Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

Google Search

Google rolls out ‘preferred sources’ feature, allowing users to choose outlets that appear within Top Stories

NEWYou can now listen to Fox News articles!
Google users can now customize their search results to display favorite sources such as Fox News, using the company’s new “preferred sources” feature. Google officially launched the feature on Aug. 12, creating a way to tailor the Top Stories section to include outlets handpicked by the user. “When you select your preferred sources, you’ll start to see more of their articles prominently displayed within Top Stories, when those sources have published fresh and relevant content for your search,” read a statement from Google.  Google’s new “preferred sources” feature allows users to customize their search results by choosing their favorite publishers to appear within the Top Stories section.  (AP Photo/Don Ryan, File)GOOGLE TURNS CO2 INTO BATTERY POWER FOR CLEAN ENERGYContent from your handpicked sources may also appear in a dedicated “from your sources” section, Google says. Adding Fox News as a “preferred source” can be done in just a few clicks using this shortcut.  You can make Fox News a preferred source on Google to stay up-to-date on coverage.  (iStock)HOW GOOGLE’S ‘ASK PHOTOS’ USES AI TO FIND THE PICTURES YOU WANTAlternatively, you can follow these steps. Search for any topic in the news on Google.Click on the icon presented to the right of Top Stories.Search for Fox News when prompted.Select Fox News.Refresh results to see Fox News content in Top Stories.This new Google feature allows users to select as many sites as they want as a preferred source. You can also change sites you’ve selected at any time.  Users can select one or more “preferred sources” to appear on the Google search results page. Once “preferred sources” are selected, if there is recent and relevant coverage from those sources related to your search, they will appear more frequently within Top Stories.  (Photo Illustration by Soumyabrata Roy/NurPhoto via Getty Images)CLICK HERE TO GET THE FOX NEWS APPMake sure you stay up-to-date on Fox News coverage by adding it as a preferred source.

Google rolls out ‘preferred sources’ feature, allowing users to choose outlets that appear within Top Stories Read More »

trump ai order

Fox News AI Newsletter: Google, Trump administration reach deal on AI for federal agencies

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Trump administration strikes deal with Google to use AI platform across federal agencies- Trump’s AI plan is a bulwark against the rising threat from China- How AI is now helping hackers fool your browser’s security tools U.S. President Donald Trump displays a signed executive order during the “Winning the AI Race” summit hosted by All‑In Podcast and Hill & Valley Forum at the Andrew W. Mellon Auditorium on July 23, 2025 in Washington, DC.  (Getty Images)AI MEETS DC: The General Services Administration (GSA) on Thursday announced a new agreement with Google to deploy its suite of artificial intelligence (AI) and cloud services across the federal government. CPU with Chinese flag concept stock  (iStock)DIGITAL ARMS RACE: In July, some of the brightest minds in American technology descended on Washington to celebrate a major milestone: the launch of President Donald Trump’s bold initiative to ensure the United States remains the world’s unrivaled leader in artificial intelligence (AI).  Illustration of a cybercriminal at work  (Kurt “CyberGuy” Knutsson)DIGITAL DECEPTION: Cybercriminals continually seek new ways to expose you to phishing and scam sites designed to steal your credentials or install malware that can compromise your personal data and system. Although browsers and search engines like Chrome and Google Search actively scan and take action against spam and malicious sites, they rely on automated tools to manage the huge volume of threats.AI FOR ALL: Meta CEO Mark Zuckerberg on Wednesday announced the tech giant will focus on developing a personal superintelligence for everyone, which will further enable creative and leisurely pursuits.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Google, Trump administration reach deal on AI for federal agencies Read More »

31 atlas comet 2

Harvard physicist says mysterious interstellar object could be nuclear-powered spaceship

NEWYou can now listen to Fox News articles!
A Harvard physicist who sounded the alarm earlier this month about a rare interstellar object passing through our solar system — and suggested it might be more than a comet — now says it could even be a nuclear-powered spaceship.The object, dubbed 3I/ATLAS, was first detected in early July by an Asteroid Terrestrial-impact Last Alert System (ATLAS) telescope in Chile. It marks only the third time an interstellar object has been observed entering our solar system, according to NASA.While NASA classified the object as a comet, Dr. Avi Loeb pointed out that an image showed an unexpected glow in front of the object rather than trailing behind it — something he called “quite surprising.”In a blog post this week, Loeb wrote that the object’s brightness profile cannot be explained by sunlight reflection or standard cometary outgassing.METEORITE FRAGMENT THAT SLAMMED THROUGH HOMEOWNER’S ROOF IS BILLIONS OF YEARS OLD, PREDATES EARTH: PROFESSOR Astronomers discovered an unusual object entering our solar system earlier this month. (NASA, ESA, David Jewitt (UCLA); Image Processing: Joseph DePasquale (STScI))Instead, he suggested, 3I/ATLAS might be generating its own light — possibly from nuclear energy.”Alternatively, 3I/ATLAS could be a spacecraft powered by nuclear energy, and the dust emitted from its frontal surface might be from dirt that accumulated on its surface during its interstellar travel,” Loeb wrote. “This cannot be ruled out, but requires better evidence to be viable.”Loeb dismissed other natural power sources. A primordial black hole, he said, would generate only about 20 nanowatts — far too weak. A radioactive fragment from a supernova was highly unlikely given its rarity, and frictional heating from interstellar gas and dust was ruled out by momentum and density constraints.RARE JUPITER-SIZED PLANET DISCOVERED 3,200 LIGHT-YEARS AWAY USING EINSTEIN’S SPACE-TIME WARPING METHOD A Harvard physicist is sounding alarms that the object could be an alien probe. (Avi Loeb)That leaves the simplest explanation: a central, compact, high-power source. The most natural way to achieve the gigawatt-level luminosity observed, Loeb noted, would be nuclear power.Still, Loeb does not claim the object is nuclear-powered. He stresses there is only one possible interpretation if natural models fail — and proving it would require more evidence.3I/ATLAS is estimated at about 20 kilometers across, larger than Manhattan.Loeb has also raised questions about its unusual trajectory.”If you imagine objects entering the solar system from random directions, just one in 500 of them would be aligned so well with the orbits of the planets,” Loeb told Fox News Digital earlier this month.SCIENTISTS DISCOVER ANCIENT RADIO SIGNALS FROM DISTANT GALAXY CLUSTER The interstellar object, which comes from the center of the Milky Way, is also expected to pass near Mars, Venus, and Jupiter. (ATLAS/University of Hawaii/NASA)The interstellar object, which comes from the center of the Milky Way, is also expected to pass near Mars, Venus, and Jupiter — another improbable coincidence, he said.”It also comes close to each of them, with a probability of one in 20,000,” he said.According to NASA, 3I/ATLAS will reach its closest point to the sun — about 130 million miles away — on October 30.CLICK HERE TO GET THE FOX NEWS APP”If it turns out to be technological, it would obviously have a big impact on the future of humanity,” Loeb said. “We have to decide how to respond to that.”Fox News Digital’s Sophia Compton contributed to this report.

Harvard physicist says mysterious interstellar object could be nuclear-powered spaceship Read More »

1 the truth behind those mysterious shipment emails in your inbox intro

The truth behind those mysterious shipment emails in your inbox

NEWYou can now listen to Fox News articles!
Over the past year, more people have reported receiving order shipment emails for purchases they never made. These messages usually come from legitimate retailers, often sportswear brands or electronics stores, and contain real tracking numbers and delivery details. The products are being shipped to different names at different addresses, but for some reason, the buyer’s contact email is yours.It might seem like a harmless clerical error or someone accidentally typing the wrong email address. But when it happens repeatedly, and across multiple unrelated orders, it starts to look less like a coincidence and more like a tactic.Arthur from Cape Coral, Florida, recently reached out with an experience that mirrors what others have been describing:”My wife’s e-mail address is showing up in emails from various sports entities to notify her of shipping dates, etc. So far, three separate individuals have ordered products, shipped to a different name at a different address, but used her email as the contact. They didn’t use our credit card to place the order. What could be going on? I don’t believe it’s a coincidence.”HOW TO DETECT FAKE AMAZON EMAILS AND AVOID IMPERSONATION SCAMSArthur is right to question what’s happening. Scammers are deliberately using real email addresses to push fraudulent purchases through retailer systems with fewer checks. They rely on your email to carry out the scam, even if they have not stolen your payment details.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER  Some scammers use valid, active email addresses to bypass retailer fraud filters. (Kurt “CyberGuy” Knutsson)What’s likely happening with those shipment emails in your inboxIt is unlikely that someone is accidentally typing your email address every single time. Rather, scammers are deliberately using valid, active email addresses like yours to bypass retailer fraud filters. Numerous sources confirm that fake order and shipping confirmation emails are a common tactic in fraud operations, with criminals exploiting the trust systems placed in legitimate email addresses.When a stolen credit card is used, pairing it with a real email that has not triggered spam alerts increases the chance the transaction will go unnoticed by anti-fraud systems. Retailers often check whether an email address is active or bounces. If the system sees a functioning address, it may be less suspicious than an obviously fake one.Once the order is placed, products are frequently sent to drop addresses or freight-forwarding services, as confirmed by official investigations into brushing scams. These services act as intermediaries, making the scam harder to trace. In that context, your email is simply a means to an end, a validated contact point that helps the operation move forward smoothly. Scammers can obtain email addresses when reputable companies experience data breaches. (Kurt “CyberGuy” Knutsson)How bad actors are able to get your emailYour email address may have ended up in the hands of scammers through several common methods. The most likely cause is a data breach. Many well-known companies have suffered leaks where customer emails and other information were exposed. Once your email is part of a leaked database, it often circulates on the dark web or in underground forums where it is freely traded and reused. Even if you were not part of a breach, scammers often use a technique called credential stuffing. This involves testing stolen login details across different websites to confirm which email addresses are active.REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSRemove yourself from the webThe best thing you can do to prevent this from happening is to invest in a data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan If you are receiving order confirmations for things you never bought, your email address could be a tool used by scammers in a larger fraud operation. (Kurt “CyberGuy” Knutsson)7 ways to secure your email from scammersThese simple but powerful steps can help you protect your inbox, safeguard your identity, and stay one step ahead of scammers misusing your email.1) Protect and monitor your emailStart by locking down your email account with a strong, unique password that you don’t reuse anywhere else. Enable two-factor authentication (2FA) so hackers can’t get in even if they’ve stolen your password. A password manager makes this much easier by generating and securely storing complex passwords, helping you avoid the risks of reuse. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 2) Watch for suspicious messagesScan your inbox regularly for order confirmations, shipping notices, or account sign-ups you don’t recognize. If something looks off, report it directly to the retailer or platform; it could be part of a larger scam using your email address. Scan your inbox regularly for order confirmations, shipping notices, or account sign-ups you don’t recognize. If something looks off, report it directly to the retailer or platform; it could be part of a larger scam using your email address. Never click on suspicious links, even if the message looks legitimate, and protect your devices with strong antivirus software to catch threats before they spread.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 3) Be picky about where you share your emailAvoid entering your email on shady giveaway sites or sketchy online forms. When in doubt, skip the sign-up or use a throwaway email. The fewer places your email lives, the harder it is for scammers to get hold of it.4) Create a second email address for shoppingSet up a dedicated email for online purchases, newsletters, and subscriptions. This helps keep your main inbox clean and makes it easier to spot strange activity. Sometimes, it’s best to create various email aliases so that you don’t have to worry about all your info getting taken in a data breach.  An email alias address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/MailHOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM5) Monitor your credit and identity regularlyEven if no purchases appear under your name, scams involving your email can be a red flag for future identity misuse. Set up alerts with your bank and consider a credit monitoring service to catch unauthorized activity early.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft6) Review connected accounts and revoke accessIn your email settings (e.g., Gmail, Outlook), check for any connected apps, services, or delegated access you don’t recognize and remove them. This ensures no third party is piggybacking off your account.7) File an identity theft report if the problem escalatesIf this email misuse leads to fraudulent financial activity, direct users to file a report with the FTC at IdentityTheft.gov or their local authorities. Include this only if appropriate to your tone.Kurt’s key takeawayIf you are receiving order confirmations for things you never bought, do not shrug it off. Your email is likely being misused as part of a larger fraud operation, not by accident but intentionally. Scammers are taking advantage of active, trustworthy email addresses to slip past retailer defenses and carry out unauthorized purchases. The repeated use of your email shows that fraud networks are already circulating it, even if your financial information remains untouched.Are you comfortable with how much of your personal information is floating around online? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

The truth behind those mysterious shipment emails in your inbox Read More »

1 brain implant turns thoughts into digital commands

Brain implant turns thoughts into digital commands

NEWYou can now listen to Fox News articles!
A new brain implant now lets people control Apple devices, such as iPads, iPhones and the Vision Pro, using only their thoughts. Synchron, an endovascular brain-computer interface (BCI) company based in New York, demonstrated the first wireless BCI that works with Apple’s official protocol.Ten patients have received the implant: six in the U.S. and four in Australia. With this technology, users living with severe paralysis can navigate apps, send messages and operate devices hands-free. This breakthrough greatly expands independence, as it enables patients to manage their environment, stream shows and control smart home devices, all using only their minds.Synchron’s advancement in BCI technology marks a significant step for assistive devices and hints at how we may interact with computers in the future. The device’s hands-free, voice-free operation offers a powerful new level of accessibility and autonomy for people with disabilities.NONINVASIVE BRAIN TECH AND AI MOVES ROBOTIC HAND WITH THOUGHTSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER  ALS patient Mark Jackson demonstrates Synchron’s brain-computer interface (BCI) working with an iPad. (Synchron)A first for brain-tech and AppleSynchron is the first company to connect a brain implant directly to Apple devices using Apple’s official BCI Human Interface Device (HID) protocol. This means no custom hacks or workarounds. The system simply connects over Bluetooth, just like a keyboard or a mouse, and works with iPhones, iPads, and even the Apple Vision Pro. In a powerful video shared by Synchron, ALS patient Mark Jackson demonstrates the tech in action. After losing the use of his hands, he’s now able to navigate his iPad entirely with thought. That includes opening apps, composing messages, and staying connected with the people he loves-all without moving a muscle.Behind the scenes, Synchron’s system uses artificial intelligence to decode brain signals and turn them into real-time digital commands. Machine learning models interpret motor intent, such as thinking about tapping your finger, and translate that into actions on the iPad. This AI-powered decoding helps the system feel smooth and responsive as users learn to control it with focus alone. Synchron’s brain-computer interface is seen up close. (Synchron)The game-changing signal strength meterOne surprising new feature is the built-in signal strength meter. This visual cue shows patients how strong their brain signal is in real time. A blue box appears over an icon or app and fills up based on how clearly the system reads the user’s intent. It may sound simple, but this is a huge deal. It helps users like Mark fine-tune their mental focus, adjust their posture, and improve their interaction without outside help. It’s like seeing your brain in action and learning to drive it better. “When I lost the use of my hands, I thought I had lost my independence,” Mark says in the video. “Now, with my iPad, I can message my loved ones, read the news, and stay connected with the world, just by thinking.”NEW BRAIN THERAPY ALLOWS PARALYZED PATIENTS TO WALK AGAIN: ‘I FEEL MY LEGS’  Mark Jackson operates Synchron’s brain-computer interface, which functions using Apple’s official protocol. (Synchron)What sets Synchron apartBCIs like Synchron’s Stentrode and Elon Musk’s Neuralink have connected to devices before, but never like this. Previous setups required custom software or physical adapters. Now, thanks to Apple’s new BCI HID protocol, brain-computer interfaces can plug right into the Apple ecosystem like any other accessory. That official integration opens the door to more features, better performance, and fewer setup hurdles. Synchron’s COO, Kurt Haggstrom, calls it a “game changer” for both patients and the entire BCI industry.What this means for youThis tech isn’t just for people with paralysis, at least, not forever. Today, it’s a medical tool undergoing trials. Tomorrow, it could become a consumer product you buy at your local Apple Store. With Apple embracing BCI as a legitimate input method, everything from your phone to your smart home could one day be controllable by thought. That opens the door for more accessibility, more customization, and completely new ways of interacting with technology.PARALYZED MAN SPEAKS AND SINGS WITH AI BRAIN-COMPUTER INTERFACETake My Quiz: How Safe Is Your Online Security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com/QuizKurt’s key takeawaysSynchron’s Apple demo marks a new era in brain-computer interaction. It turns thoughts into action using mainstream tech you probably already own. While it’s still in its early stages, the direction is clear: BCI is moving out of the lab and into real life, and Apple is helping lead the charge.Would you trust your brain to control your devices? Or is this one step too far? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Brain implant turns thoughts into digital commands Read More »

1 remove your data to protect your retirement from scammers

Remove your data to protect your retirement from scammers

NEWYou can now listen to Fox News articles!
You’ve spent decades building your retirement fund. Now is the time to enjoy it, not lie awake worrying about scammers and identity thieves. Criminals are more aggressive than ever, and they know your personal information is the key to your money.The good news? You can take simple steps to remove your personal data from risky websites and databases. These actions greatly reduce the chance of fraud and protect your hard-earned savings from scammers. By taking control of your information now, you keep your money secure and your retirement in your hands.THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAYSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  A man enjoys his retirement. (Kurt “CyberGuy” Knutsson)Why criminals target retirement accountsRetirement accounts are a goldmine for criminals. Here’s why:They’re large. A lifetime of savings can add up to six or seven figures.They’re less monitored. Unlike checking accounts, you may only review them a few times a year.They’re easy to access remotely. Scammers don’t need your wallet-just enough personal details to pretend to be you.Elder fraud caused more than $4.9 billion in losses in 2024. In 72% of cases, scammers found victims’ personal data online. Most of these crimes were tied to identity theft, allowing criminals to access accounts, redirect benefits, or launch phishing attacks. A woman enjoys her retirement. (Kurt “CyberGuy” Knutsson)You have an online profile even without social mediaYou don’t have to be on Facebook to have your information online. Data brokers, companies you may have never heard of, collect and sell personal details about nearly every adult in the U.S. These profiles may include:Age and date of birthHome address and property valueMarital status and family detailsIncome range and investmentsRetirement statusFor scammers, this information is like a treasure map.HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUDHow criminals abuse your dataWhen scammers know your age, address, and that you’re retired, they can craft scams that feel frighteningly real. Some examples are:Fake financial advisor calls: Claiming to represent your bank or retirement plan provider, they already know your full name, your investment type, and even the city you live in.”Pre-approved” retirement loan or annuity offers: Complete with official-sounding terms and personal details to make them seem legitimate.Social engineering scams: Using information about your family or recent life events (like selling a home) to build trust before asking for account details.The more accurate the personal data they have, the more convincing their story, and the higher the risk you’ll believe them. A woman scrolls on her phone. (Kurt “CyberGuy” Knutsson)Reduce the target on your backEvery piece of personal information you remove from public databases is one less tool scammers can use. Removing your data can:Reduce the number of scam attemptsLimit how convincing those scams seemPrevent your details from being resold repeatedlyThink of it as changing the locks on your home before a break-in happens.HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONERemove your data manuallyYou can contact data brokers and request that they delete your profile. To start, search your name online, find the sites listing your data, and follow each site’s removal process. However, there’s a catch:There are hundreds of these companiesEach has a different process, often requiring ID copies or mailed lettersMany will repost your data within months unless you check back regularlyIt’s a time-consuming job that most people eventually abandon. A woman checks her retirement accounts on her laptop. (Kurt “CyberGuy” Knutsson)Use an automated data removal serviceA data removal tool handles the work for you. It:Contacts hundreds of data brokers on your behalfTracks each request and follow-up to ensure deletionMonitors continuously to keep your data off the listsWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScanKurt’s key takeawaysYou’ve worked too hard to let criminals take what you’ve built. By reducing your digital footprint, you protect both your money and your peace of mind. Start removing your personal information today, and keep your retirement exactly where it belongs, in your hands.If you’ve been targeted by a scam, how did you handle it, and what advice would you give others?  Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

Remove your data to protect your retirement from scammers Read More »

1 meta ai docs exposed allowing chatbots to flirt with kids

Meta AI docs exposed, allowing chatbots to flirt with kids

NEWYou can now listen to Fox News articles!
Tech bro Mark Zuckerberg’s company has been caught in one of the most disturbing scandals yet. Reuters uncovered an internal Meta document that allowed its AI chatbots to flirt with children and engage in sensual conversations. The revelation sparked outrage, and Meta only reversed course after getting caught.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER Threads app logo on a smartphone screen with the Meta logo above it. (Kurt “CyberGuy” Knutsson)Meta AI policy allowed chatbots to flirt with kidsAccording to internal “GenAI: Content Risk Standards,” Meta’s legal, policy, and engineering teams signed off on chatbot rules that made it acceptable for bots to describe a child as “a youthful form of art” or engage in romantic roleplay with minors. Even worse, the guidelines gave room for chatbots to demean people by race and spread false medical claims. This was not a bug. These were approved rules until Meta faced questions. Once Reuters started asking, the company quickly scrubbed the offensive sections and claimed it had been a mistake.META ADDS TEEN SAFETY FEATURES TO INSTAGRAM, FACEBOOKWe reached out to Meta, and a spokesperson provided this statement to CyberGuy:”We have clear policies on what kind of responses AI characters can offer, and those policies prohibit content that sexualizes children and sexualized role play between adults and minors. Separate from the policies, there are hundreds of examples, notes, and annotations that reflect teams grappling with different hypothetical scenarios. The examples and notes in question were and are erroneous and inconsistent with our policies, and have been removed.” Meta told CyberGuy that their AI policies prohibit content that sexualizes children.  (Kurt “CyberGuy” Knutsson)Big Tech puts profit over kids’ safetyLet’s call this what it is. Meta didn’t stop this on its own. It only acted when exposed. That shows Big Tech’s priorities: money, engagement, and keeping kids glued to screens. Safety? Not even on the radar until someone blows the whistle. Meta has repeatedly shown it couldn’t care less about your children’s well-being. It’s about maximizing time online, pulling in younger users, and monetizing every click. This latest scandal proves once again that parents cannot rely on tech companies to protect kids.Congress pushes Meta to explain disturbing AI rulesSenator Josh Hawley and a bipartisan group in Congress are demanding that Meta come clean. Lawmakers want to know how and why these policies ever got approval. Hawley called on Meta to release all internal documents and explain why chatbots were allowed to simulate flirting with children. Meta insists it has “fixed” the problem, but critics argue these corrections only came after they were exposed. Until real regulations arrive, parents are on their own. A bipartisan group of lawmakers are demanding that Meta release internal documents and explain why chatbots were allowed to simulate flirting with children.  (Kurt “CyberGuy” Knutsson)META FACES BACKLASH OVER AI POLICY THAT LETS BOTS HAVE ‘SENSUAL’ CONVERSATIONS WITH KIDSHow parents can protect kids from risky AI chatbotsWhile Congress investigates, families need to take immediate steps to protect their children from the dangers exposed in Meta’s AI scandal.1) No unsupervised access to AI chatbotsChildren should never have free access to AI chatbots, including Meta AI. The internal documents show these systems can cross boundaries that no parent would approve of. Supervision is the first line of defense.2) Turn on parental controls across all devicesEnable parental controls on phones, tablets, and computers. These tools give you more visibility and limit access to risky apps where inappropriate chatbot conversations could happen.3) Talk with kids regularly about AI and online dangersThe Meta revelations prove AI can go places parents would never expect. Ongoing conversations with your children about what is safe and what is not online are essential for their protection.4) Use content filtering tools to block risky appsApps like Bark allow parents to block or filter certain programs where AI interactions may slip through. With tech companies failing to self-police, filtering tools give parents more control.Read more here: Is your child’s data up for grabs? The hidden dangers of school tech5) Install strong antivirus software on every family deviceWhile antivirus software won’t stop AI flirting, it adds a much-needed layer of security. Hackers and bad actors often target kids through the same devices where chatbots live, so whole-family protection matters. The best way to safeguard from malicious links that install malware, potentially accessing you and your family’s private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTechThese steps won’t solve the problem entirely, but they give parents more power at a time when Big Tech seems unwilling to put children’s safety first.META AI’S NEW CHATBOT RAISES PRIVACY ALARMSWhat this means for youIf you thought chatbots were harmless fun, think again. Meta’s own documents prove its AI bots were allowed to cross dangerous lines with children. Parents must now take a proactive role in monitoring tech, because Big Tech will not protect your kids until forced.Kurt’s key takeawaysMeta’s scandal shows once again why blind trust in Silicon Valley is dangerous. AI can be powerful, but without accountability, it becomes a threat. Congress may push for answers, but parents must stay one step ahead to safeguard their children.Do you think Big Tech companies like Meta should ever be trusted to police themselves when kids’ safety is on the line? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com. All rights reserved.

Meta AI docs exposed, allowing chatbots to flirt with kids Read More »

1 openai limits chatgpts role in mental health help

OpenAI limits ChatGPT’s role in mental health help

NEWYou can now listen to Fox News articles!
More people are turning to artificial intelligence for support, even for mental health advice. It’s easy to see why: tools like ChatGPT are free, fast, and always available. But mental health is a delicate issue, and AI isn’t equipped to handle the complexities of real emotional distress.To address growing concerns, OpenAI has introduced new safety measures for ChatGPT. These updates will limit how the chatbot responds to mental health-related queries. The goal is to prevent users from becoming overly dependent and to encourage them to seek proper care. OpenAI also hopes to reduce the risk of harmful or misleading responses through these changes.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER   A screenshot shows the ChatGPT prompt window interface. (Kurt “CyberGuy” Knutsson)Why is OpenAI making this change?In a statement released by OpenAI, the company admitted that there “have been instances where our 4o model fell short in recognizing signs of delusion or emotional dependency.” One example, ChatGPT validated a user’s belief that radio signals were coming through the walls because of their family. In another, it allegedly encouraged terrorism.CHATGPT COULD BE SILENTLY REWIRING YOUR BRAIN AS EXPERTS URGE CAUTION FOR LONG-TERM USEThese rare but serious incidents sparked concern. OpenAI is now revising how it trains its models to reduce “sycophancy,” or excessive agreement and flattery that could reinforce harmful beliefs.  Screenshot of a prompt asking if ChatGPT can provide mental health advice (Kurt “CyberGuy” Knutsson)What new safeguards has OpenAI set in place?From now on, ChatGPT will prompt users to take breaks during long conversations. It will also avoid offering specific advice on deeply personal issues. Instead, the chatbot will help users reflect by asking questions and offering pros and cons, without pretending to be a therapist.OpenAI stated, “While rare, we’re continuing to improve our models and are developing tools to better detect signs of mental or emotional distress so ChatGPT can respond appropriately and point people to evidence-based resources when needed.”IS YOUR THERAPIST AI? CHATGPT GOES VIRAL ON SOCIAL MEDIA FOR ITS ROLE AS GEN Z’S NEW THERAPISTThe company also partnered with more than 90 physicians worldwide to create updated guidance for evaluating complex interactions. An advisory group, made up of mental health experts, youth advocates, and human-computer interaction researchers, is helping shape these changes. OpenAI says it wants input from clinicians and researchers to refine its safeguards further. Screenshot of a user asking ChatGPT to “Cheer me up with a joke.” (Kurt “CyberGuy” Knutsson)Your private conversations with ChatGPT are not legally protectedOpenAI CEO Sam Altman recently raised red flags about AI privacy. “If you go talk to ChatGPT about your most sensitive stuff and then there’s a lawsuit or whatever, we could be required to produce that. And I think that’s very screwed up,” he said.He added, “I think we should have the same concept of privacy for your conversations with AI that we do with a therapist or whatever.”So, unlike talking to a licensed counselor, your chats with ChatGPT don’t enjoy legal privilege or confidentiality. Be careful what you share.SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST 1 CHATGPT SEARCHWhat this means for youIf you’re turning to ChatGPT for emotional support, understand its limits. The chatbot can help you think through problems, ask guiding questions, or simulate a conversation, but it can’t replace trained mental health professionals.Here’s what to keep in mind:Don’t rely on ChatGPT in a crisis. If you’re struggling, seek help from a licensed therapist or call a crisis hotline.Assume your chats aren’t private. Treat your AI conversations as if they could be read by others, especially in legal matters.Use it for reflection, not resolution. ChatGPT is best at helping you sort your thoughts, not solve deep emotional issues.OpenAI’s changes are a step toward safer interactions, but they’re not a cure-all. Mental health requires human connection, training, and empathy – things no AI can fully replicate.Take My Quiz: How Safe Is Your Online Security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz Kurt’s key takeawaysWhile ChatGPT is a useful tool, it’s far from being a substitute for a human being, even with the introduction of Agent, which adds capabilities but still lacks true empathy, judgment, and emotional understanding. The safeguards go a long way toward addressing the concerns about AI’s ethical and psychological implications. It’s a good thing OpenAI is aware of this because it’s just the start.  To truly protect users, the company will need to keep evolving how ChatGPT handles emotionally sensitive conversations.Do you think people should be using AI for mental health? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

OpenAI limits ChatGPT’s role in mental health help Read More »

hands typing iphone fox news 001

Your phone is tracking you even when you think it’s not

NEWYou can now listen to Fox News articles!
You know that little GPS icon that pops up when an app is using your location? That’s the polite part. The tip of the iceberg. The warm handshake before your phone whispers your every movement to Big Tech behind your back. Your phone has more than one way to know where you are. Cell towers, Wi-Fi networks, Bluetooth beacons and even background pings track you. If you have an old smartphone, you can enter to win a new iPhone 16 Pro at www.komando.com/win.I’m not here to scare you or tinfoil-hat this. I’m here to help you take back control. I tested these steps myself, but your phone’s menus might look a little different depending on the make and model. Poke around your settings and you’ll find it.YOUR PHONE PREDICTS AN EARTHQUAKE Your phone has more than one way of knowing where you are. (iStock)iPhone: The sneakiest settingApple keeps a “Significant Locations” log buried deep in your settings. It’s meant to make your Maps smarter and improve recommendations, but it’s also a detailed history of where you’ve been.Here’s how to find and clear it:Go to Settings  > Privacy & Security  > Location Services.Scroll to System Services. Tap Significant Locations.Use Face ID or your passcode to unlock it, then review your history.Tap Clear History, and if you don’t want it tracked anymore, toggle it off.While you’re there, review your Location Services list and set apps to While Using or Never. Most don’t need 24/7 access.FORGET SEO: HOW TO GET FOUND BY AI TOOLS IN 2025 On iPhones, there’s a “Significant Locations” log deep in your Settings. (Photo by STR/NurPhoto via Getty Images)Android: Timeline and app permissionsAndroid’s version is called “Timeline,” and it’s tied to your Google account, not just your device. Even if you switch phones, the log follows you unless you turn it off.To see it:Open Google Maps. Tap your profile picture > Your timeline.Hit the three dots > Location & privacy settings.Under Location Settings, toggle off Timeline. You can also Delete all Timeline data.Next, check app permissions:Go to Settings  > Location  > App permissions.Change any “Allow all the time” apps to “Allow only while using” or “Deny.”FOLDABLE PHONES ARE IMPRESSIVE TECHNOLOGICAL MARVELS BUT COME WITH SERIOUS COMPROMISES On Android, Google Maps has a “Timeline” worth disabling if you’re concerned about privacy. (Guillaume Payen/SOPA Images/LightRocket via Getty Images)Pro tip for bothEven with these off, your carrier still knows where you are when your phone is connected to the network. If you really need to go off-grid, you’ll need to power down or use airplane mode.CLICK HERE TO GET THE FOX NEWS APPGet tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio and podcasts: Airing on 500+ stations across the US, search for Komando in your favorite radio or podcast appDaily newsletter: Join 650,000 folks who read the Current (free!) at www.GetKim.comWatch: On YouTube.com/kimkomandoCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Your phone is tracking you even when you think it’s not Read More »