Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

1 over 8m patient records leaked in healthcare data breach intro

Over 8M patient records leaked in healthcare data breach

NEWYou can now listen to Fox News articles!
In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt “CyberGuy” Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt “CyberGuy” Knutsson)DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERSHow healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt “CyberGuy” Knutsson)MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLEKurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn’t gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Over 8M patient records leaked in healthcare data breach Read More »

1 compact machine turns air into ready to use gasoline

Compact machine turns air into ready-to-use gasoline

NEWYou can now listen to Fox News articles!
Recently, Aircela, a fuel company headquartered in New York, publicly demonstrated a machine in Manhattan that produces gasoline directly from air. The event attracted city and state officials, investors and energy professionals who witnessed the launch of this compact, refrigerator-sized unit. Aircela’s technology combines direct air capture with on-site fuel synthesis, providing fossil-free gasoline that is fully compatible with existing engines and infrastructure.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide —  free when you join. Aircela’s air-to-gasoline machine  (Aircela)Understanding the science behind Aircela’s technologyLed by co-founder and CEO Eric Dahlgren (pictured on the right below), Aircela has developed a machine that produces real, engine-ready gasoline from just air and water, powered by renewable electricity and advanced chemical processes. The technology is based on direct air capture research, notably the work of physicist Klaus Lackner (shown on the left below), and is designed for easy installation in residential, commercial and industrial settings.The process begins by drawing in ambient air and using a water-based solution containing potassium hydroxide to efficiently capture carbon dioxide. As air flows through a specially designed chamber, the liquid sorbent absorbs carbon dioxide from the atmosphere, which is then regenerated for repeated use. Next, the system uses renewable electricity to split water into hydrogen and oxygen through electrolysis. The hydrogen is retained for the fuel synthesis process, while the oxygen is safely released into the environment.FLYING CAR WITH 620-MILE RANGE SCHEDULED FOR UPCOMING LAUNCHThe captured carbon dioxide and generated hydrogen are then combined to create methanol, which is subsequently converted into gasoline using established chemical processes. The resulting gasoline contains no sulfur, ethanol or heavy metals, making it fully compatible with existing engines and infrastructure. Each Aircela unit can produce approximately one gallon of gasoline per day from around 22 pounds of captured carbon dioxide with a storage capacity of up to 17 gallons. This innovative machine enables users to generate fossil-free gasoline on site using only air, water and renewable electricity. Physicist Klaus Lackner, at left, and Eric Dahlgren, co-founder and CEO of Aircela, at right   (Aircela)Distributed production sets Aircela apartUnlike traditional synthetic fuel projects that rely on large, centralized plants, Aircela’s approach is modular and distributed. Each unit can produce gasoline on site, making it suitable for off-grid locations, ports, islands or emergency situations. This design allows users to access cleaner fuel without the need to alter their vehicles or fueling routines. Aircela’s air-to-gasoline machine  (Aircela)HYDROGEN FUEL CELL TRUCKS HIT THE ROADS IN GEORGIAInvestment and industry support for AircelaAircela has secured funding from notable investors, including Chris Larsen, founder of Ripple Labs’ Jeff Ubben, a board member at ExxonMobil; and Maersk Growth, the venture capital arm of A.P. Moller-Maersk. During the demonstration, Morten Bo Christiansen, Maersk’s head of energy transition, emphasized the machine’s potential to support global efforts to reduce carbon emissions, particularly in the shipping and logistics industries. Aircela’s air-to-gasoline machine  (Aircela)Environmental and practical advantagesThe process developed by Aircela is intended to be carbon neutral, as the carbon dioxide released when the gasoline is burned is balanced by the amount captured during production. The gasoline works with current engines and fueling systems, so there is no need for costly upgrades. Distributed production reduces reliance on centralized refineries and long supply chains. In addition, the fuel’s purity, free from sulfur and additives, helps lower harmful emissions beyond just carbon dioxide.GET FOX BUSINESS ON THE GO BY CLICKING HERE Aircela’s air-to-gasoline machine (Aircela)Aircela’s next steps and future plansAircela plans to begin initial deployments of its machines in the fall of 2025, with a focus on off-grid, commercial and industrial users. The company’s goal is to increase production, reduce costs and make the technology widely available. While the current output is modest, Aircela aims to provide a practical, climate-aligned alternative to fossil fuels that does not require people to change their vehicles or daily habits.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Signage at Aircela’s air-to-gasoline machine event   (Aircela)Kurt’s key takeawaysAircela’s gasoline-from-air machine shows that sometimes the best solutions are the ones that fit right into our daily routines. Instead of requiring new cars or major changes, this technology lets people keep using what they already have, just with cleaner fuel. Watching carbon pulled from the air and turned into gasoline on the spot feels like a practical step toward a more sustainable future. As Aircela gets ready to roll out these machines, it will be interesting to see how this approach might help ease the transition to cleaner energy for everyone.CLICK HERE TO GET THE FOX NEWS APPWhat would it take for you to fill up your tank with gasoline made from thin air? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Compact machine turns air into ready-to-use gasoline Read More »

1 how addresses are collected and put on people finder sites

How addresses are collected and put on people finder sites

NEWYou can now listen to Fox News articles!
Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online. (Kurt “CyberGuy” Knutsson)How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online. (Kurt “CyberGuy” Knutsson)How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online. (Kurt “CyberGuy” Knutsson)What are the risks of having your address on people finder sites?The Federal Trade Commission (FTC) advises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like “opt out,” “delete my information,” etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

How addresses are collected and put on people finder sites Read More »

minions characters world premiere

Fox News AI Newsletter: Hollywood studios sue ‘bottomless pit of plagiarism’

The Minions pose during the world premiere of the film “Despicable Me 4” in New York City, June 9, 2024.  (REUTERS/Kena Betancur)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Major Hollywood studios sue AI company over copyright infringement in landmark move- Meta’s Zuckerberg aiming to dominate AI race with recruiting push for new ‘superintelligence’ team: report- OpenAI says this state will play central role in artificial intelligence development The website of Midjourney, an artificial intelligence (AI) capable of creating AI art, is seen on a smartphone on April 3, 2023, in Berlin, Germany. (Thomas Trutschel/Photothek via Getty Images)’PIRACY IS PIRACY’: Two major Hollywood studios are suing Midjourney, a popular AI image generator, over its use and distribution of intellectual property.AI RACE: Meta CEO Mark Zuckerberg is reportedly building a team of experts to develop artificial general intelligence (AGI) that can meet or exceed human capabilities.TECH HUB: New York is poised to play a central role in the development of artificial intelligence (AI), OpenAI executives told key business and civic leaders on Tuesday. Attendees watch a presentation during an event on the Apple campus in Cupertino, Calif., Monday, June 9, 2025.  (AP Photo/Jeff Chiu)APPLE FALLING BEHIND: Apple’s annual Worldwide Developers Conference (WWDC) kicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision. FROM COAL TO CODE: This week, Amazon announced a $20 billion investment in artificial intelligence infrastructure in the form of new data centers, the largest in the commonwealth’s history, according to the eCommerce giant.DIGITAL DEFENSE: A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly. Rep. Darin LaHood, R-Ill., leaves the House Republican Conference meeting at the Capitol Hill Club in Washington on Tuesday, May 17, 2022.  (Bill Clark/CQ-Roll Call, Inc via Getty Images)SHIELD FROM BEIJING: Rep. Darin LaHood, R-Ill., is introducing a new bill Thursday imploring the National Security Administration (NSA) to develop an “AI security playbook” to stay ahead of threats from China and other foreign adversaries. ROBOT RALLY PARTNER: Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. DIGITAL DANGER ZONE: Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system.  Fairfield, Ohio, USA – February 25, 2011 : Chipotle Mexican Grill Logo on brick building. Chipotle is a chain of fast casual restaurants in the United States and Canada that specialize in burritos and tacos. (iStock)’EXPONENTIAL RATE’: Artificial intelligence is helping Chipotle rapidly grow its footprint, according to CEO Scott Boatwright. AI TAKEOVER THREAT: The hottest topic nowadays revolves around Artificial Intelligence (AI) and its potential to rapidly and imminently transform the world we live in — economically, socially, politically and even defensively. Regardless of whether you believe that the technology will be able to develop superintelligence and lead a metamorphosis of everything, the possibility that may come to fruition is a catalyst for more far-leftist control.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Hollywood studios sue ‘bottomless pit of plagiarism’ Read More »

1 robots step into the ring for the first ever boxing match

Robots step into the ring for a first-ever boxing match

NEWYou can now listen to Fox News articles!
Robot combat just got a lot more interesting in Hangzhou, China. Four Unitree G1 robots, each steered by a human operator, went head-to-head in a tournament called Unitree Iron Fist King: Awakening!The event took place right next to Unitree’s massive new factory and drew a lively mix of tech fans and people just curious to see what all the buzz was about. This wasn’t only about showing off robotic strength; it gave everyone a front-row seat to how impressively robots can now move and react almost like humans.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Unitree Iron Fist King: Awakening! (CGTN)How the Unitree robot combat tournament worksThe competition was structured like a classic martial arts tournament. Each match consisted of three rounds, each lasting two minutes. Points were awarded for strikes: one for a hand hit, three for a leg strike. Knockdowns or failure to recover within eight seconds meant penalties, adding to the tension. The format kept things fast-paced and easy to follow.AI TENNIS ROBOT COACH BRINGS PROFESSIONAL TRAINING TO PLAYERS Unitree Iron Fist King: Awakening! (CGTN)AI HUMANOID ROBOT IS CHANGING THE WAY YOU BUY CARS AT DEALERSHIPSUnitree G1 robot battles: Match highlights and knockoutsThe opening match set the tone. “AI Strategist,” controlled by Lu Xin, faced “Silk Artisan,” piloted by Jiao Tianqi. AI Strategist wasted no time, landing precise blows and ultimately knocking out Silk Artisan in the third round.Next up, “Armored Mulan” faced off against “Energy Guardian.” Energy Guardian scored a dramatic knockdown in the first round, and despite a late stumble from Armored Mulan, Energy Guardian secured the win.The final bout saw AI Strategist return to the ring against Energy Guardian. In a display of skill and adaptability, AI Strategist delivered three consecutive knockouts, clinching the championship. According to Zhou Di, a robotics expert with the China Computer Federation, “The robots’ ability to predict opponents’ moves and adjust in real time is a leap forward.” Unitree Iron Fist King: Awakening! (CGTN)CHINESE HUMANOID ROBOT WITH EAGLE EYE VISION AND POWERFUL AIWhat makes the Unitree G1 robot so impressive?Standing 4.3 feet tall and weighing 77 pounds, the Unitree G1 is built for agility. With 23 degrees of freedom and powerful knee joints, these robots can throw hooks and side kicks and recover quickly after a fall. They may look a bit clunky in action, but their movements are surprisingly fluid and engaging.The G1 is designed with accessibility in mind. It’s more affordable than Unitree’s flagship H1 model, which stands nearly 6 feet tall and costs upwards of $90,000. The G1 can be folded up and carried by one person, and it can reach speeds of about 4.5 miles per hour. Its impressive moves, such as kip-ups and side flips, are made possible by the LAFAN1 motion capture dataset, which translates human movements into robotic actions.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Unitree Iron Fist King: Awakening! (CGTN)HUMANOID ROBOT BREAKDANCES ITS WAY INTO HISTORYReal-world testing: How the G1 performed in live robot fightsThis tournament wasn’t just for show. It served as a real-world test for the G1’s sensors, motors, and algorithms. Every punch, dodge and recovery pushed the robots to their limits. Observers noted some minor issues, like slight delays in reaction time or wobbles after taking a hit, but overall, the robots handled the pressure well. Unitree Iron Fist King: Awakening! (CGTN)G1 robots keep learning: Control options and accessibilityOne of the most interesting aspects of the G1 is its ability to learn new skills over time. Operators can control the robots using motion-sensing devices, traditional controllers or even voice commands. Unitree is making it easy for anyone to experience these battles, whether through live streams or in-person events.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Unitree Iron Fist King: Awakening! (Unitree)Kurt’s key takeawaysThe “Unitree Iron Fist King: Awakening!” tournament really showed us what the future of robot combat could look like. The G1 robots wowed everyone with their quick moves, flexibility and the kind of action that keeps a crowd cheering. As the tech keeps getting better, these events are only going to get more fun and easier for everyone to check out, bringing the excitement of robot sports to fans everywhere.CLICK HERE TO GET THE FOX NEWS APPWould you buy a ticket to watch a live robot battle, or do you prefer traditional sports? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  

Robots step into the ring for a first-ever boxing match Read More »

1 5 new tips to stay private in 2025

11 easy ways to protect your online privacy in 2025

NEWYou can now listen to Fox News articles!
Privacy is getting harder to protect in a world where everything is connected. Whether you’re chatting with an AI, checking your email or using your smartphone, your personal information is constantly being collected, tracked and sometimes even sold. But protecting your privacy in 2025 doesn’t have to be overwhelming. With a few practical steps, you can take back control of your data and make your online life safer. This guide walks you through 11 easy ways to get started.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Scrabble pieces form the word “SCAM.” (Kurt “CyberGuy” Knutsson)1. Don’t overshare: Even with AI tools like ChatGPTAI chatbots like ChatGPT are useful, but they’re not private journals. The platform owners may have privacy policies and use the latest security measures, but that doesn’t mean you should let your guard down. When using these tools, refrain from sharing any personal information, such as your name, address, birthdate, passwords, financial details or sensitive conversations. Remember that AI systems store and process your inputs, and despite security promises, data breaches can occur.SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST 1 CHATGPT SEARCHTip: Treat all online forms of AI interaction like public forums. Keep your examples generic and use caution with anything that could identify you.If you’re going to input your personal information while using these AI tools, ensure there is an option to prevent them from sharing it. On ChatGPT, for instance, do the following:Go to Settings.Click Data controls.Tap Improve the model for everyone. Steps to prevent ChatGPT from sharing your personal information (Kurt “CyberGuy” Knutsson)Toggle off Improve the model for everyone.Click Done. Steps to prevent ChatGPT from sharing your personal information (Kurt “CyberGuy” Knutsson)Why it matters: AI tools may seem personal, but they’re not secure vaults. Guarding what you share helps prevent misuse, identity theft or data leaks from breaches.CLEAN UP YOUR PHONE: SPEED, STORAGE AND PRIVACY BOOST IN MINUTES2. Use alias email addressesYour email is often the key to your online identity and a common target for spam. By creating disposable email aliases that forward messages to your main inbox, you can keep your real address hidden from websites and services. These unique aliases act as shields, so if one starts getting spammed or is involved in a data breach, you can simply deactivate it without affecting your main email account.My top recommendation to avoid being inundated with spam emails is to use an alias email address. An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address.In addition to creating throwaway email accounts for online sign-ups and other circumstances where you would not want to disclose your primary email address, alias email addresses are helpful for handling and organizing incoming communications. Sometimes, it’s best to create various email aliases so that you don’t have to worry about getting tons of spam mail or having your information taken in a data breach. An alias email address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. See my review of the best secure and private email services here.Why it matters: You stay anonymous, avoid data leaks and never have to change your main email address again.BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS3. Take advantage of Facebook’s privacy checkupMeta frequently updates its privacy settings, so it’s best to check regularly to see how you can improve your privacy. Use Facebook’s Privacy Checkup tool to review and adjust crucial settings, including post visibility, app permissions, search visibility and friend-request settings. This comprehensive tool helps ensure your profile remains as private as you want it to be. You can find the tool by following these steps:Log in to your Facebook app on your phone.Then click the menu icon in the bottom right.Tap Settings.Click Privacy Checkup.Once you open the Privacy Checkup, you’ll be guided through several key areas to customize your privacy preferences and better control your information.Who can see what you share: Adjust who can view your posts, photos and profile details to limit access to only people you trust.How people can find you on Facebook: Manage who can send you friend requests, look you up using your email or phone number, and decide whether your profile appears in search engines.Your data settings on Facebook: Review which apps and websites have access to your Facebook data and remove any you no longer use or trust.How to keep your account secure: Set up two-factor authentication, update your password and monitor login alerts to protect your account from unauthorized access.Your ad preferences on Facebook: Control how Facebook uses your activity to show you personalized ads and opt out of categories that feel too intrusive.Quick tip: Set a reminder to run a privacy checkup every few months, especially after major Facebook updates. This way, you’ll always be in control of your information.Why it matters: Social media platforms thrive on your personal data. Adjusting your settings regularly puts you back in control of what others and Facebook can see and use. Facebook’s privacy checkup (Kurt “CyberGuy” Knutsson)HOW TO PROTECT YOUR ONLINE PRIVACY AND SECURITY ON YOUR NEXT CRUISE VACATION4. Scrub yourself off the internet automaticallyYour name, phone number and home address may already be listed on people-search sites like Spokeo, Whitepages and BeenVerified. These data brokers collect and sell your personal information without you even knowing it. Fortunately, personal data removal services are available to protect your privacy. They automatically send legal removal requests to hundreds of data brokers. They also go above and beyond by continuously monitoring them in case these third parties happen to get your information again.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Why it matters: The less personal information available about you online, the harder it is for scammers and identity thieves to target you and the more peace of mind you’ll have. 10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE’S SECURITY AND PRIVACY5. Use a privacy-focused messaging appIf you’re still using standard texting apps or platforms like Facebook Messenger, it’s time to upgrade to a more secure option. Apps like Signal and Session offer end-to-end encryption, no ads and no metadata tracking, meaning they can’t see who you’re talking to or what you’re saying. Both apps support disappearing messages, giving you more control over how long your conversations stick around.Why it matters: Your messages stay private and can’t be accessed by hackers, advertisers or the app developers themselves.6. Stop Google from tracking your every moveGoogle collects a massive amount of data from your searches, YouTube views, Gmail activity and location history, all of which fuels targeted advertising. You can stop much of this tracking by turning off Ad Personalization and deleting your activity history. Here’s what to do:Go to Google’s My Ad Center.Find the Ad Personalization section.Toggle the switch to turn off ad personalization. This stops Google from using your activity to tailor ads.Manage activity historyIn My Ad Center or via your Google Account, go to Data & Privacy.Under History Settings, review and pause or delete: Web & App Activity, YouTube History and Location History (if applicable).Delete existing activity dataSelect Manage all Web & App Activity, Manage all YouTube History, etc.Delete past activity by choosing a time range (e.g., “All time”) and confirming deletion for each category.Opt out of third-party ad personalizationScroll to Ad settings and look for third-party ad personalization options.Opt out of partner sites’ ad personalization if available.If you have multiple Google accounts, repeat these steps for each account.Why it matters: Cutting down on ad tracking reduces how much of your online behavior is used to build a profile on you, often without your knowledge.7. Turn off location tracking on your smartphoneApps don’t need to know your every move. Disabling or limiting location tracking is one of the simplest ways to protect your physical privacy. Here’s what to do:iPhone:Go to Settings.Tap Privacy & Security.Click Location Services.Scroll down and tap the app you want to manage.Choose your preferred setting: Never to block location access completely; Ask Next Time Or When I Share to allow location only with your permission; While Using the App to allow location only when the app is open.For apps like Maps, toggle Precise Location off to prevent pinpoint tracking.To disable location tracking entirely, toggle Location Services off at the top of the Location Services page (this will stop all apps from using your location).Android:Settings may vary depending on your Android phone’s manufacturer.Go to Settings.Tap Location.Tap App permissions or App location permissions.You will see a list of apps grouped by their location access: Allowed all the time; Allowed only while in use; Ask every time; Not allowed.Tap any app to change its location permission. Choose from: Allow all the time; Allow only while using the app; Ask every time; Don’t allow.For apps that have location access, you can also turn Precise location on or off if you want to limit accuracy. Repeat for each app you want to manage.Tip: If you want to stop all apps from accessing your location, you can turn off Location at the top of the Location settings page.Why it matters: Prevents apps, advertisers and even your OS from building a detailed map of your daily routines. Steps to turn off location tracking on your smartphone (Kurt “CyberGuy” Knutsson)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?8. Change the default admin password on your routerMost routers ship with default admin usernames and passwords like “admin” or “1234,” and these are publicly available online. Hackers know this and often scan networks looking for unprotected routers. Here’s what to do:Log in to your router’s settings via its IP address (often 192.168.1.1 or 192.168.0.1).Change the admin username and password to something strong and unique.Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.Why it matters: Prevents intruders from hijacking your home network and spying on your devices.9. Enable WPA3 encryption on your Wi-Fi routerWPA3 is the newest wireless encryption protocol and offers much stronger protection than WPA2. If your router supports WPA3, enabling it is a no-brainer. How to check:Log into your router settings and look under Wireless Security.If WPA3 is available, enable it.If not, consider upgrading to a newer, security-focused router. Check out our top routers for best security 2025.Why it matters: Stronger encryption means hackers can’t easily intercept or crack your Wi-Fi traffic.10. Set up a guest network for visitors and smart devicesYour friends don’t need access to your entire home network and neither do your smart lights and doorbells. Creating a guest network adds a safety barrier between your personal devices and less trustworthy ones. Steps to take:Log into your router settings.Create a separate guest network with its own password.Connect smart devices, TVs and guests to this network only.Keep your main network just for personal computers and phones.Why it matters: Even if a smart device gets compromised, the attacker won’t have access to your main network or sensitive devices.11. Use a secure, private browser for sensitive browsingNot all browsers treat your privacy equally. Switching to a browser designed for privacy like Brave, Firefox or DuckDuckGo’s browser can drastically cut down on the amount of data collected about you while you browse. Also, use incognito/private mode for sensitive searches. Why it matters: Reduces digital fingerprints and helps stop advertisers and data brokers from building a profile on you based on your browsing behavior.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICESKurt’s key takeawaysStaying private online isn’t about being paranoid; it’s about making smart, intentional choices. With the right tools and a few small changes, you can take back control of your data in 2025. Digital privacy is always changing, so it’s a good idea to check your settings and habits every so often. The upside is that for every new privacy challenge, there’s usually a way to push back and keep your information safe.CLICK HERE TO GET THE FOX NEWS APPIf you’d like a printable checklist or want this content turned into a shareable infographic, just let me know.What privacy tools and methods do you use to protect your data online? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

11 easy ways to protect your online privacy in 2025 Read More »

1 fbi warns over a million android devices hijacked by malware

FBI warns over 1 million Android devices hijacked by malware

NEWYou can now listen to Fox News articles!
Everything that connects to the internet can be hacked by malware. This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either.But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Remote control and smart TV (Kurt “CyberGuy” Knutsson)FBI warns: Over 1 million smart devices infected with BadBox 2.0 malwareThe FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces.FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOWOnce infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people’s accounts.The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection. A person holding a tablet (Kurt “CyberGuy” Knutsson)DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXBadbox malware history: From TV boxes to over 1 million infected devicesBadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers “sinkholed” the malware’s command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN’s Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds. These are not official Android TV OS products and are not protected by Google Play Protect.Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look. Smart TV (Kurt “CyberGuy” Knutsson)ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELYHow to tell if your device might be infected with BadBox 2.0If you’re wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do.1. You bought a low-cost Android-based device from an unknown or no-name brand: Devices sold online through third-party sellers or unknown brands, especially if advertised as “unlocked,” “jailbroken” or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware:Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ2. Your device is not Google-certified: If your Android device doesn’t support Google Play Protect or doesn’t show the Play Protect certification in the Play Store settings, it’s likely running on an uncertified version of Android. That’s a major red flag. To check:Open the Google Play Store.Tap your profile icon > Settings > About.Look for Play Protect certification. If it says “Device is not certified,” that’s a problem.3. Suspicious behavior or strange apps: Look for unfamiliar apps you didn’t install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded.4. Google Play Protect is disabled: If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise.5. Your home internet is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network.6. The device came with outdated or unofficial firmware: If your device doesn’t receive software updates or has a strange update process, that’s another potential sign it’s not legit or may be compromised.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE8 ways to protect your devices from BadBox 2.0 and Android malwareWant to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats.1. Use strong antivirus software: Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Only buy certified and trusted devices: Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled.3. Avoid sideloading apps from unofficial sources: Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats.4. Check your device settings for tampering: Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised.GET FOX BUSINESS ON THE GO BY CLICKING HERE5. Monitor your network for unusual activity: If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router’s settings or a network monitoring app to track strange behavior or unauthorized connections.6. Disconnect and replace suspicious hardware: If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller.7. Keep your devices and apps updated: Install system and app updates regularly. Even though cheap devices may not always offer updates, keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches.8. Secure your router and home network: Your devices are only as safe as the network they’re connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals.THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALLKurt’s key takeawayIt’s alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.CLICK HERE TO GET THE FOX NEWS APPWith over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

FBI warns over 1 million Android devices hijacked by malware Read More »

1 ai tennis robot coach brings professional training to players

AI tennis robot coach brings professional training to players

NEWYou can now listen to Fox News articles!
Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. Tenniix brings smart technology and adaptability to your training sessions, making it easier to get the most out of your time on the court.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Tenniix, the AI-powered tennis robot (T-Apex)What is Tenniix? Meet the AI tennis robot transforming practice sessionsTenniix is an AI-powered tennis robot that is compact and weighs only 15 pounds, which is much lighter than traditional ball machines. Despite its small size, it serves balls at speeds of up to 75 mph, with spins reaching 5,000 RPM, and holds up to 100 balls at a time. The robot’s movable base allows it to deliver shots from different angles, keeping practice sessions dynamic and engaging.TENNIS PRO ERIN ROUTLIFFE EXPLODES OVER LACK OF ‘ROBOTS’ AT AUSTRALIAN OPEN A player lifting the Tenniix, an AI-powered tennis robot, out of the vehicle. (T-Apex)NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOTAI tennis coaching: How Tenniix delivers realistic, pro-level practiceOne of the standout features of Tenniix is its AI-driven coaching. The robot has been trained on over 8,000 hours of professional tennis data, allowing it to adjust its shots based on your position and playing style. This gives you a realistic and challenging experience every time you step on the court. Tenniix offers a wide variety of training modes, with more than 1,000 drills and three skill levels, so you can focus on everything from timing and footwork to shot accuracy. Tenniix, the AI-powered tennis robot being carried (T-Apex)WILL 3D TECH CHANGE SPORTS FOREVER?Smart and simple: How to control Tenniix with voice, gestures or your phoneControlling Tenniix is simple and intuitive. You can use voice commands or gestures to change spin, speed or shot type without interrupting your practice. Tenniix also features convenient app controls, letting you select training modes, adjust settings and review session data right from your smartphone for a fully customized and trackable experience. The robot’s modular design means you can start with the model that fits your needs and upgrade as your skills improve. With a built-in camera and AI chip, Tenniix analyzes your shots and provides instant feedback, helping you track your progress over time. Tenniix, the AI-powered tennis robot (T-Apex)SKYROCKET TO A HEALTHIER LIFESTYLE WITH THIS GEAR IN 2025Advanced tracking and movement: How Tenniix adapts to your game in real timeTenniix uses a combination of visual tracking and ultra-wideband sensors to know exactly where you and the ball are on the court. Its motorized base moves smoothly to deliver a wide range of shots, from high lobs to fast groundstrokes, at different speeds and spins. The battery lasts up to four hours, which is enough for a solid training session. Tenniix, the AI-powered tennis robot (T-Apex)BEST FATHER’S DAY GIFTS FOR EVERY DADPractice like the pros: Train against Nadal-style shots with TenniixAnother feature that sets Tenniix apart is its ability to mimic the playing styles of tennis greats like Nadal and Federer. This helps you prepare for matches by practicing against shots and spins similar to those you’ll face in real competition. Coaches and players have noted how Tenniix creates realistic rallies and adapts to different skill levels, making training both efficient and enjoyable. Tenniix, the AI-powered tennis robot (T-Apex)Portable, smart and backed by support: Why tennis players love TenniixTenniix is easy to carry and set up, making it convenient for players who want to practice anywhere. With thousands of shot combinations and drills, your workouts stay fresh and challenging. The smart technology, real-time tracking and instant feedback help make every session productive. Each robot comes with a one-year warranty and reliable customer service.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Tenniix, the AI-powered tennis robot (T-Apex)Tenniix models and pricing: Which AI tennis robot is right for you?There are three Tenniix models to choose from. The Basic model is priced at $699, the Pro at $999 and the Ultra at $1,499. Each model offers a different set of features, with the Ultra version including advanced options like the movable base and enhanced vision system. Tenniix was launched through a Kickstarter campaign, giving early supporters a chance to back the project and receive the robot at a special price.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Tenniix, the AI-powered tennis robot (T-Apex)Kurt’s key takeawaysTenniix feels less like a machine and more like a smart tennis partner who’s always ready to help you improve. Whether you want to polish your technique or get serious about your game, it offers a flexible and engaging way to train. If you’re looking for a training partner that adapts to you, Tenniix is worth checking out.CLICK HERE TO GET THE FOX NEWS APPWould you rather challenge yourself playing against a robot like Tenniix, or do you prefer training with a human opponent? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

AI tennis robot coach brings professional training to players Read More »

redd ai dominance elements.00 00 00 00.still001

Trump’s nuclear strategy takes shape as former Manhattan Project site powers up for AI race against China

NEWYou can now listen to Fox News articles!
Over 80 years after scientists of the ‘Manhattan Project’ harnessed the power of the atom to end World War II, the top-secret worksite has a new mission to help dominate AI before China does. The first phase of the United States’ latest uranium enrichment facility opened in Oak Ridge, Tennessee in May. Uranium powers the nuclear reactors the AI data centers are turning to for reliable energy. They will use more energy as AI becomes more sophisticated, according to Orano USA CEO Jean-Luc Palayer.”The United States can lead in AI, only if we can power AI,” Palayer said. “Having that in mind and our new project on enrichment in Oak Ridge, Tennessee, we step forward on a new mission of equal consequence.”Numerous Tennessee lawmakers joined Palayer for a ribbon cutting of his new facility in Oak Ridge.  The first phase of the Orano USA uranium enrichment facility opened on May 29. (Fox News)The U.S. Energy Information Administration reported 99% of U.S. nuclear fuel is imported from other countries. In 2023, most of America’s uranium products came from Russia, Canada, Australia, Kazakhstan, and Uzbekistan. The U.S. banned the import of uranium products from Russia in May 2024, but companies can still apply for waivers until 2028.FIRE DEPARTMENTS TURN TO AI TO DETECT WILDFIRES FASTER”America is staring down the barrel of an energy crisis,” Tennessee Gov. Bill Lee said. “We can’t lose the AI war to China. We can’t lose the energy war to Russia. In order to do that, we have to win the nuclear energy renaissance war in America.” The site of the top secret ‘Manhattan Project’ of the 1940’s was crucial to the development of the atomic bomb that ended World War II. (Fox News)At the end of May, President Trump signed four executive orders aimed at quadrupling domestic nuclear energy production by 2050. The orders include a deadline for the publication of a report on how to strengthen domestic uranium conversion capacity and enrichment capabilities. It orders the government to update its nuclear energy policies to streamline production. At least 10 large nuclear reactors must be under construction no later than 2030, according to the order. FDA APPROVES FIRST AI TOOL TO PREDICT BREAST CANCER RISKMeanwhile, China plans to build 10 new nuclear power reactors each year for the next decade, totaling 100 reactors by 2035. A list of U.S. nuclear reactors posted by the National Energy Institute shows the U.S. has built three in the last 30 years.  China plans to build 100 nuclear reactors in the next decade. Meanwhile, the U.S. has built three in the last 30 years. A Trump executive order aims to quadruple domestic nuclear energy production by 2050. (Fox News)Despite rapid capacity growth in 2022, nuclear power made up only about 5% of China’s cumulative power generation that year. Nuclear power accounts for about 18% of the electricity generation mix in the United States.CLICK HERE TO GET THE FOX NEWS APP”We can’t wait 10 years to build nuclear reactors in this country. “That’s how long it used to take to approve them, to permit them, to build them,” Lee said. “We don’t have 10 years. China will have built 150 in 10 years.”In 2023, the Department of Energy reported data centers used an estimated 176 TWh. That number is expected to rise to between 325 and 580 TWh by 2028. The department estimated AI data centers will use about 12% of U.S. energy annually by 2028, enough to power New York City for 11 years. 

Trump’s nuclear strategy takes shape as former Manhattan Project site powers up for AI race against China Read More »

1 when clicks turn into scams on facebook ads

When clicks turn into scams on Facebook ads

NEWYou can now listen to Fox News articles!
Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system. From fake crypto endorsements by celebrities to malware disguised as video game betas, the landscape of digital scams is smarter, faster and more dangerous than ever.Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up! Facebook login page displayed on a laptop (Kurt “CyberGuy” Knutsson)DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXHow Facebook scam ads have evolved with AI and deepfakesScammers used to rely on low-effort clickbait, but that era is over. Now, sophisticated schemes are leveraging AI-generated content. Technology is being used to create convincing videos of celebrities endorsing fake products or services. These ads exploit the trust users place in public figures and the perceived legitimacy of Facebook’s advertising platform. These tools can mimic a person’s appearance and voice with alarming accuracy, making it challenging for users to discern real from fake. And these tools are no longer out of reach. Scammers use a mix of freely available AI generators and private networks to mass-produce scam campaigns that look more real than ever.ONE CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERSReal examples of Facebook scam ads using celebrity deepfakesOn Reddit, users have posted screenshots of bizarre scam ads that made it through Facebook’s filters:One features an AI-generated video of Kelly Clarkson promoting a suspicious cash giveaway. There are reportedly over 20 accounts using variations of the name “Kelly Clarkson Live.” These ads ask users to comment “Christmas” to receive free money, then instruct them to contact a WhatsApp number to claim their prize, which is a common tactic used to harvest personal information or initiate payment scams.AI CYBERSECURITY RISKS AND DEEPFAKE SCAMS ON THE RISE Screenshots of bizarre Facebook scam ads (Reddit)Another uses Billie Eilish’s face to endorse a knockoff shopping site. The design mimics standard e-commerce ads, making it easy to fall for, especially for fans or younger users. Screenshots of Facebook scam ads (Reddit)How AI tools and deepfake tech power Facebook scam adsThese scams are not the work of lone fraudsters. They are coordinated efforts that mirror real digital marketing operations.Deepfake software is used to create fake video footage of celebrities.AI voice clones make fake endorsements sound eerily convincing.Text generators churn out fake user reviews, comment threads and testimonials.Scam kits with ad templates and deployment instructions circulate in private Telegram groups and Discord servers.These operations are designed to appear legitimate. Landing pages mimic reputable news sites. Comment sections feature AI-written praise. Every element is optimized to build trust and get the click.Who Facebook scam ads target and why you could be nextScammers do not just blast out ads at random. They use Facebook’s ad targeting system to handpick the most vulnerable audiences.Older users are often targeted with health scams or celebrity cash giveaways.Men aged 25-45 are frequently shown crypto or investment ads featuring tech figures.Fans of specific celebrities or shows may see fake endorsements tied to those interests.Users who click on giveaways or contests are more likely to be targeted again, since Facebook tracks interaction history.These groups are targeted because they are either perceived as trusting, impulsive or unfamiliar with how digital scams operate.HOW TO ESCAPE FACEBOOK’S CREEPY AD TRACKINGWhy Facebook scam ads keep getting past Meta’s moderationDespite Meta’s claims of robust ad review, scam ads still make it through frequently and quickly. Here is why:Most ads are approved by automated systems that cannot catch nuanced AI fakery.Scammers use geographic targeting to show ads in regions less likely to report fraud or where enforcement is weak.The ads often run for only a short time before disappearing, making them harder to catch.Even with tools like facial recognition being tested to detect unauthorized celebrity use, these systems have not been widely implemented. Meanwhile, investigations by consumer advocacy groups and cybersecurity firms have found that a significant portion of crypto-related Facebook ads are fraudulent. With scammers paying for ad space, Meta has little financial incentive to aggressively remove them.Common signs of Facebook scam ads: What to watch forScam ads can be surprisingly well-made, but common themes show up again and again. Watch for:Free game betas or giveaways, especially ones that require downloads.Celebrity endorsements promoting crypto, weight-loss pills or supplements.Mimicked news articles or fake media logos.Urgent claims or miracle results, which are classic scam tactics.If an ad prompts you to download a file, especially a .zip or .rar, it is almost certainly a trap. Facebook app on home screen of a smartphone (Kurt “CyberGuy” Knutsson)HOW TO SPOT THE RED FLAGS FOR THIS LATEST FACEBOOK MARKETPLACE SCAMHow to protect yourself from AI-powered Facebook scam adsHere is how to stay safe and help others do the same:1. Check the source: If it is an ad, approach it with extra skepticism. Look it up independently.2. Do not download files from ads: Especially avoid compressed formats like .zip or .rar, which often contain malware.3. Verify endorsements: If a celebrity is promoting something, check their official social media or public statements.4. Report suspicious ads: Even if you are not sure, reporting helps Meta identify fraudulent activity.5. Talk to friends and family: Especially older adults, who may be more trusting of what they see on Facebook.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?6. Be wary of unsolicited messages or friend requests and install strong antivirus software: Scammers often use fake profiles to send scam ads or phishing links via Facebook Messenger or friend requests. Avoid clicking links from unknown contacts. Also, install strong antivirus software, which adds a layer of defense that can block malware from scam links. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.7. Consider using a password manager: If your credentials are compromised, this minimizes the risk of attackers accessing other accounts. A password manager can securely store and generate complex passwords. It will help you create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account, so that you never have to remember them yourself. The fewer passwords you remember, the less likely you are to reuse them for your accounts. Get more details about my best expert-reviewed password managers of 2025 here.8. Turn on two-factor authentication (2FA): 2FA can prevent unauthorized logins even if your password is stolen.9. Regularly update your software and apps: Keeping your operating system, browsers and Facebook app updated ensures you have the latest security patches that can block known vulnerabilities exploited by scammers.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawaysScam ads on Facebook are evolving fast, using AI-generated content, fake celebrity endorsements and deepfakes to trick users into clicking. What looks like a game beta or cash giveaway can actually lead to malware, phishing scams or fake crypto schemes. Facebook’s ad review system isn’t catching these in time, which means users need to stay alert. Be skeptical of ads, avoid downloading files, install trusted antivirus software and talk to family members who may be more vulnerable.CLICK HERE TO GET THE FOX NEWS APPGiven how widespread and sophisticated scam ads have become on Facebook, do you think Meta should be held more accountable for protecting users, and if so, what actions should they take to better prevent these scams? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

When clicks turn into scams on Facebook ads Read More »