalists. Many use their real names,” the anonymous site creator wrote. “With a little sleuthing, I could say with near-certainty: yep, this is them.”The anonymous researcher, who says they’ve been scraping accounts since summer 2024, insists they only used publicly available information. “I’ve been scraping their playlists for over a year. Some individuals even have a setting enabled that displays their last played song. I scraped this continuously, so I know what songs they played, how many times and when.” They also noted there is no affiliation with Spotify. The site itself frames the project as more playful than sinister.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA Vice President JD Vance’s playlist revealed “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” (Panama Playlists)Why leaked playlists matterAt first, this all feels like lighthearted gossip, but it points to a bigger issue: how much of our personal information is publicly available by default? A playlist can reveal mood, personality and even political leanings. When pieced together with other open-source data, these details help paint a surprisingly detailed portrait. The lesson? Privacy leaks don’t always involve hackers. Sometimes, it’s the platforms themselves leaving doors wide open. REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSWhat the Panama Playlists revealThe playlists range from ironic to eyebrow-raising, with some choices feeling almost too on the nose. Here are some of the highlights: JD VanceThe vice president’s “Making Dinner” playlist includes “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” His “Gold On The Ceiling” playlist adds eclectic picks like “What Makes You Beautiful” by One Direction, “You are a Tourist” by Death Cab for Cutie and “San Francisco” by The Mowgli’s.Karoline LeavittThe White House press secretary’s “Baby Shower” playlist featured Beyoncé’s “Run the World (Girls)” and Cyndi Lauper’s “Girls Just Want to Have Fun.” The timing matched her actual baby shower, further confirming the account.Sam AltmanThe OpenAI CEO’s “My Shazam Tracks” suggests he’s searched for “Get Ur Freak On” by Missy Elliott, George Ezra’s “Blame It on Me,” and David Guetta and OneRepublic’s “I Don’t Wanna Wait.”Pam BondiThe U.S. Attorney General’s playlist “Pam” includes “Hot In Herre” by Nelly, “Hands to Myself” by Selena Gomez and “Cold As Ice” by Foreigner. Playlists show Karoline Leavitt listening to Beyoncé’s “Run the World (Girls),” Sam Altman to Missy Elliott’s “Get Ur Freak On” and Pam Bondi to Nelly’s “Hot In Herre.” (Panama Playlists)Ron DeSantisThe Florida governor keeps it classic. His playlist includes “Ring of Fire” by Johnny Cash, Billy Joel’s “Piano Man,”and “Life Is a Highway” by Rascal Flatts.Mike JohnsonThe House Speaker has a Pandora account with Jerry Goldsmith’s “The Parachutes,” Enya’s “May It Be,” and Bryan Adams’ “One Night Love Affair.”Adam MosseriThe Instagram CEO’s playlist, “Hang,” shows a reflective and soulful side. It features “July” by Noah Cyrus and Leon Bridges, “River” by Leon Bridges, “Strangers” by The Kinks and Leonard Cohen’s “Famous Blue Raincoat.” He rounds it out with Otis Redding’s “(Sittin’ On) The Dock of the Bay” and Bobby Vinton’s “Mr. Lonely.”  Ron DeSantis, Mike Johnson and Adam Mosseri’s playlists revealed. (Panama Playlists)9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUTWhat Panama Playlists teaches usPanama Playlists demonstrate how a person’s music can clash with their public image, revealing hidden interests that shake expectations.Your tunes might be more visible than you think.Spotify’s default settings put playlists in public mode unless you switch them to private.This is less about guilty pleasures and more about digital exposure. The music you thought was just for your earbuds might already be telling a story about you to strangers. Tips to stay safe and protect your playlistIf you use Spotify, Apple Music, or YouTube Music, take a moment to review your privacy settings. Here’s how to protect yourself: 1) Make playlists privateTurn off public defaults. Only share playlists you intentionally want others to see.SpotifyDisable public visibility: Stop new playlists from being automatically public.Tap your profile picture in the upper left.Tap Settings and privacyClick Privacy and Social Toggle off Public playlists. Users can adjust their Spotify settings to make their playlists private. (Kurt “CyberGuy” Knutsson)Apple MusicOpen the Apple Music app on your iPhone or iPad.Tap your profile icon or picture in the upper right of the screen.Tap “View Profile.”On your profile page, tap “Edit.”Find the toggle for “Listening To” or “Allow Others to See What You’re Listening To” and turn it off to stop sharing your Apple Music listening activity. Steps on how to stop sharing your Apple Music listening activity. (Kurt “CyberGuy” Knutsson)YouTube MusicOpen the YouTube Music app and sign in.Tap your profile picture to go to your Library.Find the playlist you want to edit. Long-press on the playlist or open it and tap the three dots (…).Choose Edit playlist.Under Privacy, select the option you want:Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Tap Done or Save to confirm your choice.Note: There is no global setting to make all playlists private at once; you must adjust privacy for each playlist individually. The privacy setting is available when creating a new playlist or editing an existing one. For brand-new playlists, you’ll see a privacy selection box during playlist creation. 2) Review connected appsStreaming platforms often link to third-party apps. Revoke access for those you no longer use. 3) Limit what you sharePlaylist names, listening history and even likes reveal more than you think. 4) Use personal data removal servicesWhat looks like harmless fun, like a playlist name or your “last played” track, can actually become part of a bigger puzzle. A determined bad actor could stitch together your music history with other open-source data, such as your social posts, tagged photos, or even public records. Over time, those small details paint a surprisingly complete picture of your habits, locations, or private interests.That’s why reducing your overall digital footprint matters. Personal data removal services work to wipe your information from data broker sites, making it harder for anyone to cross-reference your listening habits with your identity. The less data floating around, the harder it is for someone to connect the dots in ways you never intended.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan. 5) Keep your software updatedPrivacy settings change often. Check regularly to ensure your preferences haven’t been reset and keep your software updated.  CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe playlist leak may feel like a punchline, but it serves as a real reminder. Our digital lives are stitched together from tiny details we often overlook. Even something as simple as your favorite workout jams can end up on display if you don’t take control. Privacy isn’t about hiding your personality. It’s about choosing what you share, and with whom.Would you be comfortable if your own playlists, every guilty pleasure and repeat listens were suddenly made public? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved. 

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi Read More »

ai toys kids playing

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids

NEWYou can now listen to Fox News articles!
Do AI chatbots packaged inside plush animals really help children, or do they threaten vital developmental milestones? Companies market them as “screen-free playmates” for toddlers, but pediatric experts warn these toys could trade human connection for machine conversation. Toys like Grem, Grok and Rudi are designed to bond with kids through voice and conversation. Instead of simply replacing screen time, they may replace something far more important: the role of parents and peers in emotional development.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.THIS EV HAS A FACE, AND IT TALKS BACK WITH AI AI-powered stuffed toys, such as Grem (left), could disrupt cognitive and emotional development among young children, experts say. (Curio/©Michael Cuviello/Amarillo Globe-News/USA Today Network/IMAGN)Why AI stuffed animals worry child expertsPediatricians and psychologists raise red flags about these AI toys. Young children naturally form attachments. If those attachments shift to chatbots, kids may learn to trust machines more than people. Research already shows children ages 3 to 6 sometimes trust robots more than humans, even when the robots give wrong answers. That undermines how kids build empathy, learn to question, and develop critical thinking. There are also privacy concerns. Parents may not realize that these “personalized” toys are recording conversations. Sensitive information could be stored, analyzed, or misused without families fully knowing. A-powered stuffed toy called Grok. Companies market AI-enhanced plushies as “screen-free playmates” for toddlers. (Curio)HOLLYWOOD TURNS TO AI TOOLS TO REWIRE MOVIE MAGICHow AI toys may disrupt child developmentPediatric experts in early childhood and language development warn that responsive AI could “fundamentally change the wiring of the human brain.” Unlike television or passive media, AI plushies respond in real time, adapting to a child’s questions, stories, and moods. That responsiveness can be powerful. It can encourage curiosity, vocabulary growth, and even creativity. But it can also crowd out human interactions, those subtle facial expressions, pauses, and “nos” that children need to experience to learn empathy and resilience. Another risk is that AI companions are trained to be overly charming and agreeable. Instead of challenging a child’s thinking, these “sycophantic” toys may simply tell kids what they want to hear. Over time, that could nudge children toward believing comforting lies instead of asking hard questions, a toxic pattern for developing critical thinking.  AI-powered stuffed toy called Gabbo. Pediatric experts in childhood development warn responsive AI in stuffed animals may “fundamentally” alter brain growth. (Curio)MCDONALD’S AI HIRING CHATBOT EXPOSED DATA OF JOB CANDIDATESThe benefits and risks parents should weighSome parents say these AI toys offer relief. They help answer endless questions, tell stories, and spark play. In fact, some early research shows kids learn new words faster when engaging in dialogue with AI rather than passively consuming media. But the tradeoff is significant. If AI becomes the primary companion, kids could miss out on the messy, unpredictable, and deeply human experiences that shape trust, empathy, and social awareness. AI-powered stuffed toy called Grok still in its shipping box. Experts warn that AI-powered plushies could reshape child development and trust. (Curio)Safety and security tips for parents before buying AI plush toysBefore bringing one of these toys home, experts suggest:Check the fine print: Review what data is collected, where it’s stored, and if it can be deleted.Limit use to short sessions: Treat the toy like TV, fun in moderation, not a substitute for playmates.Keep conversations public: Encourage kids to use the toy in family spaces, not behind closed doors.Turn off the cloud if possible: Some models work locally without sending every word to servers.WE HAVE TO ACT NOW TO KEEP AI FROM BECOMING A FAR-LEFT TROJAN HORSEBetter play alternatives to AI-stuffed animalsIf you’re worried about replacing human connection, consider healthier alternatives:Rotate traditional toys to keep novelty alive.Use AI plushies together with your child, treating it as a shared activity instead of a private companion.Encourage kids to retell stories to parents and siblings, not just to the toy.What this means for youParents need to think critically before bringing an AI-powered plushie into their home. Ask yourself:Do I want my toddler’s first conversations recorded by a company?Could a chatbot toy undermine the natural give-and-take of family interaction?Am I replacing screen time, or am I replacing myself?Balancing curiosity with caution is key. Occasional use may spark fun, but long-term reliance could reshape your child’s emotional growth in ways no study has yet measured.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawaysAI stuffed animals may look like harmless, cuddly friends, but the stakes are bigger than bedtime stories. These AI-powered plushie toys raise questions about privacy, trust, and what it means to connect as humans. Technology will always tempt us with convenience, but children learn best through love, attention, and genuine relationships.Would you let an AI-powered toy become your child’s closest companion? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids Read More »

transunion building office

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected

NEWYou can now listen to Fox News articles!
You might have recently noticed a wave of cyberattacks hitting companies whose services millions of Americans rely on every day. Among the victims are Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, all reporting breaches linked to Salesforce-connected applications.Now, credit reporting firm TransUnion has confirmed its own major incident, with more than 4.4 million U.S. consumers affected. Attackers exploited weaknesses in third-party integrations, not Salesforce itself. Security researchers tie this technique to the extortion group ShinyHunters and its affiliated crews.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD Hackers stole 13 million records, exposing data of 4.4 million Americans in the latest TransUnion cyberattack. (Christopher Dilts/Bloomberg)What you need to know about the TransUnion data breachTransUnion has disclosed a major data breach that impacted 4,461,511 individuals in the United States, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025, and was discovered two days later on July 30.The breach resulted from unauthorized access to a third-party application used in TransUnion’s U.S. consumer support operations. The company stressed that its core credit database and credit reports were not compromised.Although TransUnion characterized the exposed information as “limited,” the stolen data is highly sensitive. It includes names, dates of birth, Social Security numbers, billing addresses, email addresses, phone numbers, reasons for customer transactions (such as requests for a free credit report), and customer support tickets and messages.Hackers claim they stole more than 13 million records in total, with about 4.4 million tied to U.S. consumers.In response, TransUnion is providing all affected individuals with 24 months of free credit monitoring and identity theft protection services.FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS The breach at TransUnion follows several similar cyberattacks against tech companies, including Google and Cisco, and retail brands, such as Chanel and Adidas.  (Mike Kemp/In Pictures)Hackers target companies through Salesforce appsThe breach appears to be part of a broader wave of Salesforce-related attacks that is hitting organizations across sectors, from tech and finance to retail and aviation. Alongside Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, brands like Adidas, Louis Vuitton, Dior, Tiffany & Co., Cartier and Air France-KLM have also reported incidents tied to weaknesses in Salesforce-linked applications.In most cases, attackers exploited malicious third-party integrations or OAuth-connected apps disguised as legitimate Salesforce tools to siphon sensitive records. This technique bypassed traditional login protections and gave intruders long-lasting access to customer relationship management data. The stolen information ranges from basic contact details and business notes to highly sensitive identifiers such as Social Security numbers, dates of birth and driver’s license information.Researchers say these intrusions align with activity from the extortion group ShinyHunters, with some overlap in tactics and infrastructure linked to other threat actors like Scattered Spider. Campaigns tracked under names such as UNC6395 and UNC6040 point to a larger “extortion-as-a-service” model, where criminal crews collaborate and share stolen data across underground forums.TransUnion’s responseCyberGuy reached out to TransUnion for a comment and received the following response:”TransUnion recently experienced a cyber incident that affected a third-party application serving our U.S. consumer support operations. Upon discovery, we quickly contained the issue, which did not involve our core credit database or include credit reports.The incident involved unauthorized access to limited personal information for a very small percentage of U.S. consumers. We are working with law enforcement and have engaged third-party cybersecurity experts for an independent forensics review. Additionally, we will notify affected consumers and provide credit monitoring services.”As for the gap between when the breach occurred (July 28, 2025) and when it was officially recorded as “discovered” (July 30, 2025), a TransUnion spokesperson clarified that the company “identified and contained this event within hours” of it happening, but that it is common industry practice to designate a later “date of discovery” to reflect a more complete assessment following the initial response.MARY KAY’S ICONIC PINK CADILLAC SHIFTS TO FULLY ELECTRIC Researchers have linked the latest cybercrimes to extortion group ShinyHunters and its affiliated crews. (Kurt “CyberGuy” Knutsson)8 ways you can stay safe from the TransUnion data breachThe TransUnion breach exposed millions of people’s data, but there are steps you can take to protect yourself. Here are eight ways to stay safe.1) Delete personal data that puts you at riskGo through old online accounts, shopping profiles or cloud storage that may still hold sensitive data. Deleting what you no longer use reduces the amount of information that could be stolen in future breaches or sold on dark web forums. You can also get help from a data removal service.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.2) Avoid phishing scams and use strong antivirus softwareData stolen in breaches often ends up fueling phishing campaigns. Attackers may use your name, email or phone number to make messages look more convincing. If you get an email or text claiming to be from TransUnion, your bank or any service asking you to “verify” details, don’t click on the link. Instead, log in through the official website or call customer service directly.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech.3) Save passwords securelyIf your login details were exposed, reusing the same password across sites puts multiple accounts at risk. Use a password manager to create and store strong, unique passwords for every service. Even if hackers get hold of one, they won’t be able to use it elsewhere. Consider using a password manager to generate and store complex passwords.Next, see if your passwords have been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY4) Turn on two-factor authenticationTwo-factor authentication (2FA) adds a critical extra step beyond just a password. If someone tries to break into your email, banking app or social media account, they’ll also need the one-time code from your authenticator app or text message. This makes stolen credentials much less useful.5) Keep your devices updatedHackers often rely on outdated software to spread malware or steal information. Installing the latest updates for your phone, computer and apps ensures security patches are in place, blocking known vulnerabilities that attackers might exploit.6) Freeze your credit right awayOne of the biggest risks after a breach is criminals opening new loans or credit cards in your name. A credit freeze with all three major bureaus, TransUnion, Equifax and Experian, prevents anyone from accessing your credit file without your approval. It’s free and can be temporarily lifted if you need to apply for credit.7) Monitor your accounts regularlyWatch your bank and credit card statements for unfamiliar charges, no matter how small. Set up transaction alerts where available. You should also pull your free annual credit report to check for unauthorized accounts or inquiries, which could be signs of fraud.8) Consider identity theft protection servicesIf your Social Security number, driver’s license or other sensitive identifiers were exposed, you may want to sign up for an identity theft protection service. These services monitor credit reports, dark web forums and financial activity for signs of misuse. Some also include insurance or recovery assistance if your identity is stolen, giving you added peace of mind beyond basic credit monitoring. If you’re one of the affected TransUnion users, make use of the 24 months of free credit monitoring and identity theft protection services. If not, you might get one yourself for the future.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayThe reality is that the TransUnion breach isn’t just about stolen names and numbers. It’s about how exposed ordinary people are when a single company holds the keys to their financial identity. For years, consumers have had little choice but to trust credit bureaus they never opted into.Should companies like TransUnion be held legally accountable when millions of people are exposed to fraud? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.  

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected Read More »

docusign apple fraud photo 1

Scammers are using DocuSign emails to push Apple Pay fraud

NEWYou can now listen to Fox News articles!
Phishing scams are getting smarter, and one of the latest tricks involves fake DocuSign emails that appear to show charges from major companies like Apple. At first glance, these fraud messages look convincing, often including a receipt, order ID and even a support number. But instead of connecting you to Apple or another legitimate service, that number links you directly to scammers.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T FALL FOR THIS BANK PHISHING SCAM TRICKAll about the DocuSign & Apple Pay fraudThese phishing emails pretend to be billing receipts for recent Apple Pay purchases. They typically claim that a subscription has been charged to your account and prompt you to call a phone number if you do not recognize the charge. Scammers spoof Apple, Netflix, and other brands to push fake subscription charges posing as DocuSign. (Kurt “CyberGuy” Knutsson)The emails often use well-known brands such as Apple, Netflix, Expedia, or even lawn service companies to make them seem credible. Some also include a “DocuSign” link with a security code, creating the illusion that you need to access a file to confirm the transaction.In reality, neither Apple nor these other companies sends billing receipts through DocuSign. That detail alone is a red flag. Another telltale sign is the sender’s address. It may contain odd characters, such as a Cyrillic “B” replacing the “B” in “Billing,” which helps scammers bypass spam filters.AMAZON ALERTS CUSTOMERS ABOUT IMPERSONATION SCAMSHow the DocuSign scam worksThe scam aims to catch you off guard and pressure you into acting fast. The email claims your Apple Pay account has been charged for a subscription or purchase. It includes an order ID, a charge amount, and a DocuSign link that supposedly holds a receipt or confirmation file. To make it look even more convincing, some versions add a security code to “unlock” the document.The message also lists a phone number and urges you to call if the charge was not authorized. That number is the core of the scam. Instead of reaching Apple, Netflix or whichever company the email pretends to represent, you end up speaking with a scammer posing as a support agent.Once you’re on the call, the scammer tries to convince you that your account has been compromised or that the payment must be reversed right away. From there, the tactics vary. They might ask for your Apple ID, banking details, or card numbers. They may pressure you to download remote access software so they can “fix” the issue on your device. In some cases, they demand payment for fake account protection or reversal fees. DocuSign scam uses fake receipts and urgent language to steal personal information from users. (Kurt “Cyberguy” Knutsson)The end goal is always the same: gain enough access to lock you out of your accounts, steal sensitive data, or initiate fraudulent transactions. What makes these scams dangerous is how they combine multiple red flags in one message: a realistic-looking receipt, official logos, a DocuSign link, urgent language, and a phone number that appears to be the quickest way to resolve the issue.HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM5 ways to stay safe from the DocuSign scamScammers rely on people reacting quickly without questioning the details. The good news is that there are simple steps you can take to protect yourself. Here are five practical ways to stay safe.1) Inspect the sender address carefullyScammers often use email addresses that look close to official ones but contain subtle differences, such as extra letters or swapped characters. If the email does not come from an official domain like @apple.com, it is not legitimate. Fraudulent billing emails claim Apple Pay charges and link victims to fake support lines using DocuSign. (Kurt “CyberGuy” Knutsson) 2) Know how companies send receiptsApple, Netflix, and other major services do not send billing statements through DocuSign. If a receipt shows up in this format, you can safely assume it is a scam. Real receipts always come directly from the service provider itself.3) Watch out for phishing links and use strong antivirus softwareBe cautious with any links in suspicious emails. Scammers often mask harmful links behind text that looks legitimate, such as “View Document” or “Review Payment.” Hover over the link without clicking to see the real web address. If it does not match the official company domain, do not click.The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.4) Double-check your transaction historyInstead of trusting the email, confirm whether a charge actually exists. Apple users can review purchases directly from the Settings app under their Apple ID. If nothing shows up, the receipt is fake. Other services have similar ways to check history.5) Delete personal data from the internetThe less information scammers can find about you online, the harder it is for them to craft convincing attacks. Consider removing old accounts you no longer use, limit the personal details you share publicly on social media, and use data removal services when possible. This reduces the risk of your name, email, or phone number being targeted in scams like this.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayPhishing scams are constantly evolving, and the DocuSign Apple Pay ruse is just one of many. The best defense is a healthy dose of skepticism. If something feels off, stop, double-check, and confirm directly through official channels. Scammers rely on panic and quick reactions. By slowing down and verifying details, you can protect yourself from falling into their trap.Should email providers step up their filters so fewer of these messages slip through? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM.Copyright 2025 CyberGuy.com.  All rights reserved. 

Scammers are using DocuSign emails to push Apple Pay fraud Read More »

raft 2

Fox News AI Newsletter: Fighter pilots take directions from AI

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Fighter pilots take directions from AI in Pentagon’s groundbreaking test- Google Pixel 10 event brings new phones, smartwatch, earbuds and AI- Elon Musk’s xAI sues Apple, OpenAI over AI competition and App Store rankings Image of Starsage’s battle manager system  (Raft AI )MACHINE WINGMAN: For the first time, U.S. fighter pilots took direction from an AI “air battle manager” in a Pentagon test that could change how wars are fought in the skies.STAR-POWERED TECH: Google kicked off its Made by Google event last week with blockbuster energy. Jimmy Fallon played host, bringing humor and star presence. Steph Curry highlighted how the Pixel 10 empowers creators and athletes to capture and share their stories. Lando Norris, fresh from the F1 circuit, showed off how Pixel’s speed and AI enhancements fit into fast-paced lives. And the Jonas Brothers premiered a music video filmed entirely on the new Pixel 10 Pro, proving the phone’s camera is ready for professional-grade production.TECH THROWDOWN: Billionaire entrepreneur Elon Musk’s artificial intelligence startup xAI sued Apple and ChatGPT maker OpenAI in U.S. federal court in Texas on Monday, accusing them of illegally conspiring to thwart competition for artificial intelligence. Visitors walk in front of the Meta (Facebook) sign at its headquarters in Menlo Park, California, United States on December 29, 2022.  ((Photo by Tayfun Coskun/Anadolu Agency via Getty Images))BIG MONEY MOVE: Meta Platforms, Inc., the parent company of Facebook and Instagram, is launching a new political action committee to back candidates in California who support pro-artificial intelligence policies and oppose strict regulation.RISING CONCERNS: Artificial intelligence is developing rapidly. While some are embracing it, others are warning of the potential threats. But both sides agree the technology is changing how the world operates.TECH SPOTTER: A missing hiker’s dead body was finally found in July in Italy’s rugged Piedmont region after 10 months. The recovery team credited the breakthrough to an AI-powered drone that spotted a critical clue within hours. The same process would have taken weeks or even months if done by the human eye. Will Smith performs onstage during a concert at Cardiff Castle on Aug. 25, 2025, in Cardiff, Wales. (Maxine Howell)FAKE CROWD FRENZY: Will Smith is facing accusations of using artificial intelligence to create a crowd in a video shared online.TECH DEAL: Nvidia CEO Jensen Huang told FOX Business on Thursday that he is in talks with the Trump administration about selling its powerful Blackwell chip to China, saying how the global adoption of American tech could help the U.S. win the AI race.EVOLVING ROLES: Right now, many people are worried that artificial intelligence is coming for their jobs. If you’re one of them, then the recent study by Microsoft will shed some light on how AI’s generative capabilities will impact your field of work. In short, some occupations are more susceptible to its influence than others.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Fighter pilots take directions from AI Read More »

american man at computer

Farmers Insurance data breach exposes 1.1M Americans

NEWYou can now listen to Fox News articles!
Data breaches are no longer just a problem for the tech industry. They’ve become a constant across every sector, from airlines to banks to fashion brands, exposing personal data and leaving customers worried about where their information might end up. Insurance companies, sitting on mountains of sensitive details, are no exception. The latest to join the list is Farmers Insurance. The U.S. insurer confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year, stealing customer databases and fueling a growing wave of extortion attempts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATIONWhat you need to know about the Farmers Insurance breachFarmers Insurance has confirmed a data breach impacting more than 1.1 million customers. The incident is tied to the ongoing wave of Salesforce-related cyberattacks that have hit major companies this year.In a notice published on its website, the U.S. insurance giant said the breach occurred on May 29, 2025, through one of its third-party vendors. Farmers serves over 10 million households nationwide. It offers auto, home, life, and business insurance through a vast network of agents and subsidiaries.”On May 30, 2025, one of Farmers’ third-party vendors alerted Farmers to suspicious activity involving an unauthorized actor accessing one of the vendor’s databases containing Farmers’ customer information,” the company wrote in its advisory. Farmers Insurance confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year. (Kindamorphic/Getty Images)According to the company, the vendor’s monitoring tools detected the intrusion quickly, allowing containment measures to be taken. Farmers said it immediately launched an investigation, notified law enforcement, and worked to determine the scope of the breach.The investigation revealed that the stolen data included customer names, addresses, dates of birth, and driver’s license numbers. In some cases, the last four digits of Social Security numbers. Farmers began notifying affected individuals on Aug. 22, with a filing to the Maine Attorney General’s Office confirming that 1,111,386 customers were impacted.While Farmers did not publicly name the vendor involved, reports indicate that the breach is part of the larger Salesforce data theft campaign carried out by threat actors this year.ALLIANZ LIFE INSURANCE DATA BREACH EXPOSES 1.4 MILLION AMERICANSThe Salesforce data theft campaignThe Salesforce attacks have been ongoing since early 2025. Researchers attributed them to a threat actor cluster tracked as UNC6040/UNC6240. The intrusions typically begin with voice phishing (vishing) calls, where employees are tricked into approving a malicious OAuth application linked to their company’s Salesforce instance.Once connected, attackers siphon customer relationship management (CRM) databases and use the stolen data in extortion attempts. The cybercrime group ShinyHunters has claimed responsibility, according to BleepingComputer. The group claims that the attacks involve overlapping threat groups, including members of the notorious Scattered Spider gang. Hackers exploited a third-party vendor tied to Salesforce systems to steal 1.1 million Farmers Insurance customer data. (Kurt “CyberGuy” Knutsson)”Like we have said repeatedly already, ShinyHunters and Scattered Spider are one and the same,” a representative told the publication. “They provide us with initial access, and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”The Salesforce campaign has affected a growing list of high-profile companies, including Google, Cisco, Workday, Adidas, Qantas, Allianz Life and luxury brands under LVMH such as Louis Vuitton, Dior, and Tiffany & Co.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUPFarmers Insurance responseIn response to CyberGuy’s inquiry, a Farmers Insurance spokesperson shared the following statement:”At Farmers, protecting our customers’ information is our top priority. We recently discovered that an unauthorized third party briefly accessed a vendor’s system that contained some Farmers’ customer information. The incident involved only limited information from certain customers. An investigation-conducted with both internal and external security experts-found no evidence that the exposed data has been misused, nor any indication that Farmers’ own systems were compromised. We are contacting affected individuals directly and are providing support resources, including complimentary credit monitoring.”8 ways you can stay safe after a data breachIf your personal information has been exposed in the Farmers data breach, take the steps below immediately to limit the damage, protect your identity, and prevent future fraud. Farmers Insurance said it began notifying more than 1 million affected policyholders after detecting unauthorized access to customer records in a data breach. (Kurt “CyberGuy” Knutsson)1) Invest in a data removal serviceYou can’t undo the damage once hackers have accessed your data. However, you can limit the fallout by investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use identity theft protection servicesYour Social Security number or other sensitive data may have been exposed in the data breach. Identity Theft companies can monitor personal information, such as your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.3) Enable two-factor authentication (2FA)Turn on 2FA for your email, banking, and insurance logins. Even if a hacker has your password, 2FA requires a second verification step, like a code sent to your phone, making unauthorized access much harder.4) Be wary of phishing and follow-up scamsAfter a data breach, attackers often follow up with phishing emails or phone calls. They pretend to be from your insurance company or a support service. Don’t click on links in unsolicited messages, and verify any claims through official channels before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.5) Freeze your credit right awayPut a credit freeze on your files with Equifax, Experian and TransUnion. This stops criminals from opening new accounts in your name. It’s free, easy to set up, and you can lift the freeze temporarily when needed.6) Update your passwords nowChange your passwords for all important accounts. Start with email, financial, and health-related logins. Use strong, unique passwords for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.7) Check your accounts for strange activityLook for any signs of identity misuse, like:Unknown chargesLogins from unfamiliar devicesNew accounts or lines of credit you didn’t openEarly detection makes a big difference.8) Report identity theft fastIf someone is misusing your identity, go to IdentityTheft.gov. This government site provides step-by-step help and generates the letters and reports you’ll need to stop the fraud.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayData breaches keep hitting companies we trust, and Farmers Insurance is the latest reminder. Even when the stolen data hasn’t been misused yet, the risk lingers long after the headlines fade. That’s why it’s so important to stay alert, protect your identity, and take simple steps now. By acting today, you put yourself in control, not the hackers.Do incidents like this make you reconsider which companies you do business with? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Farmers Insurance data breach exposes 1.1M Americans Read More »

megan mcarthur iss

NASA Astronaut Megan McArthur Retires

NASA astronaut Megan McArthur has retired, concluding a career spanning more than two decades. A veteran of two spaceflights, McArthur logged 213 days in space, including being the first woman to pilot a SpaceX Dragon spacecraft and the last person to “touch” the Hubble Space Telescope with the space shuttle’s robotic arm.
McArthur launched as pilot of NASA’s SpaceX Crew-2 mission in April 2021, marking her second spaceflight and her first long-duration stay aboard the International Space Station. During the 200-day mission, she served as a flight engineer for Expeditions 65/66, conducting a wide array of scientific experiments in human health, materials sciences, and robotics to advance exploration of the Moon under Artemis and prepare to send American astronauts to Mars.
Her first spaceflight was STS-125 in 2009, aboard the space shuttle Atlantis, the fifth and final servicing mission to Hubble. As a mission specialist, she was responsible for capturing the telescope with the robotic arm, as well as supporting five spacewalks to update and repair Hubble after its first 19 years in space. She also played a key role in supporting shuttle operations during launch, rendezvous with the telescope, and landing.
“Megan’s thoughtful leadership, operational excellence, and deep commitment to science and exploration have made a lasting impact,” said Steve Koerner, acting director of NASA’s Johnson Space Center in Houston. “Her contributions have helped shape the future of human space exploration, and we are incredibly grateful for her service.”
In addition to her flight experience, McArthur has served in various technical and leadership roles within NASA. In 2019, she became the deputy division chief of the Astronaut Office, supporting astronaut training, development, and ongoing spaceflight operations. She also served as the assistant director of flight operations for the International Space Station Program starting in 2017.
Since 2022, McArthur has served as the chief science officer at Space Center Houston, NASA Johnson’s official visitor center. Continuing in this role, she actively promotes public engagement with space exploration themes, aiming to increase understanding of the benefits to humanity and enhance science literacy.
“Megan brought a unique combination of technical skill and compassion to everything she did,” said Joe Acaba, chief of the Astronaut Office at NASA Johnson. “Whether in space or on the ground, she embodied the best of what it means to be an astronaut and a teammate. Her contributions will be felt by the next generation of explorers she helped train.”
McArthur was born in Honolulu and raised as a “Navy kid” in many different locations worldwide. She earned a Bachelor of Science in aerospace engineering from the University of California, Los Angeles, and a doctorate in oceanography from the Scripps Institution of Oceanography at the University of California, San Diego. Before being selected as an astronaut in 2000, she conducted oceanographic research focusing on underwater acoustics, which involved shipboard work and extensive scuba diving.
McArthur is married to former NASA astronaut Robert Behnken, who also flew aboard the Dragon Endeavour spacecraft during the agency’s SpaceX Demo-2 mission in 2020.
“It was an incredible privilege to serve as a NASA astronaut, working with scientists from around the world on cutting-edge research that continues to have a lasting impact here on Earth and prepares humanity for future exploration at the Moon and Mars,” said McArthur. “From NASA’s Hubble Space Telescope to the International Space Station, our research lab in low Earth orbit, humanity has developed incredible tools that help us answer important scientific questions, solve complex engineering challenges, and gain a deeper understanding of our place in the universe. Seeing our beautiful planet from space makes it so clear how fragile and precious our home is, and how vital it is that we protect it. I am grateful I had the opportunity to contribute to this work, and I’m excited to watch our brilliant engineers and scientists at NASA conquer new challenges and pursue further scientific discoveries for the benefit of all.”
To learn more about NASA’s astronauts and their contributions to space exploration, visit:
https://www.nasa.gov/astronauts
-end-
Shaneequa VereenJohnson Space Center, Houston281-483-5111shaneequa.y.vereen@nasa.gov

NASA Astronaut Megan McArthur Retires Read More »