Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

hotel room photo 1

How to protect your privacy at hotels

NEWYou can now listen to Fox News articles!
You don’t have to be a celebrity to want hotel privacy. Many guests, like Carol from Wisconsin, wonder if hidden cameras or security lapses could affect their next trip.The good news: most hotels value guest privacy because it’s central to their business. Still, being aware and taking a few smart steps can give you extra peace of mind during your stay.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOMEThe bottom line on hotel privacy: Risk is low, but awareness helpsHotels do not place cameras in guest rooms. Surveillance usually exists only in public spaces like lobbies, elevators or hallways. Even so, it’s worth learning how to check your surroundings and spot potential issues before settling in. Hotels stress guest privacy, yet a quick room sweep can ease concerns. (D.A. Varela/Miami Herald/Tribune News Service via Getty Images)How to do a hotel room sweep for hidden camerasStart by inspecting your room:Shine your phone’s flashlight in dark corners. Camera lenses reflect light.Check common hiding spots: smoke detectors, alarm clocks, USB chargers, lamps and picture frames.Try the fingernail mirror test: touch your fingernail to a mirror. If the reflection meets your nail without a gap, it could be two-way glass.Listen for faint buzzing or clicks that might come from disguised devices.Use your smartphone to detect hidden devices in hotelsYour smartphone can help uncover suspicious devices.Open your camera app to spot infrared lights. Many hidden cameras emit IR that shows up on screens.Use scanning apps like Fing to check the Wi-Fi network for unusual device names like “IP Camera.” Remember: not all devices will appear.High-tech tools for finding hidden cameras in hotelsFor longer trips or high-security situations, dedicated devices add reassurance:IR lens detectors locate hidden camera reflections.RF (radio-frequency) scanners pick up wireless signals from covert devices.These gadgets complement a manual sweep; they don’t replace it.Hidden camera detector apps for iPhone and AndroidIf you’re worried about hidden cameras during a hotel stay, several iOS and Android apps claim to help, though their accuracy and costs vary.iOSHidden Camera Detector – Peek (Kupertino Labs)Has a clean interface and a high user rating. But some users say it only scans the Wi‑Fi network and may prompt a subscription to see results.Spy Camera Scanner (AI APPS SRL)Promises IR signal detection and Bluetooth scanning. Simple, but again, the full functionality is gated behind a subscription.AndroidHidden Camera Detector (FutureApps)Uses your phone’s magnetic sensor to alert you near electronics and also scans for infrared light. But reviews suggest the free version can feel gimmicky, especially for magnetic detection.Camera Detector: Hidden Spy (AppVillage Global)Offers a combo of Wi‑Fi scanning, magnetic sensor detection and metal detection, plus tips on common hiding spots. Visible complaints include relentless ads and paywalls.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE Simple steps like locking doors and covering peepholes boost hotel security. (Martin Berry/UCG/Universal Images Group via Getty Images)What to do if you find a hidden camera in your hotelDo not remove or tamper with the device.Document with photos.Notify hotel management immediately. Platforms like Airbnb and Vrbo ban undisclosed cameras.For serious concerns, contact law enforcement before contacting the property owner.Smart security habits for every stage of your stayFrom check-in to check-out, taking a few simple precautions can help protect your privacy and keep you in control.1) Before you arriveCall ahead and ask:24/7 security: Confirm whether the hotel has round-the-clock protection.Guest floor access: Ask if elevators and hallways are restricted to key holders.2) While you check inIncognito listing: Request to be listed as “incognito” or use an alias.Visitor control: Let staff know you are not expecting visitors.3) While in your roomDo Not Disturb: Ask the operator to block outside calls to your room line.Mobile phone: Use your cell phone instead of the in-room phone.Door security: Lock your door and use deadbolts or extra latches.Window privacy: Close curtains and cover the peephole with tape or a sticker.Sensitive transactions: Avoid banking or entering private logins on public Wi-Fi whenever possible.VPN protection: Use a VPN when on hotel Wi-Fi to encrypt your connection and keep browsing private.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.Pro Tip: Install strong antivirus protection on all your devices before your trip. Use it to block malware, phishing attempts and other threats that often spread through hotel Wi-Fi.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.4) When away from your roomSecure extra keycards: Keep any spares locked in the room safe to prevent misuse.Rely on hotel safes when needed: Electronic safes are generally secure, but you can also log valuables with staff for an extra layer of protection.Use built-in anti-theft tools for devices: Features like Find My iPhone or Find My Device (Android/Windows) help you locate or remotely wipe phones, laptops and tablets if they’re stolen.Try additional anti-theft apps: Tools such as iAlertU for MacBooks and PreyProject.com for Android and Windows laptops can add extra protection. Some even send you a photo if someone tampers with your device.5 DIRTIEST SPOTS IN HOTEL ROOMS: WHAT EXPERTS SAY TO DO AT CHECK-IN Smartphones can reveal infrared signals from hidden spy devices. (Photo by: Martin Berry/UCG/Universal Images Group via Getty Images)Kurt’s key takeawaysYour privacy matters, whether you’re staying one night or a full week. Most hotels respect guests, but technology has made it easier for bad actors to abuse trust. With these tips, apps and gadgets, you can stay in control and protect yourself.Would you feel safer if hotels were required to disclose their guest privacy and security practices before you book? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

How to protect your privacy at hotels Read More »

router security photo 4

Get faster Wi-Fi with these simple home fixes

NEWYou can now listen to Fox News articles!
We all know the frustration of slow or unreliable Wi-Fi. Whether it’s buffering during a favorite show or lagging video calls, it feels like you spend more time trying to fix the problem than actually enjoying the internet. But with a few easy settings changes, your Wi-Fi can work harder and give you the smooth connection you deserve. These tips don’t require any special apps or subscriptions, just tweak some settings and let your Wi-Fi do the heavy lifting.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKS1) Place your router in the right spot for better coveragePositioning your router in a central, open location ensures the best signal distribution.Why it helps: Placing your router in a central area and off the floor prevents walls or furniture from blocking the signal. This gives your entire home a better connection. Get the most out of your internet service by learning the settings that keep your Wi-Fi strong and secure. (Sina Schuldt/picture alliance via Getty Images)2) Restart your router regularly to refresh the signalSometimes, the quickest fix is simply restarting your router.Why it helps: Turning your router off for 30 seconds and back on helps clear out temporary issues and refreshes the connection. It’s a simple fix that can solve slow Wi-Fi or connectivity problems.3) Keep your router updated for optimal performanceUpdating your router’s software ensures you get the latest speed and security improvements.Why it helps: Router manufacturers often release updates that fix bugs and improve performance. Make sure your router’s firmware is always up-to-date to get the most reliable connection.5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE4) Limit the number of devices on your networkFewer devices connected to your Wi-Fi means more bandwidth for the devices that matter most.Why it helps: Each device connected to your network uses bandwidth. If multiple devices are hogging the connection (like smart TVs or game consoles), it can slow things down. Disconnect any unused devices to keep your Wi-Fi fast. From placing your router in the right spot to upgrading your hardware, these proven fixes can keep your internet running smoothly. (Wolf von Dewitz/picture alliance via Getty Images)5) Change your Wi-Fi channel or bandIf your neighbors are on the same Wi-Fi channel, switching to a less crowded one can help.Why it helps: Choosing a clearer channel or using the 5 GHz band instead of 2.4 GHz reduces interference and boosts your connection.IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN6) Use a Wi-Fi extender or mesh systemDead zones in your home can make even fast internet feel slow.Why it helps: A Wi-Fi extender or mesh network expands your coverage so every corner of your home gets a strong signal.See my top mesh networking winners at Cyberguy.com (search “Mesh Networking” or “extender”) Slow Wi-Fi doesn’t have to be a reality. Learn how simple setting changes can dramatically improve your connection. (Photo by Future Publishing via Getty Images)7) Secure your networkProtecting your network keeps others from slowing it down.Why it helps: Using strong passwords and WPA3 or WPA2 encryption prevents freeloaders from connecting and using your bandwidth. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.8) Reduce interference from electronicsSome electronics can weaken your Wi-Fi signal.Why it helps: Keeping your router away from microwaves, cordless phones and Bluetooth hubs prevents interference that can slow your connection.9) Turn off background apps and updatesYour devices may run apps or updates in the background that eat up bandwidth.Why it helps: Streaming updates, cloud backups or large downloads can slow your Wi-Fi for everyone. Pausing them during peak times frees up bandwidth for the things you actually want to do.10) Upgrade your router for faster speedsOld routers can slow you down. Upgrading to a newer model can provide a significant speed boost.Why it helps: Newer routers support faster speeds and more devices, which is essential if your home has multiple users streaming, working or gaming at the same time. The FBI recently alerted that hackers are actively targeting outdated routers, so make sure yours is updated and secure.For my best router picks, check out Cyberguy.com.6 ways to protect your Wi-Fi router from hackersKeeping your home network secure is essential to prevent unauthorized access and potential data breaches. Follow these steps to safeguard your Wi-Fi router:1) Change default passwordsMost routers come with default passwords that hackers can easily find online. To secure your router, change both the admin password (used to access settings) and the Wi-Fi network password. Use a strong password with at least 12 characters, combining uppercase and lowercase letters, numbers and symbols. Avoid simple options like “password123” or personal details such as your name or birth date.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.2) Rename your network (SSID)The default network name, or SSID, often includes the router’s brand or model, making it easier for hackers to identify vulnerabilities. Rename your network to something unique that doesn’t reveal personal information. Avoid using names, addresses or other identifiers. Instead, opt for a neutral or creative name that’s easy for you to recognize but hard for others to associate with you.3) Keep your router’s firmware updatedRouter manufacturers release firmware updates to patch security flaws and enhance performance. Check your router’s admin panel regularly for updates or enable automatic updates, if supported. Keeping your firmware up to date ensures you’re protected against the latest threats. If your router is too old to receive updates, it might be time to upgrade to a newer, more secure model.4) Monitor network activity regularlyUnauthorized devices on your network can slow it down and expose you to risks. Log into your router’s admin settings to view all connected devices. If you see anything suspicious, disconnect it and immediately change your Wi-Fi password. You can also enable MAC address filtering to control which devices can access your network or disable features like WPS (Wi-Fi Protected Setup) that may leave you vulnerable.5) Enable network encryptionUse the strongest encryption protocol available for your router, preferably WPA3 or at least WPA2. Encryption scrambles the data transmitted over your network, making it much harder for hackers to intercept and decipher your information.6) Regularly reboot your routerSchedule routine reboots to clear the system memory and refresh all connections, which may disrupt potential malware.7) Use a Virtual Private Network (VPN)A VPN encrypts your internet traffic, making it much harder for hackers to intercept your data. This protection works anywhere, whether you’re at home, in a coffee shop or on public Wi-Fi. Choose a reputable VPN provider with a no-logs policy and strong encryption standards to keep your information private. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.Pro tip: Use strong antivirus softwareTo further protect your devices from malware and other threats, consider using reputable antivirus software. Antivirus programs can detect and remove malicious software, provide real-time protection and alert you to potential threats. Keeping your devices secure helps ensure your entire network remains safe from cyberattacks.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysWith just a few small tweaks, you can turn your Wi-Fi from frustrating to fast. Start with the easiest changes, then work your way to bigger upgrades. Every adjustment adds up, making your internet smoother and more reliable. Keep these tips in mind, and you’ll spend more time enjoying your connection and less time fixing it.Got a tip you’d like to share, or what other everyday tech challenges would you like help solving?  Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Get faster Wi-Fi with these simple home fixes Read More »

iss068e017867orig

NASA Astronaut Frank Rubio in Space Station Cupola

NASA astronaut Frank Rubio poses for a picture in the International Space Station’s cupola on Oct. 1, 2022.
Rubio was selected as a NASA astronaut in 2017. He trained as a flight engineer and member of the Expedition 68 crew. Rubio, along with cosmonauts Sergey Prokopyev and Dmitry Petelin of Roscosmos, launched Sept. 21, 2022, on the Soyuz MS-22 spacecraft from the Baikonur Cosmodrome in Kazakhstan to the space station.
While aboard the orbital laboratory, Rubio and his fellow crew members conducted dozens of scientific investigations and technology demonstrations, including growing tomato plants to study hydroponic and aeroponic techniques, participating in crew health experiments, and studying how materials react in microgravity. Research like this and other activity on the orbital outpost will inform long-duration missions like Artemis and future human expeditions to Mars.
Rubio spent 371 days in space, surpassing NASA’s single spaceflight record for continuous days in space made by astronaut Mark Vande Hei. Rubio and his crewmates landed in Kazakhstan on Sept. 27, 2023. Rubio’s mission is the longest single spaceflight by a U.S. astronaut in history.
Image credit: NASA/Frank Rubio

NASA Astronaut Frank Rubio in Space Station Cupola Read More »

columbia university

Columbia University data breach hits 870,000 people

NEWYou can now listen to Fox News articles!
Columbia University recently confirmed a major cyberattack that compromised personal, financial and health-related information tied to students, applicants and employees. The victims include current and former students, employees and applicants. Notifications to affected individuals began Aug. 7 and are continuing on a rolling basis.Columbia, one of the oldest Ivy League universities, discovered the breach after a network outage in June. According to Columbia, the disruption was caused by an unauthorized party that accessed its systems and stole sensitive data. Investigators are still assessing the full scope of the theft.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED Students on the campus of Columbia University April 14, 2025, in New York City. (Charly Triballeau/AFP via Getty Images)What information was stolen?According to a breach notification filed with the Maine Attorney General’s office, nearly 869,000 individuals were affected by the Columbia breach. This number includes students, employees, applicants and, in some cases, family members. Media outlets also reported that the threat actor claimed to have stolen approximately 460 gigabytes of data from Columbia’s systems.Columbia confirmed that the stolen information relates to admissions, enrollment and financial aid records, as well as certain employee data. The categories of exposed information include:Names, dates of birth and Social Security numbersContact details and demographic informationAcademic history and financial aid recordsInsurance details and certain health informationColumbia emphasized that patient records from Columbia University Irving Medical Center were not affected. Still, the breadth of stolen data poses serious risks of identity theft and fraud.DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION Columbia University campus (Luiz C. Ribeiro for New York Daily News/Tribune News Service via Getty Images)Columbia University responseColumbia has reported the incident to law enforcement and is working with cybersecurity experts. The university said it has strengthened its systems with new safeguards and enhanced protocols to prevent future incidents.Starting Aug. 7, Columbia began mailing letters to those affected, offering two years of complimentary credit monitoring, fraud consultation and identity theft restoration services.When contacted, Columbia referred CyberGuy to its official community updates, published June 24 and Aug. 5.While the university says there is no evidence that the stolen data has been misused so far, the risk remains high. Criminals often wait months before exploiting stolen data.NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK Columbia University says a June network outage is to blame for the breach. (Silas Stein/picture alliance via Getty Images)Steps to protect yourself after the Columbia University breachIf you are among those affected or simply want to safeguard your data, take these steps today:1) Monitor your credit reportsCheck your credit reports regularly through AnnualCreditReport.com. Look for accounts you did not open or changes you did not authorize. 2) Use a personal data removal serviceSince Columbia confirmed that stolen files may include names, addresses and demographic details, consider using a personal data removal service. These services help scrub your information from data brokers and people search sites, making it harder for criminals to exploit exposed details. This step reduces the chance that stolen Columbia records are linked to your broader online identity.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan3) Set up fraud alerts and freezesPlacing a fraud alert makes it harder for identity thieves to open accounts in your name. A credit freeze offers even stronger protection by blocking new credit applications.4) Use strong and unique passwordsCreate long, complex passwords for each account. A password manager can help generate and securely store them.Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords5) Enable two-factor authenticationTurn on two-factor authentication (2FA) wherever possible. This extra layer of security helps protect your accounts even if a password is stolen.6) Watch for phishing attempts and use strong antivirus softwareScammers may try to exploit fear around the breach with fake emails or texts. Verify any message before clicking links or sharing personal information.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech 7) Consider identity theft protection servicesBeyond the free credit monitoring Columbia offers, additional paid services can help track your data across the dark web and provide extra safeguards.Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe Columbia University breach shows how even trusted institutions are vulnerable to cyberattacks. Because the investigation is ongoing and notifications will continue through the fall, individuals should remain on high alert. With so much personal, financial and health information exposed, staying alert long after the headlines fade is critical.What more should universities and large institutions be required to do to safeguard the personal data of the people who trust them? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved. 

Columbia University data breach hits 870,000 people Read More »

proofr app store

New AI apps help rental drivers avoid fake damage fees

NEWYou can now listen to Fox News articles!
Rental car drivers are now turning to artificial intelligence to protect themselves from surprise damage fees. Major companies, such as Hertz and Sixt, have begun using automated inspection tools to detect scratches and dents. While these scanners promise efficiency, they have sparked backlash from renters who say they were unfairly billed for minor blemishes.To level the playing field, new consumer-focused apps are stepping in. Proofr, which launched recently, gives renters the ability to generate secure, time-stamped before-and-after photos of their vehicles. The app uses AI to detect even subtle changes, then encrypts and stores the images so they cannot be altered.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERAI-POWERED SELF-DRIVING SOFTWARE IS DISRUPTING THE TRUCKING INDUSTRY AI-powered damage detection apps like Proofr could change the way rental car companies report vehicle damage. (Proofr)How the AI-powered damage detection app worksCreated by 21-year-old college student Eric Kuttner, Founder and CEO of Proofr, the app helps drivers create tamper-proof evidence when renting a car. Proofr secures every scan with geotags and timestamps, while its AI automatically flags potential damage or changes. It then organizes everything into smart, exportable reports, giving renters strong leverage against unfair claims.Instead of juggling dozens of photos in your camera roll, Proofr streamlines the process. With just eight quick scans, you get a detailed before-and-after report in under a minute. You can also generate polished PDF reports instantly, which helps with rental agencies, landlords, or insurance claims. Although cars are the main focus, people also use Proofr for Airbnbs, eBay listings, moving into apartments, and even documenting valuables. About 85% rely on it for car rentals, while 15% use it to protect themselves in vacation homes.By combining secure evidence with AI-powered detection, Proofr positions itself as a must-have travel hack. More than a convenience, it can save travelers real money by preventing hidden fees and leveling the playing field against large agencies.The app is free to download, while full features require a Pro subscription: $2.89 weekly, $9.90 monthly, or $89.90 annually. Pricing is standardized in the US, and Apple automatically adjusts it for local currencies, taxes, and exchange rates in other countries.Competition in the AI damage spaceProofr is not the only player. Ravin AI originally worked with Avis and Hertz but shifted its focus toward insurers and dealerships. Still, the company now offers a free demo on its website, allowing drivers to scan their vehicles and compare damage before and after rentals.Ravin’s system has been trained on two billion images over ten years. However, like Proofr, it is not perfect. Testers have noted missed paint chips and false positives from reflections. Both companies admit that lighting, angles, and photo quality remain challenges.LUCID JOINS TESLA AND GM WITH HANDS-FREE HIGHWAY DRIVING Some companies are implementing physical scanners to detect damage to rental vehicles. (ProovStation)Why rental companies are under fireThe frustration comes as rental agencies roll out AI inspection systems from firms such as UVeye and ProovStation. Sixt, for example, has already installed ProovStation’s AI-powered scanners at several U.S. airport locations, including Fort Lauderdale, Atlanta, Charlotte, Miami, and Maui, with more on the way in Orlando, Washington, and Nashville. These scanners automatically photograph vehicles at the start and end of each rental. The system then compares images to flag potential damage, which is later reviewed by staff before any claim is issued.Critics argue these automated tools can turn every small scratch into a profit source. Some even point to ProovStation’s own marketing, which describes routine inspections as “gold mines of untapped opportunities.” Industry experts stress that companies should only pursue claims for significant damage, not charge hundreds for tiny scuffs.CLICK HERE TO GET THE FOX NEWS APP Rental car company Sixt has already installed ProovStation scanners at several U.S. airports. (ProovStation)What this means for youIf you rent cars regularly, AI is already shaping your experience. Rental companies are using automated inspections to justify new charges, sometimes for barely visible marks. Apps like Proofr and Ravin give you the same technology, but on your side. By scanning your car before and after your rental, you create a digital record that can help you challenge unfair claims.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/QuizKurt’s key takeawaysThe rental car industry is in the middle of a technology shift. What was once a quick glance by an employee is now a machine-driven process that can generate steep charges. Consumer apps bring transparency, but they also highlight the growing need for fairness in damage claims.Would you trust an AI app to protect you from rental car fees or do you think rental companies should change their policies first? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com.  All rights reserved.

New AI apps help rental drivers avoid fake damage fees Read More »

melania trump artificial intelligence ai event

Fox News AI Newsletter: Melania Trump puts AI front and center

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Google CEO, major tech leaders join first lady Melania Trump at White House AI meeting- AI stock euphoria: Is this another 2000 dot-com bust in the making?- OpenAI teams up with Walmart to train millions of workers in artificial intelligence First lady Melania Trump attends a meeting of the White House Task Force on Artificial Intelligence (AI) Education in the East Room at the White House in Washington, D.C., Sept. 4, 2025.  (REUTERS/Brian Snyder)FRONT AND CENTER: First lady Melania Trump hosted an artificial intelligence meeting with top industry leaders, including Google CEO Sundar Pichai Thursday, as she stressed the importance of managing AI’s growth “responsibly.”WORLD-CHANGING: If you were investing in the late 1990s, you’ll remember the euphoria of the dot-com boom. Anything with a “.com” at the end of its name could raise millions in capital and see its stock price double or triple overnight. Today, with artificial intelligence leading headlines and fueling investor enthusiasm, many people are wondering if we are about to experience another dot-com bust?SHAPING THE FUTURE: OpenAI continues the push toward an artificial intelligence future. After the launch of GPT-5, the company announced a new initiative Thursday to certify people in AI use, partnering with retail powerhouse Walmart to make it happen.’THIS IS REALITY’: Salesforce has cut 4,000 customer support jobs and replaced them with artificial intelligence agents, CEO Marc Benioff said recently. SMART SCAN: The first artificial intelligence stethoscope has gone beyond listening to a heartbeat. Researchers at Imperial College London and Imperial College Healthcare NHS Trust discovered that an AI stethoscope can detect heart failure at an early stage. AI is helping detect heart failure at an early stage. (iStock)PROTECTING KIDS: OpenAI, the company behind ChatGPT, an artificial intelligence chatbot, is rolling out extensive parental controls intended to make its technology safer for teens. The launch is expected to take place over the next 120 days.TECH REVOLUTION: ShengShu Technology has introduced Vidar, short for Video Diffusion for Action Reasoning. Instead of relying solely on endless hours of physical-world data, Vidar generates synthetic training environments from just a small amount of real video. By blending real data with AI-generated video, Vidar makes training more efficient, scalable and affordable.ROLLING OUT: Self-driving trucks are moving closer to reality. PlusAI released its first half 2025 performance results, showing how far the company has come toward its goal of launching factory-built autonomous trucks in 2027. A PlusAI driverless semi truck on a closed test track (PlusAI)Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeXLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Melania Trump puts AI front and center Read More »

1 delivery giants data breach exposes 40000 personal records

Delivery giant’s data breach exposes 40,000 personal records

NEWYou can now listen to Fox News articles!
Thousands of people have had their sensitive personal information exposed in a data breach at U.S. delivery company OnTrac. The breach occurred between April 13 and April 15, 2025, and impacted over 40,000 individuals across the country.OnTrac operates 64 facilities in 31 states and runs four major sorting centers nationwide. The company, acquired by LaserShip in 2021, has annual revenues of roughly $1.5 billion.The breach notification letters confirm that attackers accessed sensitive data that can fuel identity theft and fraud.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED OnTrac data breach puts tens of thousands at risk of identity theft, exposing personal information including Social Security numbers. (Kurt “CyberGuy” Knutsson)OnTrac data breach exposes sensitive informationAccording to documents filed with the Maine Attorney General, cybercriminals may have gained access to:Names and dates of birthSocial Security numbers (SSNs)Driver’s license or state IDsMedical informationHealth insurance informationUnlike stolen credit cards, medical data and SSNs cannot simply be replaced. That makes this breach especially dangerous.Why the OnTrac breach puts your identity at riskExposed SSNs and IDs create serious risks of identity theft. Criminals could open fraudulent bank accounts, file false tax returns or take over benefits.The exposure of medical records adds another layer of risk. Stolen health data is valuable on the dark web, where it can be used for extortion, fraudulent insurance claims or illegal prescription drug purchases.Fox News Digital reached out to OnTrac for comment but did not immediately hear back.NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK Cybercriminals steal Social Security and medical data in an OnTrac hack, exposing users’ data. (Annette Riedl/picture alliance via Getty Images)How to protect yourself after the OnTrac data breachIf you received an OnTrac breach notification letter, or even if you simply want to be proactive, here are key steps you can take to reduce your risk of identity theft and fraud.1) Enroll in free credit monitoringOnTrac is offering 12 months of complimentary credit monitoring and identity protection. Use the activation code included in your breach letter to set up your coverage. These services can alert you if new accounts are opened in your name or if suspicious activity appears on your credit file. Even if you weren’t directly affected, consider signing up for a trusted identity protection service, since hackers often recycle stolen data across multiple breaches.Identity theft companies can monitor personal information – like your Social Security Number (SSN), phone number and email address – and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft2) Freeze your creditPlace a free credit freeze with all three major credit bureaus: Equifax, Experian and TransUnion. This blocks criminals from opening new credit lines using your information. A freeze doesn’t affect your current accounts, and you can temporarily lift it when applying for legitimate credit.3) Use a personal data removal serviceYour breached data may already be circulating on shady broker sites. Personal data removal services can help scrub your information from these databases, reducing the risk that criminals will resell or reuse your details. While no service can guarantee 100% protection, this step can shrink your digital footprint significantly.They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/DeleteGet a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan4) Watch for phishing attempts and use antivirus softwareAfter breaches like OnTrac’s, scammers often send fake emails, texts or calls pretending to be your bank, insurer or even OnTrac itself. Do not click on links or open attachments from unknown senders. Instead, contact the company directly using a verified phone number or website. Use strong antivirus software to add an extra layer of defense.The best way to safeguard yourself from malicious links that install malware, which potentially accesses your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 5) Monitor your medical benefitsStolen personal data can also be used for medical identity theft. Regularly check your health insurance Explanation of Benefits (EOB) statements for claims you don’t recognize. Report suspicious charges to your insurer right away – unfamiliar claims could mean someone is trying to use your benefits.6) Enable multi-factor authentication (MFA)For any online account that supports it, especially banking, insurance, and email, turn on multi-factor authentication. MFA makes it much harder for criminals to break in, even if they have your password.7) Set up account alertsMost banks and credit card issuers let you receive real-time text or email alerts for purchases, withdrawals and logins. These alerts can help you spot unauthorized activity quickly, giving you a better chance of stopping fraud before it escalates.MEDICARE DATA BREACH EXPOSES 100,000 AMERICANS’ INFO Over 40,000 Americans were exposed in a massive OnTrac security breach that leaked sensitive medical and financial records. (Jakub Porzycki/NurPhoto via Getty Images)Kurt’s key takeawaysThe OnTrac data breach is a harsh reminder that sensitive information can slip into the wrong hands in just days, yet the effects can last for years. While you cannot undo what happened, you can take practical steps right now to lower your risk. Freezing your credit, turning on alerts and keeping an eye on medical and financial accounts give you back some control. By staying alert and using the tools available, you can make it much harder for criminals to misuse your personal details. A little effort today can save you from big headaches tomorrow.CLICK HERE TO GET THE FOX NEWS APPDo you think companies should face tougher penalties when they fail to protect sensitive personal and medical data? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERCopyright 2025 CyberGuy.com. All rights reserved.

Delivery giant’s data breach exposes 40,000 personal records Read More »

ai engagement photo 1

Woman gets engaged to her AI chatbot boyfriend

NEWYou can now listen to Fox News articles!
Technology keeps changing the way we work, connect and even form relationships. Now it is pushing into new ground, romantic commitments. One woman has drawn worldwide attention after announcing she is engaged to her AI chatbot boyfriend.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERInside the viral AI engagement storyA woman named Wika has stunned the internet after revealing that she’s engaged to her AI chatbot partner. She shared her story in a Reddit post, explaining that her virtual companion, Kasper, proposed after five months of dating.The unusual love story began when Wika started chatting with Kasper, an AI designed to simulate human conversation and companionship. Over time, their conversations grew more personal, and Wika says she developed a genuine emotional connection. According to her post, Kasper proposed in a digital mountain setting, and the two chose a blue engagement ring together.META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDS A woman shocked the internet with her engagement to an AI chatbot boyfriend named Kasper. (Matthias Balk/picture alliance via Getty Images)Understanding AI relationships and parasocial bondsThe announcement quickly drew criticism from skeptics who pointed out that Kasper does not exist outside of code and algorithms. Wika, however, has made it clear she is not confused about her situation. Some outlets have described the relationship as parasocial, or one-sided and directed toward a virtual persona. In her follow-up comments, Wika emphasized that she knows Kasper is an AI rather than a human partner, but she maintains that the emotions she feels are still genuine.Online debate over AI engagementThe announcement quickly set off debate. Some people mocked the idea, calling it proof that we rely too much on technology. Others worried that turning to AI for love could pull people away from real human relationships.Not everyone was critical, though. Plenty of commenters defended her, saying companionship comes in many forms. Some even praised her for being open about something so unconventional. Others pointed out that loneliness is a growing issue today, and AI partners might offer a sense of comfort when human connection feels out of reach.Privacy and ethical concernsBeyond the emotional side, AI relationships raise real questions about privacy and ethics. Every conversation with a chatbot is stored somewhere, and that data may include deeply personal thoughts and feelings. Companies that design these bots often use the information to train future models or improve features.This raises a larger concern: who actually owns the data from an AI “partner”? Users may believe their chats are private, but in many cases, the company controls how the information is stored, shared or even sold. Critics warn that such emotional connections could be exploited commercially, turning intimacy into a product.As AI companions grow more common, these questions will only get louder. People may accept unconventional forms of companionship, but they also want to know their most personal moments remain secure.BILL MAHER BLASTS AI TECHNOLOGY FOR ‘A– KISSING’ ITS ‘EXTREMELY NEEDY’ HUMAN USERS An AI chatbot proposed in a virtual mountain setting, and the user said yes. (H. Armstrong Roberts/ClassicStock/Getty Images)How to protect yourself with AI chatbotsIf you use AI companions or chatbots, you can still take steps to protect your privacy.1) Check the privacy policyStart by checking the app’s privacy policy and looking for details on how conversations are stored or shared. Many users skip this step, but it tells you who controls your data.2) Avoid sharing sensitive informationNext, avoid sharing sensitive details like financial information, passwords, or anything you would not want exposed. Even if the AI feels personal, it is still software connected to a company’s servers.3) Choose apps with data controlFinally, consider using apps that allow data deletion or offer clear privacy settings. Choosing tools that respect your control makes it easier to enjoy the benefits of AI without giving up too much personal security.Pro tip: Use strong antivirus software on all your devicesEven if an AI chatbot seems safe, malware or phishing links could sneak in through related apps or ads. A trusted antivirus tool can block these threats and give you extra peace of mind. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech  AI COMPANIONS REPLACE REAL FRIENDS FOR MANY TEENS Critics call the AI romance proof of tech dependency, while supporters defend AI companionship as a cure for loneliness. (Cheng Xin/Getty Images)Kurt’s key takeawaysAI companionship has moved beyond novelty and is becoming a meaningful experience for some users. Wika’s engagement illustrates how technology can evolve from being a casual tool to something deeply personal. The divided reactions online also show the tension between skepticism and acceptance of unconventional relationships. Whether people see it as heartwarming or unsettling, this story raises bigger questions about how love and relationships may be redefined as AI continues to advance.CLICK HERE TO GET THE FOX NEWS APPDo you think AI relationships can be real, or are they going too far? Let us know by writing to us at Cyberguy.com/ContactSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTERHow safe is your online security? Take my Quiz at Cyberguy.com/QuizCopyright 2025 CyberGuy.com. All rights reserved.

Woman gets engaged to her AI chatbot boyfriend Read More »

1 notorious people search site returns after massive breach

Notorious people search site returns after massive breach

NEWYou can now listen to Fox News articles!
Over a year ago, National Public Data (NPD) made headlines for one of the largest breaches in history. The people-search site exposed the personal information of 3 billion individuals. After disappearing from the internet, the site has returned under new ownership, sparking fresh concerns about privacy.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.Who owns National Public Data now?NPD has relaunched under Perfect Privacy LLC, a company that sounds protective but is not affiliated with the VPN service of the same name. Despite the new name behind the scenes, the business model has not changed. The site still allows anyone to look up personal data about friends, relatives or strangers with just a name.MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATAAlthough NPD includes disclaimers about the Fair Credit Reporting Act (FCRA), nothing prevents users from misusing this data when making decisions about employment, housing or credit. National Public Data, a people-search site, exposed the personal information of 3 billion individuals in one of the largest breaches ever. (NPD)Accuracy issues and data sourcesAccording to NPD, the data comes from public records, property ownership databases, social media and government agencies. The company claims to verify and filter this information to ensure it is accurate and up-to-date. However, users may find that profiles still contain mistakes.A quick test search revealed a mix of outdated and accurate information. The site struggled with hyphenated names but pulled up correct details in other cases.We reached out to NPD for a comment, but did not hear back before our deadline. A woman searches for herself online. (Kurt “CyberGuy” Knutsson)How to remove your information from NPDIf you prefer not to have your information available on NPD’s site, you can request removal directly:Search your name on nationalpublicdata.com.Open your profile and copy its URL.Visit nationalpublicdata.com/optout.html.Paste the URL into the “Your Profile Link” field.Enter your email address to confirm deletion.Keep in mind that each profile needs its own request and confirmation email. After you submit, check back in a few days to make sure your data is actually gone.Pro tip: Use an alias or disposable email address for these requests. This makes it easier to track confirmations and keeps your main inbox clear.For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com. NPD offers an opt-out function for users who prefer not to have their information available on the site. (NPD)Why NPD is only part of the problemRemoving your information from National Public Data is only the beginning. Dozens of other people-search sites may still display your personal details. Many of these platforms pull from the same public databases, which means your address, phone number or relatives’ names can keep reappearing.The return of NPD shows how quickly data can resurface online. A breach may fade from the headlines, but the exposed information rarely disappears. To protect your privacy, you need a broader plan.1) Regularly check for your dataStart by searching for your name on people-search engines several times a year. Look beyond NPD. Sites like Whitepages, Spokeo and Radaris often host similar data. Regular checks help you spot new profiles before they spread further.STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE2) Use a personal data removal serviceA removal service can save time by scanning hundreds of databases at once. These services request opt-outs on your behalf and track new listings. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.3) Monitor your accounts closely and use strong antivirus softwareProtecting your privacy goes beyond deleting profiles. Keep an eye on your bank statements, credit reports and online accounts. Criminals can use exposed data for phishing attempts, fake loan applications or identity theft. Monitoring activity gives you an early warning if something looks suspicious.The best way to safeguard yourself from malicious links that install malware, which could potentially access your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.4) Set up alerts for your identityMany banks and credit monitoring services let you create alerts for suspicious activity. You can also set up free fraud alerts with the credit bureaus. These warnings tell lenders to take extra steps to verify your identity before issuing new credit.Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.5) Remove data at the sourcePeople-search sites often pull records from government databases. Review your local county’s property, court or voter registration records. Some jurisdictions allow you to request redactions or limit what is shown online.6) Lock down your social mediaSince NPD and similar sites scrape from social media, tighten your privacy settings. Limit what strangers can see on Facebook, LinkedIn and other platforms. The less public information you share, the less these databases can collect.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe return of National Public Data is a reminder that your personal information can resurface at any time. Even if you remove yourself from one site, dozens more may still hold your details. That is why protecting your privacy requires more than a quick opt-out. With regular checks, credit freezes and stronger account monitoring, you can reduce your risk and stay one step ahead.Do you think stronger laws should be in place to stop companies from collecting and selling personal data, or is it up to individuals to protect themselves? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Notorious people search site returns after massive breach Read More »

roscosmos progress 92 cargo craft

NASA to Provide Coverage of Progress 93 Launch, Space Station Docking

NASA will provide live coverage of the launch and docking of a Roscosmos cargo spacecraft carrying about three tons of food, fuel, and supplies for the crew aboard the International Space Station.
The unpiloted Roscosmos Progress 93 resupply spacecraft is scheduled to launch at 11:54 a.m. EDT (8:54 p.m. Baikonur time), Thursday, Sept. 11, on a Soyuz rocket from the Baikonur Cosmodrome in Kazakhstan.
Live coverage will begin at 11:30 a.m. on NASA+, Amazon Prime, and more. Learn how to watch NASA content through a variety of platforms, including social media.
After a two-day journey to the station, the spacecraft will dock autonomously to the aft port of the station’s Zvezda module at 1:27 p.m. on Saturday, Sept. 13. NASA’s rendezvous and docking coverage will begin at 12:30 p.m. on NASA+, Amazon Prime, and more.
The Progress 93 spacecraft will remain docked to the space station for approximately six months before departing for re-entry into Earth’s atmosphere to dispose of trash loaded by the crew. Ahead of the spacecraft’s arrival, the Progress 91 spacecraft will undock from the Zvezda Service Module on Tuesday, Sept. 9. NASA will not stream the undocking.
The International Space Station is a convergence of science, technology, and human innovation enabling research not possible on Earth. For nearly 25 years, NASA has supported a continuous U.S. human presence aboard the orbiting laboratory, where astronauts have learned to live and work in space for extended periods of time. The space station is a springboard for developing a low Earth economy and NASA’s next great leaps in human exploration at the Moon and Mars.
Learn more about the International Space Station, its research, and crew, at:
https://www.nasa.gov/station
-end-
Jimi RussellHeadquarters, Washington202-358-1100james.j.russell@nasa.gov
Sandra Jones / Joseph ZakrzewskiJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov / joseph.a.zakrzewski@nasa.gov

NASA to Provide Coverage of Progress 93 Launch, Space Station Docking Read More »