Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

amazon warehouse deliveries

Fox News AI Newsletter: AI job losses hit hard

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Amazon to cut around 14K corporate jobs- Senate Republican demands Google shut down AI model over false rape allegation- Leading AI company to ban kids from chatbots after lawsuit blames app for child’s deathCORPORATE CUTBACKS: Amazon is planning to cut 14,000 roles from its corporate workforce as part of an internal restructuring, according to a message shared with employees on Tuesday. FILE PHOTO: Workers move products during Cyber Monday at the Amazon’s fulfillment center in Robbinsville, New Jersey, Nov. 27, 2023.  (REUTERS/Mike Segar/File Photo)AI LIES EXPOSED: A Senate Republican accused Google and its AI of targeting conservatives with false allegations and fake news stories, including allegations of a sexual assault that never happened.CHATBOT CRACKDOWN: Popular artificial intelligence (AI) chatbot platform Character.ai, widely used for role-playing and creative storytelling with virtual characters, announced Wednesday that users under 18 will no longer be able to engage in open-ended conversations with its virtual companions starting Nov. 24.AI PROOF: There is growing concern among today’s workforce that they will be swiftly replaced by artificial intelligence as the technology, which has touched nearly every corner of the economy, continues to advance. But experts argue that the adoption of the technology won’t be the same across all industries, meaning not every job will be impacted the same way, according to the World Economic Forum. To better characterize the situation, the organization likened AI to a college student who had access to all the old exams and study guides.REAL WORLD ROADS: A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100. Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)DIGITAL DANGER: Heartbroken parents are demanding justice after artificial intelligence (AI) “companion” chatbots allegedly groomed, manipulated and encouraged their children to take their own lives — prompting bipartisan outrage in Congress and a new bill that could potentially hold big tech accountable for minors’ safety on their platforms.EXPANDING REACH: Chip giant Nvidia on Tuesday announced new partnerships with tech and telecommunications companies in efforts to advance artificial intelligence (AI)infrastructure and operationalize AI capabilities.RACE TO WIN: PayPal on Tuesday became the first payments platform to embed its digital wallet into OpenAI’s ChatGPT. Shares of the San Jose, California-based company climbed in Tuesday morning trading after the company announced that it is going to adopt the Agentic Commerce Protocol (ACP) to expand payments and commerce in ChatGPT, allowing ChatGPT users to be able to check out instantly using PayPal. DEFAMATION SUIT: Conservative activist Robby Starbuck is suing Google after the tech giant’s AI tools allegedly linked him to false accusations of sexual assault, child rape and financial exploitation, among others.DIGITAL DECEPTION: Artificial intelligence is helping workers create fake expense receipts, according to a recent report. A slew of AI-generated receipts have been submitted to employers thanks to new image generation models from companies like Google and OpenAI, the Financial Times reported.TECH SHAKE-UP: Chegg Inc., a Santa Clara-based online learning platform, said Monday it will cut about 45% of its workforce – roughly 388 employees – as it confronts what it calls “the new realities of AI and reduced traffic from Google to content publishers.”GONE GROK: Elon Musk’s artificial intelligence company, xAI, launched its early version of Grokipedia Monday, which is said to be an AI-generated encyclopedia to compete with Wikipedia. The billionaire Tesla founder, who has long criticized Wikipedia for what he calls “editorial bias,” previously described Grokipedia as a more “truthful and independent alternative.”  lon Musk attends the Viva Technology conference dedicated to innovation and startups at the Porte de Versailles exhibition center on June 16, 2023, in Paris. (Chesnot/Getty Images)PROGRAMMING HOPE: Artificial intelligence is stepping into the fight against cancer — and, according to Fox News senior medical analyst Dr. Marc Siegel, it could be a game-changer. On the Monday episode of “Fox & Friends,” Siegel said AI is already transforming the way doctors detect and treat cancer, and could lead to real cures within the next decade.EYES ON YOU: Your phone is full of photos you’ve never posted, moments you meant to share but never got around to. That’s exactly what Facebook wants to change. It now uses Meta AI to spot hidden gems in your camera roll, polish them, and create simple collages you can share. You take the pictures, and Facebook helps turn them into easy, ready-to-share memories. No design skills required.DIGITAL DOMINANCE: The United States must win the global race for AI domination against China. Our success depends on thriving innovation and robust investment – two integral pieces of our national battle plan. But the third component of victory can’t be overlooked: The U.S. urgently needs even better internet infrastructure. If we don’t extend our advantage in 21st-century connectivity, we will lose the fight for global AI leadership.SECURITY SLIP: Police officers swarmed a 16-year-old high school student last week after an artificial intelligence (AI) gun detection system mistakenly flagged his bag of chips as a firearm, leaving officials and students shaken. Student Taki Allen was waiting for his ride at Kenwood High School in Essex, Maryland, last Monday when he placed an empty bag of chips in his pocket, according to WMAR-2 News. Moments later, police officers suddenly surrounded him, ordering him to the ground and handcuffing him, the local station reported. FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: AI job losses hit hard Read More »

2 MICROSOFT LAPTOP

Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

NEWYou can now listen to Fox News articles!
Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWAREWhy are unsupported systems dangerousUnsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.The “just one more year” trapMany people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading. Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERSThe hidden costs of waiting to upgrade to Windows 11It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files, or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.How to stay safe from unsupported Windows 10 security risksYou can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes, but make a major difference in your security.1) Upgrade your system to Windows 11HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELYStart by checking if your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.2) Watch out for phishing scams and install strong antivirus softwareBe cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.3) Use a data removal serviceHOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICESUse a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com4) Secure your loginsStrong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELYNext, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)Check out the best expert-reviewed password managers of 2025 at Cyberguy.com5) Back up your data regularlyThink of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.6) Stay informed and proactiveCyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysUnsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide Read More »

nike project amplify 1

Nike partners with robotics company to create world’s first motor-powered footwear system

NEWYou can now listen to Fox News articles!
Nike has taken a bold step into the future with Project Amplify, the world’s first motor-powered footwear system made for people who love to move. Created with robotics partner Dephy, the design combines a carbon-plated running shoe with a motorized cuff and drive belt that add a gentle push to every stride.Unlike performance tech built for pros, Project Amplify is designed for everyday movers such as runners, walkers and commuters. It helps anyone who wants to go a little faster and a little farther with less effort. Think of it like the running world’s version of an e-bike. It makes movement simpler, smoother and more fun for everyone.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.SKECHERS’ AIRTAG SHOES LET YOU TRACK YOUR KIDS’ STEPSHow Project Amplify worksAt the center of Project Amplify is a small but powerful motor. It connects to a rechargeable cuff that wraps comfortably around your calf. The cuff links to a carbon plate inside the shoe. Together, they provide natural assistance with each step. Nike’s Project Amplify pairs sleek design with advanced robotics to help every step feel lighter and smoother. (Nike)Testing in the Nike Sport Research Lab has been extensive. More than 400 athletes have taken over 2.4 million steps during trials. According to testers, the system makes uphill running feel like flat ground. Some even said it helped them go from a 12-minute mile to a 10-minute mile with less effort.NIKE IS NOW ON AMAZON: SHOP WALKING SHOES, JOGGERS, SOCKS AND SHORTS TODAYBecause of this, Nike says Project Amplify isn’t about competition. The company’s focus is on making movement easier and more approachable for a wider range of people. Whether someone is new to running or wants to fit more walking into daily life, the technology is designed to offer gentle support without taking over the effort.Innovation made accessibleNike’s VP of Emerging Sport and Innovation Michael Donaghu described the idea behind Project Amplify as this, “What if we could help athletes move faster and farther with less energy and a lot more fun?”HUMANOID ROBOT TURNS HEADS AT NYC SNEAKER STOREThat question inspired years of research and collaboration between Nike and Dephy. Together, they combined robotics, biomechanics and motion algorithms to create a powered shoe that feels natural to wear.Like e-bikes transformed cycling, Project Amplify could do the same for running and walking. It aims to help people stay active more often and enjoy movement in new ways. Through this approach, Nike is showing how innovation can make fitness more accessible to everyone. Early testing shows the powered cuff and drive system give runners steady support on every stride. (Nike)What this means for youAFFORDABLE 3D-PRINTED BIONIC ARM USES MUSCLE SIGNALS TO MOVEImagine finishing a run with energy to spare. Picture walking an extra mile without feeling tired. Project Amplify makes that possible. Its gentle mechanical assist feels like an extra set of calf muscles that supports your natural stride.For casual runners, this means more miles with less strain. For commuters, it could make daily travel faster and more efficient. Overall, it gives you the power to enjoy movement again. The goal is not to do less. The goal is to get more from every step.Take my quiz: How safe is your online security?NEW EXOSKELETON BUILT TO BOOST ENDURANCE AND CUT FATIGUEThink your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysWith Project Amplify, Nike is blending art, science and sport to change how movement feels. This new technology aims to enhance natural motion rather than replace it. As testing moves forward, one thing is clear: Project Amplify could completely change how we think about running, walking and human performance. As Nike refines Project Amplify, the focus remains on making movement easier, more natural, and more enjoyable for everyone. (iStock)CLICK HERE TO DOWNLOAD THE FOX NEWS APPIf powered shoes could make running and walking easier, would you try them or stick with pure muscle power? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Nike partners with robotics company to create world’s first motor-powered footwear system Read More »

1 employee screening data breach exposes 3.3 million records

183 million email passwords leaked: Check yours now

NEWYou can now listen to Fox News articles!
A massive online leak has exposed more than 183 million stolen email passwords gathered from years of malware infections, phishing campaigns and older data breaches. Cybersecurity experts say it is one of the largest compilations of stolen credentials ever discovered.Security researcher Troy Hunt, who runs the website Have I Been Pwned, found the 3.5-terabyte dataset online. The credentials came from infostealer malware and credential stuffing lists. This malware secretly collects usernames, passwords and website logins from infected devices.Researchers say the data contains both old and newly discovered credentials. Hunt confirmed that 91% of the data had appeared in previous breaches, but about 16.4 million email addresses were completely new to any known dataset.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT Cyber experts uncovered a 3.5-terabyte data dump containing millions of stolen logins. (Kurt “CyberGuy” Knutsson)The real risk behind the password leakThe leak puts millions of users at risk. Hackers often collect stolen logins from multiple sources and combine them into large databases that circulate on dark web forums, Telegram channels and Discord servers.If you have reused passwords across multiple sites, attackers can use this data to break into your accounts through credential stuffing. This method tests stolen username and password pairs on many different platforms.The risk remains real for anyone using old or repeated credentials. One compromised password can unlock social media, banking and cloud accounts.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices.   (Jens Büttner/picture alliance via Getty Images)Google responds to the reportsGoogle confirmed there was no Gmail data breach. In a post on X, the company stated “reports of a Gmail security breach impacting millions of users are false. Gmail’s defenses are strong, and users remain protected.”Google clarified that the leak came from infostealer databases that compile years of stolen credentials from across the web. These databases are often mistaken for new breaches when, in fact, they represent ongoing theft activity. Troy Hunt also confirmed the dataset originated from Synthient’s collection of infostealer logs, not from a single platform or recent attack. While no new breach occurred, experts warn that leaked credentials remain dangerous because cybercriminals reuse them for future attacks.How to check if you were exposedTo see if your email was affected, visit Have I Been Pwned. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the Synthient leak.Many password managers also include built-in breach scanners that use the same data sources. However, they may not yet include this new collection until their databases update.If your address shows up, treat it as compromised. Change your passwords immediately and turn on stronger security features to protect your accounts.COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE The 183 million exposed credentials came from malware, phishing and old data breaches. (Kurt “CyberGuy” Knutsson)9 steps to protect yourself nowProtecting your online life starts with consistent action. Each step below adds another layer of defense against hackers, malware and credential theft.1) Change your passwords immediatelyStart with your most important accounts, such as email and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. Never reuse passwords. One stolen password can unlock multiple accounts. Each login should be unique to protect your data.A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed.Next, check whether your email has been caught in a recent credential leak. Our No. 1 password manager pick includes a built-in Breach Scanner that searches trusted databases, including the newly added Synthient data from Have I Been Pwned. It helps you find out if your email or passwords have appeared in any known leaks. If you see a match, change any reused passwords right away and secure those accounts with strong, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.2) Enable two-factor authentication (2FA)Turn on 2FA wherever possible. It adds a powerful second layer of defense that blocks intruders even if they have your password. You will receive a code by text, app or security key. That code ensures only you can log in to your accounts.3) Use an identity theft service for continuous monitoringIdentity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. It’s a smart way to stay one step ahead of hackers.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.4) Protect your devices with strong antivirus software Infostealer malware hides inside fake downloads and phishing attachments. A strong antivirus software scans your devices to stop threats before they spread. Keep your antivirus updated and run frequent scans. Even one unprotected device can put your whole digital life at risk.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Avoid saving logins in your web browserBrowsers are convenient but risky. Infostealer malware often targets saved passwords in your web browser. 6) Keep software updatedUpdates fix security flaws that hackers exploit. Turn on automatic updates for your operating system, antivirus and apps. Staying current keeps threats out. 7) Download only from trusted sourcesAvoid unknown websites that offer free downloads. Fake apps and files often contain hidden malware. Use official app stores or verified company websites. 8) Review your account activity oftenCheck your accounts regularly for unusual logins or device connections. Many platforms show a login history. If something looks off, change your password and enable 2FA immediately.9) Consider a personal data removal serviceThe massive leak of 183 million credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites.While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThis leak highlights the ongoing danger of malware and password reuse. Prevention remains the best defense. Use unique passwords, enable 2FA and stay alert to keep your data safe. Visit Have I Been Pwned today to check your email and take action. The faster you respond, the better you protect your identity.Have you ever discovered your data in a breach? What did you do next? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   Copyright 2025 CyberGuy.com.  All rights reserved.

183 million email passwords leaked: Check yours now Read More »

2 What to do and not do when it comes to charging your phone iphone charger

5 hidden battery drainers you can fix right now

NEWYou can now listen to Fox News articles!
You plug in your phone overnight, but by lunchtime, it’s already gasping for charge. Sound familiar? Hidden background features, sneaky settings and apps you forgot existed can quietly drain your battery faster than you think. The good news is a few quick tweaks can help your device stay powered all day, without sacrificing performance or convenience.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.1) Turn off background app refreshStop apps from sipping power when you’re not using them. Even when you’re not actively scrolling or tapping, many apps continue running in the background, fetching updates, refreshing data and sending notifications. It’s convenient, but it drains your battery faster than you realize.For iPhone Go to Settings.Tap General.Click Background App Refresh.Tap Background App Refresh again.Select Off, or choose Wi-Fi to limit data use and battery drain.You can also toggle off refresh for individual apps if you still want certain ones to run.WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE Stop background apps from quietly draining your battery. (Kurt “CyberGuy” Knutsson)For Android Settings may vary depending on your Android phone’s manufacturer. Open Settings.Tap Battery (or Battery & device care, Power management, or similar).Select Background usage limits, App battery management, or Battery optimization, wording depends on your device.Choose the apps you rarely use, then set them to Restricted, Optimized, or Put unused apps to sleep.To let Android manage this automatically, turn on Adaptive Battery (found under Settings › Battery › Adaptive Battery).Pro tip: Keep essential apps, such as messaging, navigation, or weather, active so they can update in real time. Restricting background activity for apps you don’t open often can extend battery life by several hours a day.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE Turn off background refresh to stop unused apps from quietly draining your battery. (Kurt Knutsson)2) Disable Always-in DisplayThat sleek clock on your screen might look cool, but it’s constantly using power. Always-On Display keeps your screen partially lit, even when you’re not touching it, to show time, notifications or widgets. Over time, that adds up, especially overnight.For iPhone (14 Pro and later)Go to Settings.Tap Display & Brightness.Click Always On Display.Toggle Off next to Always On Display to stop your phone from lighting up when locked.For AndroidSettings may vary depending on your Android phone’s manufacturer. Open Settings.Tap Lock screen (sometimes labeled “Lock screen & security”, “Lock screen & AOD”, “Display & lock screen”, etc.).Look for Always On Display (AOD) (or similar, such as “Always show time & info”, “Ambient display”, “Screen always on when locked”).Toggle Off to disable the AOD entirely, or choose an alternative mode (for example: “Tap to show” / “Show on tap” so the AOD only appears when you tap the screen) if available.(Optional) Some devices allow scheduling of AOD or limiting it to when notifications are present. If you want more control, explore the sub-options under the AOD setting.Turning off Always-On Display can extend standby battery life by up to 10-15%.YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT Turn off Always-On Display to save more power each day.  (SeongJoon Cho/Bloomberg via Getty Images)3) Limit location accessGPS is one of the biggest hidden battery drains. Apps that track your location in the background, from ride-sharing to retail, can quietly sap your phone’s power even when you’re not using them. Adjusting permissions keeps your phone secure and efficient.For iPhone Go to Settings.Tap Privacy & Security.Click Location Services.Tap each app individually and change Always to While Using the App or Never.Now, scroll to the bottom and tap System Services.Tap Significant Locations, then toggle it Off to stop your iPhone from storing detailed location and travel history. (You can also tap “Clear History” here to erase past entries.)For Android Settings may vary depending on your Android phone’s manufacturer.Open Settings.Tap Location (or sometimes Privacy & Security → Location).Tap App permissions (or App location permissions, Location permissions for apps).Select an app, then choose the appropriate permission, such as “Allow only while using the app” (or “Allow only when in use”) or “Don’t allow” (or “Deny”).On the same screen (for that app), you may see a toggle for “Use precise location”. If the app doesn’t need GPS accuracy, toggle Off to let it use only an approximate location.Apps like Maps and Weather need access, but most don’t. Tightening this setting not only boosts battery life, but it also improves your privacy by limiting background tracking.Pro tip: Leaving essential features like Find My iPhone or Emergency Calls & SOS enabled under System Services ensures your phone can still help locate or protect you if it’s lost, even with other location options turned off.CLICK HERE TO GET THE FOX NEWS APP Limit location tracking to protect privacy and extend battery life. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)4) Turn off Raise to Wake and Tap to WakeEver notice your screen lighting up when you simply pick up your phone? Those quick flashes add up. Every time your display activates — even for a second, it consumes battery power. Turning off these motion-activated features can reduce unnecessary screen wake-ups.For iPhoneGo to Settings.Tap Display & Brightness.Turn off Raise to Wake.For Android Settings may vary depending on your Android phone’s manufacturer.Open Settings.Tap Display (or Lock screen & security, or Advanced features, depending on your device).Look for Lift/ Raise to wake, Tap to wake, or Double tap to wake (sometimes found under Gestures or Motion settings).Turn off “Lift/Raise to wake” and “Tap/Double tap to wake” (or choose to disable whichever is active).If you want a simpler way to wake your phone only when you intend to, rely on the power-button wake (which is the default on nearly all phones).5) Review battery usage and spot the culpritsIf your phone is dying faster than usual, the Battery Usage tool can reveal the exact cause. You’ll see which apps are using the most power, both on screen and in the background, so you can take action.For iPhoneGo to Settings.Tap Battery.Scroll to view the battery usage graph and list of apps and system processes that are using power.Look for any highlighted items (indicating unusually high usage).Tap an app or process to view more details about its usage and background activity.If you notice an app draining power in the background on an ongoing basis, consider limiting its background activity or uninstalling it if it’s not needed.For Android Settings may vary depending on your Android phone’s manufacturer.Open Settings.Tap Battery (or Battery & device care, Power & battery, depending on your device).Tap Battery usage or Battery usage by app (or similar).Look through the list of apps and sort or filter by App usage or Screen time, if available, to identify top battery consumers.Tap a high-drain app, then choose something like Restrict background usage, Optimize, or Disallow background activity (depending on the options your phone offers).Common battery-draining culprits include social media apps, streaming apps, location-based apps and apps with heavy background update behavior. Reviewing this every few weeks can help catch new drains early. Bonus: Check your battery healthIf your phone still drains quickly after these fixes, your battery might be aging. Both iPhones and Android devices offer built-in diagnostics to check battery health and capacity.For iPhoneGo to Settings.Tap Battery.Tap Battery Health & Charging (on some older versions, it may simply be “Battery Health”).On the Battery Health screen, look at the Maximum Capacity percentage. This tells you how the battery’s current capacity compares to when it was new.If the percentage is well below ~80%, it may be a good time to replace the battery to restore performance and capacity. (Apple notes that batteries are designed to retain around 80 % of their original capacity at 500 full charge cycles under ideal conditions.)For AndroidSettings may vary depending on your Android phone’s manufacturer.Go to Settings.Tap Battery (or “Battery & device care”, “Power & battery”, depending on your phone).Look for an option called Battery health, Battery capacity, Battery status or Battery Information. Note: this may not appear on all phones.If the built-in health indicator isn’t available, you can open the hidden test menu by dialing *#*#4636#*#* in the Phone app. If “Battery information” appears, you may see stats such as health, capacity, or cycle count.If your battery health or capacity is shown as “Reduced” or significantly lower than expected, consider replacing the battery for better performance and longevity.Replacing an aging battery can dramatically improve performance and lifespan, often more than any software tweak.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysWith a few quick tweaks, your phone can finally keep up with you all day. Adjusting settings, limiting background activity and checking battery health really do make a difference. You’ll spend less time stressing about a low battery and more time actually using your phone. Stay proactive, and your device will stay powered when you need it most.Got a tip you’d like to share, and/or what other everyday tech challenges would you like help solving? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

5 hidden battery drainers you can fix right now Read More »

kodiak autonomous truck safety

AI truck system matches top human drivers in massive safety showdown with perfect scores

NEWYou can now listen to Fox News articles!
A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100.The Kodiak Driver earned a remarkable score of 98. That result placed it beside the safest human fleets in Nauto’s global network. The findings sparked discussion across the trucking industry and raised new questions about the role of automation in freight transport.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027? The Kodiak Driver, an autonomous trucking system powered by AI, earned a top VERA Score of 98 in a new safety evaluation. (Kodiak)Kodiak Driver’s autonomous truck safety evaluation resultsKodiak’s VERA Score of 98 matched the highest rating among all fleets evaluated. Fleets with Nauto’s safety technology average a score of 78, while those without the technology average only 63.The Kodiak Driver achieved perfect scores of 100 in inattentive driving, high-risk driving and traffic violations. Its lowest score, 95, came in aggressive driving. The VERA Score combines over 20 vision-based AI variables into one clear safety rating.Nauto found that every ten-point increase in VERA Score cuts collision risk by about 21 percent. A near-perfect score like Kodiak’s represents a strong improvement over typical human performance on the road.The strong results didn’t come as a surprise to Kodiak’s leadership. Don Burnette, founder and CEO of Kodiak, told CyberGuy: “Achieving the top safety score among more than 1,000 commercial fleets in Nauto’s Visually Enhanced Risk Assessment (VERA Score®) proprietary safety benchmark is a testament to the Kodiak’s focus on safety. Safety is at the foundation of everything Kodiak builds. Our core value is ‘safety first and always.’ We believe independent safety evaluations like Nauto’s help to validate what we already know: the Kodiak Driver is already among the safest drivers on American highways. They also help to establish and build public awareness around how safe our technology truly is.”FOX NEWS AI NEWSLETTER: TRUMP, MUSK AIM FOR DOMINANCEThe growing impact of AI on truck driving safetyNauto equipped the trucks with advanced monitoring and hazard detection systems. These tools track both the driving environment and vehicle behavior in real time. Removing human factors such as distraction, fatigue and delayed reaction directly improves safety.Burnette said in a company statement that the system “is never drowsy, never drunk, and always paying attention.” That constant awareness allows the Kodiak Driver to operate defensively and predictably, two traits linked to safe driving.The VERA Score also gives fleets a consistent way to measure safety. Companies can now shift from reacting to crashes to preventing them.Federal Motor Carrier Safety Administration data support the trend. U.S. commercial truck crashes dropped from more than 124,000 in 2024 to roughly 104,000 this year. Fewer crashes mean fewer fatalities and safer highways overall. Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKINGConcerns about autonomous truck safetyNot everyone is ready to hand over the wheel to artificial intelligence. Some industry experts point out that while systems like the Kodiak Driver perform well in controlled evaluations, real-world roads can still pose unpredictable challenges. Weather, human drivers and mechanical issues remain complex variables for autonomous systems to manage.Others worry about the impact on jobs. As AI takes on more driving responsibilities, professional drivers wonder what the shift will mean for employment and pay across the trucking industry.Safety advocates also call for clearer regulations and public transparency.Even supporters of the technology agree that continued oversight, testing and gradual rollout are essential. Progress is promising, but trust takes time.AI DRONE FINDS MISSING HIKER’S REMAINS IN MOUNTAINS AFTER 10 MONTHSWhat this means for youIf you work in logistics, fleet management or transportation tech, this news hits close to home. The Kodiak Driver’s near-perfect score proves that autonomous systems aren’t just catching up to human drivers; they’re starting to edge ahead in safety.Businesses could see big gains. AI-powered safety tools help cut liability, lower costs and keep fleets running smoothly. The technology doesn’t need rest breaks or reminders to stay focused, which makes every mile more efficient.Regulators are also paying attention. Verified data like this builds trust and clears the way for safer, wider use of autonomous trucks. It’s proof that technology can deliver real-world safety, not just promise it.Drivers on everyday roads benefit too. Fewer crashes mean safer highways and more reliable deliveries. When trucks drive smarter, everyone shares the reward. Human drivers aren’t going anywhere soon, but AI is quickly becoming their most reliable partner. It helps prevent fatigue, distraction and those risky split-second decisions that lead to trouble. AI-driven fleets are proving that technology and human expertise can work together to make highways safer for everyone. (PlusAI)TESLA’S SELF-DRIVING CARS UNDER FIRE AGAINTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: Cyberguy.comKurt’s key takeawaysThis study marks a major step in redefining what safe driving means. An autonomous system equaling the best human fleets signals that automation is moving from theory to reality. Still, the shift raises questions. How soon will public trust catch up with technology? Can regulations evolve fast enough to support widespread adoption? Will drivers adapt to sharing the road with machines that never tire or lose focus? What remains certain is that safety innovation is transforming transportation. Autonomous systems like the Kodiak Driver are proving that technology and safety can move forward together.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSo here’s something to think about: If AI-driven trucks already match the safest human fleets, are we ready to let them take the wheel on our highways? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

AI truck system matches top human drivers in massive safety showdown with perfect scores Read More »

Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide

NEWYou can now listen to Fox News articles!
If you’re over 50 and maxing out your 401(k), there’s a big change coming in 2026 that could affect how much tax you pay on your “catch-up contributions.” While it’s mostly about taxes and retirement planning, there’s an unexpected side effect: scammers are circling. Every time your financial habits or personal data become public, it’s a chance for fraudsters to try to exploit you. Here’s what’s changing, why it matters, and how to protect yourself before the scammers come knocking.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterWhat’s changing with 401(k) catch-up contributionsREMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSRight now, if you’re over 50, you can make extra contributions to your 401(k) on top of the standard annual limit ($23,500 in 2025). These “catch-up” contributions are typically tax-deferred, meaning the money comes out of your paycheck before tax and grows tax-free until retirement.But starting in 2026, for anyone earning more than $145,000 in the previous year, these catch-up contributions will no longer be tax-deferred. Instead, they’ll become like the Roth 401(k), meaning you pay taxes on the money now, but it grows tax-free and can be withdrawn tax-free in retirement.That sounds simple, but it creates a ripple effect:High earners will see less take-home pay now.Tax planning gets trickier, and some people may consider restructuring their accounts or investment strategies.And, most importantly for CyberGuy readers: these changes create new opportunities for scammers. Big 401(k) changes in 2026 could leave retirees exposed to new scam risks. (Cyberguy.com)Why the new rules could attract scammersFBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING ITScammers constantly look for financially active retirees. When rules like this change, fraudsters send out emails, calls, or letters pretending to be financial advisors, IRS agents, or plan administrators. Their goal? To trick you into giving away account numbers, Social Security details, or direct-deposit information.Some common scam tactics to watch for:Fake “plan update” emails claiming you need to verify your 401(k) contributions due to the law change.Roth conversion scam calls claiming you can “avoid extra taxes” by transferring your account through a third-party “advisor.”Urgency and fear tactics, such as “Act now, or lose your retirement benefits!”Even savvy retirees can be caught off guard, especially when the message sounds official and references real tax law changes.How to protect yourself from 401(k) scams and data theftNATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGEWith new 401(k) rule changes taking effect, scammers are using the confusion to trick retirees and workers alike. Follow these steps to stay alert, safeguard your savings, and protect your personal data from being stolen or misused.1) Know the legitimate changesStart by understanding Secure 2.0 and how catch-up contributions will be taxed. Reliable sources include your plan administrator, the IRS website, or a licensed tax advisor. Staying informed helps you spot fake claims before they cause harm.2) Use a personal data removal serviceFor retirees, this extra layer of protection keeps sensitive information out of reach from scammers who exploit tax changes, Roth conversions, and retirement updates. While you can manually opt out of data brokers and track your information, that process takes time and effort. A personal data removal service automates the task by contacting over 420 data brokers on your behalf. It also reissues removal requests if your data reappears and shows you a dashboard of confirmed removals.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com Scammers are already targeting retirees with fake “account update” alerts. (Kurt “CyberGuy” Knutsson)HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUDGet a free scan to find out if your personal information is already out on the web: Cyberguy.com3) Verify every call and email, plus use antivirus softwareIf you get a call or email about your 401(k), don’t assume it’s real. Hang up or delete it, then contact your plan administrator directly using official contact details. Avoid clicking links or downloading attachments from unknown messages.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com4) Monitor your credit and accountsCybercriminals often use personal information from earlier data leaks or data brokers. Watch your credit reports and account activity closely. Early detection can stop suspicious transactions before they escalate.HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS5) Set up alerts and freezes if necessaryAsk your bank and retirement plan to enable transaction alerts. You can also temporarily freeze your credit to prevent anyone from opening new accounts in your name. This is especially useful during times of financial change.6) Educate friends and familyScammers often target retirees and their relatives who help manage finances. Remind your loved ones never to share account details over the phone or email. Protecting everyone in your household keeps scammers from finding weak links. Stay safe by confirming any 401(k) changes directly with your plan provider. (uchar/Getty Images)Kurt’s key takeawaysAs 2026 approaches, the new 401(k) rule changes will reshape how millions of Americans manage their retirement savings. Staying informed, cautious, and proactive can protect your financial future. Scammers thrive on confusion, but by verifying information, monitoring your accounts, and removing your personal data from risky sites, you can stay one step ahead. Remember, the more control you take over your privacy, the harder it becomes for criminals to exploit it.CLICK HERE TO DOWNLOAD THE FOX NEWS APPHave you taken steps to see where your personal data is exposed, and what did you find most surprising when you checked? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com. All rights reserved.

Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide Read More »

1 5 social media safety tips to protect your privacy online

5 social media safety tips to protect your privacy online

NEWYou can now listen to Fox News articles!
Let’s face it: Social media can feel like a minefield. Between oversharing personal details, friend requests from strangers and sneaky scams sliding into your DMs, it’s easy to put yourself at risk without realizing it. But staying safe online doesn’t have to be complicated. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to.Settings and menus on social media platforms can change over time and may vary by device (iOS vs. Android vs. Web) or region. The steps below were accurate at the time of publishing, but you may see slightly different wording or paths depending on updates, app version or mobile device manufacturer.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletterHOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES1) Turn off Location SharingMany apps automatically tag your posts with your location. That can let strangers know your routines or even your home address. Scammers have a harder time learning about your life the less you share online.    (Kurt “CyberGuy” Knutsson)How to turn off Location SharingOn iPhoneGo to Settings.Click Privacy & Security.Tap Location Services.Then pick the app.Set it to “Never” or “While Using the App.”On Android(Settings may vary depending on your Android phone’s manufacturer.)Go to Settings.Tap Location.Click App permissions.Then select the app and toggle location off or select Don’t allow.Note: Some apps may still have permission for “While using the app” or “Only this time.” So, you should check each app individually, especially camera and social-media apps, for location permissions.Pro tip: Even turning off location for just your camera app helps keep photos from carrying hidden location data.META TO ALLOW TEENS’ PARENTS TO DISABLE PRIVATE CHATS WITH AI AFTER BACKLASH OVER FLIRTY CHATBOTS Parents — and even some teens — are growing increasingly concerned about the effects of social media use on young people. (AP Photo/Kiichiro Sato, File)2) Use a private accountA private account means only people you approve can see your posts and photos. Think of it like putting a lock on your front door.How to set private accountsFacebookGo to Settings & Privacy.Tap Settings.Scroll to the Audience & Visibility (or Your Activity) section.Click Posts.Find “Who can see your future posts?” and set it to Friends.InstagramTap your profile.Tap the menu (☰).Tap Account Privacy.Toggle on Private account.TikTokGo to your Profile.Tap the menu (☰).Select Settings and privacy.Tap Privacy.Toggle on Private account.X (formerly Twitter)Click on your profile icon in the top left of the screen.Open Settings and privacy.Select Privacy and safety.Tap Audience and tagging.Toggle Protect your posts (or Protect your Tweets).Once enabled, only approved followers can see your posts.SnapchatOpen Settings (gear icon).Scroll to Privacy Controls.Under “Who Can,” adjust options like Contact Me, View My Story and See Me in Quick Add to Friends only.YouTubeGo to your YouTube Studio (desktop or mobile app).When uploading, set visibility to Private or Unlisted.For existing videos, open the video’s settings and change visibility as needed.Note: Entire channels cannot be made private, only individual videos.LinkedInTap your profile photoSettings.Go to Visibility.Under Profile viewing options, select Private mode.You can also control who sees your connections and activity under “Visibility of your LinkedIn activity.” Identity theft has become so commonplace that it no longer shocks you to hear about the latest scam. (Cyberguy.com)3) Report suspicious accountsFake profiles are everywhere. Scammers may pose as friends, celebrities or even customer service reps. Reporting them helps keep you (and others) safe.How to report an accountFacebookGo to the fake or impersonating profile.Tap the three-dot menu (Options).Select Find support or report profile.Choose a reason, such as pretending to be someone else.Follow the on-screen prompts to submit the report.InstagramGo to the profile.Tap the three-dot menu.Select Report.Choose a reason.Follow the on-screen instructions to complete the report.TikTokOpen the profile.Tap the three-dot menu (or sometimes the Share icon).Select Report.Choose Report account.Select the reason.Submit the report.X (formerly Twitter)Go to the account profile.Tap the three-dot or overflow icon.Select Report.Choose the type of issue.If you’re reporting an entire profile rather than a single post, select Report @username from the profile page.YouTubeGo to the channel page.Tap the About tab (on desktop) or the three-dot menu (on mobile).Select Report.Choose the reason.Submit the report.SnapchatGo to the user’s profile.Tap the three-dot menu or gear icon.Select Report.Choose the reason.Submit the report.LinkedInVisit the fake or suspicious profile.Tap the More button (or three dots).Select Report abuse.Select a reason and follow the prompts.Pro tip: Don’t just block. Report alerts to the platform so they can remove the account for everyone. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to. (Thai Liang Lim/Getty Images)4) Enable two-factor authentication (2FA)Even if someone steals your password, 2FA makes it harder for them to break in. It adds an extra step, like a code texted to your phone.How to enable two-factor authentication (2FA)FacebookGo to the menu and select Settings & Privacy, then Settings.Tap Accounts Center.Then click Password and Security.Tap Two-factor authentication.It may ask you to choose an account to set up two-factor authentication. Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.InstagramGo to your profile and open Settings.Click Accounts Center. Select Password and Security.Then Two-Factor Authentication.It may ask you to choose an account to set up two-factor authentication. Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.TikTokGo to your Profile.Then open the Menu.Select Settings and privacy.Then, Security and permissions.Tap 2-step verification.Choose one or more verification methods, such as text message, email or an authentication app.Click Turn On. Follow the prompts to finish setup.X (formerly Twitter)Click on your profile on the upper left of the screen.Open Settings and privacy.Select Security and account access, then Security.Tap Two-factor authentication.Choose your preferred method, such as text message, authentication app or security key.Follow the steps to turn it on.Note: Text message (SMS) verification on X may only be available for paid (Premium) users or in certain regions. If SMS isn’t available, you can still use an authentication app or a physical security key for two-factor authentication.Pro tip: Use an authenticator app (like Google Authenticator or Authy) instead of text messages for stronger protection.5) Check your photos before postingYour photos may reveal more than you think — house numbers, car license plates or even vacation details that signal you’re away from home.Quick fixes before postingCrop or blur backgrounds that show personal details.Avoid posting in real time while traveling. Wait until you’re back.Review old posts to make sure you’re not unintentionally sharing private info.SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATEBonus tip: Keep personal info under wrapsEvery time you post, share or comment online, you’re leaving small clues about your life, and scammers are great at putting those pieces together. The less information fraudsters can find about you, the weaker their scams become.Many impersonators use public details like your hometown, workplace or family connections to build fake profiles that seem trustworthy. Even information like your email address or phone number can be exploited if it’s floating around the internet.A personal data removal service can help reduce that risk by scrubbing your personal details from people search sites and data brokers. While no solution is perfect, minimizing your digital footprint makes you a much harder target for impersonation and social-engineering scams. These services actively monitor and systematically remove your information from hundreds of sites, saving you time and giving you peace of mind.Protecting your privacy online isn’t just about what you share on social media; it’s also about controlling what’s out there already. Limiting that data means scammers can’t easily cross-reference your information with data from breaches or the dark web.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.Kurt’s key takeawaysStaying safe on social media isn’t about deleting your accounts; it’s about taking control of your information. Turning off location sharing keeps your whereabouts private. Switching to a private account gives you more say over who sees your posts. Being cautious with friend requests and DMs helps you avoid scams. And double-checking your photos before posting prevents oversharing. With just a few quick settings and habits, you can enjoy social media with peace of mind.Have you ever spotted a scam or fake account online? Tell us what happened by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.CLICK HERE TO DOWNLOAD THE FOX NEWS APPCopyright 2025 CyberGuy.com.  All rights reserved.  

5 social media safety tips to protect your privacy online Read More »

1 how a tiny retinal implant is helping people regain their sight

How a tiny retinal implant is helping people regain their sight

NEWYou can now listen to Fox News articles!
A new study in The New England Journal of Medicine revealed that the PRIMA brain computer interface (BCI) retinal implant helped people with advanced age-related macular degeneration regain some central vision. The device uses a tiny 2 millimeter by 2 millimeter photovoltaic implant that is only 30 micrometers thick, and thinner than a strand of hair. It sits beneath the retina and works with a special pair of smart glasses. The glasses capture images and send them as near-infrared light to the implant. The implant converts that light into small electrical signals that stimulate the optic nerve. This process mimics how healthy retinal cells normally send visual information to the brain.The study followed thirty-eight participants, thirty-two of whom completed one year of follow-up. Twenty-six patients experienced measurable improvement in vision, which equals about eighty percent of the group. Many participants could read letters, numbers, and even full pages of text again. Although the restored vision is black and white and slightly blurry, the results are remarkable for people who once believed they would never see clearly again.WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANTSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Why this matters for AMD treatmentAge-related macular degeneration, often called AMD, is one of the leading causes of irreversible blindness in older adults. Until now, available treatments could only slow down vision loss. None of them could restore what had already been lost. The PRIMA implant works with smart glasses to bring central vision back to life. (PRIMA by Science)The PRIMA implant takes a different approach. It directly replaces the missing function of the retina by turning light into electrical signals. Patients can still use their natural peripheral vision while the implant restores some central vision. This combination creates a more complete visual experience.The trial showed that the surgery is generally safe. Most side effects occurred within the first two months and resolved soon after. Importantly, the implant did not reduce the patients’ remaining natural peripheral vision. Researchers call this a major step toward restoring sight rather than only slowing its decline.The PRIMA implant was developed by Science Corporation, a brain-computer interface company founded by Max Hodak, who previously cofounded Neuralink. Science Corporation acquired the PRIMA technology from the French firm Pixium Vision, continuing its development toward clinical use.EYE DROPS MAY REPLACE READING GLASSES FOR THOSE STRUGGLING WITH AGE-RELATED VISION LOSS The tiny chip sits under the retina and turns light into visual signals. (PRIMA by Science)What this means for youIf you or someone you love lives with late-stage AMD, this breakthrough may offer real hope. For the first time, there is a device that can restore some sight instead of only preserving what remains. You may want to talk with your ophthalmologist about upcoming trials or future approval of the PRIMA system in your area. The company behind the technology has already applied for European approval, and a process with the U.S. Food and Drug Administration is underway.Regaining even partial central vision can make a big difference. Reading text, recognizing faces, or simply moving independently becomes possible again. This progress also shows how fast medical innovation is moving. Patients who were once told that nothing could help may soon have a chance to see again.It is also a reminder to stay informed. Treatments that were once experimental are becoming available sooner than expected. Discussing new technologies with your doctor helps you understand timing, eligibility, and what kind of results you can realistically expect. This breakthrough offers new hope for people living with advanced macular degeneration. (PeopleImages/Getty Images)Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThe PRIMA retinal implant represents a shift in how scientists and doctors think about blindness caused by AMD. For decades, the focus was on slowing down the disease. Now, researchers are proving that restoration is possible. While this generation of the implant provides limited black and white vision, it gives real, functional sight to people who had none. That alone changes lives. More work remains to improve image clarity, color perception, and comfort. Still, this is only the beginning. Future versions of the device and smart glasses may make vision restoration even more effective and accessible.If you could regain even part of your sight through new technology, would you take the opportunity and experience the world in a whole new way?  Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

How a tiny retinal implant is helping people regain their sight Read More »

1 this feature can save your pc from getting hacked how to set it up intro

How to use passkeys to keep your computer safe

NEWYou can now listen to Fox News articles!
Keeping your computer secure is more important than ever. Cyberattacks target computers, accounts and sensitive data daily. Traditional passwords have long been the cornerstone of security, but they come with real challenges. Many of us reuse passwords across sites, and even strong passwords can be compromised in data breaches.Passkeys offer a safer and more convenient way to authenticate. However, they’re still relatively new, and many of us are still trying to figure out how they work. For example, Peter recently reached out asking, “How do I get a passkey from a PC desktop that doesn’t have a camera or fingerprint device?”That’s a great question, Peter, and you’re not alone in wondering about this. The good news is that passkeys are designed to work on virtually any device, whether or not it has biometric hardware like a fingerprint reader or camera. Let’s explore what passkeys are, why they’re worth using and how to set them up on both Windows and Mac, regardless of your hardware setup.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE Passkeys make signing in faster and safer by replacing traditional passwords with encrypted keys. (Kurt “CyberGuy” Knutsson)What are passkeys?Passkeys use cryptography to prove who you are. When you create a passkey, your device makes two keys, one public and one private. The public key goes to the website, and your private key stays on your device. During login, your device confirms your identity with the private key. The website never sees or stores it.This process blocks phishing and password theft. It also makes sign-in faster. You don’t need to remember or type long passwords anymore.While passkeys simplify authentication, they don’t eliminate the need for a secure password manager. Password managers can safely store and sync your passkeys, just as they do with passwords, allowing you to access your credentials across devices and browsers — even if those devices don’t natively sync passkeys, such as between Windows and Apple systems. Using a password manager alongside passkeys creates a bridge between platforms and provides an additional layer of security and convenience.Can you use passkeys without biometrics?Yes, you can. A PC or Mac without a camera or fingerprint reader can still use passkeys. On Windows, you unlock them with your Windows Hello PIN. On Apple devices, you can use Touch ID, Face ID or your passcode. The key is having an updated operating system and browser that support passkeys.If you manage multiple accounts or devices, a password manager that supports passkeys can act as your central vault. This lets you use passkeys even on systems that don’t directly support syncing through iCloud or Google Password Manager. It’s an easy way to ensure you always have access to your credentials, no matter what kind of device you use.Why you still need passwordsNot every website supports passkeys yet. Some services still rely on passwords. Keep strong, unique passwords for those accounts. Passwords also serve as backup if you lose a device or can’t use your passkey. Over time, more sites will support password-free logins.This is where password managers continue to play an important role. They bridge the gap between old and new authentication methods, allowing you to store both traditional passwords and passkeys in one secure place. Until the web is fully passkey-ready, combining the two provides both convenience and resilience, giving you a seamless experience across multiple devices and services. Passkeys also prevent phishing because your private key never leaves your device during sign-in. (Kurt “CyberGuy” Knutsson)Passkey support by platform WindowsWorks on Windows 10 and 11.Windows 11 version 22H2 (KB5030310+) includes passkey management.Unlock with Windows Hello PIN, face, or fingerprint.If your browser or operating system doesn’t yet sync passkeys automatically, a third-party password manager with passkey support can store them for cross-platform access.macOS and iOSWorks on macOS 13 Ventura or later and iOS/iPadOS 16 or later.Passkeys sync through iCloud Keychain with end-to-end encryption.Two-factor authentication must be turned on.Use Touch ID, Face ID or your device passcode to confirm logins.While Apple’s iCloud Keychain handles passkeys securely within its ecosystem, using a password manager that supports passkeys provides extra flexibility, letting you securely access the same credentials on non-Apple devices or browsers outside Safari.AndroidAvailable on Android 9 and later.Android 14 adds third-party passkey manager support.Passkeys sync through Google Password Manager by default.Alternatively, password managers now integrate passkey syncing, letting you use your passkeys seamlessly on both desktop and mobile devices.BrowsersChrome, Edge, Safari and Firefox all support passkeys.Keep your browser updated for the best compatibility.Browser-based password managers can also sync passkeys, adding flexibility if you switch between devices or operating systems.Major services that support passkeysAs of publishing, these major services offer passkey sign-in:GoogleMicrosoftAppleAmazonPayPalGitHubUbereBayWhatsAppFacebookSupport continues to expand every month. Most new accounts on these platforms can now use passkeys.How to set up passkeys on WindowsOpen Settings → Accounts → Sign-in options.Set up Windows Hello PIN or biometrics.Visit a site that supports passkeys.Choose Create a passkey and confirm with your PIN or biometric.Manage passkeys later under Settings → Accounts → Passkeys on Windows 11.If your PC lacks biometrics, you can still approve sign-ins using your phone nearby or a synced password manager that supports passkeys. (Kurt “CyberGuy” Knutsson)How to set up passkeys on MacApple devices also provide a simple and secure way to use passkeys through iCloud Keychain. There’s no separate setup for passkeys if you have iCloud Keychain enabled. Once it’s on, an eligible app or service will ask you to create a passkey at the time of login, and you’ll be able to do so by following the instructions on the screen. Below is how you can enable iCloud Keychain.Go to Apple menu → System Settings → your name → iCloud.Click Passwords and turn on Passwords & Keychain and enable syncing.Visit a site that supports passkeys.Select Create a passkey and confirm with Touch ID or your passcode.Passkeys will sync to your other Apple devices through iCloud Keychain.You can also approve logins on a non-Apple device using your iPhone nearby, or access them through a password manager that stores both your passkeys and passwords in one place. On Windows, you can use passkeys with a simple Hello PIN, even without a camera or fingerprint reader. (Kurt “CyberGuy” Knutsson)Common questions about passkeysCan I move passkeys between devices?Yes. iCloud and Google Password Manager sync passkeys securely. For more flexibility, password managers now support passkey portability across different ecosystems, perfect if you use both Mac and Windows, or Android and iPhone.What if I lose my device?You can recover passkeys from iCloud, Google or your password manager. Always keep a backup login method and 2FA enabled. Storing your passkeys in a secure password manager ensures recovery even if you lose access to one platform’s ecosystem.Are passkeys fully replacing passwords?Not yet. Many major platforms support them, but full adoption will take time. Until then, password managers remain an essential bridge technology, providing secure storage, synchronization and transition support as passkeys continue to expand.MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS5 additional steps you can take to keep your computer safeEven with passkeys and strong passwords, there are other steps you can take to enhance the security of your computer.1) Use a password managerPassword managers help generate and store strong, unique passwords for every account. This reduces the risk of password reuse and ensures that your backup passwords are secure. Now that many password managers support passkeys, they also act as your universal credential vault, letting you log in with either method depending on what a website supports.Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.2) Install strong antivirus softwareStrong antivirus software protects against malware, ransomware and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APP3) Keep your system updatedRegular updates fix security vulnerabilities in your operating system and software. Enable automatic updates whenever possible to stay protected.4) Enable two-factor authenticationTwo-factor authentication (2FA) adds a second verification step, usually through a code sent to your phone or email, or through an authentication app. This makes it harder for attackers to access your accounts even if your password or passkey is compromised.5) Backup your dataRegularly backing up your Mac or PC to a secure cloud service or external drive ensures that you can recover important data in case of hardware failure, malware attack, or accidental deletion.Kurt’s key takeawayPasskeys are a major upgrade over traditional passwords, but we’re not living in an all-passkey world just yet. Many sites still rely on passwords, and you’ll need backups if something happens to your device. Supplementing passkeys with a password manager is the best move right now; it lets you store, sync and protect both passkeys and passwords under one roof. The good news is that setting up passkeys takes just a few minutes, and once they’re enabled, logging in becomes faster and more secure.Have you tried using passkeys yet? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

How to use passkeys to keep your computer safe Read More »