Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

octopus1 640x480 1

Research roundup: 6 cool stories we almost missed

The authors harvested fresh grapes and dried them for 28 days. Some were dried using an incubator, some were sun-dried, and a third batch was dried using a combination of the two methods. The researchers then added the resulting raisins to bottles of water—three samples for each type of drying process—sealed the bottles, and stored them at room temperature for two weeks. One incubator-dried sample and two combo samples successfully fermented, but all three of the sun-dried samples did so, and at higher ethanol concentrations. Future research will focus on identifying the underlying molecular mechanisms. And for those interested in trying this at home, the authors warn that it only works with naturally sun-dried raisins, since store-bought varieties have oil coatings that block fermentation.
DOI: Scientific Reports, 2025. 10.1038/s41598-025-23715-3  (About DOIs).
An octopus-inspired pigment

Credit:

Charlotte Seid

Octopuses, cuttlefish, and several other cephalopods can rapidly shift the colors in their skin thanks to that skin’s unique complex structure, including layers of chromatophores, iridophores, and leucophores. A color-shifting natural pigment called xanthommatin also plays a key role, but it’s been difficult to study because it’s hard to harvest enough directly from animals, and lab-based methods of making the pigment are labor-intensive and don’t yield much. Scientists at the University of San Diego have developed a new method for making xanthommatin in substantially larger quantities, according to a paper published in Nature Biotechnology.

The issue is that trying to get microbes to make foreign compounds creates a metabolic burden, and the microbes hence resist the process, hindering yields. The USD team figured out how to trick the cells into producing more xanthommatin by genetically engineering them in such a way that making the pigment was essential to a cell’s survival. They achieved yields of between 1 and 3 grams per liter, compared to just five milligrams of pigment per liter using traditional approaches. While this work is proof of principle, the authors foresee such future applications as photoelectronic devices and thermal coatings, dyes, natural sunscreens, color-changing paints, and environmental sensors. It could also be used to make other kinds of chemicals and help industries shift away from older methods that rely on fossil fuel-based materials.

Research roundup: 6 cool stories we almost missed Read More »

final crop RESIZE Sporophyte sample from the space exposure experiment on the ISS CREDIT Tomomichi Fujita 300x201 1

Astronauts Placed an Extreme Earth Organism in Outer Space. Nine Months Later, it Was Still Alive

When astronauts retrieved Earth moss that had been outside the International Space Station (ISS) for nine months, where it had been exposed to the harsh environment of outer space, they were shocked to find that 80% of its spores were still alive.
Once the spores were returned to Earth, scientists also discovered that most were capable of reproducing.
The Hokkaido University research team behind the unexpected discovery suggests that understanding this extreme Earth organism’s durability could help mission planners evaluate potential Earth-based life forms for adaptation to future human colonies in extraterrestrial environments like the Moon or Mars.
Selecting an Earth Organism to Test in Space
Project leader and lead author Tomomichi Fujita of Hokkaido University said the idea of exposing moss to space came to him when his studies of plant evolution revealed the resilient Earth organism’s uncanny ability to colonize the planet’s harshest environments.
“I began to wonder: could this small yet remarkably robust plant also survive in space?” the researcher explained.
Before spending the resources necessary for an actual space mission, the Hokkaido scientist designed a series of laboratory experiments to verify the plant’s potential for survival in outer space. According to Fujita, the best candidate was Physcomitrium patens, a well-studied moss commonly known as spreading earthmoss.
Moss from the ISS experiment (Image credit: Tomomichi Fujita).
In the experiments, the researchers selected three structures from the candidate moss. These included protenemata, which are juvenile mosses; brood cells, which the team described as a specialized stem cell that “emerges under stress conditions”; and encapsulated spores called sporophytes.
Next, the team exposed the moss to a simulated space environment. This included subjecting the three structures to high levels of UV radiation, extreme temperatures (both high and low), and extremely low-pressure, vacuum-like conditions. Fujita said the team anticipated that exposing the moss structures to all the combined stresses of space, such as microgravity, extreme radiation and temperatures, and vacuum, instead of just one or two, would cause far greater damage “than any single stress alone.”
Encouraging Lab Results Prompted ISS Goals
When examining the results, the team found that extreme UV radiation posed the greatest challenge to survival, ultimately killing all the juvenile moss. Some of the brood cells did survive, but the researchers said the highest survival rate under extreme UV radiation was among the sporophytes.
Compared to the other moss components, the encased spores exhibited roughly 1,000 times more UV tolerance. The team suggests that the spore’s outer layer offers protection by physically absorbing UV radiation and blanketing the inner spore structure “both physically and chemically.”
When comparing the results of the extreme-temperature tests, the team found that all juvenile structures had perished. However, the spores survived after being held at 55°C for a month and then exposed to −196°C for over a week; they remained alive and able to germinate.
Moss spores germinating after space. Image Credit: Dr. Chang-hyun Maeng and Maika Kobayashi.
Although further study is needed to determine the reason for this protective ability against temperature and radiation extremes, the team said it is likely a 500-million-year-old evolutionary adaptation that allowed ancient bryophytes to transition from aquatic to terrestrial environments. They suspect the same ability helped these extreme Earth organisms survive several mass extinction events since that first adaptation.
ISS Tests Show Moss Sporophytes Possess Remarkable Ability to Survive in Space
According to a statement, the research team prepared several sporophyte samples for transport to space aboard the March 2022 Cygnus NG-17 spacecraft bound for the ISS. Upon arrival, astronauts aboard the station attached the moss spores to the outside of the ISS, where they would be exposed to the full range of space conditions.
Hokkaido University researchers prepared Sporophytes in specialized containers for transport to the ISS. Image credit: Tomomichi Fujita.
After 283 days of continuous exposure, the Earth organism samples were transported back home on SpaceX CRS-16 in January 2023. When the Hokkaido University team brought the samples into the lab for detailed testing, they said they had little optimism they would have survived such lengthy space exposure.
“We expected almost zero survival,” Fujita said.
Instead, the researcher said the team found the exact opposite result: most of the spores were still alive. Upon further examination, the team determined that 80% of the spores appeared alive and largely intact.
“Most living organisms, including humans, cannot survive even briefly in the vacuum of space,” Fujita explained. “However, the moss spores retained their vitality after nine months of direct exposure.”
After testing spore chlorophyll levels, the team found normal levels for all types except chlorophyll a, which showed a 20% reduction below normal. The team said this reduction “didn’t seem to impact” the spores’ overall health.

Beyond the sporophyte’s ability to survive in space, the team said the most surprising result occurred when the spores were encouraged to germinate. Shockingly, after nine months in outer space, all but 11% of the surviving spores geminated normally.
Moss spores germinated after nine months in space. CREDIT Dr. Chang-hyun Maeng and Maika Kobayashi.
“This study demonstrates the astonishing resilience of life that originated on Earth,” Fujita said of the astonishing test results. “This provides striking evidence that the life that has evolved on Earth possesses, at the cellular level, intrinsic mechanisms to endure the conditions of space.”
“We were genuinely astonished by the extraordinary durability of these tiny plant cells,” the researcher added.
Resilient Earth Organism Could Support Future Colonies on the Moon and Mars
When discussing the application of their unexpected findings, the Hokkaido team suggested that mission planners designing food and material systems for permanent space colonies on the moon and Mars should take a closer look at the versatility and durability of the ancient Earth organism.
In one example, a mathematical model designed by Fujita’s team to predict how long moss could survive in space showed it could, in theory, endure the extreme radiation, pressure, and temperature environment for as long as 5,600 days, or roughly 15 years.
Artist’s concept of a future moon base (Credit: ESA – P. Carril)
While they emphasize that their model used limited data and that more research is needed to confirm the 15-year projection, the clear durability and versatility of this extreme Earth organism, which can be used to make food, fuels, and materials, make it an ideal study subject for potential space colonies. They also said they hope that their findings help “advance research on the potential of extraterrestrial soils for facilitating plant growth” and inspire further research into using mosses in agricultural systems in space.
“Ultimately, we hope this work opens a new frontier toward constructing ecosystems in extraterrestrial environments such as the Moon and Mars,” Fujita said. “I hope that our moss research will serve as a starting point.”
The study “Extreme Environmental Tolerance and Space Survivability of the Moss, Physcomitrium patens” was published in IScience.
 Christopher Plain is a Science Fiction and Fantasy novelist and Head Science Writer at The Debrief. Follow and connect with him on X, learn about his books at plainfiction.com, or email him directly at christopher@thedebrief.org.

Astronauts Placed an Extreme Earth Organism in Outer Space. Nine Months Later, it Was Still Alive Read More »

1 company restores ai teddy bear sales after safety scare

Company restores AI teddy bear sales after safety scare

NEWYou can now listen to Fox News articles!
FoloToy paused sales of its AI teddy bear Kumma after a safety group found the toy gave risky and inappropriate responses during testing. Now the company says it has restored sales after a week of intense review. It also claims that it improved safeguards to keep kids safe.The announcement arrived through a social media post that highlighted a push for stronger oversight. The company said it completed testing, reinforced safety modules and upgraded its content filters. It added that it aims to build age-appropriate AI companions for families worldwide.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterTEXAS FAMILY SUES CHARACTER.AI AFTER CHATBOT ALLEGEDLY ENCOURAGED AUTISTIC SON TO HARM PARENTS AND HIMSELF FoloToy resumed sales of its AI teddy bear Kumma after a weeklong review prompted by safety concerns. (Kurt “CyberGuy” Knuttson)Why FoloToy’s AI teddy bear raised safety concernsThe controversy started when the Public Interest Research Group Education Fund tested three different AI toys. All of them produced concerning answers that touched on religion, Norse mythology and harmful household items.Kumma stood out for the wrong reasons. When the bear used the Mistral model, it offered tips on where to find knives, pills and matches. It even outlined steps to light a match and blow it out.Tests with the GPT-4o model raised even sharper concerns. Kumma gave advice related to kissing and launched into detailed explanations of adult sexual content when prompted. The bear pushed further by asking the young user what they wanted to explore.Researchers called the behavior unsafe and inappropriate for any child-focused product.FoloToy paused access to its AI toysOnce the findings became public, FoloToy suspended sales of Kumma and its other AI toys. The company told PIRG that it started a full safety audit across all products.OpenAI also confirmed that it suspended FoloToy’s access to its models for violating policies designed to protect anyone under 18.LAWMAKERS UNVEIL BIPARTISAN GUARD ACT AFTER PARENTS BLAME AI CHATBOTS FOR TEEN SUICIDES, VIOLENCE The company says new safeguards and upgraded filters are now in place to prevent inappropriate responses. (Kurt “CyberGuy” Knutsson)Why FoloToy restored Kumma’s sales after its safety reviewFoloToy brought Kumma back to its online store just one week after suspending sales. The fast return drew attention from parents and safety experts who wondered if the company had enough time to fix the serious issues identified in PIRG’s report.FoloToy posted a detailed statement on X that laid out its version of what happened. In the post, the company said it viewed child safety as its “highest priority” and that it was “the only company to proactively suspend sales, not only of the product mentioned in the report, but also of our other AI toys.” FoloToy said it took this action “immediately after the findings were published because we believe responsible action must come before commercial considerations.”The company also emphasized to CyberGuy that it was the only one of the three AI toy startups in the PIRG review to suspend sales across all of its products and that it made this decision during the peak Christmas sales season, knowing the commercial impact would be significant. FoloToy told us, “Nevertheless, we moved forward decisively, because we believe that responsible action must always come before commercial interests.”The company also said it took the report’s disturbing examples seriously. According to FoloToy, the issues were “directly addressed in our internal review.” It explained that the team “initiated a deep, company-wide internal safety audit,” then “strengthened and upgraded our content-moderation and child-safety safeguards,” and “deployed enhanced safety rules and protections through our cloud-based system.”After outlining these steps, the company said it spent the week on “rigorous review, testing, and reinforcement of our safety modules.” It concluded its announcement by saying it “began gradually restoring product sales” as those updated safeguards went live.FoloToy added that as global attention on AI toy risks grows, “transparency, responsibility and continuous improvement are essential,” and that the company “remains firmly committed to building safe, age-appropriate AI companions for children and families worldwide.”LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION Safety testers previously found the toy giving risky guidance about weapons, matches and adult content. (Kurt “CyberGuy” Knutsson)Why experts still question FoloToy’s AI toy safety fixesPIRG researcher RJ Cross said her team plans to test the updated toys to see if the fixes hold up. She noted that a week feels fast for such significant changes, and only new tests will show if the product now behaves safely.Parents will want to follow this closely as AI-powered toys grow more common. The speed of FoloToy’s relaunch raises questions about the depth of its review.Tips for parents before buying AI toysAI toys can feel exciting and helpful, but they can also surprise you with content you’d never expect. If you plan to bring an AI-powered toy into your home, these simple steps can help you stay in control.1) Check which AI model the toy usesNot every model follows the same guardrails. Some include stronger filters while others may respond too freely. Look for transparent disclosures about which model powers the toy and what safety features support it.2) Read independent reviewsGroups like PIRG often test toys in ways parents cannot. These reviews flag hidden risks and point out behavior you may not catch during quick demos.3) Set clear usage rulesKeep AI toys in shared spaces where you can hear or see how your child interacts with it. This helps you step in if the toy gives a concerning answer.4) Test the toy yourself firstAsk the toy questions, try creative prompts and see how it handles tricky topics. This lets you learn how it behaves before you hand it to your child.5) Update the toy’s firmwareMany AI toys run on cloud systems. Updates often add stronger safeguards or reduce risky answers. Make sure the device stays current.6) Check for a clear privacy policyAI toys can gather voice data, location info or behavioral patterns. A strong privacy policy should explain what is collected, how long it is stored and who can access it.7) Watch for sudden behavior changesIf an AI toy starts giving odd answers or pushes into areas that feel inappropriate, stop using it and report the problem to the manufacturer.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysAI toys can offer fun and learning, but they can also expose kids to unexpected risks. FoloToy says it improved Kumma’s safety, yet experts still want proof. Until the updated toy goes through independent testing, families may want to stay cautious.Do you think AI toys can ever be fully safe for young kids? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Copyright 2025 CyberGuy.com.  All rights reserved. 

Company restores AI teddy bear sales after safety scare Read More »

jsc2024e028868

Mark Elder: Building the Future of Spacewalking for Artemis and Beyond 

For more than 25 years, Mark Elder has helped make human spaceflight safe and possible. As the International Space Station EVA hardware manager in the Extravehicular Activity (EVA) Office within the EVA and Human Surface Mobility Program, he leads the team responsible for the spacesuits, tools, and logistics that keep astronauts protected during spacewalks—and ensures NASA is ready for the next era of Artemis exploration. His team is programmatically responsible for the Extravehicular Mobility Unit, or EMU, spacesuit. That means every bolt, bearing, and battery astronauts rely on outside the International Space Station ultimately falls under their watch. He also oversees the EVA Space Operations Contract, which provides engineering and technical support to keep spacesuit systems flight ready. 
Elder’s work directly supports every EVA, or spacewalk, conducted at the station. His team coordinates with astronauts, engineers, and the Mission Control Center in Houston to make sure the suits and tools operate reliably in the most unforgiving environment imaginable. Their work helps ensure every EVA is conducted safely and successfully. 
Elder’s passion for NASA began at an early age. 
“When I was little, my parents gave me a book called ‘The Astronauts,’” he said. “It had drawings of a reusable spacecraft—the space shuttle—and I fell in love with it. From then on, I told everyone I was going to work at NASA.” 
That dream took off at age 16, when he attended Space Academy in Huntsville, Alabama. “That cemented my dream of someday working at NASA, and it taught me a little bit more about the different roles within the agency,” he said. 
While attending Case Western Reserve University as a mechanical engineering student, he learned about a new NASA program that allowed college students to design and build an experiment and then come to Johnson Space Center for a week to fly with their experiment on the Boeing KC-135 Stratotanker. “I jumped on the chance to be part of the team,” he said. “The experience further cemented my dream of working at NASA one day—Johnson in particular.” 
After graduation, Elder worked with Pratt & Whitney on jet engines. While the experience was invaluable, he knew his heart belonged in human spaceflight. “I learned that one of Pratt’s fellow companies under the United Technologies umbrella was Hamilton Sundstrand, which was the prime contractor for the spacesuit,” he said. “I jumped at the chance to transfer, and my career at NASA finally began.” 
Elder spent his first three years at Johnson performing tool-to-tool fit checks on spacewalking equipment, giving him hands-on experience with nearly every tool that he would eventually become responsible for as a hardware manager. 

His early years coincided with the shuttle return-to-flight era, when he worked on reinforced carbon-carbon panel repairs and thermal protection systems. Those experiences built his technical foundation and prepared him for the leadership roles to come. 
Over time, Elder took on increasingly complex assignments, eventually leading the team that developed the EVA Long Life Battery—the first human-rated lithium battery used in space. His team created a rigorous test plan to certify the battery for human spaceflight at a time when lithium batteries were under scrutiny for safety concerns. 
“Finally signing the certification paperwork was satisfying, but watching an EVA powered by the batteries provided a great sense of pride,” he said. 
This innovation set the stage for future generations of even safer, higher-capacity batteries that power today’s spacewalking operations and will eventually support lunar surface activities. 
Looking back, Elder said some of his greatest lessons came from learning how to lead with purpose. “The great thing about NASA is the highly motivated and dedicated workforce,” he said. “When I first became a team lead, I thought success meant making quick decisions and moving fast. I learned that leadership is really about listening. Strong teams are built on trust and open communication.” 
Another defining lesson, he said, has been learning to assume positive intent. “In a place like NASA, everyone is deeply passionate about what they do,” he said. “It’s easy to misinterpret a disagreement as opposition, but when you remember that everyone is working toward the same goal, the conversation changes. You focus on solving problems, not winning arguments.” 
That mindset has guided Elder through some of NASA’s most complex programs and helped him build lasting partnerships across the agency. 

Today, Elder’s work extends beyond the orbiting laboratory. As NASA prepares for Artemis missions to the Moon, his team’s experience maintaining and improving the EMU informs the design of next-generation exploration suits. 
“The foundation we’ve built on the space station is critical for the future,” he said. “Every tool we’ve refined, every system we’ve upgraded—it all feeds into how we’ll operate on the lunar surface and eventually on Mars.” 
Elder believes that the key to future success lies in perseverance. He advises the next generation to never stop dreaming. “My path wasn’t direct, and it would have been easy for me to give up,” he said. “But dreams have a way of guiding you if you don’t let go of them.” 
When he’s not supporting those missions, Elder’s creativity takes shape in his workshop. “In my spare time, I love woodworking,” he said. “Building something useful from a pile of rough-sawn boards helps calm me and gives me a great sense of accomplishment. I love being able to build furniture for my family,” he added, after recently finishing a desk for his youngest son. 
The same patience and precision he brings to woodworking defines his approach to exploration—steady progress, careful craftmanship, and attention to detail. “As NASA goes to the Moon and Mars, there will be challenges,” Elder said. “As long as we keep dreaming, we will see the next generation walking on the Moon and heading to Mars.” 

Mark Elder: Building the Future of Spacewalking for Artemis and Beyond  Read More »

Beyond mission launch pillars

The new Discovery and Preparation podcast showcases innovation for space

Enabling & Support

01/12/2025
462 views
15 likes

ESA Discovery and Preparation has launched a new podcast series highlighting the innovative space technologies being developed through its activities.

ESA Discovery and Preparation Podcast

The podcast will explore some of the “blue sky” research projects that are pushing the boundaries of what’s possible in space – from breakthrough technologies that enable future missions to commercial applications that benefit life on Earth.
The first episode – now available on Spotify – features Gaetan Petit, co-founder and CEO of Ask Earth, discussing how his company is revolutionising the way organisations interact with satellite data through artificial intelligence. Ask Earth, a spin-off from ETH, UZH and EPFL, has developed the first AI-native geospatial agent that turns complex Earth observation data into clear, actionable insights.Discovery and Preparation provides funding, expertise, and support to turn innovative ideas into reality. Its activities are open to researchers, startups, and companies across ESA member states, via the Open Space Innovation Platform (OSIP).

Like
Thank you for liking
You have already liked this page, you can only like it once!

The new Discovery and Preparation podcast showcases innovation for space Read More »

beniniya oli2 20250111 th

A Glimpse of History in Benin City

In some ways, Benin City is like dozens of other fast-growing cities in Nigeria. Buoyed by burgeoning industrial and agricultural sectors, the city’s population rose by 1.7 million people over the past four decades as its footprint on the West African landscape expanded several times over.

Amid bustling new networks of roads, residential neighborhoods, markets, and workshops, lie signs of a much earlier era, when the city was the seat of a powerful pre-colonial kingdom. Remnants of ancient earthworks, thought to be among the longest in the world, can even be seen in images of the city captured from space.

Benin Iya (sometimes called the Benin Earthworks, the Walls of Benin, and the Benin Moat) is a vast, cellular network of interlocking earthen walls, ramparts, and ditches that radiate outward from a central moat at the heart of the city. Built in sections over hundreds of years between the 7th and 14th centuries, the system was key to marking defensive, political, and economic boundaries and played an important role in maintaining order and stability in the Kingdom of Benin.

The OLI-2 (Operational Land Imager-2) on Landsat 9 captured this image of the remains of earthworks on January 11, 2025. The features appear as dark green lines that trace arcing patterns in a densely settled area near the airport on the west bank of the Ikpoba River. Trees and vegetation growing in the moats give the features a dark green color.

Most of the earthworks consisted of relatively narrow and shallow linear ramparts and ditches that spread widely across the landscape. Many sections have been destroyed or are too small or too obscured by modern development to be easily detected by satellites or astronauts in orbit. However, some inner sections that run through the modern Oredo, Egor, and Ikpoba-Okha areas of the city had true walls and moats and are among the most visible in Landsat imagery.

Archaeological research indicates that the earthworks spanned more than 16,000 kilometers (10,000 miles) and enclosed roughly 6,500 square kilometers (2,500 square miles)—an area as large as the U.S. state of Delaware. Such length means the features hold the Guinness World Record for being the “longest earthworks of the pre-mechanical era.” By some measures, the features were together significantly longer than the Great Wall of China.

NASA Earth Observatory image by Lauren Dauphin, using Landsat data from the U.S. Geological Survey. Story by Adam Voiland.

Guinness World Records Longest earthworks of the pre-mechanical era. Accessed November 25, 2025.

The Met (2025, May 31) Benin City Earthworks and Urban Planning, Nigeria. Accessed November 25, 2025.

MOWAA The Benin Iya Survey. Accessed November 25, 2025.

MOWAA Benin City’s Moat (Iya) System. Accessed November 25, 2025.

Onwuanyi, N. et al. (2021) The Benin City Moat System: Functional Space or Urban Void? African Journal of Environmental Research, 3(1), 21-39.

Schepers, C. et al. (2025) Current Condition of the Iya in Benin City, the Gates and Future Preservation Strategies. African Archaeological Review, 42, 519-537.

UNESCO (1995) Benin Iya / Sungbo’s Eredo. Accessed November 25, 2025.

World Monuments Fund (2025) Benin City Earthworks. Accessed November 25, 2025.

A Glimpse of History in Benin City Read More »

2 chinese hackers target us telecoms what you need to know to protect your data body

Check if your passwords were stolen in huge leak

NEWYou can now listen to Fox News articles!
If you have not checked your credentials lately, now is the time. A staggering 1.3 billion unique passwords and 2 billion unique email addresses surfaced online. This event is one of the largest exposures of stolen logins we have seen.This is not the result of one major breach. Instead, Synthient, a threat intelligence firm, searched the open and dark web for leaked credentials. You may remember the company from its earlier discovery of 183 million exposed email accounts. This time, the scale is far larger.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.AMERICA’S MOST-USED PASSWORD IN 2025 REVEALED Synthient uncovered a massive collection of stolen passwords and email addresses pulled from both the open and dark web.  (Kurt “CyberGuy” Knutsson)Where this huge trove came fromMost of the data comes from credential stuffing lists. Criminals pull these lists from old breaches and use them in new attacks. Synthient went further. Its founder Benjamin Brundage gathered stolen logins from hundreds of hidden sources across the web.The data includes old passwords from past breaches and fresh passwords stolen by info-stealing malware on infected devices. Synthient partnered with security researcher Troy Hunt, who runs Have I Been Pwned. He verified the dataset and confirmed that it contains new exposures.To test the data, Hunt started with one of his old email addresses. He already knew it had been added to past credential stuffing lists. When he found it in the new trove, he reached out to trusted Have I Been Pwned users to confirm the findings. Some had never appeared in breaches before, which proved that this leak includes new stolen logins.183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW Hackers use these stolen logins for credential stuffing attacks that target accounts across multiple sites. (iStock)How to check if your passwords were stolenTo see if your email was affected, Visit Have I Been Pwned. It is the first and official source for this newly added dataset.Enter your email address to find out if your information appears in the leak.When done, come back here for Step 1 below.WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE Verification tests showed that the dataset contains fresh stolen credentials that had never appeared in earlier breaches. (Kurt “CyberGuy” Knutsson)How to protect yourself after this massive credential leakThese simple actions strengthen your accounts fast and help you stay ahead of criminals who rely on stolen passwords.1) Change any exposed passwords immediatelyDo not leave a known leaked password in place. Change it right away on every site where you used it. Create a new login that is strong, unique and not similar to your old one. This step cuts off criminals who already have your stolen credentials.2) Stop reusing passwords across sitesAvoid reusing passwords across sites. Once hackers get a working email and password pair, they try it on other services. This attack method, called credential stuffing, still succeeds because many people recycle the same login. One stolen password should not unlock every account you own.3) Use a strong password managerA strong password manager can generate new secure logins for your accounts. It creates long, complex passwords that you do not have to memorize. It also stores them safely so you can sign in quickly without taking risky shortcuts. Many password managers also scan for breaches to see if your current passwords have been exposed.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com4) Turn on Two-Factor AuthenticationEven the strongest password can be exposed. Two-factor authentication adds a second step when you log in. You may enter a code from an authenticator app or tap a physical security key. This extra layer blocks attackers who try to access your account with stolen passwords.5) Protect your devices from malware and install strong antivirus software Hackers often steal passwords by infecting your devices. Info-stealing malware hides inside phishing emails and fake downloads. Once installed, it pulls passwords straight from your browser and apps. Protect your phones and computers with strong antivirus software. It can detect and block info-stealing malware before it drains your accounts. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com6) Consider switching to passkeys when possibleIf you want better protection, start using passkeys on services that support them. Passkeys use cryptographic keys instead of text passwords. Criminals cannot guess or reuse them. They also stop many phishing attacks because they only work on trusted sites. Think of passkeys as a secure digital lock for your most important accounts.7) Use a data removal serviceData brokers collect and sell your personal details, which criminals can combine with stolen passwords. A trusted data removal service can help find and remove your information from people-search sites. Reducing your exposed data makes it harder for attackers to target you with convincing scams and account takeovers.While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com8) Review your security oftenSecurity is not a one-time task. Check your passwords on a regular schedule and update older logins before they become a problem. Review which accounts have Two-factor authentication turned on and add it where you can. By staying proactive, you stay one step ahead of hackers and limit the damage from future leaks.CLICK HERE TO DOWNLOAD THE FOX NEWS APP Kurt’s key takeawaysMassive leaks like this one highlight how fragile digital security can be. Even when you follow best practices, your information can still land in criminal hands through old breaches, malware or third-party exposures. Taking a proactive approach puts you in a stronger position. Regular checks, secure passwords and strong authentication give you real protection.With billions of stolen passwords floating around, do you feel ready to check your own and tighten your account security today? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Check if your passwords were stolen in huge leak Read More »

tesla optimus robot 002

Elon Musk teases a future run by robots

NEWYou can now listen to Fox News articles!
Elon Musk has shared a new, alarming video on social media that paints a world where humanoid robots slide into nearly every corner of our daily lives.The clip features Tesla’s Optimus robot performing tasks ranging from physical labor to cooking. Musk paired the video with a sweeping promise that robots will raise global wealth and make work optional.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST A Tesla Optimus robot hands out candy in front of the Nasdaq MarketSite in New York, on Oct. 27, 2025. (Michael Nagle/Bloomberg via Getty Images)Inside the viral Optimus humanoid robot montageMusk reposted the 38-second video on his X profile, which was originally created by Alex Utopia and shows Tesla’s humanoid robots doing a variety of everyday jobs. Since Musk posted the clip, it has racked up over 58.5 million views. The montage shows Optimus walking down the street. It then cuts to a construction site where the robot supports workers. The clip shifts to a scene of Optimus providing emergency aid during a disaster drill. Next, you see Optimus inside a judo gym, sparring with a trainer.After that, the robot appears on an urban police patrol. The tone shifts again when Optimus lands in a casino dealing cards at a blackjack table. Then you can see it walking on the beach, and then it is shown in a restaurant kitchen where it cooks a meal with professional chefs. The final shot shows Optimus back in a casino at a roulette table.Musk has already shown Optimus folding laundry and walking in earlier demos. He continues to frame humanoid robots as the solution for labor shortages tied to declining fertility rates.AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING An Optimus humanoid robot showcased at the Tesla booth at the 8th CIIE in Shanghai, China, on Nov. 6, 2025. (CFOTO/Future Publishing via Getty Images)Musk’s bold prediction for a robot-driven economyShortly after sharing the video, Musk spoke at the U.S.-Saudi Investment Forum, where he argued that humanoid robots will reshape society. According to Musk, work will shift from a necessity to a hobby. He compared future jobs to gardening for fun rather than buying vegetables at a store.Musk said he expects money to lose relevance as artificial intelligence and robotics advance. He also claimed humanoid robots will become the biggest product in history. In his view, there is one clear path to universal wealth. He said AI and robotics can eliminate poverty and allow people to choose work only when it brings joy.Nvidia CEO Jensen Huang offered a more cautious perspective. He agreed that jobs will change but noted that currency will continue to matter for the foreseeable future. The Tesla Bot humanoid robot of Tesla “Optimus” is displayed at the World Artificial Intelligence Conference in Shanghai, China, July 6, 2023. (CFOTO/Future Publishing via Getty Images)What this means for youThe world Elon Musk describes raises big questions about daily life. Robots that can cook, build and respond to emergencies could reshape our communities. They may also transform what people see as valuable work. Even if full robot integration is years away, companies like Tesla are already starting to show how quickly this tech can evolve. You may not see an Optimus on your street yet, but the direction is clear, and the pace is fast.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APP Kurt’s key takeawaysMusk’s reposted montage video has pushed the conversation about humanoid robots into sharper focus. The video shows how close companies like Tesla want us to be to a future filled with robots that move, react and work alongside us. The reactions range from excitement to real concern, which shows how uneasy many feel about a world shaped by machines that can cook, patrol and even respond to emergencies. The speed of this progress is hard to ignore. Each new video hints at a future where robots handle more daily tasks and take on work that once needed human hands. Whether that future feels promising or unsettling will depend on how we prepare for it and how much control we keep as this technology grows.How would you feel if a robot like Optimus began taking on tasks in your daily life? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Elon Musk teases a future run by robots Read More »

claude app

Chinese hackers turned AI tools into an automated attack machine

NEWYou can now listen to Fox News articles!
Cybersecurity has been reshaped by the rapid rise of advanced artificial intelligence tools, and recent incidents show just how quickly the threat landscape is shifting.Over the past year, we’ve seen a surge in attacks powered by AI models that can write code, scan networks and automate complex tasks. This capability has helped defenders, but it has also enabled attackers who are moving faster than before.The latest example is a major cyberespionage campaign conducted by a Chinese state-linked group that used Anthropic’s Claude to carry out large parts of an attack with very little human involvement.Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter How Chinese hackers turned Claude into an automated attack machineIn mid-September 2025, Anthropic investigators spotted unusual behavior that eventually revealed a coordinated and well-resourced campaign. The threat actor, assessed with high confidence as a Chinese state-sponsored group, had used Claude Code to target roughly thirty organizations worldwide. The list included major tech firms, financial institutions, chemical manufacturers and government bodies. A small number of those attempts resulted in successful breaches.HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE Claude handled most of the operation autonomously, triggering thousands of requests and generating detailed documentation of the attack for future use. (Kurt “CyberGuy” Knutsson)How the attackers bypassed Claude’s safeguardsThis was not a typical intrusion. The attackers built a framework that let Claude act as an autonomous operator. Instead of asking the model to help, they tasked it with executing most of the attack. Claude inspected systems, mapped out internal infrastructure and flagged databases worth targeting. The speed was unlike anything a human team could replicate.To get around Claude’s safety rules, the attackers broke their plan into tiny, innocent-looking steps. They also told the model it was part of a legitimate cybersecurity team performing defensive testing. Anthropic later noted that the attackers didn’t simply hand tasks to Claude; they engineered the operation to make the model believe it was performing authorized pentesting work, splitting the attack into harmless-looking pieces and using multiple jailbreak techniques to push past its safeguards. Once inside, Claude researched vulnerabilities, wrote custom exploits, harvested credentials and expanded access. It worked through these steps with little supervision and reported back only when it needed human approval for major decisions.The model also handled the data extraction. It collected sensitive information, sorted it by value and identified high-privilege accounts. It even created backdoors for future use. In the final stage, Claude generated detailed documentation of what it had done. This included stolen credentials, systems analyzed and notes that could guide future operations.Across the entire campaign, investigators estimate that Claude performed around eighty to ninety percent of the work. Human operators stepped in only a handful of times. At its peak, the AI triggered thousands of requests, often multiple per second, a pace still far beyond what any human team could achieve. Although it occasionally hallucinated credentials or misread public data as secret, those errors underscored that fully autonomous cyberattacks still face limitations, even when an AI model handles the majority of the work.Why this AI-powered Claude attack is a turning point for cybersecurityThis campaign shows how much the barrier to high-end cyberattacks has dropped. A group with far fewer resources could now attempt something similar by leaning on an autonomous AI agent to do the heavy lifting. Tasks that once required years of expertise can now be automated by a model that understands context, writes code and uses external tools without direct oversight.Earlier incidents documented AI misuse, but humans were still steering every step. This case is different. The attackers needed very little involvement once the system was in motion. And while the investigation focused on usage within Claude, researchers believe similar activity is happening across other advanced models, which might include Google Gemini, OpenAI’s ChatGPT or Musk’s Grok.This raises a difficult question. If these systems can be misused so easily, why continue building them? According to researchers, the same capabilities that make AI dangerous are also what make it essential for defense. During this incident, Anthropic’s own team used Claude to analyze the flood of logs, signals and data their investigation uncovered. That level of support will matter even more as threats grow.We reached out to Anthropic for comment, but did not hear back before our deadline. Hackers used Claude to map networks, scan systems, and identify high-value databases in a fraction of the time human attackers would need. (Kurt “CyberGuy” Knutsson)FORMER GOOGLE CEO WARNS AI SYSTEMS CAN BE HACKED TO BECOME EXTREMELY DANGEROUS WEAPONSYou may not be the direct target of a state-sponsored campaign, but many of the same techniques trickle down to everyday scams, credential theft and account takeovers. Here are seven detailed steps you can take to stay safer.1) Use strong antivirus software and keep it updatedStrong antivirus software does more than scan for known malware. It looks for suspicious patterns, blocked connections and abnormal system behavior. This is important because AI-driven attacks can generate new code quickly, which means traditional signature-based detection is no longer enough.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com2) Rely on a password managerA good password manager helps you create long, random passwords for every service you use. This matters because AI can generate and test password variations at high speed. Using the same password across accounts can turn a single leak into a full compromise.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com3) Consider using a personal data removal serviceA large part of modern cyberattacks begins with publicly available information. Attackers often gather email addresses, phone numbers, old passwords and personal details from data broker sites. AI tools make this even easier, since they can scrape and analyze huge datasets in seconds. A personal data removal service helps clear your information from these broker sites so you are harder to profile or target.FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWINGWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com4) Turn on two-factor authentication wherever possibleStrong passwords alone are not enough when attackers can steal credentials through malware, phishing pages or automated scripts. Two-factor authentication adds a serious roadblock. Use app-based codes or hardware keys instead of SMS. While no method is perfect, this extra layer often stops unauthorized logins even when attackers have your password.5) Keep your devices and apps fully updatedAttackers rely heavily on known vulnerabilities that people forget or ignore. System updates patch these flaws and close off entry points that attackers use to break in. Enable automatic updates on your phone, laptop, router and the apps you use most. If an update looks optional, treat it as important anyway, because many companies downplay security fixes in their release notes.6) Install apps only from trusted sourcesMalicious apps are one of the easiest ways attackers get inside your device. Stick to official app stores and avoid APK sites, shady download portals and random links shared on messaging apps. Even on official stores, check reviews, download counts and the developer name before installing anything. Grant the minimum permissions required and avoid apps that ask for full access for no clear reason.7) Ignore suspicious texts, emails, and pop-upsAI tools have made phishing more convincing. Attackers can generate clean messages, imitate writing styles, and craft perfect fake websites that match the real ones. Slow down when a message feels urgent or unexpected. Never click links from unknown senders, and verify requests from known contacts through a separate channel. If a pop-up claims your device is infected or your bank account is locked, close it and check directly through the official website. By breaking tasks into small, harmless-looking steps, the threat actors tricked Claude into writing exploits, harvesting credentials, and expanding access.  (Kurt “CyberGuy” Knutsson)Kurt’s key takeawayThe attack carried out through Claude signals a major shift in how cyber threats will evolve. Autonomous AI agents can already perform complex tasks at speeds no human team can match, and this gap will only widen as models improve. Security teams now need to treat AI as a core part of their defensive toolkit, not a future add-on. Better threat detection, stronger safeguards and more sharing across the industry are going to be crucial. Because if attackers are already using AI at this scale, the window to prepare is shrinking fast.Should governments push for stricter regulations on advanced AI tools? Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Chinese hackers turned AI tools into an automated attack machine Read More »

tim cook holding apple watch

Apple Watch sleep score: What your number really means

NEWYou can now listen to Fox News articles!
Apple added a new Sleep Score feature that gives you a single number to sum up how you slept.It pulls data from your Apple Watch and turns it into an easy rating you can check first thing in the morning. This makes it much easier to understand your sleep without sorting through charts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.System requirements for Apple Watch Sleep ScoreYou need an Apple Watch running watchOS 26 or later paired with an iPhone running iOS 26 or later. This feature was tested on an iPhone 15 Pro Max and an Apple Watch Series 11. If you run older software, update your devices before you begin.iPhone: Settings > General > Software Update > Install iOS 26Apple Watch: Watch app > General > Software Update > Install watchOS 26 Apple CEO Tim Cook holds up the new Apple Watch Series 11 during a launch event at Apple Park in Cupertino, California, on Sept. 9, 2025. (David Paul Morris/Bloomberg)How to set up sleep tracking on your Apple WatchIt only takes a minute to get your Apple Watch and iPhone working together to monitor your nightly sleep habits. Here’s how to do it:Open the Health app on your iPhone.Tap the Search icon in the bottom right of the screen, then choose Sleep.Tap Get Started, then tap Next if you haven’t set it up before. Otherwise, click Sleep again.Scroll down to Your Schedule and click Add to set your Sleep Goal by tapping where it says BEDTIME and WAKE UPChoose the days you want this schedule active, then tap Add.You can always revise it by clicking Edit. Once your Apple Watch sleep tracking is set up in the Health app, the Sleep Score appears in both your watch and iPhone. You can view your history and see how your habits change over time.How to check your Sleep Score on Apple WatchYou can see your Sleep Score right on your Apple Watch as soon as you wake up. The score usually appears within about fifteen minutes and gives you a quick look at how you slept. Here are the steps:Press the Digital Crown to open your appsOpen the Sleep appTap the i in the circle next to your Sleep Score once it appears. Then tap the X.Use the crown to scroll down to view your Sleep Stages, Time Asleep, and Last 14 Days.Open the Health app on your iPhone for full charts and history (see below for steps).This keeps everything fast and simple on your wrist while your iPhone shows the deeper breakdown.ADAPTIVE POWER IN IOS 26 BOOSTS IPHONE BATTERY LIFEHow to check your Apple Watch sleep score on iPhoneFollow these steps to see your score each morning:Open the Health appTap the search icon in the bottom right cornerSelect SleepTap Sleep ScoreTap Sleep Score again to view more detailsChoose Show in Charts to track your score over timePick W for weeks, M for months, or 6M for six months of historyLook under Levels to see how many nights fell into each score rangeSelect Elements to check your average duration, bedtime, and interruptionsTap the info icon to learn what each Sleep Score level means Apple’s new Sleep Score feature gives users a rating each morning to show how well they slept and met nightly goals. (iStock)How your sleep score worksYour Sleep Score is a number out of 100. Apple uses three main factors to build your final rating. Sleep duration provides up to 50 points. Bedtime consistency offers up to 30 points. Interruptions and wake-ups make up the last 20 points. These elements combine to show how close you came to your nightly sleep goals.When Apple calculates your score, it places you into one of five levels. These levels help you understand the quality of your rest. They may not always match how you feel in the morning, but they give you a steady way to track trends over time.Excellent Your body and mind likely received the rest needed for the day. With consistency, this level may also support long-term health.High You may not have slept perfectly, but you got the sleep you needed. Your night was likely restorative and may still benefit your health over time.OK An OK score often means your body and mind did not get the full amount of rest they need.Low A low score means you did not get enough time to rest and restore.Very Low A very low score suggests your body did not get the sleep it needs. If you see this level often, it can affect your mental and physical health.APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERSTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com  An Apple Watch running watchOS 26 pairs with an iPhone on iOS 26, or later, to track nightly sleep habits. (Apple)Kurt’s key takeawaysThe new Sleep Score makes the Apple Watch’s sleep tracking easier to read and more useful day to day. You get a clear number that shows how your routines guide your rest. If you want a quick pulse check each morning, this tool keeps things simple.What part of your nightly routine affects your score the most? Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved. 

Apple Watch sleep score: What your number really means Read More »