memoment editorial

1 how to spot and stop ai phishing scams

How to spot and stop AI phishing scams

Key Takeaways: 1. Hackers are using AI to create more convincing phishing scams, including voice clone and deepfake video scams. 2. Ways to spot AI-driven phishing scams include checking for red flags in emails, analyzing language for AI patterns, and verifying requests through another channel. 3. Tips to protect yourself include staying cautious with unsolicited […]

How to spot and stop AI phishing scams Read More »

1 space startup unveils 1 hour orbital delivery system

Space startup unveils 1-hour orbital delivery system

NEWYou can now listen to Fox News articles!
A Los Angeles-based aerospace startup called Inversion Space has unveiled Arc, its first flagship spacecraft designed to deliver supplies from orbit back to Earth in record time. The reusable reentry vehicle can transport up to 500 pounds of mission-critical cargo to nearly any point on the planet in less than an hour. Founders Justin Fiaschetti and Austin Briggs launched the company in 2021 with a bold vision: to build a space-based logistics network. During an event at the company’s factory, they described Arc as the next evolution of global delivery, one that starts in orbit, not on the ground.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.How the Arc spacecraft delivers cargo from orbit to EarthStanding about 8 feet tall and 4 feet wide, Arc is roughly the size of a large tabletop. It’s a lifting-body vehicle, meaning it can steer as it reenters the atmosphere. Instead of needing a runway, Arc lands safely under parachutes, using non-toxic propellants that make it safe to handle immediately after landing. The spacecraft features a cross-range of approximately 621 miles, allowing it to target wide landing zones. It can stay in orbit for up to five years, ready to return to Earth when needed. That flexibility means the spacecraft could one day drop off medical supplies, drones or military equipment at hard-to-reach locations. THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF Inversion Space unveils its Arc reentry vehicle designed for rapid orbital delivery (Inversion Space) Inversion’s Ray mission tested key systems in orbit, paving the way for Arc’s full development. (Inversion Space)Why Arc’s hypersonic speed could change aerospace testingBeyond rapid delivery, Arc doubles as a hypersonic testing platform. It can reach speeds over Mach 20, endure extreme heat and survive massive g-forces. Those capabilities have caught the attention of U.S. defense agencies, which are eager to improve hypersonic flight testing. Inversion’s participation in the Kratos-led MACH-TB 2.0 program highlights the growing military interest in Arc’s reusable design. “Fully reusable and capable of precise landings for rapid recovery, Arc makes hypersonic testing faster, repeatable, and more affordable,” the company said. Arc could deliver mission-critical cargo anywhere on Earth in under an hour. (Inversion Space)What Inversion learned from its first spacecraft, RayBefore Arc, Inversion launched a smaller demo craft called Ray on SpaceX’s Transporter-12 mission. Ray weighed about 200 pounds and successfully tested propulsion, avionics and solar power systems in orbit. Though a short circuit prevented reentry, it provided valuable data that led to Arc’s development. Ray’s success convinced the company to push forward with full-scale testing. Inversion has already completed dozens of drop tests and built a full-scale Arc prototype. The startup also partnered with NASA to refine the vehicle’s thermal protection system for reentry.UFO MANIA GRIPS SMALL TOWN AFTER MYSTERIOUS GLOWING OBJECT SIGHTING GOES VIRALHow Arc strengthens defense and emergency logisticsInversion sees Arc as a bridge between space logistics and national defense. The spacecraft could deliver mission-critical cargo to remote, damaged or denied environments where traditional transport would take days. As Fiaschetti put it, the goal is simple: make a difference the moment it lands. By combining maneuverability, reusability and speed, Arc could reshape both emergency response and battlefield supply chains. It’s not just about moving packages, it’s about delivering readiness. Engineers at Inversion Space test Arc’s reentry systems as the spacecraft moves closer to flight readiness. (Inversion Space)What this means for youIf Arc succeeds, it could redefine emergency logistics on Earth. Imagine doctors receiving vital medical kits from orbit after a natural disaster, or soldiers getting urgent supplies in minutes instead of hours. Arc could also accelerate scientific research, enabling faster delivery of experimental payloads or orbital materials. For everyday people, this technology represents the next step toward on-demand space infrastructure, where the line between space and Earth logistics begins to blur. The reusable Arc spacecraft maneuvers through Earth’s atmosphere using parachutes for safe landing. (Inversion Space)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysInversion Space’s Arc is more than a spacecraft; it’s a bold attempt to turn orbit into a delivery zone. With reusable systems, hypersonic capability and a focus on safety, it might just reshape how we think about time, distance and access.Would you trust a spacecraft to deliver emergency supplies to your neighborhood in under an hour? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.   Copyright 2025 CyberGuy.com.  All rights reserved.

Space startup unveils 1-hour orbital delivery system Read More »

1 dont fall for fake settlement sites that steal your data

Don’t fall for fake settlement sites that steal your data

Cyber expert shares tips to avoid AI phishing scams Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program. NEWYou can now listen to Fox News articles! Sometimes, data

Don’t fall for fake settlement sites that steal your data Read More »

google maps comparison waze apple maps

Google Maps vs Waze vs Apple Maps: Which is best?

NEWYou can now listen to Fox News articles!
Navigation apps have become an essential part of modern life. Whether you are commuting to work, running errands or exploring a new city, relying on accurate directions and real-time traffic updates can make all the difference. Over the past decade, Google Maps, Waze and Apple Maps have emerged as the dominant players in this space, each offering a distinct approach to navigation.While millions of people rely on these apps daily, choosing the right one can depend on a variety of factors, from interface design to privacy policies. In this article, we compare these three apps across usability, accuracy, features and data handling to help you determine which one best fits your needs.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.What each app does bestGoogle Maps is widely regarded as the all-rounder. It combines extensive mapping data with points of interest, public transit information, Street View, Live View AR and detailed business listings. Its versatility makes it a top choice for both daily commuters and travelers. Google Maps is a great way to explore the world with detailed routes, Street View, and real-time traffic insights. (OLIVIER DOULIERY/AFP via Getty Images)Waze, on the other hand, is designed primarily for drivers. It thrives on community input, offering live updates about traffic jams, road hazards, accidents and even police presence. Since Google owns Waze, many Waze-style real-time alerts have now begun appearing directly inside Google Maps. While Waze still focuses on driving, this integration blurs the lines between the two apps.Apple Maps has made major strides in recent years. Once considered the underdog, it’s now a solid choice for iOS users. Its clean interface, privacy-focused design and seamless integration with Siri, CarPlay and Apple Watch make it a convenient pick for those fully in the Apple ecosystem.INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONSUsability and interfaceWhen it comes to interface, each app approaches design differently.Google Maps provides a dense but intuitive layout, giving users access to multiple layers of information, including traffic, satellite imagery and public transit routes. Switching between driving, walking, biking and transit is straightforward, and the search functionality is robust, often displaying detailed business profiles, ratings, and hours of operation.Waze prioritizes active driving support. Its interface is visually bold, with clear alerts for traffic jams, accidents and road hazards submitted by other users. While some may find the screen slightly cluttered, the focus is entirely on driving efficiency, which makes sense given its target audience. Waze helps to put you on a faster route with live, community-driven alerts that help you dodge traffic jams and road hazards.  (Kurt “CyberGuy” Knutsson)Apple Maps offers a minimalist, streamlined interface that emphasizes simplicity. Searching for locations, initiating navigation, and following turn-by-turn instructions is straightforward. The app works seamlessly with iOS features like Siri and CarPlay, providing a smooth and cohesive experience for Apple users.Navigation accuracy and performanceAccurate routing and timely traffic updates are critical.Google Maps remains the most reliable for precise routing and travel time estimates. It combines AI-enhanced predictive routing with historical and live traffic data to suggest the best route. Its consistency holds strong across urban and rural areas alike.Waze is unmatched for real-time rerouting. Relying heavily on crowd-sourced reports, it often detects slowdowns or hazards before Google Maps does. However, it still struggles when offline or in areas with poor data coverage.Apple Maps has significantly improved its routing accuracy, especially in cities. Its traffic data is now crowd-sourced from millions of iPhones, processed on-device to protect privacy. In some rural or international regions, though, it can still lag behind Google Maps and Waze. Apple Maps offers seamless use with your iPhone and CarPlay for smooth and privacy-focused navigation.  (Kurt “CyberGuy” Knutsson)Features and ecosystem integrationBeyond basic navigation, each app offers additional tools and integrations.Google Maps offers offline maps, Live View AR navigation, multi-stop routing, EV charger locations and indoor maps for airports and malls. Integration with Gmail, Calendar and Google Assistant creates a seamless travel experience.Waze remains focused on social and driving-specific features. You can report hazards or police sightings and even control Spotify, Audible or podcasts directly from the app without switching screens.Apple Maps leans into privacy and ecosystem benefits. Its “Look Around” feature rivals Street View, while EV routing, cycling paths and Siri integration make it ideal for Apple fans. Apple also uses anonymized “Look Around” imagery to train its AI models, but with strict privacy safeguards like blurring faces and plates.YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOTPrivacy and data handlingHow these apps handle your personal data matters more than ever.Google Maps collects detailed location and usage data to power personalization and advertising. That means better recommendations, but less privacy for users who prefer anonymity.Waze, also owned by Google, gathers anonymized driving data to enhance community reporting. Its functionality depends on sharing your location in real time, which is necessary for crowd-sourced accuracy.Apple Maps takes a different approach. It processes most data on-device, uses random identifiers instead of personal accounts and does not associate searches with your Apple ID. That makes it the most privacy-conscious option, though even Apple collects anonymized data for traffic and route improvements.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.Kurt’s key takeawayThere is no single “best” navigation app, and the right choice depends on your priorities. Google Maps is ideal if you want a feature-packed, versatile app that works well for a variety of transportation modes and travel scenarios. Its global coverage and rich data make it reliable for everyday use and exploration. Waze is best if your main concern is real-time driving efficiency. Its community-driven traffic alerts and dynamic rerouting help you avoid congestion and save time during daily commutes. Apple Maps suits users deeply embedded in the Apple ecosystem who value simplicity, clean design and privacy protections. It may not have as many features as Google Maps or the same real-time edge as Waze, but its seamless integration with iOS makes it convenient.Which navigation app do you rely on most for daily commuting, and why?  Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.CLICK HERE TO GET THE FOX NEWS APPCopyright 2025 CyberGuy.com.  All rights reserved.  

Google Maps vs Waze vs Apple Maps: Which is best? Read More »

ethernet wired router connection

Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection

NEWYou can now listen to Fox News articles!
We spend so much time online that how we connect to the internet has become almost as important as the devices we use. Most people never give it a second thought. They connect their computer to Wi-Fi, type in a password and get on with their day. But if you have ever wondered whether plugging in an Ethernet cable is safer than sticking to wireless, you are asking the right question. The way you connect can have real consequences for your privacy and security. Recently, Kathleen reached out to me with the same doubt.”Is it more secure to use the Ethernet connection at home for my computer, or is it safer to use the Wi-Fi from my cable provider?”It’s a great question, Kathleen, because both options seem similar on the surface but work very differently under the hood. Those differences can mean the difference between a private, secure connection and one that’s more vulnerable to attackers.BEWARE OF FAKE WI-FI NETWORKS THAT STEAL YOUR DATA WHEN TRAVELINGSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER Ethernet offers direct, wired security without wireless risks. (Kurt “CyberGuy” Knutsson)How Ethernet and Wi-Fi differ when it comes to securityEthernet and Wi-Fi both get you online, but they do it in completely different ways. Ethernet uses a physical cable that connects your computer directly to the router. Since it is a wired connection, data travels straight through that cable, making it much harder for anyone to intercept it. There is no wireless signal to hijack, no airwaves to eavesdrop on.Wi-Fi, on the other hand, is built on convenience. It sends your data through the air to and from your router, which is what makes it so easy to connect from anywhere in your home. But that convenience comes with more risk. Anyone within range of your signal could potentially try to break into the network. If your Wi-Fi is protected by a weak password or uses outdated encryption, a skilled attacker might gain access without ever stepping inside your house. At home, that risk is smaller than in a coffee shop or hotel, but it is not zero. Even a poorly secured smart device on your network can give attackers a way in. Ethernet removes many of those risks simply because it is harder to access a connection that requires physical access to a cable. Check out our steps for setting up a home network like a pro here.DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKSWhy one connection might be safer than the otherIt is easy to think Ethernet is automatically safer, but that is not the whole story. Your real security depends on how your entire network is set up. For example, a Wi-Fi network with a strong password, up-to-date router firmware, and WPA3 encryption is going to be far more secure than a poorly configured Ethernet setup connected to an outdated router.There is also the question of who else uses your network. If it is just you and a handful of devices, your risk is low. But if you live in a shared space or run smart home gadgets, that changes the equation. Each device connected to Wi-Fi is a potential entry point. Ethernet reduces the number of devices that can connect, which limits the attack surface.Ultimately, the connection type is one piece of the puzzle. The bigger factors are how your router is configured, how often you update your software, and how careful you are with what devices you connect. Wi-Fi brings convenience but also potential exposure to hackers.  (Kurt “CyberGuy” Knutsson)6 ways to make your internet saferWhether you stick with Wi-Fi or switch to Ethernet, there are several practical steps you can take to protect your devices and data. Each step adds an extra layer of security to your network.IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN1) Use a strong network passwordChoose a long and unique password for your Wi-Fi. Avoid obvious choices like your name, address, or simple sequences. A strong password makes it far harder for attackers to guess or crack your network. A password manager helps you create and store strong, unique passwords for every account, reducing the chances of a hacker gaining access through weak or repeated credentials.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords2) Enable the latest encryption on your routerMost modern routers support WPA3, which is much more secure than older standards like WPA2. Check your router’s settings to enable the latest encryption and ensure your network traffic is harder to intercept.3) Keep your router firmware updatedRouter manufacturers regularly release updates that patch security vulnerabilities. Log into your router’s admin panel occasionally to check for updates and install them as soon as they are available. This prevents attackers from exploiting known flaws. 10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE4) Review connected devicesRegularly check which devices are connected to your network and disconnect anything you no longer use. Each connected device is a potential entry point for attackers, so keeping the list limited reduces your network’s exposure.5) Install strong antivirus softwareEven on a secure network, malware can sneak in through downloads, phishing attacks, or compromised websites. A strong antivirus program will detect and block malicious activity, protecting your computer before damage occurs.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech  Ethernet cables connect to a router as part of a home network setup. (Kurt “CyberGuy” Knutsson)6) Use a VPN for sensitive tasksA virtual private network encrypts your internet traffic, making it unreadable to outsiders. This is especially useful if you ever use Wi-Fi in public or need an extra layer of privacy at home. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPNKurt’s key takeawaySo, which is safer, Ethernet or Wi-Fi? Ethernet wins in raw security because it eliminates many of the risks that come with wireless connections. But in a well-secured home network, the difference is often smaller than most people think. What matters more is how you manage your devices, passwords, software, and online habits.CLICK HERE TO GET THE FOX NEWS APPWould you trade the flexibility of wireless for the peace of mind of a wired connection? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection Read More »

robot 3d printing home desert

Australian construction robot Charlotte can 3D print 2,150-sq-ft home in one day using sustainable materials

NEWYou can now listen to Fox News articles!
Construction robots are no longer a far-off idea. They’re already changing job sites by tackling repetitive, heavy, and often dangerous tasks. The latest robot comes from Australia, where a spider-like machine named Charlotte is making headlines.Charlotte is designed to 3D print an entire 2,150-sq-ft home in just one day. That’s equivalent to the speed of more than 100 bricklayers working simultaneously. This offers a glimpse into how the future of housing might be constructed.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER AUSTRALIA DEBUTS FIRST MULTI-STORY 3D PRINTED HOME – BUILT IN JUST 5 MONTHS Charlotte the robot 3D prints homes in just 24 hours using eco-friendly materials.  (Crest Robotics)How Charlotte the robot worksCharlotte is a collaboration between Crest Robotics and Earthbuilt Technology. The robot doesn’t simply stack bricks or tie rebar. Instead, it uses a giant extrusion system that lays down eco-friendly material in layers.That material comes from sand, crushed brick and recycled glass, all locally sourced. The result? A structure that’s fireproof, floodproof and created with a far smaller carbon footprint than traditional building methods.SUSTAINABLE 3D-PRINTED HOME BUILT PRIMARILY FROM SOILWhy Charlotte the robot stands outThis 3D printing construction robot stands out for its unique mix of speed, strength, versatility and affordability.Speed: Prints a home in 24 hours.Strength: Uses durable, sustainable materials.Versatility: Can raise itself on spider-like legs to keep building higher walls.Affordability: Cuts out many of the expensive steps in construction.While Charlotte is still in the development phase, a scaled-down prototype has already been showcased. Researchers believe it could help solve housing shortages where labor is scarce and construction costs are skyrocketing. Its spider-like legs let it climb and build higher, cutting costs and saving time.  (Crest Robotics)The future of 3D printed moon bases beyond EarthCharlotte’s creators also have their eyes set on the stars. They imagine future versions of the robot building moon bases for research and exploration. With its compact design and autonomous operation, Charlotte could adapt to the extreme environments of space just as well as it can to the challenges on Earth.THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PASTWhat this means for youIf Charlotte delivers on its promise, it could reshape how homes are built worldwide. Faster construction means quicker housing availability. Lower costs and sustainable materials mean more affordable homes with a smaller environmental impact. For anyone facing rising housing prices or construction delays, technology like Charlotte may bring a ray of hope.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/QuizAMERICA’S LESSONS FROM WORLD’S LARGEST 3D-PRINTED SCHOOLS Future versions may even construct Moon bases for research and exploration.  (Crest Robotics)Kurt’s key takeawaysCharlotte may be years away from building its first full-scale home, but its prototype already points toward a future where robots take on critical roles in construction. From tackling housing crises on Earth to building shelters on the moon, Charlotte shows how robotics and 3D printing can work together to solve real problems.CLICK HERE TO GET THE FOX NEWS APPWould you live in a home 3D printed by a robot like Charlotte, or even in one built on the moon? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

Australian construction robot Charlotte can 3D print 2,150-sq-ft home in one day using sustainable materials Read More »

cybercrime hacker photo 1

How malicious party invites target your inbox

NEWYou can now listen to Fox News articles!
Cybercriminals are getting sneakier, and one of their latest tricks is using fake invitation emails that look like they’re coming from legitimate services. They promise you an “exclusive invite” or ask you to download and install something before you can see the details. If you’re not careful, that simple click could install malware on your computer.Recently, I received one of these deceptive emails. It used a Gmail address, which made it look more authentic at first glance. But the red flag was in the language: “Save the invite and install to join the list.” No legitimate service should ever ask you to install software just to see an invite.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERSCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Cybercriminals use fake “invitation” emails to trick users into downloading malware. (Photo by Felix Zahn/Photothek via Getty Images)How the fake invitation scam worksThe email looks polished and even mimics well-known event platforms. When you click the link, it sends you to a site that pretends to host the invitation. Instead of showing event details, it pushes you to download an “invitation” file.That file is likely malware. Once installed, it can:Steal your personal informationAccess your email contacts and spread the scam furtherHijack your system for criminal useThe link in my case pointed to a suspicious domain ending in “.ru.com.” At first glance, it mimicked a legitimate brand name, but the extra suffix is a clue it’s not official. Hackers often use look-alike domains to trick you into thinking the site is real.Red flags that reveal fake invitation email scamsHere are some warning signs that should make you pause before clicking:Unusual instructions like “install” or “save” just to view an inviteUrgent or exclusive language pushing you to act fastLook-alike URLs that swap in extra characters or use different endingsDownload prompts when all you expected was an online inviteIf you see any of these, close the email and delete it.SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS Scammers mimic legitimate services, urging victims to “install” files that steal data. (Photo by Jens Büttner/picture alliance via Getty Images)How to protect yourself from fake invitation email malwareThese fake party invite emails are designed to trick you into downloading malware before you even realize what’s happening. Follow these steps to stay safe and keep your inbox secure.1) Hover over links before clickingBefore you click on any “Download Invitation” button, hover your mouse over the link. Real invites use the company’s official domain. Scams like this often use odd endings such as “.ru.com” instead of “.ru” or “.com.” That small clue can help you avoid a big problem.2) Use strong antivirus softwareIf you click by mistake, strong antivirus protection can detect and block malware before it spreads. Think of it as your last line of defense against a fake invite that sneaks into your inbox.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 3) Use a personal data removal serviceScammers often spread these emails by stealing contact lists from infected accounts. A personal data removal service reduces the amount of your personal information floating around online, making it harder for cybercriminals to target you in the first place.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4) Keep your system updatedHackers love outdated systems because they’re easier to exploit. Keeping your operating system and apps updated patches those holes and makes it much harder for malware to take hold.5) Report suspicious emailsDon’t just delete a suspicious invite, report it to your email provider. This helps improve their filters, protecting you and others from future fake emails.6) Enable multi-factor authentication (MFA)Even if hackers get your password from a phishing attack, MFA adds an extra lock to your accounts. It makes breaking in nearly impossible without your phone or secondary code.7) Back up your files regularlyIf the worst happens and malware damages your computer, backups ensure you don’t lose everything. Use an external hard drive or a trusted cloud service for peace of mind.NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS Hackers send polished emails with malicious links disguised as exclusive invites. (Photo by Thomas Trutschel/Photothek via Getty Images)Kurt’s key takeawaysFake invitation emails are designed to catch you off guard. Hackers count on you being in a hurry and clicking without thinking. Taking a moment to question an unexpected email could save you from installing dangerous malware.Have you ever received a fake invitation email that looked convincing? How did you handle it? Let us know by writing to us at Cyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

How malicious party invites target your inbox Read More »

1 flying drones take aim at retail theft

Flying drones take aim at retail theft

NEWYou can now listen to Fox News articles!
Shoplifting has long been a challenge for retailers, but a U.S. company now believes that flying drones could help combat the issue. Flock Safety, best known for its law enforcement camera systems, is promoting its new Flock Aerodome Drone as an Automated Security system to the private sector. The idea is simple: if a theft occurs, a drone launches, follows the suspect, and streams live video back to security teams or even police. With theft rates reportedly climbing 93% in 2024, the push for high-tech security has never been stronger.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter   An example of a Flock Safety drone, ready to follow theft suspects within seconds (Flock Safety)How the drones would workInstead of dispatching a guard, Flock’s drones could launch within seconds after motion is detected. Equipped with HD and thermal cameras, the drones can zoom in, track suspects, and relay real-time visuals.The company says the system:Covers up to 38 square miles with a single dockIntegrates with existing security alarms and camera systemsOperates with FAA safety approvals and built-in geofencingReduces costs by replacing the need for multiple guardsIn theory, the drones act as a “guard in the sky,” providing retailers with rapid coverage across large areas, such as malls, warehouses, or ports. The drone is equipped with HD and thermal cameras; they track movement across wide areas in order to follow suspects. (Flock Safety)TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDSWhy retailers may be interestedOrganized retail crime is a growing problem. Retailers have been reporting higher losses, tighter budgets, and fewer staff members available. Flock Safety argues its drone system can act as a deterrent simply by being visible, making criminals think twice before targeting a store. Beyond retail, the company is also pitching its drones to operators of hospitals, warehouse sites, and energy facilities that require large-scale surveillance. Due to the drones’ helpful technologies, retailers may soon rely on them as a visible deterrent against organized theft. (Flock Safety)HEGSETH TEARS UP RED TAPE, ORDERS PENTAGON TO BEGIN DRONE SURGE AT TRUMP’S COMMANDWhat this means for youFor shoppers, this could mean visiting stores where drones are part of the security landscape. You might notice them overhead at malls or parking lots, watching for unusual activity. While some may view this as an added safety measure, others may worry about increased surveillance and loss of privacy. For retailers, drones could help protect profits, staff, and customers without the rising costs of hiring additional guards. But whether customers welcome drones buzzing around remains to be seen.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/QuizKurt’s key takeawaysTechnology is quickly reshaping how companies approach security, and drones may soon play a bigger role in everyday shopping environments. With faster response times, broader coverage, and lower staffing costs, the idea has clear appeal for retailers. At the same time, questions about privacy and public acceptance will influence the extent to which this technology is adopted.Would you feel safer shopping under drone surveillance, or would it make you uncomfortable? Let us know by writing to us at CyberGuy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/NewsletterCLICK HERE TO GET THE FOX NEWS APPCopyright 2025 CyberGuy.com. All rights reserved.

Flying drones take aim at retail theft Read More »

bernie sanders robot tax artificial intelligence

Fox News AI Newsletter: Dems demand ‘robot tax’

Independent Vermont Sen. Bernie Sanders appears at a news conference on Capitol Hill on Sept. 9, 2025, in Washington, D.C. (Kent Nishimura/Getty Images)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Democrats demand ‘robot tax’ as AI reportedly threatens to replace 100M US jobs- AMD, OpenAI leaders celebrate major partnership to drive next wave of AI innovation- OpenAI becomes world’s most valuable private company with $500B valuation: reportROBOT REBELS: A new Senate report warns that artificial intelligence could displace nearly 100 million U.S. jobs within the next decade, spurring Democrats to push for a “robot tax” on companies that replace human workers with tech.’GO BIG’: Markets are just starting to grapple with U.S.-based semiconductor giant Advanced Micro Devices’ potentially industry-shaking partnership with OpenAI — and both companies’ leaders are making the rounds as the future of artificial intelligence takes shape. AI BOOM: A recently completed stock deal saw OpenAI’s valuation surge to $500 billion and become the world’s most valuable private company, according to a report. Sam Altman, chief executive officer of OpenAI Inc. (Nathan Howard/Bloomberg via Getty Images)BODYCAM BOOST: As artificial intelligence becomes more mainstream, the Pima County Sheriff’s Department is looking at how it can use the emerging technology.DEEP FAKE: Sora 2 is OpenAI’s new video-generating app that’s both mind-blowing and terrifying.AI GOES NEUTRAL: OpenAI says its latest generation of artificial intelligence (AI) models, including GPT-5 Instant and GPT-5 Thinking, show a significant reduction in political bias compared to previous versions, according to a new internal report obtained by Fox News Digital. Elon Musk looks on as President Donald Trump meets South African President Cyril Ramaphosa. (AP/Evan Vucci)TRILLION BOUND: Once upon a not-so-distant time, being a millionaire meant you’d “made it.” Now the billionaires list seems to grow by the week. It won’t be long before the new title that matters is trillionaire. And make no mistake about it, Elon Musk is on a trajectory to become the first trillionaire. It’s not just possible, it’s all but inevitable. PET SAVER: Love Lost, powered by Petco Love, is a national database driven by artificial intelligence that matches lost and found pet photos. Sharon’s beloved cat, Louie, slipped out of a window and went missing for 11 days. (Petco Love)DIRTY CLAIMS: West Virginia Attorney General John “JB” McCuskey said Monday that his office is helping lead a new multi-state investigation into big tech firms, alleging they exaggerate their clean-energy commitments — a practice known as “greenwashing.”GUARDRAILS EXPOSED: An internal Meta document sheds light on how the company is training its AI chatbot to handle one of the most sensitive issues online: child sexual exploitation. The newly unearthed guidelines detail what’s permitted and what’s strictly forbidden, offering a rare look into how Meta is shaping its AI behavior amid government scrutiny.TECH REVOLUTION: The artificial intelligence and robotics being developed by multi-billionaires today will allow corporate America to wipe out tens of millions of decent-paying jobs, cut labor costs and boost profits, Sen. Bernie Sanders argues.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Dems demand ‘robot tax’ Read More »

1 hackers leak childrens data in major nursery breach intro 1

Hackers leak children’s data in major nursery breach

NEWYou can now listen to Fox News articles!
Over the past few years, data breaches targeting schools, healthcare providers, and childcare services have been making headlines, exposing sensitive personal information and leaving families vulnerable. Now, a new breach has come to light that targets a nursery chain. Kido, which operates in the U.S., U.K., China and India, has reportedly had sensitive data stolen from thousands of children. Names, photos, addresses, birthdates, parental details and even safeguarding notes and medical records were allegedly accessed by a hacker group called Radiant.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter The incident highlights how stolen data threatens not just privacy but also long-term child safety. (Kurt “CyberGuy” Knutsson)What you need to know about nursery breachAccording to reports, the hacker group Radiant claims to have stolen data related to around 8,000 children. To prove possession, they posted samples, including pictures and profiles of ten children, on a darknet website. They then issued a ransom demand, threatening to release more sensitive information unless Kido paid. In addition to targeting the nursery chain directly, Radiant reportedly called some of the children’s parents, pressuring them to push Kido into paying the ransom.FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATAWhen questioned about their actions, the group defended their tactics as a form of “penetration testing” for which they supposedly deserved compensation. This defense is misleading, as such testing requires explicit permission from the organization being targeted or participation in an official bug bounty program. Without that consent, these actions are illegal and deeply unethical. Hackers exploited children’s data in the Kido breach, exposing families to serious risks. (Kurt “CyberGuy” Knutsson)Why is this attack so disturbing?The Kido breach is alarming for multiple reasons. First, it involves children’s data, which is particularly sensitive and legally protected in most countries. Second, the attackers combined traditional data theft with intimidation tactics, reaching out to parents directly. History suggests that once criminals gain access to such information, the attacks can escalate.Breaches like this highlight how personal and digital security are intertwined. The potential misuse of data extends beyond simple identity theft. It can impact children’s safety, family privacy and long-term well-being. With attackers leveraging both the stolen data and psychological pressure on parents, the threat is particularly potent and long-lasting. Parents reported being directly contacted by attackers, showing how intimidation adds to the harm. (Kurt “CyberGuy” Knutsson)7 steps parents can take to protect their child’s dataEven though the investigation into the Kido breach is ongoing, parents and schools can take immediate action to protect children’s data and reduce the risk of further exploitation. Here’s a detailed guide:1) Monitor your child’s online accounts regularlyLog in to email, school portals and cloud storage accounts linked to your child. Look for unusual activity such as unrecognized logins, changes to passwords or new connected devices. Set up notifications for account activity whenever possible so you are alerted instantly if something suspicious happens.2) Enable two-factor authentication (2FA) on all accountsAdding 2FA creates an extra layer of security. Even if a hacker has a password, they won’t be able to access the account without the second verification step. Most email providers, school portals and messaging platforms support this, and it’s a simple step that dramatically improves security.3) Consider a personal data removal serviceData broker sites often collect names, addresses and other personal details that hackers can use. Services that remove your child’s information from these databases can make it harder for attackers to find and exploit sensitive data.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/DeleteGet a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScanTHINK YOU’RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS4) Use identity theft protection servicesThese services can continuously scan for your child’s personal information online and alert you if their data appears on suspicious websites or the dark web. This early warning allows you to take action before criminals attempt to exploit it.Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com/IdentityTheft5) Install antivirus software on all devicesA strong antivirus program protects devices from malware, phishing scams, and suspicious scripts. It is particularly important on devices that children use to access school portals or personal accounts. This ensures that if a hacker tries to use malware to get deeper access, it is blocked.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech6) Use a secure mail provider for sensitive communicationsFor communications with schools, healthcare providers or any service handling sensitive information about children, consider using an email service that offers strong encryption and built-in protection against spoofing. This makes it harder for attackers to impersonate a school or parent.For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail7) Educate your children about online safetyTeach children not to share personal information online, including photos, addresses or school details. Encourage them to report anything suspicious and explain why it’s important to keep login information private.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayData breaches targeting children are particularly concerning because they can have long-lasting consequences. The Kido incident is a stark reminder of the importance of proactive digital security measures for families. While organizations bear responsibility for protecting sensitive data, parents can take significant steps to monitor, secure and respond to potential threats.Have you ever reviewed what personal information about your child is online? Let us know by writing to us at CyberGuy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/NewsletterCopyright 2025 CyberGuy.com.  All rights reserved.

Hackers leak children’s data in major nursery breach Read More »