Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

1 air france and klm breach tied to hacker group

Air France and KLM breach tied to hacker group

NEWYou can now listen to Fox News articles!
Air France and KLM are warning customers about a new data breach that hit their customer service platform. Hackers accessed personal details including names, emails, phone numbers, loyalty program information and recent transactions. While no financial details were stolen, experts warn that this information is still a gold mine for cybercriminals.The airlines say they acted quickly to cut off the attackers’ access. They also stressed that their internal networks remain secure.”Air France and KLM detected unusual activity on an external platform we use for customer service,” the companies said in a joint statement. “This activity led to unauthorized access to customer data. Our IT security teams, along with the relevant external party, took immediate action to stop it. We have also put measures in place to prevent it from happening again. Internal Air France and KLM systems were not affected.”Authorities in France and the Netherlands have been notified. Meanwhile, impacted customers are being told to stay alert.”Customers whose data may have been accessed are currently being informed,” the airlines added. “We are advising them to be extra vigilant for suspicious emails or phone calls.”NOTORIOUS HACKER GROUP SETS SIGHTS ON AIRLINE INDUSTRY IN ALARMING SECURITY THREATSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER Air France airliner (Kurt “CyberGuy” Knutsson)

Air France and KLM breach tied to hacker group Read More »

1 apple wins blood oxygen battle for watch owners

Apple wins blood oxygen battle for watch owners

NEWYou can now listen to Fox News articles!
Apple Watch owners in the U.S. just got a big reason to update their devices. Apple just rolled out a redesigned Blood Oxygen feature to specific models, following a recent victory in a legal dispute. This change affects Apple Watch Series 9, Series 10 and Apple Watch Ultra 2 users who have been without the feature due to the ongoing battle.Thanks to a U.S. Customs ruling, these users will soon be able to track their blood oxygen levels again, with a twist.Instead of processing the data directly on the watch, the measurements will now be calculated on the paired iPhone and displayed in the Respiratory section of the Health app.CAN YOUR APPLE WATCH DETECT PREGNANCY?Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER Blood oxygen feature on Apple Watch (Kurt “CyberGuy” Knutsson)

Apple wins blood oxygen battle for watch owners Read More »

1 nearly a million patients hit in davita dialysis ransomware attack intro

Nearly a million patients hit by DaVita dialysis ransomware attack

NEWYou can now listen to Fox News articles!
Healthcare institutions have become a favorite target for bad actors, largely because of how easy they make it for attackers. In June, researchers discovered a healthcare data breach that exposed the personal information of around 8 million patients. All of this information was publicly accessible online without any passwords or authentication protocols.The latest healthcare organization to fall victim to a breach is DaVita, which has put nearly a million people at risk. Headquartered in Denver, Colorado, DaVita provides dialysis treatment to about 200,000 patients across the U.S. and 13 other countries.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERDIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION A healthcare professional working on her laptop  (Kurt “CyberGuy” Knutsson)What you need to know DaVita ransomware attackKidney dialysis giant DaVita says nearly 916,000 people had personal and medical information exposed in an April ransomware attack (via Comparitech). The breach, which the company disclosed in state filings, compromised names, Social Security numbers, dates of birth, health insurance details, medical records, tax ID numbers, addresses and even images of checks made out to the company.DaVita says the incident disrupted internal operations and primarily affected its laboratories. In its latest notice to victims, the company says the cyberattack began March 24, 2025, and continued until April 12. It has not confirmed whether a ransom was paid.Ransomware gang Interlock claimed responsibility on April 25, posting screenshots of alleged stolen documents and saying it took 1.5TB of DaVita’s data. The group lists the company on its public leak site, where it pressures victims by threatening to sell or release stolen files.DaVita is offering eligible breach victims free identity restoration services through Experian, with a Nov. 28 enrollment deadline. The company has not confirmed how attackers gained access to its network or the size of the ransom demand.CyberGuy reached out to DaVita for comment but did not receive a response before publication. A healthcare professional working on a tablet   (Kurt “CyberGuy” Knutsson)Who’s behind the DaVita breachInterlock, which first appeared in October 2024, has claimed responsibility for the DaVita attack and at least 23 other ransomware attacks, plus dozens more that remain unverified. Healthcare targets have included Texas Digestive Specialists, Kettering Health and Naper Grove Vision Care, all of which reported data breaches in 2025.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The DaVita incident is the second-largest U.S. healthcare ransomware attack by number of records this year, behind Frederick Health’s January breach. According to Comparitech, there have been 53 confirmed ransomware attacks on American healthcare providers in 2025 alone, compromising more than 3.2 million patient records. A screen showing a patient’s vitals  (Kurt “CyberGuy” Knutsson)6 ways to protect yourself from DaVita ransomware attackThe DaVita data breach exposed sensitive patient information. If you are affected or just want to stay one step ahead, these actions can help minimize your risk.1. Don’t click on suspicious links or attachments and use strong antivirus softwareThe DaVita data breach likely gives attackers access to your contact details, which they can misuse. Avoid clicking on unexpected emails or messages, even if they look legitimate.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech2. Use a personal data removal serviceSince your personal details were exposed in the DaVita breach, you’re more vulnerable to targeted fraud. Consider using a personal data removal service to scrub your personal details from data broker websites that sell your information.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Use strong, unique passwords for every accountReusing passwords increases your risk. A single leaked password can unlock multiple accounts. Use a password manager to generate and store secure passwords.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords4. Sign up for an identity theft protection serviceDaVita is offering free identity theft and credit monitoring services to those affected by the breach. But even if you weren’t a victim of this specific breach, it’s still smart to protect yourself.Identity theft protection services can alert you to suspicious activity, help you recover if your identity is stolen and often provide tools to freeze or lock your credit. That prevents fraudsters from opening new accounts in your name, and you can lift the freeze temporarily when needed.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft5. Enable two-factor authentication (2FA)Adding a second layer of login protection, like a text message or app-based code via 2FA, can make it much harder for DaVita attackers to access your accounts, even if your password is exposed.6. Monitor your credit and financial accountsKeep an eye out for strange charges or unfamiliar accounts. Set up alerts through your bank and review your credit report regularly to catch fraud early.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayThe investigation into the DaVita breach is ongoing, and the company has not disclosed how the hackers got in. Nearly a million people now face the possibility of their personal information being used for malicious purposes. Ransomware attacks on hospitals and clinics can lock critical systems, delay care and push providers back to paper records. In severe cases, they can force appointment cancellations and patient diversions and potentially endanger lives.Should U.S. law require healthcare organizations to meet stricter cybersecurity standards? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Nearly a million patients hit by DaVita dialysis ransomware attack Read More »

1 humanoid robot turns heads at nyc sneaker store

Humanoid robot turns heads at NYC sneaker store

NEWYou can now listen to Fox News articles!
Think you’ve seen it all in New York City? Shoppers on Fifth Avenue froze when a humanoid robot walked into the Hoka store and tried on sneakers. The sleek Unitree R1 wasn’t just out for a stroll. It starred in a high-profile stunt promoting KraneShares’ new artificial intelligence and robotics ETF.Passersby watched in disbelief as the KOID-branded robot posed for selfies, grabbed a hot dog and browsed the shoe racks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER$5,900 UNITREE R1 ROBOT IS SURPRISINGLY AFFORDABLE Unitree R1 humanoid robot at sneaker store  (KraneShares)From Nasdaq to Fifth AvenueThe KOID robot is built by Chinese robotics firm Unitree, with software from Stanford’s OpenMind. Supplied by Long Island-based RoboStore, the robot had already made headlines earlier in the week by ringing the Nasdaq opening bell.Although it was remote-controlled during this Manhattan stroll, the R1 is fully programmable and already used in research labs and universities. The Hoka sneaker trial was all part of a larger rollout for the KraneShares Global Humanoid and Embodied Intelligence Index ETF, which launched in June and has already pulled in $28 million in investments. Unitree R1 humanoid robot ringing the Nasdaq opening bell  (RoboStore)Why this Unitree humanoid robot mattersHumanoids like the R1 are more than viral photo ops. They represent a shift toward machines that can move, interact and adapt in human environments. The Morgan Stanley Global Humanoid Model predicts there could be 1 billion humanoid robots generating $5 trillion in annual revenue by 2050. That future may seem far away, but moments like this show just how close we might be.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Unitree R1 humanoid robot at sneaker store (KraneShares)What this means for youSeeing a robot casually shopping in Manhattan is a preview of the technology that could be serving customers, assisting in retail or even running errands in the near future. Companies are investing heavily in humanoid robotics, and the line between novelty and necessity is getting thinner. If robots like the Unitree R1 can handle real-world environments today, imagine what they’ll be capable of in a few short years.GET FOX BUSINESS ON THE GO BY CLICKING HERE Unitree R1 humanoid robot out and about in NYC  (RoboStore)Kurt’s key takeawaysA sneaker-shopping robot may sound like a publicity stunt, and it is, but it’s also a snapshot of how AI-powered machines are stepping into everyday life. The big question isn’t if you’ll encounter a humanoid robot in your neighborhood, but when.CLICK HERE TO GET THE FOX NEWS APPWould you feel excited or uneasy if a robot strolled into your favorite store?  Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Humanoid robot turns heads at NYC sneaker store Read More »

1 google confirms data stolen in breach by known hacker group intro

Google confirms data stolen in breach by known hacker group

NEWYou can now listen to Fox News articles!
When a hospital or nonprofit falls victim to a cyberattack, it’s hard to place blame. Cybersecurity isn’t their strength, and many lack the budget for a dedicated security team, let alone a chief technology officer.But when a tech giant like Google experiences a data breach, it raises serious questions. Is data security slipping down the company’s priority list? Or are today’s cybercriminals so advanced that even Google’s top engineers are struggling to keep up?Here’s what happened: Google recently confirmed that hackers stole customer data by breaching one of its internal databases. The breach targeted a system that used Salesforce, a popular cloud-based platform companies use to manage customer relationships, store business contact information and track interactions. The attack has been linked to a known threat group.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERDIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION A Google sign on the side of a building (Kurt “CyberGuy” Knutsson)What you need to know about Google data breachGoogle has confirmed that a hacking group known as ShinyHunters stole customer data from one of its internal Salesforce databases used to manage business client relationships. The company disclosed the breach in a blog post published in early August, noting that the stolen data included “basic and largely publicly available business information, such as business names and contact details.”WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The breach was carried out by ShinyHunters, a well-known cybercriminal group formally tracked as UNC6040. The group has recently been linked to a string of high-profile incidents involving companies such as AT&T, Ticketmaster, Allianz Life and Pandora. In this case, the attackers targeted Google’s corporate Salesforce system, which the company uses to store contact information and notes about small and medium-sized businesses.According to Google’s Threat Intelligence Group, the attackers relied on voice phishing, or “vishing,” impersonating company employees in phone calls to IT support and persuading them to reset login credentials. This technique has proven effective against multiple organizations in recent months. A man using the Google search engine on his laptop   (Kurt “CyberGuy” Knutsson)No company is safe from cyberattacksGoogle did not specify how many customers were affected by the breach. When asked for comment, a company spokesperson pointed CyberGuy back to the blog post and declined to elaborate. It is also unclear whether Google has received any sort of ransom demand from the group.Cisco, Qantas and Pandora have all reported similar breaches in recent months, which now appear to be part of a broader campaign targeting cloud-based customer relationship management tools.In its blog post, Google warned that ShinyHunters may be preparing a public leak site. Ransomware gangs often use this tactic to extort companies, threatening to publish stolen data. The group reportedly shares infrastructure and personnel with other cybercriminal collectives, including The Com, which runs extortion campaigns and has, in some cases, issued threats of physical violence.  Google search engine (Kurt “CyberGuy” Knutsson)9 ways to stay safe from voice phishing and social engineering attacksWhile organizations like Google may be prime targets, individuals are often the weakest link that attackers exploit. But with a few smart practices, you can dramatically reduce your risk.1. Never share login credentials over the phoneThe Google breach happened because employees gave up sensitive information over a phone call. No legitimate IT team will ever ask you to share your password or 2FA codes over the phone. If someone does, it’s a major red flag.2. Always verify who’s callingIf someone claims to be from your company’s IT department or a service provider, hang up and call back using an official number. Never trust the number displayed on caller ID.3. Enable two-factor authentication (2FA)Even if credentials are compromised, two-factor authentication (2FA) can block unauthorized access by adding an extra layer of security. It ensures that a password alone isn’t enough to break into your accounts.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links tooPhishing emails and messages often include links that take you to fake websites designed to steal your login credentials or personal information. These messages usually create a sense of urgency, asking you to verify an account, reset a password or claim a reward. Instead of clicking the link, take a moment to inspect the message.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech5. Use a data removal serviceAttackers are able to carry out phishing, smishing and vishing attacks because your personal data is readily available online. The less of it that’s publicly accessible, the harder it becomes for them to craft convincing scams.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan6. Keep your software and browsers up to dateAttackers often exploit outdated software with known vulnerabilities. Make sure your operating system, browsers, plugins and apps are always running the latest version. Enable auto updates wherever possible to avoid missing critical patches.7. Use a password manager with phishing detectionA good password manager doesn’t just store strong, unique passwords; it can also alert you if you’re on a suspicious site. If your password manager refuses to autofill your login, it could mean the site is fake.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords8. Monitor your accounts for unusual activityIf you suspect a breach, watch your accounts for unauthorized logins, password reset emails or other suspicious behavior. Set up alerts when possible. Many online services offer login notifications or dashboards that show recent access history.9. Report phishing attemptsIf you receive a vishing or phishing attempt, report it to your organization’s IT/security team or the appropriate government agency (like reportfraud.ftc.gov in the U.S.). Reporting helps shut down these scams faster and can protect others.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayWhile the data exposed in Google’s case may be limited, the breach highlights a persistent vulnerability in corporate systems: people. ShinyHunters seems to be getting more effective at exploiting that weakness. What’s even more concerning is the rise of vishing, also known as voice phishing. Vishing isn’t new, but its growing success shows just how fragile even well-defended systems can be when human error is involved.How confident are you in your company’s cybersecurity awareness training? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER Copyright 2025 CyberGuy.com.  All rights reserved.  

Google confirms data stolen in breach by known hacker group Read More »

trump ai executive order

Fox News AI Newsletter: Trump admin unveils groundbreaking tool ‘supercharging’ gov’t efficiency in AI

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Trump admin unveils groundbreaking tool ‘supercharging’ gov’t efficiency to ‘win the race’ for AI dominance- ‘Godfather of AI’ warns machines could soon outthink humans, calls for ‘maternal instincts’ to be built in- Would you eat at a restaurant run by AI? President Donald Trump displays a signed executive order during the “Winning the AI Race” summit hosted by All‑In Podcast and Hill Valley Forum at the Andrew W. Mellon Auditorium on July 23, 2025 in Washington, DC. Trump signed executive orders related to his Artificial Intelligence Action Plan during the event.  (Chip Somodevilla/Getty Images)’TIP OF THE SPEAR’: The Trump administration is announcing the launch of a new tool it says will be instrumental in enabling agencies across the federal government to efficiently implement artificial intelligence at scale and take a major step forward rolling out the president’s “AI Action Plan.”‘MUCH SMARTER’: Geoffrey Hinton, one of the most prominent figures in the world of artificial intelligence, is sounding the alarm that machines could soon outthink humans, and he’s advocating for “maternal instincts” to be built into advanced systems to ensure AI cares for and protects people.ROBOT SOUS CHEF: In the heart of Dubai, just steps from the Burj Khalifa, the future of food is taking shape. A new restaurant called Woohoo plans to serve more than just dinner. It offers a futuristic food experience designed in part by artificial intelligence.  Interior of the Woohoo restaurant driven by AI in Dubai  (Woohoo)TECH REVOLUTION: Three years ago, I said Google was going the way of the dial-up modem. People called me crazy with a capital K. Well, I was spot on. We don’t use the web the same way anymore. DIGITAL DANGER ZONE: Artificial intelligence is no longer just a tool for homework or simple tasks. Today, many teens use AI-powered companions for emotional support, advice and even simulated relationships. These apps simulate conversation in ways that feel deeply personal and, for some teens, deeply real. Carmen AI robot  (University of California San Diego)Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Trump admin unveils groundbreaking tool ‘supercharging’ gov’t efficiency in AI Read More »

1 cigarette butts make roads stronger than ever before

Cigarette butts make roads stronger than ever before

NEWYou can now listen to Fox News articles!
Cigarette butts are the most littered item on the planet. People toss out an estimated 4.5 trillion cigarette butts each year, and that number may double by the end of 2025 as e-cigarette use grows. These small, toxic waste items pollute city streets, beaches and waterways. They also take years to break down.But that may be starting to change. Scientists have developed a way to recycle cigarette butts into asphalt, creating roads that are both stronger and more sustainable. Research teams from the University of Granada in Spain and the University of Bologna in Italy have studied the process closely, highlighting its potential to improve road performance while cutting down on waste.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.OOH LA LAW: FRANCE SNUFFING OUT SMOKING IN PARKS, BEACHES, MORE A littered cigarette butt on an asphalt road   (Kurt “CyberGuy” Knutsson)Why cigarette butts make a good asphalt additiveModern road construction often relies on additives to improve the strength and flexibility of asphalt. Some road-building materials already use cellulose fibers like those found in cigarette filters. That sparked the idea to take used butts, clean them up and put them to work.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?E-cigarette filters are especially promising. They are longer and packed with fibers like cellulose and polylactic acid (PLA) fibers, making them ideal for reinforcing asphalt.  Person holding cigarette butt in hand    (Kurt “CyberGuy” Knutsson)How cigarette butts are recycled into road materialThe recycling process involves several steps:1. Collecting and sorting: Filters from traditional and e-cigarettes go through a collection and cleaning process. Ash and residue are removed, leaving behind usable fiber material.2. Shredding and mixing: Machines shred the cleaned fibers and combine them with synthetic hydrocarbon wax, which serves as a binder.3. Pellet formation: The blended material is pressed, heated and cut into small pellets that can be easily stored and transported.4. Asphalt integration: These pellets are added to reclaimed asphalt and bitumen. During heating, the pellets melt and release reinforcing fibers that strengthen the final asphalt mix.Up to 40% of the final road material can come from these recycled components.GET FOX BUSINESS ON THE GO BY CLICKING HEREStronger roads and a cleaner planet thanks to cigarette butt recycling Recycled cigarette butts make asphalt stronger, more flexible and longer-lasting. The fibers released during mixing act as micro reinforcement, improving fatigue resistance and helping roads withstand heavy traffic and temperature changes. The wax in the pellets lowers the temperature needed to mix asphalt, reducing both energy use and emissions during production. Beyond performance, this method gives cigarette waste a second life. By repurposing billions of discarded filters, cities can reduce litter and pollution while building more sustainable infrastructure. Illustration of a traditional roadway surface (Kurt “CyberGuy” Knutsson)What cities are doing next with recycled cigarette butts This technique is still emerging, but interest is growing worldwide. In Bratislava, Slovakia, city officials have already started collecting cigarette butts specifically for road construction. One road built with this recycled asphalt is already in use, setting an example for other cities to follow.As more pilot projects roll out and awareness spreads, cigarette butts could shift from toxic litter to a valuable resource in sustainable infrastructure.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayRecycling cigarette butts into asphalt solves two problems at once. It clears toxic waste from public spaces and makes roads that last longer. This approach turns one of the world’s most common pollutants into a valuable construction material. As more cities explore cleaner, smarter infrastructure, this kind of solution could play a big role in the future of street design.Would you support roads built with recycled cigarette butts in your city?  Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Cigarette butts make roads stronger than ever before Read More »

1 google ai email summaries can be hacked to hide phishing attacks intro

Google AI email summaries can be hacked to hide phishing attacks

NEWYou can now listen to Fox News articles!
Artificial intelligence is everywhere these days — in your phone, your car, even your washing machine. I saw one just the other day featuring built-in AI. And while that might sound a little over the top, there’s no denying that artificial intelligence has made life easier in a lot of ways.From boosting productivity to unlocking new creative tools, it’s changing how we work and live. The most common version you’ve probably encountered? Generative AI, think chatbots like ChatGPT. But as helpful as this tech can be, it’s not without its problems.If you’ve used Google’s Workspace suite, you may have noticed the company’s AI model, Gemini, integrated across apps like Docs, Sheets and Gmail. Now, researchers say attackers can manipulate Gemini-generated email summaries to sneak in hidden phishing prompts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS Google Gemini app on a mobile device  (Kurt “CyberGuy” Knutsson)How Gemini summaries can be hackedResearchers at Mozilla’s 0Din have discovered a vulnerability in Google’s Gemini for Workspace that allows attackers to inject hidden instructions into email summaries. The issue, demonstrated by Marco Figueroa, shows how generative AI tools can be misled through indirect prompt injection. This technique embeds invisible commands inside the body of an email. When Gemini summarizes the message, it interprets and acts on those hidden prompts.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The attack does not rely on suspicious links or attachments. Instead, it uses a combination of HTML and CSS to conceal the prompt by setting the font size to zero and the color to white. These commands remain invisible in Gmail’s standard view but are still accessible to Gemini. Once you request a summary, the AI can be tricked into presenting fake security alerts or urgent instructions that appear to come from Google.In a proof of concept, Gemini falsely warned a user that a Gmail password had been compromised and included a fake support phone number. Since Gemini summaries are integrated into Google Workspace, you are more likely to trust the information, making this tactic especially effective. A Google sign on a building   (Kurt “CyberGuy” Knutsson)What is Google doing about the flaw?While Google has implemented defenses against prompt injection since 2024, this method appears to bypass current protections. The company told CyberGuy it is actively deploying updated safeguards.GET FOX BUSINESS ON THE GO BY CLICKING HEREIn a statement, a Google spokesperson said, “Defending against attacks impacting the industry, like prompt injections, has been a continued priority for us, and we’ve deployed numerous strong defenses to keep users safe, including safeguards to prevent harmful or misleading responses. We are constantly hardening our already robust defenses through red-teaming exercises that train our models to defend against these types of adversarial attacks.”Google also confirmed that it has not observed active exploitation of this specific technique. Google Gemini app on the home screen of a mobile device    (Kurt “CyberGuy” Knutsson)6 ways you can stay safe from AI phishing scamsSo, how can you protect yourself from phishing scams that exploit AI tools like Gemini? Here are six essential steps you can take right now to stay safe:1. Do not blindly trust AI-generated contentJust because a summary appears in Gmail or Docs does not mean it is automatically safe. Treat AI-generated suggestions, alerts or links with the same caution you would any unsolicited message. Always verify critical information, such as security alerts or phone numbers, through official sources.2. Avoid using summary features for suspicious emailsIf an email seems unusual, especially if it is unexpected or from someone you do not recognize, avoid using the AI summary feature. Instead, read the full email as it was originally written. This lowers the chance of falling for misleading summaries.3. Beware of phishing emails and messagesWatch for emails or messages that create a sense of urgency, ask you to verify account details or provide unexpected links or contact information, even if they appear trustworthy or come from familiar sources. Attackers can use AI to craft realistic-looking alerts or requests for sensitive information, sometimes concealed within automatically generated summaries. So, always pause and scrutinize suspicious prompts before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech 4. Keep your apps and extensions updatedEnsure that Google Workspace and your browser are always running the latest version. Google regularly releases security updates that help prevent newer types of attacks. Also, avoid using unofficial extensions that have access to your Gmail or Docs.5. Invest in a data removal serviceAI-driven scams like the Gemini summary attack don’t happen in a vacuum. They often begin with stolen personal information. That data might come from past breaches, public records or details you’ve unknowingly shared online. A data removal service can help by continuously scanning and requesting the removal of your information from data broker sites. While no service can wipe everything, reducing your digital footprint makes it harder for attackers to personalize phishing attempts or link you to known breach data. Think of it as one more layer of protection in a world where AI makes targeted scams even easier.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan6. Disable AI summaries for now if you’re concernedIf you’re worried about falling for an AI-generated phishing attempt, consider disabling Gemini summaries in Gmail until Google rolls out stronger protections. You can still read full emails the traditional way, which can lower your risk of being misled by manipulated summaries.How to disable Gemini features on desktopOpen Gmail on desktop.Click the Settings gear icon in the upper right.Click See all settings.Scroll to “Google Workspace smart features” and click Manage Workspace smart feature settings.Disable the toggle for Smart features in Google Workspace.Then, click Save.Note: This will turn off Gemini summaries as well as other smart features.How to disable Gemini features on mobileOn iPhone:If you use the Gemini mobile app specifically:Open the Gemini app.Tap your Profile picture.Tap Gemini Apps Activity.At the top, tap Turn off.On Android:Settings may vary depending on your Android phone’s manufacturerOpen the Gmail app on your Android.Tap the Menu icon (three horizontal lines) in the upper left corner.Scroll down and tap Settings.Select the relevant email account.Scroll down and tap Google Workspace smart features and uncheck the box to turn them off.Key caveats to know:Disabling Smart Features may remove other convenient functionalities, such as predictive text and automatic appointment detection.The Gemini icon or summary buttons may still appear, even after disabling these features. Some users report having to physically hide them via browser tools.There is no centralized single “off switch” to completely remove all Gemini AI references everywhere, but these steps significantly reduce the feature’s presence and risk.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayThis vulnerability highlights how phishing tactics are evolving alongside AI. Instead of relying on visible red flags like misspelled URLs or suspicious attachments, attackers are now targeting trusted systems that help users filter and interpret messages. As AI becomes more deeply embedded in productivity tools, prompt injection could emerge as a subtle but powerful vector for social engineering, hiding malicious intent in the very tools designed to simplify communication.How comfortable are you letting AI summarize or filter your emails, and where do you draw the line? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER Copyright 2025 CyberGuy.com.  All rights reserved.  

Google AI email summaries can be hacked to hide phishing attacks Read More »

1 would you eat at a restaurant run by ai

Would you eat at a restaurant run by AI?

NEWYou can now listen to Fox News articles!
In the heart of Dubai, just steps from the Burj Khalifa, the future of food is taking shape. A new restaurant called Woohoo plans to serve more than just dinner. It offers a futuristic food experience designed in part by artificial intelligence. Opening in September, Woohoo calls itself “dining in the future.” But what does that actually mean?Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERFOX NEWS AI NEWSLETTER: MIKE ROWE’S PREDICTION ON AMERICAN JOBS The Woohoo restaurant driven by AI in Dubai (Woohoo)How Chef Aiman powers Dubai’s AI-driven restaurant menuAt Woohoo, your waiter might be human, but the creative mind behind your dish is not. That job belongs to Chef Aiman, a large language model trained on food science, global culinary traditions and molecular gastronomy. The name Aiman blends “AI” and “man,” reflecting the partnership between technology and human creativity. Aiman doesn’t taste or smell. Instead, it analyzes ingredients by texture, acidity, umami and dozens of other variables to invent dishes that push boundaries.Woohoo offers rotating menus that fuse global cuisines, designed entirely by this AI chef. Expect bold flavors, artistic presentation and creative combinations you won’t find anywhere else. Each visit brings something new, exciting and full of surprises. However, Woohoo goes far beyond the plate.GET FOX BUSINESS ON THE GO BY CLICKING HEREUnlike a typical restaurant, it uses artificial intelligence to shape your entire dining journey. From the lighting and sound to the pace of service and flow of the meal, every detail is curated by AI. The goal is to create a multi-sensory experience that feels futuristic but still personal. While the dishes challenge tradition, the atmosphere adapts to create a mood that feels just right, every time. Then comes the human touch. Interior of the Woohoo restaurant driven by AI in Dubai  (Woohoo)Why human chefs still play a key role at WoohooWhile Chef Aiman designs the initial recipes, Dubai-based chef Reif Othman and his kitchen team take charge of refining each dish. They taste, adjust and perfect the AI-created ideas to ensure the flavors and presentation meet high culinary standards. This collaboration blends the precision and innovation of AI with the experience and intuition of skilled chefs. Rather than replacing human creativity, Chef Aiman enhances it by opening new possibilities and inspiring chefs to explore unique flavor combinations. WHAT IS ARTIFICIAL INTELLIGENCE (AI)?How Woohoo uses AI to cut kitchen waste and boost sustainabilityChef Aiman is trained to reuse ingredients many kitchens throw away, like fat and trimmings. These otherwise discarded components become key ingredients in entirely new dishes. Ahmet Oytun Cakir, one of the founders and the CEO of Gastronaut, says this feature could help reduce kitchen waste worldwide. Eventually, the hope is to license Chef Aiman to restaurants around the globe. nterior of the Woohoo restaurant driven by AI in Dubai (Woohoo)What this means for youIf you’re planning a trip to Dubai, Woohoo offers more than a photo-worthy meal. It’s a chance to taste what happens when artificial intelligence and culinary artistry work hand in hand. Beyond the dining room, this experiment has bigger implications. AI could help chefs everywhere become more sustainable, more creative and more efficient without losing the human touch that makes food special.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysWoohoo isn’t just another flashy concept. It’s part of a bigger shift in how we think about food, tech and creativity. AI isn’t taking over the kitchen. It’s teaming up with real chefs to spark new ideas and reduce waste. Whether you’re a foodie looking for something new, a tech geek chasing the next innovation or just curious about what’s next, Woohoo gives you a front-row seat to the future of dining. And, yes, you can taste it.Would you trust an AI to design your next fine dining experience, or should some things stay purely human? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

Would you eat at a restaurant run by AI? Read More »

1 159 year old company embraces driverless trucks

159-year-old company embraces driverless trucks

NEWYou can now listen to Fox News articles!
A bold new pilot program is bringing autonomous trucking to the heart of Texas. Steves & Sons, a sixth-generation American door maker, just partnered with autonomous freight startup Bot Auto and logistics giant J.B. Hunt. The goal? Launch a real-world test of driverless freight deliveries between San Antonio, Dallas and Houston. That means robots are about to hit some of the country’s busiest shipping lanes, with doors in tow.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER HAWLEY URGES DOJ PROBE OF CHINESE TRUCKING COMPANY Bot Auto is running disengagement-free routes in Houston, Texas  (Bot Auto)Steves & Sons partners with Bot Auto for driverless freightFor over 150 years, Steves & Sons has delivered high-quality millwork to builders and homeowners. Now, it’s making history again, this time by modernizing the supply chain. The pilot will use Bot Auto’s driverless trucks to carry freight between manufacturing plants and customers. These are not fantasy test runs. These are real orders, real deliveries and real stakes. J.B. Hunt, which already manages logistics for Steves & Sons, will oversee how autonomous freight fits into their broader transportation system.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Bot Auto is running disengagement-free routes in Houston, Texas (Bot Auto)Why autonomous trucking in Texas could reshape freightMore than 70% of U.S. freight moves by truck. Rising costs, driver shortages and tight delivery windows all add pressure. Bot Auto claims its technology can do more than keep up; it can outperform. Its Level 4 autonomy doesn’t need a driver in the cab. That means longer hauls, fewer delays and potentially lower costs. The big takeaway? Autonomy is moving from hype to hardware.GET FOX BUSINESS ON THE GO BY CLICKING HERE Bot Auto is running disengagement-free routes in Houston, Texas (Bot Auto)What this means for youIf you’re in manufacturing, retail or logistics, this pilot is a sign of things to come. Autonomous trucking could soon reduce shipping costs, shrink delivery windows and reshape how supply chains are built. And for consumers? It might mean faster delivery of big-ticket items like doors, furniture or appliances. Steves & Sons is betting that smart logistics will make it even more competitive and more sustainable.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThis move marks more than a tech test; it’s a signal. Steves & Sons, J.B. Hunt and Bot Auto are rethinking what freight delivery can be. They’re putting automation to work in a high-volume, real-world setting that could serve as a model nationwide. Autonomous trucking still has hurdles to clear, including regulation, safety and public trust. But this Texas pilot could be one of the first true benchmarks of commercial viability.Would you trust an autonomous truck to deliver your next major purchase or share the highway with one? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.  

159-year-old company embraces driverless trucks Read More »