Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

1 mary kays iconic pink cadillac shifts to full electric

Mary Kay’s iconic pink Cadillac shifts to fully electric

NEWYou can now listen to Fox News articles!
Nearly 60 years ago, Mary Kay Ash was turned away by a car salesman who refused to sell her a car without a man’s signature. That moment became the catalyst for a legacy, one powered by determination, lipstick, and eventually, horsepower. Now, the iconic Mary Kay pink Cadillac is entering a bold new chapter: electric mobility. Mary Kay is offering its top-performing sales reps a fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish. It’s the first time the company’s legendary incentive vehicle is going fully electric, and it’s turning heads while staying true to its roots.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. A fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish is parked in front of Mary Kay. (Mary Kay)A statement in pink (and green)In a press release, CEO Ryan Rogers, grandson of founder Mary Kay Ash, called the move a tribute to the company’s past and a leap into the future:”With the introduction of the all-electric OPTIQ, we’re honoring that iconic legacy while driving into a transformative future-one grounded in our commitment to sustainability and dedication to inspiring and celebrating the achievements of our independent sales force for generations to come.”THIS EV HAS A FACE, AND IT TALKS BACK WITH AIIt’s not just a change in drivetrain. It’s a shift in mindset and a signal that luxury, reward, and eco-consciousness can coexist without compromise. The Cadillac Optiq grille and logo are seen up close. (Mary Kay)Why the pink Cadillac still mattersMary Kay pink Cadillacs are more than just a flashy ride. They represent achievement, empowerment, and recognition. Only the top 1% of the company’s sales force qualify. Even then, it’s not handed out lightly; recipients can choose a $900 monthly bonus instead. But 90% take the car. What makes these cars even more exclusive is that they’re leased for just two years. When the lease ends, they’re returned and repainted to the original factory color. That makes a true pink Cadillac a rare sight outside of Mary Kay circles. And yes, they’re beautiful. That pink pearl paint is exclusive, and few people outside the company ever get to drive one.VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION The fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish drives down a road. (Mary Kay)What this means for youWhether or not you’re building an empire through lipstick sales, this shift tells a bigger story. The auto industry is changing. EVs are no longer just for tech-savvy early adopters or Silicon Valley commuters. Now, they’re reaching industries built on tradition and glamour. The Mary Kay electric Cadillac shows how companies can preserve their legacy while embracing innovation. If you’re considering switching to an electric vehicle, this proves that style and sustainability don’t have to be at odds.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis move isn’t just a flex. It’s a smart pivot that aligns Mary Kay with modern values while still honoring its founder’s bold spirit. And frankly, it’s refreshing to see a legacy brand walk the talk when it comes to sustainability and do it in such an eye-catching shade of pink.How do you see the integration of electric vehicles by legacy brands like Mary Kay impacting attitudes towards sustainability in industries rooted in tradition? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Mary Kay’s iconic pink Cadillac shifts to fully electric Read More »

hackers disable windows defender remotely fox news

Hackers found a way to turn off Windows Defender remotely

NEWYou can now listen to Fox News articles!
Most modern Windows PCs rely on Microsoft Defender as their first line of defense against malware. Over the years, it has evolved into a capable and often underrated antivirus that blocks a wide range of threats. But a hacker group has found a way to abuse a legitimate Intel CPU tuning driver in a “Bring Your Own Vulnerable Driver” (BYOVD) attack to completely disable Microsoft Defender.The technique has been observed since mid-July 2025 and is already being used in active ransomware campaigns. The method doesn’t rely on exploiting a software bug or delivering an obviously malicious file. Instead, it takes advantage of how the Windows driver system is designed to allow deep hardware access.Let’s discuss all you need to know about the attack and how you can stay safe.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIASign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. The Akira ransomware group exploits a legitimate Intel CPU tuning driver in cyberattacks to completely disable Microsoft Defender on Windows systems. (Kurt “CyberGuy” Knutsson)How Akira ransomware disables Microsoft DefenderThe Akira ransomware group has developed a new way to bypass security tools by using a legitimate Intel CPU tuning driver called rwdrv.sys from the performance-tweaking tool ThrottleStop. Security firm GuidePoint Security says attackers load this driver to gain kernel-level access to Windows systems, then install a second malicious driver, hlpdrv.sys, which changes the DisableAntiSpyware registry setting via regedit.exe to shut down Microsoft Defender.Once Defender is disabled, attackers can run other malicious programs undetected. GuidePoint says this method has been consistently spotted in Akira campaigns since mid-July. The Akira ransomware group has been infiltrating Windows operating systems by exploiting a legitimate driver to gain access. (Kurt “CyberGuy” Knutsson)Akira ransomware targets Microsoft Defender and SonicWall VPNsThe same group has also been linked to attacks targeting SonicWall VPN devices. SonicWall has stated that these incidents likely involve a known vulnerability, CVE-2024-40766, rather than a brand-new zero-day. The company recommends restricting VPN access, enabling multi-factor authentication, and disabling unused accounts as immediate defenses.Akira attacks often involve stealing data, setting up hidden remote access, and deploying ransomware to encrypt files across an organization. Security experts warn that fake or lookalike websites are increasingly being used to distribute these malicious tools.FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING ITResearchers at GuidePoint have published a YARA detection rule, along with file names, service names, SHA-256 hashes, and file paths to help identify this activity. They recommend administrators actively monitor for these indicators, apply filtering and blocking rules as new IoCs emerge, and only download software from official or verified sources.We reached out to Microsoft for a comment, but did not hear back before our deadline. Antivirus software, two-factor authentication and data removal services are just a few ways Windows users can protect themselves from hackers. (Cyberguy.com)6 ways to protect yourself against Akira ransomware and similar threatsThe Microsoft Defender attack is smart and dangerous, but you’re not without defenses. Here are a few tips to help you stay safe:1) Use strong antivirus softwareEven with regular updates, Windows systems can be left exposed if built-in defenses are disabled. A strong antivirus software with real-time protection, kernel-level monitoring, and frequent updates can provide backup security. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.2) Limit exposureMany exploits rely on user interaction, such as clicking a shady link, downloading a compromised file, or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments, and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).3) Avoid running unexpected commandsNever paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP4) Keep your software updatedRegularly update your operating system, browsers, and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5) Use two-factor authentication (2FA)Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6) Invest in personal data removal servicesEven with strong device security, your personal information may still be exposed online through data brokers and people-finder sites.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap – and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayAkira’s trick shows a bigger flaw in how Windows trusts certain tools. A driver meant for harmless CPU tuning ends up being the key to turning security off. Since it’s from a legitimate source, Windows just lets it through without asking questions. We tend to think hackers always break in from the outside. Here, they’re already inside the circle of trust, using the system’s own rules.Should Microsoft be doing more to stop ransomware groups from disabling Defender? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Hackers found a way to turn off Windows Defender remotely Read More »

meatball w black background

NASA Awards Spaceflight Operations, Systems Organization Contract

NASA has awarded ASCEND Aerospace & Technology of Cape Canaveral, Florida, the Contract for Organizing Spaceflight Mission Operations and Systems (COSMOS), to provide services at the agency’s Johnson Space Center in Houston.
The COSMOS is a single award, indefinite-delivery/indefinite-quantity contract valued at $1.8 billion that begins its five-year base period no earlier than Dec. 1, with two option periods that could extend until 2034. The Aerodyne Company of Cape Canaveral, Florida, and Jacobs Technology Company of Tullahoma, Tennessee, are joint venture partners.
Work performed under the contract will support NASA’s Flight Operation Directorate including the Orion and Space Launch System Programs, the International Space Station, Commercial Crew Program, and the Artemis campaign. Services include Mission Control Center systems, training systems, mockup environments, and training for astronauts, instructors, and flight controllers.
For more information about NASA and agency programs, visit:
https://www.nasa.gov
-end-
Tiernan DoyleHeadquarters, Washington202-358-1600tiernan.doyle@nasa.gov
Chelsey BallarteJohnson Space Center, Houston281-483-5111chelsey.n.ballarte@nasa.gov

NASA Awards Spaceflight Operations, Systems Organization Contract Read More »

woman shopping on amazon

Cybersecurity expert reveals simple trick to stop companies from tracking your online shopping

NEWYou can now listen to Fox News articles!
We’re conditioned to think our email address is harmless. Most of us think it’s just an ID, a way to get receipts and shipping updates, but that’s not it.Your email is the skeleton key to your online identity. It’s what companies use to build behavioral profiles, target ads, link purchases and, sometimes worse, facilitate fraud after a breach. And when you reuse the same email address everywhere, you make that key universal.To keep things private, I use an alias for online shopping to stay anonymous, cut down on spam and more. Let’s discuss what aliases are, why they matter and how they quietly turn the tables in your favor.Sign Up For My Free Cyberguy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.JOBS THAT ARE MOST AT RISK FROM AI, ACCORDING TO MICROSOFT A woman browses the Amazon website on her laptop Sept. 29, 2024. (Serene Lee/SOPA Images/LightRocket)How email aliases help you stay anonymous onlineEach time you enter your main email on a shopping site, you give that company a lasting way to connect your behavior across different platforms, devices and timeframes. They might hash or encrypt your email, but the behavioral patterns remain. You can still be tracked, but aliases interrupt that chain.Instead of sharing my actual email address, I create a unique one for each website. The emails still reach me through forwarding, but the company never sees my real address. That small change prevents them from linking my activity with other accounts or sites. It is not a perfect solution, but it adds just enough friction to disrupt the tracking systems.Every alias I use becomes a kind of tracker. If one starts getting spam, I know which site sold or lost my data. Most people don’t know where the breach happened, they just assume “it happens.” I take a different approach. When an alias starts getting unwanted emails, I do not try to unsubscribe or set up filters or waste time guessing. I simply disable the alias, and the problem is gone.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA A spam phishing email is displayed on a laptop screen March 21, 2022. Retail companies often sell shopper data, leading to unwanted spam and phishing messages. (Peter Dazeley)Stop companies from tracking you with email aliasesThe average e-commerce site uses between 15 and 30 third-party scripts, analytics trackers, ad pixels and behavioral beacons, according to a study. Even if the site itself is honest, its stack probably isn’t. Your email passes through layers of infrastructure, mailing tools, CRM platforms, shipping plugins. And all it takes is one misconfiguration or a careless developer for your data to end up in the wrong hands.An alias reduces the blast radius. If the site gets breached, your core identity remains untouched.Aliases don’t just protect privacy, they improve behavior. When I started using them, I found myself thinking more clearly about where I was signing up and why. The mental pause required to generate a new alias made me more deliberate. And it gave structure to the mess. I could set rules like all product warranties going to products@myalias.com, all newsletters to news@myalias.com.OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAKCreate email aliases for better online privacyAn alias alone isn’t enough to stay safe out there. You also need a secure email provider to start with. By creating email aliases, you can protect your information and reduce spam. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com. A woman browses Best Buy on her smartphone while online shopping. (Serene Lee/SOPA Images/LightRocket)Kurt’s key takeawayWe’ve made progress when it comes to password hygiene. Many of us now use password managers and enable two-factor authentication, but when it comes to email, the habits haven’t changed much. Most people still rely on a single email address for everything, including shopping, banking, subscriptions, work and even family communication. That’s not just inefficient but also a security risk. Using email aliases is a simple way to fragment your digital identity. It adds complexity for attackers and reduces the chances of a single breach affecting multiple accounts.Would you still use your main email for everything if you knew it made you easier to track? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign Up For My Free Cyberguy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Cybersecurity expert reveals simple trick to stop companies from tracking your online shopping Read More »

man heading to work 2

Jobs that are most at risk from AI, according to Microsoft

NEWYou can now listen to Fox News articles!
Right now, many people are worried that artificial intelligence (AI) is coming for their jobs. If you’re one of them, then the recent study by Microsoft will shed some light on how AI’s generative capabilities will impact your field of work. In short, some occupations are more susceptible to its influence than others.This study is making waves because, unlike previous studies, it draws insight from real-world data. Microsoft looked at 200,000 anonymous Copilot conversations from 2024 and mapped them against the U.S. government’s job classification system.The study also identified entire occupational groups, like “computer and mathematical occupations” and “office and administrative support”, among those with the highest AI overlap. The results reveal exactly which careers AI is already touching and which ones it barely affects.Sign Up For My FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS A man walking to his job in a financial district. Positions like advertising sales agents and market research analysts face the greatest likelihood of AI integration, according to a recent Microsoft study. (Ivan Alvarado)Is AI Going To Replace You?The result of the study was the calculation of an “AI applicability score.” It measures how closely certain job activities align with the capabilities of AI. To no one’s surprise, knowledge-based and communication-heavy roles were at the top of the list of jobs that are most impacted. At the bottom of this list were jobs requiring physical labor or machine operation, showing minimal overlap.This score reflects overlap, not guaranteed job loss. The researchers stressed that no occupation is fully performed by AI. The study focuses only on language-based generative AI (like Copilot), not other AI areas such as robotics or autonomous systems, which could affect different roles.HOLLYWOOD TURNS TO AI TOOLS TO REWIRE MOVIE MAGICWhy High AI Overlap Doesn’t Always Mean Job LossThe researchers emphasized that it’s important to differentiate between overlap and replacement. Overlap means the AI performs certain tasks alongside humans, while replacement means it will take their place. The study makes no predictions about job growth or losses. It’s simply a snapshot of where AI fits in today. In fact, historical trends suggest that automation can sometimes add jobs instead of taking them away. So, it’s not all gloom and doom even in sectors with high overlap. Two men give a presentation at a meeting on data and AI integration. Jobs deemed “most impacted” by AI indicate that technology can take over portions of an employee’s daily tasks. (Frank Rumpenhorst)MCDONALD’S AI HIRING CHATBOT EXPOSED DATA OF JOB CANDIDATESTop Jobs Most At Risk From AI, According To MicrosoftThese are the jobs that show a great deal of overlap:Technical writersTicket agents and travel clerksEditorsTelemarketersBroadcast announcers and radio DJsMathematiciansPolitical scientistsInterpreters and translatorsAdvertising sales agentsCNC tool programmersNews analysts, reporters, and journalistsCustomer service representativesHistoriansFarm and home management educatorsBusiness teachers, postsecondaryHosts and hostessesPublic relations specialistsConciergesBrokerage clerksProofreaders and copy MarkersWriters and authorsSales representatives (services)Telephone operatorsDemonstrators and product promotersPassenger attendantsData scientistsMarket research analystsWeb developersManagement analystsJobs Least Likely To Be Replaced By AI Right NowIf you do any of the jobs below, you have the least to worry about:Medical equipment preparersSurgical assistantsDishwashersRoofersMassage therapistsCement masons and concrete finishersMotorboat operatorsOrderliesFloor sanders and finishersBridge and lock tendersIndustrial truck and tractor operatorsGas compressor and pumping station operatorsHelpers-roofersRoustabouts, oil and gasOphthalmic medical techniciansPackaging and filling machine operatorsLogging equipment operatorsDredge operatorsPile driver operatorsWater treatment plant and system operatorsFoundry mold and coremakersMachine feeders and offbearersRail-track maintenance equipment operatorsSupervisors of firefightersTire buildersWE HAVE TO ACT NOW TO KEEP AI FROM BECOMING A FAR-LEFT TROJAN HORSEWhat This Means For YouIf your job appears in the “most impacted” list, it doesn’t mean you need to panic or start packing up your desk. It means AI is already capable of handling parts of your daily tasks – and that can be an opportunity if you learn to use it. Those who embrace AI tools now can work faster, free up time for creative thinking, and make themselves even more valuable.If your role is on the “least impacted” list, don’t assume you’re immune forever. While physical and hands-on jobs have less overlap with AI today, future technologies beyond language models, like robotics or AI-driven machinery, could change that picture. Staying adaptable, learning basic AI skills, and keeping up with tech trends will help you stay ahead no matter your industry.In short, treat this study as a career weather forecast, not a doomsday prediction. AI might not replace you, but someone who knows how to work with AI could. The smartest move? Learn to be that person. While jobs such as writers and editors are heavily impacted by AI, there are currently no predictions of mass unemployment from the technology’s rise. (Liz Hafalia/The San Francisco Chronicle)CLICK HERE TO GET THE FOX NEWS APPTake My Quiz: How Safe Is Your Online Security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s Key TakeawaysAs of now, it seems there are no predictions of mass unemployment due to the rise of AI. However, the study does highlight that impacted areas may evolve. A good example is how bank tellers still exist even though we have ATMs. They just redefined the role of tellers, and this is what will happen with generative AI in various fields. And who knows? AI may even give rise to entirely new professions. So it helps professionals in high-overlap fields to see AI as a collaborator.Is your career safe from AI or already in its sights? Let us know by writing to us at Cyberguy.com.Sign Up For My FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.  

Jobs that are most at risk from AI, according to Microsoft Read More »

senior citizen phone

How scammers target you even without social media

NEWYou can now listen to Fox News articles!
“I don’t use Facebook. I don’t even have an email. How could scammers possibly know anything about me?”That’s the question I hear from people over 60 all the time. If you assume that by staying off social media and avoiding the internet, you’re invisible to fraudsters, think again.The truth is, even if you’ve never posted a single thing online, scammers can still know your age, home address, relatives’ names, property value, and even when you’ve suffered the loss of a loved one. How? Because the everyday details of your offline life are quietly being collected, digitized, and sold.And scammers are taking full advantage.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS Scammers can still know a lot about you, even if you have never posted anything online. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)How scammers target seniors without social mediaHere’s the uncomfortable reality: you don’t have to “put yourself out there” for your information to appear online. Much of it becomes public record automatically, thanks to the way our legal and government systems work.Some of the biggest sources include:Obituaries: When a loved one passes away, obituaries often list family members, ages, locations, and relationships. To scammers, it’s a family tree of potential targets.Real estate records: Property purchases, sales, and even mortgage details are public. This can tell scammers whether you own your home outright, what it’s worth, and if you might be cash-rich.Probate filings: When estates go through probate, details about beneficiaries and assets are recorded. Scammers can identify heirs and target them with fraudulent “inheritance assistance.”Property tax documents: These are often searchable by anyone. They reveal not only your address but also your financial standing.Court filings: Divorce, bankruptcy, and civil disputes often contain personal details, which are public by law.On their own, these may not seem dangerous. But combined, they create a shockingly detailed portrait of your life.THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY Public records can provide a portrait of your life. (Barbara Eddowes via Getty Images)Bereavement scams and emotional tricks scammers useOne of the cruelest scams I’ve seen lately is what I call the bereavement scam.Here’s how it works:A scammer scrapes local obituaries to see who’s recently lost a spouse or child. They then reach out, by phone, email, or even mail, pretending to be a funeral home, a grief counselor, or a charity. Because they reference real names, dates, and relationships, their outreach sounds painfully authentic.Example: “We saw you lost your husband on March 3rd. We’d like to offer you a free grief support service…”Or: “Your loved one’s final medical expenses may qualify for reimbursement. We just need your banking details to confirm.”When you’re in mourning, your guard is down. Scammers know this, and they exploit grief to steal money and identities.Other emotionally charged scams follow the same playbookFake Medicare calls referencing your age and location.Phony financial advisors offering to “help” with retirement rollovers.Romance scams targeting widows and widowers who live alone.Fake agent scams trick victims into paying thousands of dollars through phone threatsThe unifying factor is that these criminals don’t need Facebook to learn about you. They already have a dossier built from public and brokered data.What’s even worse is that scammers can target your loved ones even years after your passing. They can call or text your close relatives claiming to offer free memorial services, annuities, or other common strategies when people are most vulnerable. Your exposed personal data fuels such morbid scams.9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT A man typing on his laptop (Kurt “Cyberguy” Knutsson)The shocking sources of your personal dataHere’s the part most people don’t realize: scammers rarely dig through dusty courthouse files themselves. They don’t have to. That work has already been done by data brokers. Data brokers are companies whose entire business model is gathering and selling personal information. They collect from:Public records (like those obituaries and real estate filings)Consumer databases (credit headers, magazine subscriptions, surveys)”People search” websites (Spokeo, Whitepages, BeenVerified, and dozens more).The result is a searchable profile that might include:Full name and aliasesCurrent and past addressesPhone numbers and email addressesRelatives and their contact infoAge, income range, home valueLegal or financial historyOnce a broker has your data, they sell it. And once it’s sold, it spreads. Even if you’ve never had a social media account, companies may build a ‘shadow profile’ of you from leaked data, online purchases, or details shared by others, leaving it ready to be abused.How to protect yourself from scammers and data brokersThe good news is, you’re not powerless. While you can’t stop public records from existing, you can make it much harder for scammers to access and weaponize your data. Here’s how:1) Reduce your digital footprintRequest removal from people search sites and data brokers.This prevents your profile from being sold to scammers.Doing this manually can take hours and has to be repeated, but it works.2) Stay alert for emotional manipulationIf someone contacts you after a loss, assume caution.Verify charities and funeral services before engaging.Never share banking or personal details over the phone or email.3) Automate data removalInstead of manually contacting hundreds of data brokers, you can use a service like Incogni.It sends and tracks removal requests across 420+ brokers, and keeps repeating the process so your data doesn’t resurface.With their Unlimited plan, you can request data removal from any other shady website and disappear from the internet.For seniors, this is often the safest and most practical solution.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysNot being on Facebook doesn’t mean you’re invisible. Scammers don’t need you to share your life online. Your offline life is already online without your consent. The obituary in the local paper, the deed to your home, the probate record of your loved one’s estate, these are all turned into data points, sold to brokers, and resold to whoever wants them. That’s why protecting your personal data isn’t about avoiding the internet. It’s about reducing what’s already out there. The less data scammers can find, the harder it is for them to fool you with realistic, emotionally charged attacks. And that’s a big step toward keeping your money, your identity, and your retirement safe.Do you believe it’s time for the government and companies to step in and protect your data privacy?  Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

How scammers target you even without social media Read More »

italian search and rescue team drone

AI drone finds missing hiker’s remains in mountains after 10 months

NEWYou can now listen to Fox News articles!
A missing hiker’s dead body was finally found in July in Italy’s rugged Piedmont region after 10 months. The recovery team credited the breakthrough to an AI-powered drone that spotted a critical clue within hours. The same process would have taken weeks or even months if done by the human eye.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. TRANSPORTATION DEPARTMENT DEPLOYING ARTIFICIAL INTELLIGENCE TO SPOT AIR TRAFFIC DANGERS, DUFFY SAYSSearch and recovery mission in the Italian AlpsThe hiker, an experienced mountaineer identified as Nicola Ivaldo, had been missing since September 2024 on the northern slopes of Monviso in Italy’s Cottian Alps. This remote section of the mountain is known for sheer cliffs and loose rock. Sudden weather changes often make search efforts slow and hazardous. Italian search and rescuers announced in July 2025 that they had used an artificial intelligence-powered drone to locate the dead body of a hiker who had been missing for months. (Corpo Nazionale Soccorso Alpino e Speleologico – CNSAS)The National Alpine and Speleological Rescue Corps (CNSAS) specializes in high-altitude and cave rescues. They had conducted multiple ground searches since the disappearance. In early 2025, they turned to drone technology to renew the effort. Flying about 164 feet above the terrain, the drones surveyed a 452-acre section of the mountain. During the operation, they captured more than 2,600 high-resolution images. This aerial perspective revealed details in areas that would have been difficult and risky to reach on foot. Drone in flight near the peak of Monviso in Italy’s Cottian Alps during a rescue mission. (CNSAS)How AI technology sped up the searchInstead of relying on human experts to manually scan thousands of photos, AI software analyzed the entire dataset in just hours. Using color and shape recognition, the system highlighted objects that did not match the surrounding environment.One detection stood out: the red helmet belonging to the missing hiker. That small but critical find enabled rescuers to pinpoint the location and plan recovery efforts. Once the site was confirmed, teams navigated steep and unstable ground to reach the area. They worked in challenging alpine conditions to recover the hiker. Officials emphasized that this was a joint success between advanced technology and the skilled human team interpreting the AI’s results.ALASKA HIKER MAULED BY BEAR RESCUED WITH HELP OF ADVANCED DRONE TECHNOLOGY ON REMOTE TRAIL Search and rescue drone flying over mountainous terrain. (Kurt “CyberGuy” Knutsson)The future of AI in search and rescueThis operation marks a turning point in search and rescue tactics. AI-enabled drones can cover vast and dangerous areas without risking human lives. They speed up the search process and increase the chances of finding people alive.Similar AI-aided searches have been used in Canada, Switzerland, and the United States. These missions often deliver faster results than traditional methods. Rescue teams hope that as the technology advances, it will reduce fatal accidents and locate missing persons faster. It could also allow human rescuers to focus their efforts where they are needed most.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.comCLICK HERE TO GET THE FOX NEWS APP Drone in flight near the peak of Monviso in Italy’s Cottian Alps during a rescue mission. (CNSAS)Kurt’s key takeawaysAI drones are changing the game for search and rescue. They can analyze massive amounts of visual data in hours instead of weeks. Combined with expert human teams, this technology could save more lives and make high-risk missions safer.Do you think AI should play a bigger role in rescue operations? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

AI drone finds missing hiker’s remains in mountains after 10 months Read More »

google data leak 2 billion users at risk

Over 2B users face phishing risks after Google data leak

NEWYou can now listen to Fox News articles!
A tech leader like Google often seems invincible when it comes to cybersecurity attacks, but that is not the case. Earlier this month, the search giant confirmed that attackers had accessed one of its corporate Salesforce instances. According to a Google spokesperson, this system stored basic, and largely publicly available business information, such as contact details and notes from small and medium-sized companies. It did not store customer data from Google Cloud or consumer products like Gmail, Drive or Calendar.Google says it terminated the malicious activity, completed an impact analysis, and provided mitigations. Therefore, no further action is required by users.NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUDSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  Cybercriminals are exploiting Google’s recent Salesforce data breach to launch vishing calls and phishing attacks against Gmail users worldwide. (Kurt “CyberGuy” Knutsson)Vishing calls target Gmail usersHackers have reportedly accessed Google’s Salesforce database systems, exposing customer and company names. Google confirmed the incident and clarified that the information was mostly public business contact data and did not include passwords or payment information. The company stressed that the breach affected only a corporate Salesforce system, not consumer Gmail or Google Cloud accounts.Still, attackers are exploiting the news of the breach to fuel phishing and vishing scams, tricking people into giving up sensitive information. According to PC World, some users have already reported an increase in phishing attempts that reference Google services.STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVEOne of the main tactics involves scam phone calls, also known as vishing. A Reddit post highlighted a wave of calls coming from the 650 area code, which is linked to Google’s headquarters. In these calls, scammers pose as Google employees and warn victims of a supposed security breach. They then instruct users to reset their Gmail password and share it with them. This locks the rightful owner out of the account and gives the attacker complete control. A user launches Gmail. (Kurt “CyberGuy” Knutsson)Old infrastructure exploited with “dangling buckets”Separately from the Salesforce incident, Google Cloud customers are also facing another type of attack. Hackers are trying to exploit outdated access addresses using a method called the dangling bucket. This can allow them to inject malware or steal data. Both businesses and individuals are vulnerable to losing control over sensitive information if targeted in this way.Gmail and Google Cloud serve nearly 2.5 billion people, which makes the scale of the risk significant. Although the initial breach did not expose passwords, attackers are using the news of the incident to trick people into revealing their login details. A Google search window is on a laptop. (Kurt “CyberGuy” Knutsson)6 ways you can stay safe from scammers targeting Google accountsGoogle accounts are often a prime target for scammers. The good news is that protecting yourself doesn’t require advanced technical skills. A few practical steps can drastically reduce your chances of becoming a victim.1) Avoid clicking on phishing linksPhishing remains the most common way scammers steal Google account credentials. A fake email or text may claim your account has been locked or that you need to verify suspicious activity. Clicking the link usually takes you to a counterfeit login page that looks almost identical to the real Google sign-in screen.To avoid falling for these tricks, check the sender’s email address carefully, hover over links before clicking, and avoid entering your Google password on any page that doesn’t start with accounts.google.com.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 2) Save passwords securelyReusing weak passwords across multiple sites is an open invitation for scammers. If one site is breached, your Google account becomes vulnerable. A strong, unique password is your first line of defense.The easiest way to manage this is with a password manager. It can generate complex passwords, store them securely, and fill them in automatically when you need them. This way, you never have to remember dozens of different logins, and attackers can’t guess their way in.Next, see if your email has been exposed in past breaches. Our #1 password manager pick (see Cyberguy.com/Passwords) includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/PasswordsWHAT TO DO IF YOU GET A PASSWORD RESET EMAIL YOU DIDN’T ASK FOR3) Delete personal data that puts you at riskScammers often use information they find online to craft convincing attacks. If your email address, phone number, or even past passwords are floating around on data broker sites, criminals have more tools to impersonate you or trick you into revealing more.Using a data removal service helps clean up your digital footprint. By reducing the amount of exposed information about you, it becomes much harder for scammers to target you directly.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4) Turn on two-factor authenticationEven the strongest password can be stolen, but two-factor authentication (2FA) adds an extra barrier. When enabled, Google will ask for a one-time code or prompt on your phone before granting access. That means even if a scammer manages to get your password, they can’t log in without also having your device.Google offers several 2FA methods, from SMS codes to app-based prompts and even hardware security keys. For the best protection, choose app-based or hardware verification rather than text messages.5) Keep your devices updatedMany scams rely on exploiting outdated software. If your phone, browser, or operating system isn’t up to date, attackers may use known vulnerabilities to install malware or hijack your session.Set your devices to update automatically whenever possible. This ensures you’re always running the latest security patches, reducing the number of openings a scammer can use.6) Regularly check Google account security settingsGoogle provides built-in tools to help users spot suspicious activity. By visiting your Google Account’s security page, you can see devices that have signed in, recent account activity, and whether recovery options like your phone number and backup email are up to date.Running a Google Security Checkup only takes a few minutes and gives you a clear overview of any weaknesses. Think of it as a health check for your digital life.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayThe incident is a reminder that even tech giants with vast resources are not immune to security lapses. While Google insists that no passwords were exposed, the wave of phishing and vishing scams shows how quickly criminals can weaponize even partial leaks. What began as a breach of business data has spiraled into a threat facing millions of everyday users, raising questions about how secure Google’s ecosystem really is.Do you believe regulators should step in with stricter rules for how cloud providers handle security lapses? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

Over 2B users face phishing risks after Google data leak Read More »

google pixel event jimmy fallon

Google Pixel 10 event brings new phones, smartwatch, earbuds and AI

NEWYou can now listen to Fox News articles!
Google kicked off its Made by Google event last week with blockbuster energy. Jimmy Fallon played host, bringing humor and star presence. Steph Curry highlighted how the Pixel 10 empowers creators and athletes to capture and share their stories. Lando Norris, fresh from the F1 circuit, showed off how Pixel’s speed and AI enhancements fit into fast-paced lives. And the Jonas Brothers premiered a music video filmed entirely on the new Pixel 10 Pro, proving the phone’s camera is ready for professional-grade production.From the first moment, Google made it clear: this was no ordinary reveal. The Pixel 10 family, including the Pixel 10, Pro, Pro XL, and Pro Fold, faced the spotlight alongside the Pixel Watch 4, Pixel Buds 2a, and Pixelsnap accessories, all powered by the next-gen Tensor G5 chip and Gemini Nano AI.Transitioning from star-studded entertainment to deep tech, Google showcased AI-driven upgrades, from Magic Cue anticipating your needs to Pro Res Zoom up to 100x, satellite emergency support on the Pixel Watch 4, and active noise cancellation with hands-free AI on the Buds 2a-all wrapped in smarter, more seamless hardware.TRANSFORM YOUR TECH SETUP WITH THE BEST EARLY LABOR DAY TECH DEALS ON APPLE, SAMSUNG, HP AND MOREWith entertainment and innovation sharing the stage, the event set the tone for Google’s most ambitious hardware lineup yet.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER Host Jimmy Fallon holds Pixel 10 Pro Fold mobile phone during the “Made by Google” event, which introduced the latest additions to Google’s Pixel portfolio of devices, in Brooklyn, New York, Aug. 20, 2025. (REUTERS/Brendan McDermid)Pixel 10 Series: Smarter design, displays, and camerasGoogle’s Pixel 10 lineup is the heart of this year’s Made by Google event. With the Tensor G5 chip, brighter displays, and new AI-powered camera tools, the series delivers meaningful upgrades for everyday users. Here’s what each model brings and why it matters. A man talking on a Google Pixel 10. (Google)Pixel 10: Affordable power with better photographyThe Pixel 10 brings big improvements without the Pro price tag. It features a 6.3-inch OLED Actua display that’s brighter than ever, making outdoor use easy. Google also added better bass in the speakers, so movies, music, and calls sound richer.The headline feature is the first 5x telephoto lens on a base Pixel, complete with 10x optical-quality zoom and up to 20x Super Res Zoom. For anyone who loves capturing moments from a distance, kids’ soccer games, concerts, or city skylines, this is a huge advancement forward.Pixel 10 Pro and Pixel 10 Pro XL: AI cameras for creatorsThe Pixel 10 Pro and Pixel 10 Pro XL models push Pixel photography even further. They introduce Pro Res Zoom up to 100x, powered by generative AI on the Tensor G5 chip. That means close-up shots with detail you’d normally need a DSLR to capture.Both the Pro (6.3-inch) and Pro XL (6.8-inch) feature Google’s brightest Super Actua displays, larger batteries, and up to 16 GB of RAM for faster performance. These phones are made for power users who want the very best in cameras, speed, and AI tools.Pixel 10 Pro Fold: Durability meets flexibility A Google Pixel 10 Pro Fold display is shown. (Google)The Pixel 10 Pro Fold is Google’s most durable foldable yet, designed for people who want a phone that doubles as a tablet. With an upgraded gearless hinge, IP68 water and dust resistance, and a larger battery, it’s built to last years of folding and unfolding.It’s perfect for multitasking, splitting the screen for video calls and apps, or for streaming and gaming on the bigger display. For anyone curious about foldables but worried about durability, this is Google’s most confident answer yet.The Pixel 10, Pro, Pro XL, and Pro Fold all run on the brand-new Tensor G5 chip, which Google calls its most significant upgrade to date. The chip is made by TSMC using a 3nm process, delivering faster, more efficient on-device AI performance with Gemini Nano at its core. Across the entire lineup, Google made thoughtful design upgrades. The iconic camera bar has been refined, the bodies use more recycled materials, and the colors are elegant and modern. Choices include Indigo, Frost, and Lemongrass on Pixel 10, and Moonstone, Jade, Obsidian, and Porcelain on the Pro models.FOLDABLE PHONES ARE IMPRESSIVE TECHNOLOGICAL MARVELS BUT COME WITH SERIOUS COMPROMISESPricing and availabilityPixel 10, Pixel 10 Pro, and Pixel 10 Pro XL are all available for preorder today, starting at $799, $999, and $1199. Pixel 10 Pro and Pixel 10 Pro XL owners will also get a full year of Google AI Pro. Pixel 10 Pro Fold is available for pre-order today and hits shelves on October 9.If you’re not ready to upgrade to the latest model, you can often find great discounts on earlier Pixels around launch season. Check out the Top Android phones of 2025 for deals on previous Android phones by visiting Cyberguy.com/TopAndroidPhones Pixel Buds 2a: Smarter sound at a friendly price A woman wears Pixel Buds 2a. (Google)Google introduced the Pixel Buds 2a as the newest member of the Pixel Buds family. They deliver premium features like Active Noise Cancellation (ANC) and hands-free AI help, all at an affordable $129. With a fresh design, better sound, and smarter connectivity, these buds bring everyday value to anyone who wants high performance without breaking the bank.Lightweight design with a comfortable fitPixel Buds 2a are smaller and lighter than the earlier A-series, making them comfortable enough to wear all day. Inspired by the Pixel Buds Pro 2, they include a twist-to-adjust stabilizer and four different eartips so you can find the perfect fit. With an IP54 sweat and water resistance rating, you don’t have to worry about rain or workouts. The buds also come in two stylish colors, Iris and Hazel, designed to complement other Pixel devices.Clearer, smarter audio powered by Tensor A1At the heart of Pixel Buds 2a is the Tensor A1 chip, built specifically for audio. This brings Active Noise Cancellation with Silent Seal 1.5, a first for Google’s A-series. A custom speaker driver and new high-frequency chamber enhance music and podcast quality. Wind-blocking mesh covers and Google AI improve call clarity, so your voice sounds crisp on the other end.Battery life also gets a boost. You’ll enjoy 7 hours on a single charge with ANC on, and up to 20 hours with the charging case. With ANC off, you get nearly double the listening time compared to the first-generation A-series. For the first time, the case itself includes a replaceable battery, making the buds more durable and sustainable.AI Help without reaching for your phonePixel Buds 2a work as more than headphones; they’re also your AI companion. With Gemini built in, you can get quick answers, check messages, or even ask for coffee shop recommendations on the go. Just say “Hey Google” or customize the press-and-hold gesture for instant help.Easy pairing and smart connectivityPairing with a Pixel phone is seamless, but the buds also support Multipoint, letting you switch between devices without hassle. Fast Pair makes setup quick, and the Find Hub app ensures you never lose them. You can see the exact location on a map or make them ring when nearby.Pricing and availabilityAt just $129, Pixel Buds 2a deliver features once reserved for premium earbuds. They’re available for preorder now and will hit shelves at the Google Store and retail partners on October 9.Pixel Watch 4: Smarter design, AI health, and satellite safety A Pixel Watch 4 is seen with a pink wristband and display. (Google)The Pixel Watch 4 is Google’s biggest smartwatch upgrade yet. It keeps the iconic round look but introduces a domed Actua 360 display that’s brighter, larger, and easier to see, even in direct sunlight. The screen is 50% brighter, the bezels are smaller, and everything feels more fluid thanks to new animations and stronger haptics. Simply put, it looks better and feels more responsive on your wrist.Longer battery, faster chargingBattery life has always been a concern for smartwatches. Google addressed it with a 25% boost. The 41mm model now lasts up to 30 hours, while the 45mm model stretches to 40 hours. With Battery Saver mode, you can extend usage to two or even three days. Plus, the new Quick Charge Dock takes you from 0 to 50% in just 15 minutes, making it easier to power up before you head out.Satellite communications for emergenciesOne of the most groundbreaking features is standalone satellite connectivity. Pixel Watch 4 LTE is the first smartwatch that can dial emergency services even when you’re off the grid. Whether you’re hiking, camping, or driving in remote areas, the watch can connect to geo-stationary satellites and get help when you need it most. That’s peace of mind you can actually wear.Advanced health and fitness trackingHealth remains a core focus. Pixel Watch 4 adds more accurate sleep tracking, enhanced skin temperature sensing, and dual-frequency GPS for precise route logging in tough environments. Cyclists will love the new real-time bike stats, while fitness fans get 50+ exercise modes, including pickleball and basketball. Even if you forget to start a workout, the watch’s AI now auto-detects and logs your activity.Your AI health coach, 24/7With Gemini AI built in, the Pixel Watch 4 goes beyond tracking; it coaches. A new personal AI health coach gives proactive fitness and sleep advice tailored to your goals. It’s like having a trainer and wellness guide on your wrist, available anytime. A preview of this feature arrives in October through the Fitbit app, opening the door to personalized, AI-driven health support.WWDC 2025: IOS 26, LIQUID GLASS DESIGN AND APPLE’S AI SHORTFALLSeamless smart featuresThe Pixel Watch 4 isn’t just about health. With Gemini on your wrist, you can get answers or complete tasks hands-free. Raise your wrist to talk, respond to messages with smart replies, or control your day without pulling out your phone. It’s designed for those busy, in-between moments, when your hands are full but you still need help.Pricing and availabilityThe Pixel Watch 4 is available for preorder now. It launches October 9 with pricing starting at $349 for Wi-Fi and $449 for LTE in the 41mm size, and $399 for Wi-Fi and $499 for LTE in the 45mm size. Google is also offering a wide range of new watch bands, letting you personalize your style to match your Pixel phone or your look.Pixelsnap and Qi2 Charging: Magnetic power made simple A Pixelsnap Charger, Pixelsnap Ring Stand and the Pixel Flex 67W Dual USB-C fast charger are showcased. (Google)The Pixel 10 series is the first major Android lineup to fully embrace Qi2 magnetic charging. Think of it as Google’s answer to MagSafe, only it works with a wider range of devices. Qi2 improves on the old Qi standard by adding magnets, so your phone snaps perfectly into place every time. No more fiddling with alignment, charging is instant and reliable.This upgrade matters because it unlocks a full ecosystem of Pixelsnap accessories, built to make charging and everyday use easier. And since Qi2 is a universal standard, you’re not limited to Google’s products; you can also use MagSafe accessories with your Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, and Pixel 10 Pro Fold.Pixelsnap Charger and StandThe Pixelsnap Charger comes as a simple puck or bundled with a sleek stand. It charges the Pixel 10 Pro XL at up to 25W and other Qi2-certified devices at 15W. The stand looks elegant on a desk or nightstand, and the puck detaches for charging on the go. If you own a Pixel 10 Pro Fold, the stand even supports charging while unfolded, letting you stream, video call, or display widgets on the big screen as your phone powers up.Pixelsnap Ring StandNeed hands-free viewing? The Pixelsnap Ring Stand snaps onto the back of your phone for propping it up. It rotates smoothly thanks to a microfiber liner, making it easy to find the perfect angle for movies or video calls. Slim enough to slip into a pocket or purse, it adds function without adding bulk.Pixelsnap CasesGoogle designed its new Pixel 10 cases to be Pixelsnap-ready. That means you can attach chargers or accessories without ever removing the case. Available in colors like Moonstone, Jade, Obsidian, Porcelain, Indigo, Frost, and Lemongrass, they not only protect your phone but also match the refreshed Pixel 10 design.Pixel Flex 67W Dual Port USB-C Fast ChargerIf you prefer wired charging, Google also introduced the Pixel Flex Dual Port 67W charger. It’s the fastest dual-port charger yet for Pixel phones. Thanks to a custom algorithm, it prioritizes charging your Pixel first while still powering a second device. Compact with foldable prongs, it’s designed to travel as easily as you do.Pricing and availabilityAll Pixelsnap products and the Pixel 10 series are available for preorder now, with retail availability starting August 28.AI Features: Magic Cue, Camera Coach, and more An image of the Tensor G5 chip is seen. (Google)Google made it clear at the 2025 Made by Google event that AI is now at the heart of the Pixel experience. With the Tensor G5 chip and Gemini Nano, Pixel 10 phones deliver more than speed-they anticipate what you need and help you get it done.Magic Cue: Smarter help across your appsThe new Magic Cue acts like a personal assistant inside your phone. It proactively pulls information you need at just the right time. For example, if you’re on the phone with an airline, it can instantly display your flight details from Gmail. When you’re in a group chat, it can surface photos or addresses without making you dig. And because all of this happens on-device, your personal data stays private.Camera Coach: AI that makes you a better photographerPixel cameras are known for their quality, but Camera Coach takes it further. Using Gemini AI, it gives real-time tips to improve your photos. It might suggest a different angle, a tighter frame, or a better composition. For beginners, it’s a helpful teacher. For experienced photographers, it’s like having a second set of creative eyes right in your pocket.Best Take and Pro Res Zoom: Smarter shots every timeFeatures like Best Take automatically select the sharpest face from a series of photos, making group shots easier than ever. Meanwhile, Pro Res Zoom, exclusive to Pixel 10 Pro models, uses a generative AI imaging model to deliver astonishing detail up to 100x zoom. It’s not just cropping in, it’s rebuilding and refining the image to look crisp.Everyday AI that saves you timeBeyond photography, Google packed the Pixel 10 with over 20 generative AI tools that work directly on the device. They help with editing, writing, and even composing replies in your favorite apps. The goal is simple: make the phone feel less like a tool and more like a helpful companion that adapts to your needs.CLICK HERE TO GET THE FOX NEWS APPTake My Quiz: How Safe Is Your Online Security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz Kurt’s key takeawaysGoogle just staged one of its most memorable launches yet. With Fallon, Curry, Norris, and the Jonas Brothers front and center, the event blended entertainment and innovation. That energy carried through to the devices, which brought Google’s boldest AI, camera, and ecosystem upgrades so far. Each product offered clear value. The Tensor G5 chip and Gemini Nano AI make everything faster and more efficient. The Pixel 10 phones push photography and performance further than before. Meanwhile, the Pixel Watch 4 adds health coaching and even satellite emergency support. The Pixel Buds 2a also pack premium sound and smart features at a budget price. In addition, Pixelsnap accessories make charging simple and stylish. Finally, Google’s promise of seven years of updates sets this lineup apart. Combined with thoughtful design and proactive AI, these devices feel built to last.Will Google’s AI-first approach convince you to upgrade, or are you waiting to see what Apple and Samsung do next? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Google Pixel 10 event brings new phones, smartwatch, earbuds and AI Read More »

schools spy on kids photo 1

Schools’ safety tools are spying on kids — even at home

NEWYou can now listen to Fox News articles!
School is back in session, but here’s something no one told you at orientation: Your kids may have more eyes on them than just their teachers’. Even if you don’t have kids in school, you really need to know about this.A new study from UC San Diego uncovered what’s really going on with those student safety tools schools buy. You know, the ones that are supposed to stop bullying, flag mental health struggles and prevent school shootings? Well, they’ve morphed into 24/7 surveillance machines.Enter to win a new iPhone at www.WinFromKim.com!Get this: 86% of the companies that provide these services monitor kids day and night, not just during school hours and not just on school devices. That’s every Google search, every message, sometimes even at home on personal phones and laptops.Nearly a third of these companies give kids “risk scores” based on what they type or search. The kicker? 71% rely on AI to flag behavior. Yes, an algorithm decides if your child is “risky.” TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS A new study finds that school safety tools are monitoring students 24/7. (Photo by Matt Cardy/Getty Images)Imagine your kid writing an email they never send and that draft gets scooped into some monitoring company’s database. That’s exactly what happened to this teen who got suspended. Creepy doesn’t even begin to cover it.📱 Yes, they’re watching at home, tooAbout 36% of companies monitor student-owned devices. All it takes is a school-required app, plug-in or software. Late-night YouTube binges, private DMs and social media posts could trigger a red flag on some dashboard.📌 Questions every parent should ask the schoolI think these tools can do a lot of good. God knows we don’t want any more school shootings or kids slipping through the cracks. STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE School safety programs are collecting students’ emails, messages, and web activity on their personal devices. (Photo by Sebastian Willnow/picture alliance via Getty Images)But you and your kids need to understand exactly how they work and what happens to the data. Copy these questions and send an email to the school’s administrator or set up a meeting in person.Is our school using GoGuardian, Bark, Gaggle, Securly, Lightspeed or any online monitoring service? What exactly are they tracking?Are you monitoring personal devices at home?What happens if my child is flagged? How can I see my child’s dashboard?How long is student data stored, and can parents request deletion?Is student data ever sold, shared or used for anything beyond monitoring?Make sure your kids know that anything they do on a school-issued device is fair game. And depending on the setup, their personal phone or laptop could be tracked, too. These systems can protect, but they also raise big questions about privacy and oversight.Is this happening with your kid’s school? Drop me a note. I’d love to talk to you about it.STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE Students should assume that school safety programs are monitoring their devices. (Kirk Sides/Houston Chronicle via Getty Images)🚸 Know someone with kids? Share this important information with them now.Get tech-smarter on your scheduleCLICK HERE TO GET THE FOX NEWS APPAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.Daily newsletter: Join 650,000 people who read the Current (free!)Watch: On Kim’s YouTube channelCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Schools’ safety tools are spying on kids — even at home Read More »