Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

How China made electric vehicles mainstream

4 hours agoShareSaveAnnabelle Liang & Nick MarshBusiness reporter & Transport correspondentReporting fromGuangzhouShareSaveGetty Images”I drive an electric vehicle because I am poor,” says Lu Yunfeng, a private hire driver, who is at a charging station on the outskirts of Guangzhou in the south of China.Standing nearby, Sun Jingguo agrees. “The cost of driving a petrol car is too expensive. I save money driving an electric vehicle,” he says.”Also, it protects the environment,” he adds, leaning against his white Beijing U7 model.It’s the kind of conversation climate campaigners dream of hearing. In many countries, electric vehicles (EVs) are considered luxury purchases.But here in China – where almost half of all cars sold last year were electric – it’s a banal reality.’King of the hill’At the beginning of the century, China’s leadership laid out plans to dominate the technologies of the future. Once a nation of bicycles China is now the world’s leader in EVs.For Guangzhou’s more than 18 million people, the roar of the rush hour has become a hum.”When it comes to EVs, China is 10 years ahead and 10 times better than any other country,” says auto sector analyst Michael Dunne.Getty ImagesChina’s BYD now leads the global EV market, after overtaking US rival Tesla earlier this year.BYD’s sales have been helped by a vast domestic market of more than 1.4 billion people and it is now looking to sell more cars overseas. So too are a raft of other Chinese start-ups that make affordable EVs for the mass market.So how did China build this lead, and can it be caught?The master planIn tracing the origins of China’s EV dominance, analysts often credit Wan Gang – a German-trained engineer who became China’s minister of trade and science in 2007.”He looked around and said, ‘Good news: we are now the largest car market in the world. Bad news: on the streets of Beijing, Shanghai, Guangzhou all I see is foreign brands’,” says Mr Dunne.At the time, Chinese brands simply couldn’t compete with the European, American and Japanese car makers for quality and prestige. These companies had an unassailable head start when it came to producing petrol or diesel-powered cars.But China did have ample resources, a skilled labour force and an ecosystem of suppliers in the motor industry. So Mr Wan decided to “change the game and flip the script by moving to electrics”, according to Mr Dunne.This was the master plan.Even though the Chinese government had included EVs in its five-year economic blueprint as early as 2001, it wasn’t until the 2010s that it started to provide vast amounts of subsidies to grow the industry.China, unlike Western democracies, has the capacity to mobilise huge swathes of its economy over many years towards its aims.The country’s mammoth infrastructure projects and dominance in manufacturing are a testament to this.A US think tank, the Center for Strategic and International Studies (CSIS), estimates that from 2009 to the end of 2023, Beijing spent around $231bn (£172bn) developing the EV industry.From consumers and carmakers to electricity providers and battery suppliers, everyone in China is entitled to money and assistance when it comes to EVs.It encouraged BYD, for example, to switch from making smartphone batteries to focusing on producing EVs.Ningde-based CATL – which supplies firms such as Tesla, Volkswagen and Ford – was founded in 2011 and now produces a third of all the batteries used for EVs worldwide.This combination of long-term planning and government funding also allowed China to dominate critical supply chains in battery production.It has helped build the world’s largest public charging network with stations concentrated in big cities, which put drivers just minutes away from the nearest charger.Getty Images”If you want to manufacture a battery to put into an electric car today, all roads go through China,” says Mr Dunne.Some refer to this as “state capitalism”. Western countries call it unfair business practice.Chinese EV executives insist all companies, domestic or foreign, have access to the same resources.As a result, they argue, China now has a thriving EV start-up sector, driven by fierce competition and a culture of innovation.”The Chinese government is doing the same thing you see in Europe and in the US – providing policy support, consumer encouragement and infrastructure,” Brian Gu, president of EV maker XPeng, tells the BBC.”But I think China has done it consistently and in a way that really fosters the most competitive landscape that there is. There’s no favouritism to anybody,” he adds.Annabelle LiangXPeng is one of the “Chinese champions”, as Mr Gu puts it, driving the industry forward. Barely a decade old and yet to turn a profit, the start-up is already in the world’s top 10 EV producers.The company has attracted some of China’s top young graduates to its headquarters in Guangzhou, where casually dressed staff sip flat whites and internet streamers sell cars live in the showroom.A brightly coloured slide taking employees from the top to the ground floor would seem more at home in Silicon Valley than China’s industrial heartland.Despite the relaxed atmosphere, Mr Gu says the pressure to offer consumers better cars at lower prices is “immense”.The BBC was invited on a test drive of XPeng’s Mona Max, which has just gone on sale in China for around $20,000.For this price you get self-driving capability, voice activation, lie-flat beds, film and music streaming. Young Chinese graduates, we’re told, see all these as standard features for a first car purchase.”The new generation of EV makers… look at cars as a different animal,” says David Li, the co-founder and chief executive of Hesai, which makes the Lidar sensing technology used in many self-driving cars.’An EV makes sense for me’Young Chinese consumers are certainly attracted to top-of-the-range technology, but a huge amount of government spending goes towards making EVs financially attractive, according to the CSIS study.Members of the public receive subsidies for trading in their non-electric car for an EV as well as tax exemptions and subsidised rates at public charging stations.These perks drove Mr Lu to go electric two years ago. He used to pay 200 yuan ($27.84; £20.72) to fill up his car for 400km (248 miles) of driving. It now costs him a quarter of that.Annabelle LiangPeople in China also normally pay thousands for their vehicle registration plate – sometimes more than the cost of the car itself – as part of government efforts to limit congestion and pollution. Mr Lu now gets his green one for free.”The rich drive petrol cars because they have unlimited resources,” Mr Lu says. “An EV just makes sense for me.”Another proud EV owner in Shanghai, who wanted to use her English name Daisy, says that rather than charge her vehicle at a station, she changes her car’s battery at one of the city’s many automated swapping stations provided by EV maker Nio.In under three minutes, machines replace her flat battery with a fully charged one. It’s state of the art technology for less than the price of a tank of fuel.The road aheadThe government subsidies at the heart of China’s EV growth are seen as unfair by countries looking to protect their car industries.The US, Canada and the European Union have all imposed substantial import taxes on Chinese EVs.However, the UK says it’s not planning to follow suit – making it an attractive market for firms like XPeng, which started delivering its G6 model to British consumers in March, and BYD, which launched its Dolphin Surf model this month in the UK, and is available for as little as $26,100.This should be music to the ears of Western governments that enthusiastically back the transition to EVs, which the United Nations calls “pivotal” to avert climate disaster.Getty ImagesSeveral Western countries, including the UK, say they will ban the sale of petrol and diesel cars by 2030. No country is better placed to help make this a reality than China.”The Chinese are thinking about a future where they manufacture just about every single car for the world. They’re looking around saying, ‘Can anybody do it better than us?'” says Mr Dunne.”Leaders in Detroit, Nagoya, Germany, UK, everywhere around the world, are shaking their heads. It’s a new era, and the Chinese are feeling very confident about their prospects right now.”Despite the environmental benefits, there is still suspicion about what relying on Chinese technology could bring.Britain’s former head of MI6, Sir Richard Dearlove, recently called Chinese EVs “computers on wheels” that can be “controlled from Beijing”.His claim that Chinese EVs could one day immobilise British cities was dismissed by BYD’s executive vice-president Stella Li in a recent BBC interview.”Anyone can claim anything if they lose the game. But so what?” she said.”BYD pays for a very high standard of data security. We use local carriers for all our data. In fact we do it 10 times better than our competition.”Nevertheless Sir Richard’s concerns echo previous national security debates surrounding Chinese technology.This includes telecoms infrastructure maker Huawei, whose equipment was banned in several Western countries, as well as the social media app TikTok, which is prohibited on UK government devices.But for Sun Jingguo in Guangzhou, the message is simple.”I think the world should thank China for bringing this technology to the world,” he laughs. “I do.”Additional reporting by Theo Leggett, international business correspondent in London.

How China made electric vehicles mainstream Read More »

syrian suicide bomber photo 1

Suicide bomber strikes Syrian church near Damascus during mass

NEWYou can now listen to Fox News articles!
A suicide bomber in Syria on Sunday detonated himself inside a church filled with people, state television and a war monitor said.The explosion in Dweil’a in the outskirts of Damascus took place as people were praying inside the Mar Elias Church. Britain-based war monitor the Syrian Observatory for Human Rights says there were 30 people wounded and killed, but the exact numbers are unclear. Some local media reported that children were among the casualties.THEY WANT AMERICANS DEAD, TOO — THE THREAT FROM IRAN AND ITS PROXIES A suicide bomber exploded at the Mar Elias Church on the outskirts of Damascus, Syria, on June 22, 2025. (BAKR ALKASEM/AFP via Getty Images)The attack was the first of its kind in Syria in years, and comes as Damascus under its de facto Islamist rule is trying to win the support of minorities. As President Ahmad al-Sharaa struggles to exert authority across the country, there have been concerns about the presence of sleeper cells of extremist groups in the war-torn country.WE CAN’T IGNORE THE DANGER FROM THOSE WHO WANT TO ‘GLOBALIZE THE INTIFADA.’ WE NEED TO TAKE ACTION A suicide bomber attacks a church on the outskirts of Damascus, Syria, on June 22, 2025. (BAKR ALKASEM/AFP via Getty Images)Security forces and first-responders rushed to the church. An eyewitness said in a video widely circulated online that the attacker came in and started to shoot at the people there before detonating an explosive vest he was wearing.CLICK HERE TO GET THE FOX NEWS APP

Suicide bomber strikes Syrian church near Damascus during mass Read More »

1 what to do after receiving a password reset email you did not request

What to do if you get a password reset email you didn’t ask for

NEWYou can now listen to Fox News articles!
You’re checking your inbox or scrolling through your phone when something catches your attention. It’s a message about a password reset, but you never asked for one. It might have arrived by email, text message or even through an authenticator app. It looks legitimate, and it could be from a service you actually use. Still, something feels off.Unrequested password reset messages are often an early warning sign that someone may be trying to access your account. In some cases, the alert is real. In others, it’s a fake message designed to trick you into clicking a malicious link. Either way, it means your personal information may be at risk, and it’s important to act quickly.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE Password spelled out on blocks      (Kurt “CyberGuy” Knutsson)Why you’re receiving password reset emails you didn’t requestThere are a few reasons this might happen:Someone is attempting unauthorized access: Hackers often test stolen credentials from data breaches to see where they still work. If they find an account tied to your email, triggering a password reset is one way they try to gain control.You are being targeted through phishing: Scammers send fake password reset emails or texts that look official. These often link to fake websites that steal your login credentials or install malware.You are experiencing a credential stuffing attack: This is when attackers use bots to flood login pages with known usernames and passwords. If anything matches, they will try to reset the password and lock you out.Your two-factor authentication is blocking the login: If you receive a prompt from your authenticator app but did not attempt to log in, it means someone has your correct password and is trying to break through your second layer of protection.You may be facing a SIM swap attempt: SMS-based two-factor authentication is vulnerable if someone hijacks your phone number. If you suddenly stop receiving texts or see password resets tied to SMS, contact your mobile provider immediately.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?In some cases, the message is legitimate, as seen in the email below, but the request didn’t come from you. That is often a sign your login details are already in someone else’s hands. Legit Microsoft password reset email  (Kurt “CyberGuy” Knutsson)HOW SIM SWAPPING LED TO A $1.8M CYBER FRAUD CASEHow to identify suspicious password reset attemptsUnsolicited password reset alerts can take several forms, each with signs of potential fraud or hacking:Email: Most services will send a password reset link to your inbox. If you didn’t request it, that is a red flag.Text message: You might receive a verification code or reset link via SMS. While many companies use text-based verification, scammers also send fake messages that mimic real ones.Authenticator app requests: This is often the clearest sign that someone already has your password. If you get a 2FA prompt you didn’t trigger, someone is trying to log in right now and needs your approval to finish the process.No matter how the alert appears, the goal is the same. Either someone is trying to trick you into handing over your credentials, or they already have your password and are trying to finish the job. Legit Microsoft sign-in request   (Kurt “CyberGuy” Knutsson)1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISKWhat to do if you receive an unrequested password resetIf you receive a password reset alert you didn’t request, treat it as a warning. Whether the message is legitimate or not, acting quickly can help prevent unauthorized access and stop an attack in progress. Here are the steps you should take right away.1. Don’t click on anything in the message: If the alert came through email or text, avoid clicking any links. Instead, go directly to the official site or app to check your account. If the request was real, there will usually be a notification inside your account.2. Check for suspicious login activity: Most accounts have a way to view your recent logins. Look for suspicious activity like unfamiliar devices, strange locations or logins you don’t recognize. A login from a location you have never been to could be a sign of a breach.Google accounts: Go to myaccount.google.com and open the Security tab to see recent devices and activityApple ID: On your iPhone, iPad or Mac, open Settings (or System Settings on Mac), tap your name at the top, scroll down to view your list of signed-in devices and tap any unfamiliar one to select Remove from Account.Microsoft accounts: Visit account.microsoft.com, sign in, then go to Security > Sign-in activity to view recent access attemptsBanking and social media platforms: Look under your profile or settings for login history or device management3. Change your password: Even if nothing looks wrong, it’s a good idea to reset your password. Choose one that is long, complex and unique. Avoid reusing passwords across different accounts. Consider using a password manager to generate and store complex passwords.  Get more details about my best expert-reviewed Password Managers of 2025 here.4. Scan your device for threats: If someone got access to your password, there is a chance your device is compromised. Use strong antivirus software to scan for keyloggers or spyware.5. Report the incident: If the alert came from a suspicious message, report it. In Gmail, tap the three-dot menu and select Report phishing. For other services, use the official website to flag unauthorized activity. You can also file a report at the FBI’s Internet Crime Complaint Center if you suspect a scam. A woman working on her laptop  (Kurt “CyberGuy” Knutsson)Steps you can take to eliminate password reset emailsYou can take a few steps to try to reduce the number of emails you receive requesting a password reset.1. Double-check your username and password. When accessing your account, you may have a typo in your login information. Should you repeatedly attempt to access your account with this error, the company that holds the account may believe a hacking attempt is occurring, triggering an automatic reset. If your web browser automatically populates your username and password for you, make sure this information is free of typos.2. Remove unauthorized devices. Some accounts maintain a list of devices authorized to use your account. If a hacker manages to gain some of your personal information, it may be able to add one of his devices to your authorized list, triggering account login errors as he tries to hack your password. Check the list of authorized devices and remove any items you don’t recognize. The process varies, depending on the type of account. We’ll cover steps for Microsoft, Gmail, Yahoo and AOL.MicrosoftSign in to your Microsoft account at account.microsoft.com.Click your profile icon at the top right and select My Microsoft Account.Scroll down to find the Devices section and click View all devices.You’ll see a list of devices associated with your account. Click Show details for each one to review activity.If you see a device you don’t recognize or no longer use, click Remove device. Steps to remove unauthorized devices from your Microsoft account. (Kurt “CyberGuy” Knutsson)Gmail:Sign in at myaccount.google.com.Go to the Security tab in the left sidebar.Scroll down to the Your devices section and click Manage all devices.Review the list of signed-in devices. If you see any you don’t recognize, click the device and select Sign out.Yahoo:Go to the Yahoo Account security page at help.yahoo.com/kb/account.Click on Recent activity.Review the list of devices and locations that have accessed your account.If you notice any unfamiliar activity, click Remove or Sign out next to the suspicious device.AOL:Sign in to your AOL account and go to the Recent Activity page.Review the sections for Recent activity, Apps connected to your account and Recent account changes.If you find any activity or devices that you don’t recognize, click Sign out or Remove next to it.Remember to regularly check your account settings and authorized devices to ensure the security of your accounts. If you suspect any unauthorized access, it’s also a good idea to change your passwords and review your account recovery options.3. Sort such messages to spam. If you’d prefer to simply not see these kinds of email messages, set up your email client to sort messages like this to a spam folder. (Because many of them are spam, some email clients do this automatically.) Should you ever legitimately request a password reset, though, you’ll need to remember to look in the spam folder for the message.4. Use a static IP address. Some accounts attempt to recognize your device through your IP address. If you have a dynamic IP address, your IP address changes constantly, meaning the account may not recognize your device, triggering the reset message. This often occurs because you are using a VPN. See if your VPN allows you to use a static IP address.HOW SECURE IS MY PASSWORD? USE THIS TEST TO FIND OUT How to protect your accounts from future password attacksEven if this was a one-time scare, it is important to tighten your overall security. Here are a few simple habits that go a long way:1. Use strong and unique passwords: Use a password manager to create secure, one-of-a-kind passwords for each account. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Consider using a personal data removal service:  If you’re receiving password reset emails from accounts you don’t remember signing up for, or from multiple services, there’s a good chance your personal information is exposed on data broker sites. These companies collect and sell your data, including your email, phone number, home address and even login information from old accounts. Using a reputable data removal service can help you automatically identify and request the removal of your personal data from these sites. This reduces your risk of identity theft, credential stuffing, phishing and spam.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web3. Turn on two-factor authentication (2FA): Enabling 2FA is one of the most effective ways to stop unauthorized access, even if someone has your password. When 2FA is active, anyone trying to log in must also complete a second verification step, usually through an app on your phone. If an attacker triggers a login attempt, you will receive a prompt to approve or deny it. This gives you the power to block the attempt in real time and confirms that 2FA is working as intended.4. Install strong antivirus software: Install strong antivirus software to catch malware before it causes harm. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Review your account settings: Make sure your recovery phone number and email are current. Remove any outdated or unused backup methods.6. Keep your software up to date: Keep your device software and apps up to date to patch security vulnerabilities that attackers often exploit.7. Use a VPN to protect your online activity: Avoid public Wi-Fi or use a VPN to protect your information when browsing on unsecured networks. Consider using a VPN to protect against hackers snooping on your device as well. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devicesKurt’s key takeawaysIt’s easy to brush off an unexpected password reset message, especially if nothing else seems out of place. But these alerts are often the digital equivalent of a knock at the door when you weren’t expecting anyone. Whether it’s a hacker probing for a way in or a scammer trying to bait you, the smartest move is to treat every unexpected security message as a wake-up call. Taking just a few minutes to check your login history, secure your accounts and update your passwords can make all the difference. Cybersecurity isn’t just for experts anymore. It’s an integral part of everyday life. And the more proactive you are now, the less likely you’ll be dealing with damage control later.CLICK HERE TO GET THE FOX NEWS APPAre tech companies doing enough to protect users from password threats, or are they putting too much responsibility on individuals? Let us know by writing to us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

What to do if you get a password reset email you didn’t ask for Read More »

quantum time travel 120x120 1

ESA Launches Plans for Triple-Spacecraft Mission Using Laser Antenna to “Surf Gravitational Waves”

The European Space Agency’s Laser Interferometer Antenna (LISA) is on its way to becoming the first space-based observatory specifically designed to study gravitational waves, after European space technology group OHB System AG signed its recent contract to begin construction on the project. 
The mission will involve three separate spacecraft as it seeks to detect the spacetime ripples generated by the collision of supermassive black holes and other powerful events. OHB System AG and ESA signed the contract at France’s International Paris Airshow, held June 16-22, 2025.
Heading into Production
“We are immensely proud that ESA and the scientific community entrust us to implement this groundbreaking science mission. Together with our partners we stand ready to bring LISA to life – pioneering our ability to ‘surf gravitational waves’ and enabling us to see our Universe in a new way,’ said Chiara Pedersoli, CEO of OHB System AG.
Since entering the space sector in Germany during the 1980s, OHB System AG has been involved in major programs such as the International Space Station and the upcoming Lunar Gateway, part of NASA’s Artemis program.
“I’m delighted to celebrate the contract signing today with our partners at OHB who will lead on the implementation of this truly ambitious endeavour,” said Professor Carole Mundell, ESA’s Director of Science. “LISA represents many years of pioneering technology developments, hope and belief of our scientific community, and steadfast support from our ESA member states.”
Detecting Gravitational Waves
By operating in space rather than from the ground, LISA will be able to capture low-frequency gravitational waves that are inaccessible to Earth-based detectors. These low-frequency waves are expected to provide evidence of large-scale events that reach back to the earliest moments of the universe.
“As the first space mission designed to capture gravitational waves, LISA will open a brand-new window on the dark Universe and test the known laws of physics to their extreme,” Mundell said. “When it is flying, LISA will also represent the triumph of precision engineering and international cooperation on a new scale, and place Europe at the forefront of space technology and fundamental science.”
Scientists expect LISA to deliver new data on some of the most fundamental cosmic questions, including the nature of gravity, the rate of universal expansion, and the activity of supermassive black holes. On a more localized scale, it will also advance research into stellar-origin black holes and the formation and evolution of compact binary star systems within the Milky Way.
The Triangle Mission
The mission is currently scheduled to launch in 2035 aboard an Ariane 6 rocket, developed by ArianeGroup for ESA. A new addition to Europe’s launch capabilities, the Ariane 6 successfully delivered its first commercial payload on March 6 of this year.

LISA will fly in a triangular formation, consisting of three spacecraft that follow Earth’s orbit around the Sun. Each will remain separated by 2.5 million kilometers, forming an equilateral triangle that trails the planet. The spacecraft will exchange laser beams to measure gravitational waves—over distances more than six times the span between Earth and the Moon. This kind of triangular configuration has never before been attempted in spaceflight.
Each spacecraft will carry two test masses—small cubes made from a gold-platinum alloy—suspended inside free-floating housings. Using laser interferometry, LISA will track minuscule changes in the distances between the cubes. This will allow it to detect gravitational waves by measuring variations as small as a billionth of a millimeter over millions of kilometers. The system will be sensitive enough to register distance shifts comparable in size to a single helium atom.
Ryan Whalen covers science and technology for The Debrief. He holds an MA in History and a Master of Library and Information Science with a certificate in Data Science. He can be contacted at ryan@thedebrief.org, and follow him on Twitter @mdntwvlf.

ESA Launches Plans for Triple-Spacecraft Mission Using Laser Antenna to “Surf Gravitational Waves” Read More »

1 first electric passenger plane lands at jfk in milestone flight

First electric passenger plane lands at JFK in milestone flight

NEWYou can now listen to Fox News articles!
It’s not every day aviation history is made, but June 2025 marked a real milestone for New York and the world of electric flight. For the first time, a passenger-carrying electric airplane landed at John F. Kennedy International Airport, and it wasn’t just a test. There were actual people on board.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.FLYING CAR WITH 620-MILE RANGE SCHEDULED FOR UPCOMING LAUNCH Passenger-carrying electric airplane  (Beta Technologies)The flight that made headlinesKyle Clark, founder and CEO of Beta Technologies, was at the controls as the company’s electric aircraft flew from East Hampton to JFK. With four passengers on board, the trip covered about 70 nautical miles in just over half an hour. That’s right, a fully electric plane, carrying people, quietly and efficiently making its way through the skies above New York. Clark put it simply, “This is a 100% electric airplane that just flew from East Hampton to JFK with passengers on it, which was a first for the New York Port Authority and the New York area. We covered 70 odd nautical miles in 35 minutes.” The message this sent was clear that electric air travel is here, and it’s practical.GET FOX BUSINESS ON THE GO BY CLICKING HERE Passenger-carrying electric airplane (Beta Technologies)WINDOWLESS JETS OFFER A DIGITAL EXPERIENCE ON FUTURE FLIGHTSWhy this matters for everyday travelThe real takeaway isn’t just the novelty of the flight, but what it means for the future of getting around. Electric aircraft like this one are quiet, which means happier communities near airports. They’re also much cheaper to operate. As Clark noted, “Charging this thing up and flying out here cost us about $8 in fuel. Of course, you have to pay for the pilot and the airplane, but, fundamentally, it’s way less expensive.” Passengers on the flight could talk to each other the whole time, thanks to the lack of noisy engines and propellers. That kind of comfort and accessibility is exactly what could make electric air travel a hit with commuters and travelers looking for a better way to get from one point to another.HOW TO LOWER YOUR CAR INSURANCE COSTS IN 2025 Passenger-carrying electric airplane  (Beta Technologies)FLYING CAR WITH 620-MILE RANGE SCHEDULED FOR UPCOMING LAUNCHThe bigger picture: Electric air travel is getting closerTransportation companies are already eyeing electric battery-powered aircraft for short city trips, especially those that can take off and land vertically. The idea is to help travelers beat traffic and reduce emissions, all while offering a smoother, quieter ride. The Federal Aviation Administration (FAA) has also stepped in, finalizing new rules in October for pilot training and certification for air taxis. This move was described as “the final piece in the puzzle for safely introducing these aircraft in the near term.” With regulations in place and companies like Beta Technologies pushing forward, the dream of electric air taxis is closer than ever. Passenger-carrying electric airplane (Beta Technologies)NASA’S MARTIAN HELICOPTER PROMISES UNPRECEDENTED VIEWS OF THE RED PLANETBeta Technologies: Leading the chargeBeta Technologies, based in Vermont and founded in 2017, is at the forefront of this movement. The company recently raised $318 million to fund production, certification and commercialization of its electric aircraft, bringing its total funding to over $1 billion. It’s not just building planes. It’s building the infrastructure needed to support electric flight across the country. Passenger-carrying electric airplane  (Beta Technologies)What’s next for electric air travel?The success of this flight is a strong signal that electric air travel is becoming a practical option, not just a futuristic idea. Beta’s aircraft can fly up to 250 nautical miles on a single charge, making it ideal for short hops between cities and suburbs. As more companies join the effort and more charging stations are built, it’s easy to see how electric air travel could become a regular part of how we get around, especially in busy urban areas.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Passenger-carrying electric airplane  (Beta Technologies)Kurt’s key takeawaysSo, what’s the real story here? The first passenger-carrying electric airplane touching down at JFK is way more than a cool headline. It’s proof that electric air travel isn’t just some futuristic thing. It’s actually here, it works and it’s ready to shake up how we get around. With rules that make sense, plenty of investment and people getting more curious and excited, the future of clean, quiet and easy-to-access air travel is looking pretty promising.CLICK HERE TO GET THE FOX NEWS APPWhen it comes to new tech like electric planes, what makes you hesitate the most? Are you more concerned about safety and reliability or is there something else on your mind? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved. 

First electric passenger plane lands at JFK in milestone flight Read More »

PIA24930.width 1600

Psyche keeps its date with an asteroid, but now it’s running in backup mode

The spacecraft, built by Maxar Space Systems, will operate its electric thrusters for the equivalent of three months between now and November to keep the mission on track for arrival at asteroid Psyche in 2029.
“Through comprehensive testing and analysis, the team narrowed down the potential causes to a valve that may have malfunctioned in the primary line,” NASA said in a statement Friday. “The switch to the identical backup propellant line in late May restored full functionality to the propulsion system.”
The next waypoint on Psyche’s voyage will be a flyby of Mars in May 2026. Officials expect Psyche to keep that date, which is critical for using Mars’ gravity to slingshot the spacecraft deeper into the Solar System, eventually reaching the asteroid belt about four years from now.

NASA’s Psyche spacecraft takes a spiral path to the asteroid Psyche, as depicted in this graphic that shows the path from above the plane of the planets, labeled with key milestones of the prime mission.

Credit:

NASA/JPL-Caltech

At Psyche, the spacecraft will enter orbit and progressively move closer to the asteroid, using a suite of sensors to map its surface, measure its shape, mass, and gravity field, and determine its elemental composition. Observations through telescopes suggest Psyche is roughly 140 miles (226 kilometers) in diameter, or about the width of Massachusetts. But it’s likely not spherical in shape. Scientists describe its shape as more akin to a potato.
Potatoes come in lots of shapes, and researchers won’t know exactly what Psyche looks like until NASA’s asteroid explorer arrives in 2029. Psyche will be the first metallic, or M-type, asteroid visited by any spacecraft, and scientists are eager to study an object that’s largely made of metals—probably iron, nickel, and perhaps some rarer elements— instead of rocky minerals.
With the Psyche spacecraft’s plasma thrusters back in action, these goals of NASA’s billion-dollar science mission remain achievable.
“The mission team’s dedication and systematic approach to this investigation exemplifies the best of NASA engineering,” said Bob Mase, Psyche project manager at  JPL, in a statement. “Their thorough diagnosis and recovery, using the backup system, demonstrates the value of robust spacecraft design and exceptional teamwork.”
But there’s still a lingering concern whatever problem caused the valve to malfunction in the primary fuel line might also eventually affect the same kind of valve in the backup line.
“We are doing a lot of good proactive work around that possible issue,” wrote Lindy Elkins-Tanton, Psyche’s principal investigator at Arizona State University, in a post on X.

Psyche keeps its date with an asteroid, but now it’s running in backup mode Read More »

craig1 640x445 1

New body size database for marine animals is a “library of life”

The ocean runs on size
McClain officially launched MOBS as a passion project while on sabbatical in 2022 but he had been informally collecting data on body size for various marine groups for several years before that. So he had a small set of data already to kick off the project, incorporating it all into a single large database with a consistent set format and style.

Craig McClain holding a giant isopod (Bathynomus giganteus), one of the deep sea’s most iconic crustaceans

Credit:

Craig McClain

“One of the things that had prevented me from doing this before was the taxonomy issue,” said McClain. “Say you wanted to get the body size for all [species] of octopuses. That was not something that was very well known unless some taxonomist happened to publish [that data]. And that data was likely not up-to-date because new species are [constantly] being described.”
However, in the last five to ten years, the World Register of Marine Species (WoRMS) was established with the objective of cataloging all marine life, with taxonomy experts assigned to specific groups to determine valid new species, which are then added to the data set with a specific numerical code. McClain tied his own dataset to that same code, making it quite easy to update MOBS as new species are added to WoRMS. McClain and his team were also able to gather body size data from various museum collections.
The MOBS database focuses on body length (a linear measurement) as opposed to body mass. “Almost every taxonomic description of a new species has some sort of linear measurement,” said McClain. “For most organisms, it’s a length, maybe a width, and if you’re really lucky you might get a height. It’s very rare for anything to be weighed unless it’s an objective of the study. So that data simply doesn’t exist.”
While all mammals generally have similar density, “If you compare the density of a sea slug, a nudibranch, versus a jellyfish, even though they have the same masses, their carbon contents are much different,” he said. “And a one-meter worm that’s a cylinder and a one-meter sea urchin that’s a sphere are fundamentally different weights and different kinds of organisms.” One solution for the latter is to convert to volume to account for shape differences. Length-to-weight ratios can also differ substantially for different marine animal groups. That’s why McClain hopes to compile a separate database for length-to-weight conversions.

New body size database for marine animals is a “library of life” Read More »

1 chaos ransomware attack on optima tax relief leaks 69gb of sensitive client data intro

Chaos ransomware hits Optima Tax Relief, leaks 69GB of data

NEWYou can now listen to Fox News articles!
Cyberattacks on financial service providers are no longer isolated events. In recent years, tax preparation companies, accounting software vendors and data brokers have all found themselves in the crosshairs of increasingly aggressive ransomware gangs. These attacks don’t just disrupt operations but also expose deeply personal financial information that can fuel identity theft, fraud and long-term reputational damage.Now, Optima Tax Relief, one of the most prominent tax resolution firms in the U.S., has joined that growing list. A ransomware group called Chaos claims to have breached Optima’s systems, stealing 69 GB of data before encrypting internal servers.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman working on a laptop  (Kurt “CyberGuy” Knutsson)Customer case files and personal information exposedThe data stolen in the attack includes what appears to be corporate documents and sensitive customer case files. Tax documents are especially valuable to cybercriminals. They often contain Social Security numbers, home addresses, phone numbers and other identifiers that can be used to commit financial fraud or impersonation.Sources familiar with the incident told BleepingComputer this was a double-extortion attack. That means Chaos not only stole the data but also encrypted Optima’s systems, presumably demanding a ransom in exchange for access and non-disclosure. The firm has not yet commented publicly on whether it plans to pay the ransom or notify affected individuals.TESLA DOXXING ATTACKS WRONGLY TARGET NONOWNERS ACROSS AMERICAThe attackers listed Optima on their leak site earlier this week. While the full dataset has not been published, the leak already raises concerns over regulatory compliance and consumer protection, especially given the sensitive nature of the firm’s work.Optima Tax Relief has not released an official statement regarding the breach. There has been no confirmation about whether law enforcement or federal agencies are involved in the investigation. If you’ve ever used its services, assume your data could be at risk.We reached out to Optima Tax Relief for a comment but did not hear back before our deadline. Optima Tax Relief entry on Chaos data leak site  (BleepingComputer)DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERSA new ransomware group with high-value targetsChaos ransomware first emerged in March 2025, when it claimed responsibility for five separate breaches. The group is not connected to the “Chaos ransomware builder,” a DIY toolkit that’s been in circulation since 2021. Instead, this version of Chaos is believed to be run by a coordinated team that is strategically targeting organizations with access to large amounts of personally identifiable information.Optima is not the only high-profile victim. In May, Chaos claimed to have breached the Salvation Army, though the organization has not publicly confirmed the attack or responded to media inquiries. A person scrolling on their smartphone    (Kurt “CyberGuy” Knutsson)MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT6 ways you can stay safe from Optima data breachIf your information was part of the Optima breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the Optima data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. See my tips and best picks on how to protect yourself from identity theft.2. Monitor your accounts and transactions: The Optima data breach might have revealed bank details to attackers, which means they can misuse those details to steal your money. You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud. To report identity theft, visit the FTC’s IdentityTheft.gov.3.  Contact your bank and credit card companies: Since Optima hackers might have obtained bank and credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you. You should also contact one of the three major credit reporting agencies — Equifax, Experian or TransUnion — and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Use personal data removal services: The data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Have strong antivirus software: Optima hackers most likely have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. Two-factor authentication requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.Kurt’s key takeawayThe Optima breach is not an isolated event, but part of a larger failure to adapt to the sophistication of modern ransomware groups. When companies with access to tax and identity data are compromised, it’s not just an internal issue; it becomes a national one. For an industry built on trust, breaches like this erode public confidence in systems that are already strained. Attacks like these raise fresh concerns about the cybersecurity preparedness of companies that handle tax and financial data. Unlike login credentials or email addresses, stolen tax information cannot be easily reset. For victims, the consequences of such a breach could stretch across years.CLICK HERE TO GET THE FOX NEWS APPDo you think finance companies are investing enough in their cybersecurity infrastructure? Let us know by writing to us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Chaos ransomware hits Optima Tax Relief, leaks 69GB of data Read More »

amazon ceo andy jassy

Fox News AI Newsletter: Amazon to cut workforce due to new tech

Amazon CEO Andy Jassy speaks during an Amazon Devices launch event in New York City, Feb. 26, 2025.  (REUTERS/Brendan McDermid)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Amazon CEO says AI will reduce his company’s workforce- OpenAI CEO claims Meta offering $100 million to poach employees- America’s power grid faces unprecedented challenge as AI and crypto drive demand skywardTECH TAKEOVER: Amazon CEO Andy Jassy says artificial intelligence will “change the way” work is done and expects the company’s total corporate workforce to be reduced as a result.’GIANT OFFERS’: Meta has allegedly tried to recruit employees from competitor OpenAI by offering bonuses as high as $100 million, OpenAI CEO Sam Altman claimed on a podcast that aired Tuesday.ENERGY OUTLOOK: The rise of artificial intelligence and the increasing popularity of cryptocurrency will continue to push electricity consumption to record highs in 2025 and 2026. ChatGPT on a computer. (Kurt “CyberGuy” Knutsson)POWER DRAIN CRISIS: Every time you ask ChatGPT a question, to generate an image or let artificial intelligence summarize your email, something big is happening behind the scenes. Not on your device, but in sprawling data centers filled with servers, GPUs and cooling systems that require massive amounts of electricity. GAME-CHANGING MACHINE: At ETH Zurich’s Robotic Systems Lab, engineers have created ANYmal-D, a four-legged robot that can play badminton with people. TECH POWER PLAY: OPINION: In 1823, President James Monroe drew a firm line in the sand: the Western Hemisphere would be closed to further European interference and, most importantly, America’s primary domain of industrial, political, and military control. The Monroe Doctrine, while audacious, proved effective and laid the groundwork for the Western Hemisphere as America’s stepping stone to the rest of the world. America was not yet a superpower and could not enforce it alone, however. Instead, America aligned British naval dominance with our interests to build a coalition of opportunity. America asserted its position, secured a partner through alignment against common rivals, and laid the groundwork for its emergence as a global superpower.ROBOT RUMBLE: Robot combat just got a lot more interesting in Hangzhou, China. Four Unitree G1 robots, each steered by a human operator, went head-to-head in a tournament called Unitree Iron Fist King: Awakening! Unitree Iron Fist King: Awakening! (CGTN)AI EYEWEAR: Tech giant Meta on Friday announced it is partnering with Oakley to launch new performance glasses powered by artificial intelligence.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Amazon to cut workforce due to new tech Read More »

GettyImages 2203288771 2560x1440 1

How a data center company uses stranded renewable energy

“Decisions around where data centers get built have shifted dramatically over the last six months, with access to power now playing the most significant role in location scouting,” Joshi said. “The grid can’t keep pace with AI demands, so the industry is taking control with onsite power generation.”
Soluna, like other data center developers looking to rely on renewable energy, buys the excess power from wind, hydro, and solar plants that they can’t sell to the grid. By the end of the year, Soluna will have three facilities totaling 123 megawatts of capacity in Kentucky and Texas and seven projects in the works with upwards of 800 total megawatts.
Belizaire and I talked about how in Texas, where I report from, there’s plenty of curtailed energy from wind and solar farms because of the region’s transmission capacity. In West Texas, other data center developers are also taking advantage of the unused wind energy, far from major load centers like Dallas and Houston, by co-locating their giant warehouses full of advanced computers and high-powered cooling systems with the excess energy.
One data center developer using curtailed renewable power in Texas is IREN. The firm owns and operates facilities optimized for Bitcoin mining and AI. It developed a 7.5-gigawatt facility in Childress and broke ground on a 1.4-gigawatt data center in Sweetwater.

IREN purchases power through the state grid’s wholesale market during periods of oversupply, said Kent Draper, the company’s chief commercial officer, and reduces its consumption when prices are high. It’s able to do that by turning off its computers and minimizing power demand from its data centers.
But curtailment is an issue all over the world, Belizaire said, from Oklahoma, North Dakota, South Dakota, California, and Arizona in the US, to Northern Ireland, Germany, Portugal, and Australia.
“Anywhere where you have large utility-scale renewable development that’s been built out, you’re going to find it,” Belizaire said.
In a March analysis, the US Energy Information Administration reported that solar and wind power curtailments are increasing in California. In 2024, the grid operator for most of California curtailed 3.4 million megawatt hours of utility-scale wind and solar output, a 29 percent increase from the amount of electricity curtailed in 2023.

How a data center company uses stranded renewable energy Read More »